Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

H12-891_V1.0 Sample Questions Answers

Questions 4

The following statement about the application of BFD is correct?

Options:

A.

The one-arm echo function refers to the detection of the connectivity of the forwarding link through the loopback operation of the BFD packet

B.

BFD multi-hop detection means that BFD can detect arbitrary paths between two systems that may span many hops or overlap in some parts

C.

BFD and OSPF linkage is to associate BFD and OSPF, and notify OSPF through BFD's rapid sensing of link failures, thereby speeding up OSPF Response to changes in network topology

D.

BFD single-hop detection refers to the IP connectivity detection of two direct-connected systems

Buy Now
Questions 5

When the BFD detection intervals on both ends are 30ms and 40ms, are the following options described correctly? An A. BFD session can be established, which takes 40ms after negotiation

A B. BFD session can be established, which takes 30ms after negotiation

C. BFD sessions can be established, each occurring at its own interval

l D. BFD sessions cannot be established

Options:

Buy Now
Questions 6

An advanced access control list is a sequence of rules consisting of permit |deny statements that can match IP messages based on which attributes ?(). Multiple select).

Options:

A.

Destination port number

B.

Source address

C.

Destination address

D.

Source port number

Buy Now
Questions 7

Link state information is isolated by default between different IS-IS processes on the same router.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the following messages is required?

Options:

A.

Type5

B.

Type4

C.

Typel

D.

Type2

E.

Type3

Buy Now
Questions 9

The RSTP protocol provides a variety of protection functions, such as when the edge port is configured as a protection state, the edge port receives the BPDU packet processing method;

Options:

A.

Directly discard the BPDU packet

B.

Close the port

C.

After parsing the BPDU message, the relevant information is obtained

D.

Forward BPDU packets as required

Buy Now
Questions 10

The following statement about the IS-IS protocol is incorrect?

Options:

A.

The IS-IS protocol is a link-state protocol that runs between AS

B.

The IS-IS protocol supports CLNP networks

C.

Messages for the IS-IS protocol are encapsulated directly by the data link layer

D.

The IS-IS protocol supports IP network ad

Buy Now
Questions 11

The following statement about isis protocol LSP messages is correct

Options:

A.

The isP rapid diffusion feature, which first diffuses out LSPs that are smaller than a specified number , speeding up the synchronization process of LSDB

B.

By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based on the frequency at which the routing information changes

C.

As link status information increases, the packet length of the LSP can be increased so that each ISP can carry more information.

D.

Reducing the minimum interval at which LSPs are sent per port can speed up the diffusion of LSPs.

Buy Now
Questions 12

What kind of scenario can use AS-path-filter?( Multiple select).

Options:

A.

A Filters routes received from BGP neighbors based on the AS PATH attribute carried by the route, such as the command peer X.x.x.x as path-filter import

B.

The apply clause in Route policy

C.

Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.x.x.x as path-filter export

D.

The if-match clause in Route-policy

Buy Now
Questions 13

In the use of the CP protocol, the following description is correct?

Options:

A.

The Eth-Trunk interface can be avoided by frequent oscillation interfaceeth-trunkllacppreemptenablelacppreemptdelaydelay-time by following command

B.

Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip

C.

A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown

D.

The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport

Buy Now
Questions 14

The correct statement about the difference between OSPFv2 and OSPFv3 is ? Multi-select

Options:

A.

BOTH OSPFv2 and OSPFv3 support interface authentication. And OSPFv3 authentication is still based on the fields in the ospf message header

B.

OSPFv3 is similar to OSPFv2 in that it uses a multicast address as the OSPF message destination address

C.

The same type of message exists in OSPFv2, OSPFv3: Hello, DD, LSR, LSU, LSAack, Their message format is the same

D.

OSPFv2 has the protocol number 89 in the IPv4 packet header, OSPFv 3 The next number in the IPv6 message header is 89

Buy Now
Questions 15

The following statement about IPSG technology is correct (single choice).

Options:

A.

The ip source checkuser-bind check-item command is used to configure VLAN- or interface-based IP packet checks, which take effect for both dynamic and static table entries.

B.

If an interface is configured as the OKCP Scooing Tust interface, the interface can normally receive DHCP ACK and DHCPNAK responded to by the OHHNP server and DHCPOffer packets, other untrusted ports cannot receive these packets properly.

C.

On Huawei routers, ipSG functions can be configured in Vlanif.

D.

The IPSG can perform binding table match checks on IP packets entering and leaving the interface.

Buy Now
Questions 16

During isis ' broadcast network database synchronization, is the following statement correct?

Options:

A.

R2, as DIS, sends CSNP periodically.

B.

R2 As DIS, Hello time is 3 times that of a normal router . C. R2 as DIS does not receive PSNP nouns for other routes.

C.

RI and R3 maintain database consistency by periodically sending PSNP requests.

Buy Now
Questions 17

In an MPLS VPN network, different CE devices exchange routing information with the same PE device using different routing protocols, and different CE devices use routing protocols that are independent of each other

Options:

A.

True

B.

False

Buy Now
Questions 18

There can be multiple nodes under a route -policy, different node numbers are identified by nodes, and each node can have multiple if-match and apply clauses, which of the following descriptions are wrong ?

Options:

A.

The relationship between the if-match clauses under each node is "and"

B.

The relationship between different nodes is an "and" relationship

C.

There is an "or" relationship between different nodes

D.

The relationship between the if-match clauses under each node is "or"

Buy Now
Questions 19

There are two Communily filters: ip comimuniy-lite lpemit 101201 ip community fiter 2permit101 ip commmuriyfilter 2pemit21 Regarding the above ommuniyfiter, the correct description is ?( Multiple choice questions).

Options:

A.

As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the BGP route matches the community-filterl

B.

As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the BGP route matches community-filter2

C.

The BGP route matches community-filter 1 only if the community attribute values carried in the BGP route contain 100:1 and 200:1

D.

A BGP route matches community-filter2 only if the group attribute values carried in the BGP route include 100:1 and 200:1

Buy Now
Questions 20

Router RL runs the OSPF protocol and uses the display ip routing-tabe command to view the router RL's routing table , the following information about OSPF in the routing table is described correctly as ?

Options:

A.

In the routing table, the routing table entries identified by the OSPF identifier can only be learned through the 3 types of LSAs to

B.

In the routing table, used The 'OSPF' identifier identifies a route table entry that can only pass a Type 1 LSA

C.

In the routing table, the routing table entries identified with the 'OSPF identifier' can be learned through the 1/2/3/5 LSA to

D.

In the routing table, Route table entries identified with the "O_ASE identifier can only be learned through routing introduction

Buy Now
Questions 21

Which of the following is incorrect about HTTPS?( Multiple Choice)

Options:

A.

HTTPS secures access to data by using SSLVPN.

B.

If the HTTPS traffic contains a virus, the router cannot detect the virus directly using IPS technology

C.

When using HTTPS to access a website, the website cannot be accessed if the user's browser does not recognize the website's digital certificate.

D.

HTTPS protocol uses TCP port 443 by default

Buy Now
Questions 22

The following description of the TTL in the MPLS Header is correct:

Options:

A.

A TTL that acts like an IP header and is used to prevent message loops

B.

To control label distribution

C.

Limit LSR

D.

Control of upstream devices for label distribution

Buy Now
Questions 23

The following description is correct regarding route control

Options:

A.

IBGP routes can be introduced using the impot-route BGP command

B.

AS-path-fiter is for AS-path, which affects the routing of paths.

C.

OSPF, ISIS, and BGP can issue default routes.

D.

In Node 10, if-match community-fiter1 and f-match as-pah-fiter1 are "and the relationship

Buy Now
Questions 24

LDP and IGP linkage refers to the release of IGP and TD routes to ensure that LDP and IGP linkage complete network efficiency, so that KGP and LDP maintains a consistent path, minimizing traffic loss, thereby improving the reliability of the entire network.

Options:

A.

True

B.

False

Buy Now
Questions 25

As shown in the figure, a company sets up an OSPF network. The links in the figure all form OSPF adjacencies, and all OSFP devices declare their own loopback addresses. One day SIR2 The two links of the S2AR1 suddenly failed, and in order to detect if the network was operating properly, the engineers performed a device status check, which is correct as described below

Options:

A.

R5 can normally learn the loopback route to R2

B.

R3 can not learn the loopback route to R2

C.

R1 can normally learn the loopback route

D.

R3 of R2 The loopback route of R2 can be learned normally

Buy Now
Questions 26

ICMPv6 has two types: Error Messages and Information Messages.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 27

The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000

Options:

A.

True

B.

False

Buy Now
Questions 28

Regarding Policy Routing, the following description error is ?( Single choice questions).

Options:

A.

When configuring local policy routing, if two next hop and two outbound interfaces are set in the policy at the same time, packet forwarding only distributes the load between the two outbound interfaces.

B.

Interface policy routing is only supported for application in the inbound direction of an interface.

C.

Interface policy routing only takes effect for forwarded packets, but has no effect on packets sent locally.

D.

If the message matches the permit table entry in the interface policy route , the message must be forwarded according to the next hop specified by the interface policy route

Buy Now
Questions 29

In SSM, what version of IGMP is required?

Options:

A.

IGMPV3

B.

IGMPV4

C.

IGMPV2

D.

IGMPV1

Buy Now
Questions 30

BGP authentication can prevent illegal routers from establishing neighbors with BGP routers, BGP authentication can be divided into MD5 authentication and Keychain authentication, please ask which BGP messages will be carried below BGPKeychain authentication information?( Multiple select).

Options:

A.

Update

B.

Notification

C.

Keeplive

D.

Open

Buy Now
Questions 31

The following statement about OSPF route filtering is incorrect.( Single choice questions).

Options:

A.

In the NSSA area, filtering for external route ingestion and advertisement can be configured on ASBR or ABR

B.

Filtering for the three types of LSAs needs to be configured on the ABR across OSPF regions

C.

Interface-based filtering of LSAs allows all LSAs in the inbound and outbound directions except grace LSAs

D.

Based on the link state database, when calculating routes, the fiter-policy import command is used, which only affects the route addition in the route table, and has no effect on the OSPF link state database

Buy Now
Questions 32

The router connects two EBGP neighbors through two parallel Serial cables, what do you do to achieve bidirectional negative sharing between two EBGP neighbors connected by these two parallel Serial cables? ( Single choice questions).

Options:

A.

Without any method, BGP automatically implements load sharing of traffic across different autonomous systems on the available links

B.

Use the Loopback interface to establish an EBGP neighbor relationship, configure EBGP Muti-hop, configure the Loopback interface as the update source, and then use IGP to implement Equivalent path load sharing between Loopback addresses

C.

Configure the EBGP neighbor relationship with the Loopback interface as the update source, and the IGP in each AS needs to introduce two equivalent paths to the loopback address of the EBGP neighbor; And you need to use the command "next-hop?local"

D.

Use the command "ebgp-load-balance" at both ends

E.

To configure an EBGP neighbor relationship with the Loopback interface as the update source, the IGP in each AS needs to introduce two equivalent paths to the EBGP neighbor loopback address ; And the commands "ebgp maxhop" and "next-hop-local" are used

Buy Now
Questions 33

There are routers as follows, according to which the compromise conclusion is wrong?

Options:

A.

R3 must be the DIS of some Level-1 link

B.

The R3 router is a Level-1-2 router

C.

R3 must be the DIS of some Level-2 link

D.

The system ID of the R3 router is 000300000000

Buy Now
Questions 34

There is an existing network of router RI, router R, router R3, and router R4 The 4 routers are interconnected via an LN network. All 4 routers are equipped with basic oSPF. When you execute the command "displayosp" on router R2 f peer", router R2 and router R3 are discovered The status between is "2-way". So what conclusions can you draw from this output? Multiple choice questions).

Options:

A.

Router R2 is not a DR

B.

Router R3 is not a DR, nor is it a BDR

C.

There is no full adjacency between router R2 and router R3

D.

Router R4 is destined for DR

E.

Router R2 is DR or BDR

Buy Now
Questions 35

NSF (Non-StoppingForwarding) and non-stop circuits are transmitted NSR (Non-Stopping Routing) are two highly reliable solutions, and the following statement is correct

Options:

A.

After NSR enablement, if the business batch backup has not yet ended, a master board failure occurs, the NSR cannot be completed

B.

NSR backers require the ability to support NSR through specific message negotiation

C.

After NSF is enabled, the router is switched back, and the routing table and forwarding table remain unchanged, so traffic is not lost during grf time

D.

NSF routers do not need to negotiate the ability to support NSF through specific messages

Buy Now
Questions 36

The following description of the characteristics of multi-instance CE is ?

Options:

A.

Since the MCE device is already bound to the VPN, there is no need to bind the VPN on the PE connected to the MCE device

B.

The MCE device can determine the source of the routing information according to the interface that receives the routing information, and maintain it in the route forwarding table of the corresponding VP.

C.

MCE is implemented by creating their own routing forwarding tables for different VPNs on the MCE device and binding to the corresponding interface o

D.

Configuring MCE enables a CE to connect to multiple VPNs at the same time, which can not only completely isolate the service between different VPN users, but also reduce the input cost of network equipment.

Buy Now
Questions 37

The basic header length of an IPv6 message is a fixed value.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 38

Configuration under a certain interface: isis timer hello 5 level-2, the following statement is correct?

Options:

A.

The hello packets sent at level-1 and Leve1-2 are both 5s

B.

The hello packets sent at level-1 are sent at 5s interval

C.

The level-2 hello packet send interval is 5s

D.

The CSNP packet sending interval for this interface Level-2 is 5S

Buy Now
Questions 39

Which of the following options enables encapsulation and unencapsulation of VXLAN messages?

Options:

A.

VBDIF

B.

VLANIF

C.

BD

D.

VTEP

Buy Now
Questions 40

Regarding the description of the hello message in the PIM-SM message, the error is ?

Options:

A.

Hello messages are sent to multicast address 224005

B.

Elect dr in multiple router segments with hello messages

C.

Routers periodically use hello messages to stay in touch

D.

In a PIM-SM network, a newly started multicast router needs to use hello messages to discover neighbors and maintain neighbor relationships

Buy Now
Questions 41

Two routers, connected together through the serial port, but can not ping between each other , now check the port status as follows: Can the following information determine what the cause is?

Options:

A.

Insufficient link bandwidth

B.

The IP addresses on both ends are not on the same network segment

C.

The link layer protocols on both ends are inconsistent

D.

Subnet mask does not match the

Buy Now
Questions 42

The following statements about the VRRP protocol are correct (multiple choice).

Options:

A.

Both VRRPv2 and VRRPv3 support authentication

B.

VRRPv3 does not support authentication, while VRRPV2 does

C.

VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks

D.

The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254

Buy Now
Questions 43

When there are multiple redundant links in an IS-IS network, multiple equivalent routes may occur. Regarding equivalent routing within an IS-IS network, which of the following descriptions is wrong?

Options:

A.

When the number of equivalent routes present in the networking is greater than the number configured by the command, and these routes have the same priority, the next hop device System IlD large routes are preferred for load sharing

B.

After you configure the equivalent routing priority, when the IS-S device forwards traffic to the destination segment, it will not use load sharing, but forward the traffic to the next hop with the highest priority

C.

For each of the equivalent routes, you can assign a priority, with the highest priority routes preferred and the rest as backup routes

D.

If load sharing is configured, traffic is evenly distributed across each link

Buy Now
Questions 44

In broadcast networks, elections to DIS begin only after a neighbor relationship has been established

Options:

A.

True

B.

False

Buy Now
Questions 45

The multicast protocol that can generate multicast distribution trees is ?

Options:

A.

IGMPv2

B.

BGP

C.

OSPF

D.

PIMV2

Buy Now
Questions 46

The following description of the LDPLSP establishment process is correct?

Options:

A.

By default, LSRs are for the same FEC, and the received tag mappings can only come from the optimal next hop, not from the non-optimal next hop.

B.

When a network topology change causes the next hop neighbor to change, the free label keep method is used. LSR can quickly rebuild the LSP by directly using the labels sent by the original non-optimal next-hop neighbor. Liberal needs more memory and tag space.

C.

In the DoD mode of label publishing, for a specific FEC, the LSR does not need to obtain a label request message from upstream to distribute the label.

D.

The process of establishing a D. LSP is actually to bind the FEC to the tag and advertise this binding to the LSP upstream LSR process.

Buy Now
Questions 47

Which of the following statements about RADIUS is correct?( Single choice questions).

Options:

A.

MAC authentication does not require a username password, so you cannot use RADIUS to authenticate the user.

B.

RADIUS supports both wired and wireless access modes.

C.

SEPARATION OF RADIUS PROTOCOL AUTHENTICATION, AUTHORIZATION, AND AUDIT.

D.

RADIUS authentication and Portal authentication cannot be used together because the Portal server can typically be used to authenticate users when portal authentication is deployed.

Buy Now
Questions 48

The LSA of type certainly does not exist in the 220SPF Stub zone

Options:

A.

Type7

B.

Type5

C.

Type4

D.

Type3

Buy Now
Questions 49

What's wrong about vrrp timers is ?

Options:

A.

MASTER DOWN = (3*ADVER_ INTERVAL) + Skew_ time

B.

Skew Time= (255-Priority)/255

C.

By default, the time period for VRRP advertisement messages is 2 seconds

D.

By default, the VRRP preemption delay is I seconds

Buy Now
Questions 50

In the IS-IS broadcast network type, when establishing an adjacency relationship, if the router interface priority is set to 0, it will not participate in the dis election

Options:

A.

True

B.

False

Buy Now
Questions 51

Router HW1 exists in the carrier HW's network as an MPLSLSR router. The router receives a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle that message?

Options:

A.

Router HW1 strips off the label and looks for the FIB using the P destination address

B.

Router HW1 uses LDP to create an LSP and creates a new path in LFIB for the label carried in the message

C.

Router HW1 drops the message

D.

Router HW1 will forward the message with the default label

Buy Now
Questions 52

What information does the BGP Open message carry as follows?

Options:

A.

BGP Router ID

B.

Route attributes

C.

Local Autonomous System (AS) number

D.

Hold time

Buy Now
Questions 53

Regarding the description of the encapsulation format of the labels in MPLS, the correct one is ?

Options:

A.

The TTL field in the label has a similar meaning to the TTL (Time To Live) in the IP packet, and also has the effect of preventing loops

B.

The total length of an MPLS single tag is 4 bytes (32 bits).

C.

For Ethernet, PPP packets, the tag stack is like a "cushion layer", located between the layer 2 header and the data, and when there is a VLAN tag, the MPLS header is placed on the Ether head and VLANtag between

D.

label in the S field, lbit Used to identify whether the label is a bottom label, and a value of 1 indicates that it is the penultimate label

Buy Now
Questions 54

The following description of the attributes of BGP is correct? Radio

Options:

A.

The AS number of the adjacent AS, ranked to the far right of the list of AS_Path in the BGP route entry.

B.

When a BGP Speaker publishes a route learned from an EBCP peer to an IBGP peer, it does not change the next hop attribute of that routing information.

C.

Local_Pref is valid only between EBGP peers and is not advertised to third-party AS

D.

A route can have only one community attribute value.

Buy Now
Questions 55

As shown in the figure, the PPP link between R1 and R2 is not in the same network segment, but the R1 and R2 direct connectors can communicate, and the Ethernet link cannot communicate under the same planning, why?

Options:

A.

The interconnect POS ports of R1 and R2 learn the 24-bit subnet route of each other's direct connection ports through IPCP

B.

The interconnect POS ports of R1 and R2 learn the 32-bit host route for each other's direct connections through IPCP

C.

The interconnect POS port of RI and R2, through LCP learns the MAC address of the opposite termination , does not need to use ARP to request the MAC address

D.

The data packets of the interconnect POS ports of R1 and R2 do not need to encapsulate ethernet headers and do not need to use ARP to request MAC addresses

Buy Now
Questions 56

Regarding route Policy, the following description is correct as ?( Multiple selection) Multiple selection

Options:

A.

Advanced ACLs can be applied in route-policy to filter routes

B.

The table entry exceed::0 less-equal 128 indicates that all IPv6 routes are allowed through

C.

If more than one node is defined in Route-policy, at least one node in each node should have a matching pattern of permit

D.

Route-Policy can filter only the default route

Buy Now
Questions 57

In an HW MPLS network, what parameters are used to define a forwarding equivalent class??

Options:

A.

BGP MED ?

B.

IP prefix

C.

RSVP requests resource reservation

D.

from CE Layer 2 links

Buy Now
Questions 58

Assume that BGP/MPLSIPVVPN, OSPF, LDP, and static routing protocols are already enabled on the PE router . Which of the following protocols need to enable GR on PE in order to get NSF functionality? (Multiple choice questions).

Options:

A.

BGP

B.

Static circuit

C.

OSPF

D.

MPLS LDP

Buy Now
Questions 59

Use ping-ax-cY-sZ-vpn-instance M 105162, which has the meaning of

Options:

A.

IcMP request for the ping, message size Z (without IP and ICMP headers)

B.

The source IP address of the ping packet is X

C.

The ping belongs to the VPN instance M

D.

The ping sends Y ICMP requests

Buy Now
Questions 60

Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways?

Options:

A.

Enable traffic to be forwarded locally first

B.

Connect the stacking device via a stacking card

C.

Configure the stacking system MAC address switching

D.

Enables the stacking multi-master check function

Buy Now
Questions 61

When the ACL in the VRP has multiple matching rules (rules), the matching order is about Which of the following statements is true?( Confirmed).

Options:

A.

By default, matching is based on the principle of "depth first"

B.

By default: Match in the order in which the perfect is matched first, then deny is matched.

C.

By default, rule-ID is followed Match from small to large

D.

There is only one matching order and cannot be modified

Buy Now
Questions 62

How do.8021w and 8021D handle BPDUs?( Single choice questions).

Options:

A.

The 8021D bridge only forwards BPDU packets received from the root bridge

B.

8021D bridges do not forward BPDU packets

C.

The 8021w bridge only forwards BPDU packets received from the root bridge

D.

8021w Bridge does not forward BPDU packets

Buy Now
Questions 63

The correct description about the prefix list is:

Options:

A.

The prefix list is used to filter P prefixes and can match both prefix numbers and prefix lengths

B.

The prefix list is used to filter IP prefixes, and cannot match both the prefix number and the prefix length

C.

The prefix list cannot be used for packet filtering

D.

The prefix list can be used to filter packets

Buy Now
Questions 64

The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration

Options:

A.

[Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quit

B.

[Qudway ineface gigabtethemnet /0'1

[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit

C.

Quidway inteface gigabiethenet ou0/1

[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut

D.

[Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20

E.

[Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit

Buy Now
Questions 65

Regarding the FTP protocol, which of the descriptions below is correct?

Options:

A.

In FTP Passive mode, the client completes the initialization of the TCP session for control and data

B.

In FTP Active mode, the server tells the client which port it expects to send data on by commanding "PORT"

C.

FTP always uses a TCP session to transmit control information and data information

D.

FTP always uses TCP port 20 to establish a data session, and ICP port 21 to establish control will always use E. FTP TCP port 21 to establish a data session, TCP port 20 to establish a control session

Buy Now
Questions 66

The following description of the Lsp shard extension for ISIS is correct?

Options:

A.

Enables is routers to generate more LSP shards to carry more ISIS information.

B.

Isis' shard extension is equally valid for Hello packets.

C.

Shard scaling for ISIS is achieved by adding virtual systems, up to 1000 virtual systems.

D.

The isis router can produce a maximum of 1024 shards.

Buy Now
Questions 67

In an MPLSVPN network, when a packet enters the Internet and is forwarded, it is encapsulated with two layers of MPLS tags, and the processing of the packet in the following options is described correctly?

Options:

A.

The penultimate hop device receives packets with an outer label of 3

B.

The Egress PE appliance receives an UNlabeled IP packet

C.

The Egress PE device correctly sends packets to the appropriate VPN

D.

based on the inner tag The packet pops up the outer label on the penultimate hop device and forwards it to the Egress PE device

Buy Now
Questions 68

Is the following description of the OSPFv3 message correct?

Options:

A.

The interface ID of the sending interface must be included in the A Hello packet

B.

The LSACK message contains LSA header information to confirm the receipt of LSU packets

C.

The LSR message contains the complete LSA header information for requesting an update to the LSA

D.

Hello messages and the Option field for DD messages extends to 24-bit

Buy Now
Questions 69

Which of the following are used in Ethernet?

Options:

A.

A MAC address in a non-canonical format

B.

CSMA/CD in multiplexed interviews

C.

Mac address in canonical format

D.

D. 8025 encapsulated frames

E.

8023 Encapsulated Frame

Buy Now
Questions 70

NO: 322

The following description of MED, correct:

Options:

A.

MED default value is 100

B.

MED can only be passed within this AS

C.

MED is an optional non-transitional attribute

D.

MED The default value is 0

Buy Now
Questions 71

To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter

Options:

A.

FALSE

B.

TRUE

Buy Now
Questions 72

In the city, that is, mpLS BGPVPN network, when the packet enters the public network forwarding, it will be encapsulated with two layers of MPLS tags, the following description of the two layers of tags, the error is ?

Options:

A.

Private network tags are carried and distributed by MP-BGP when routing, and public network tags are distributed by the LDP protocol.

B.

MPLS BGPVPN uses two layers of tags: public labels (also known as outer labels) and private network labels (also known as inner labels).

C.

By default, the router assigns the same tag value to all VPNv4 routes destined for the peer

D.

The egress PE uses the inner tag when determining which egress CE the message should be sent to.

Buy Now
Questions 73

In Huawei switches, the hybird port can select vlan1 as an untagged vlan

Options:

A.

True

B.

False

Buy Now
Questions 74

A multi-protocol network, the topology is shown in the figure. Take a closer look at the topology, router R4 (in Areal) is introduced into the OSPF process via the routes learned by BGP. So what categories of LS4 will R3 advertise to zone 0?( Multiple choice questions).

Options:

A.

5 ?LSA

B.

7 ?LSA

C.

1 ?LSA

D.

4 ?LSA

E.

2 ?? ??

Buy Now
Questions 75

The correct description of configuring BGP4+ is that

Options:

A.

BGP4+ does not support route reflectors.

B.

The next hop of a B. BGP4 route can use the Link-Local address.

C.

BGP4 configures the reflector, the role positioning of the reflector and the client needs to be consistent with the configuration of BGP4

D.

BGP4 specifies p

E.

BGP4+? Router-ID ? BGP4 ? Router-ID—??

Buy Now
Questions 76

: :1/128 is the IPV6 loopback address

Options:

A.

TRUE

B.

False

Buy Now
Questions 77

Regarding route introduction, the following description is correctly ?( Multiple choice questions).

Options:

A.

OSPF introduces two types of external routes, with the first type of external route taking precedence over the second type of external route.

B.

Use the default-route imported command in BGP only to introduce default routes that already exist in the local IP routing table.

C.

When ISIS introduces an external route, if you do not specify the route type that is introduced, the Level-1 route is introduced by default on the L1/2 router

D.

When ISIS introduces an external route, if you do not specify the type of route that is introduced, the Leve1-1 route is introduced by default on the L1 router .

Buy Now
Questions 78

WRED is configured on the newly deployed router HW The following description of the WRED feature is correct as ?( Multiple select).

Options:

A.

WRED can set different drop thresholds and packet loss rates for packets of different priority

B.

When traffic exceeds the minimum threshold, WRED starts dropping all ingress traffic (tail drops).

C.

Avoid global synchronization by selectively dropping multiple TCP streams Low-bandwidth traffic is easier to drop than high-bandwidth traffic

Buy Now
Questions 79

There is an existing switch running the RSTP protocol. If the network topology changes, what happens to the Layer 2 forwarding table that is automatically learned by the switch?

Options:

A.

All table entries are dropped

B.

Except for the table entry related to the edge port that is not deleted, all other table entries are deleted

C.

Only table entries related to the port that received the TC message are dropped

D.

If the aging time is set to 15 seconds, entries that exceed the aging time are deleted

E.

Table entries are dropped except for table entries related to edge ports and table entries related to ports that receive TC messages

Buy Now
Questions 80

Regarding the characteristics of CE double attribution, the description is wrong with ?

Options:

A.

CE accesses the backbone through two links that can be used as both load sharing and primary and standby links.

B.

CE and PE form a CE dual-home network, which can ensure high network availability.

C.

VRFs of two PEs connected to the same CE can belong to different VPNs.

D.

In the CE dual home network, it is possible to generate loops, and you can use route-tag to solve the loop problem.

Buy Now
Questions 81

MPLS does not enable the secondary unsubject pop-up, the penultimate hop label can be the same as

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 82

The following about BGP routing, what is the wrong description?

Options:

A.

Non-aggregate routes take precedence over aggregate routes.

B.

In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.

C.

See the following entry in the BGP routing table: • *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal.

D.

For next_hop unreachable routes are invalid cat by and do not participate in the preference. Flogging case

Buy Now
Questions 83

Compared to IPV4 multicast, which of the following descriptions is the characteristic of IP6 multicast?

Options:

A.

IPv6 multicast does not contain MSDP and dense mode

B.

The first 8bit IPV6 multicast address is always FF(11111111).

C.

IPv6 multicast clients use IGMPv3 to join multicast groups

D.

IPv6 multicast load sharing extends the multicast routing rules and is completely independent of RPF check

Buy Now
Questions 84

There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct?

Options:

A.

When HW1 injects a default route into Zone 1, HW1's local route table can not contain a single default route

B.

HW1 injects a Type 7 default route into Zone 0

C.

HW1 injects a type 7 default route into zone 1

D.

HW1 injects a Type 3 default route into Zone 1

E.

When HW1 injects a default route into zone 1, HW1's local route table needs to answer the default route

Buy Now
Questions 85

As shown in the topology diagram, all interfaces of the router in the figure are enabled with the ISIS protocol, and the following statement is correct.

Options:

A.

If the RI's Ethernet0/0/0 interface goes down, R2 becomes the master device

B.

If the Ri's Ethernet0/0/1 interface goes down, R2 becomes the master device

C.

If R3's G E0/0/0 interface goes down, R2 becomes the master device

D.

If R3's Ethernet0/0/0 interface goes down, then R2 becomes the master device

Buy Now
Questions 86

The correct statement about the VRRP protocol version is ?

Options:

A.

VRRPv2 is only available for IPv4

B.

VRRPv3 does not support authentication

C.

VRRPv2 supports authentication

D.

VRRPv3 is only available for IPv6

Buy Now
Questions 87

All interfaces of the router have OSPF enabled, the Cost value of the link is identified in the figure, and the Loopback0 socket for R2 is advertised in area 1 , then Rl reaches 10022/32 with a Cost value of ?

Options:

A.

50

B.

150

C.

200

D.

100

Buy Now
Questions 88

As shown in the figure, the neighbor relationship between R1 and R2 has just been established, and the database synchronization process between R1 and R2 is correct.

Options:

A.

The message sent by R1 to R2 is a PSNP message

B.

R1 sends the packet of R2 as the CSNP packet. The message sent by

C.

R1 to R2 is an LSP packet. The message sent by

D.

R1 to R2 is the Hello message.

Buy Now
Questions 89

One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existing IP6 address is

2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions).

Options:

A.

2013:0:130F:0:0:09CO:876Answer: 130B

B.

2013:130F::9CO:876Answer: 130B

C.

2013:0:130F:0:0:9CO:876Answer: 130B

D.

213::13F::9C:876Answer: 13B

E.

2013:0:130F::9CO:876Answer: 130B

Buy Now
Questions 90

Regarding the Stub region in the OSPF protocol , the following statement is correct.

Options:

A.

ASBR cannot exist in the Stub zone

B.

Virtual connections cannot traverse the Stub region.

C.

Injecting typeT LSA

D.

backbone areas that are not allowed in Stub regions cannot be configured as Stub regions.

Buy Now
Questions 91

The following is the correct description of the aggregation of BGP (radio).

Options:

A.

After you configure the Aggregate ipv4-address mask, only aggregate routes are published, not detail routes.

B.

For IPv6 routing, BGP supports manual aggregation and automatic aggregation.

C.

BGP enables automatic aggregation by default.

D.

Routes in the BGP local route table can be manually aggregated.

Buy Now
Questions 92

Which of the following LSAs propagate in a single region only?

Options:

A.

Router LSA

B.

Summary LSA

C.

Network LSA

D.

AS External LSA

Buy Now
Questions 93

Regarding the MPLS basic forwarding process, the following description is incorrect? Radio

Options:

A.

By default, the PHP-enabled Erass node assigns a label value of 3 to the inverted second-hop node.

B.

When an IP message enters the MPLS domain, the MPLS boundary device inserts a new label between the layer 2 header and the IP header.

C.

When the P message enters the MPLS domain, check whether the Tunel lD value corresponding to the destination IP address is Ox0O If the Tunel IlD value is Ox0 Then enter the MPLS forwarding process.

D.

The transport node device replaces the existing top-of-stack label (outermost label) with the label assigned by the next hop device.

Buy Now
Questions 94

If the PIM-SM protocol is running in a multicast network , you need to configure RP, and the configuration equation of RP is divided into dynamic RP and static RP. The following configuration description of the RP is correct (radio).

Options:

A.

When you configure Dynamic RP , you need to configure BSR as a backup of the RP.

B.

When you configure a static RP , you need to configure the BSR to advertise the RP information.

C.

When configuring a static RP, you need to specify the information for the RP on all PIM routers.

D.

When you configure Dynamic RP, you do not need to configure BSR.

Buy Now
Questions 95

In RSTP , which port provides a backup path to reach the root node of the spanning tree? What state is the port in?

Options:

A.

Root Port and Listening Status

B.

Alternate Port and Forwarding Status

C.

Alternate Port and Learning Status

D.

Designated port and Listening status

E.

Alternate port and Discarding status

Buy Now
Questions 96

What is the relationship between CIR, BC and TC? (single select)

Options:

A.

CIR=TC/BC

B.

CIR=BE/TC

C.

TC=CIR/BC

D.

TC=BC/CIR

Buy Now
Questions 97

As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).

Options:

A.

The 2::/64 route appears in the P route table

B.

The 2019:/64 route appears in the IP routing table

C.

2020::/64 The route appears in the IP routing table

D.

The 2021/64 route will appear in the IP routing table

Buy Now
Questions 98

Two VTEPs in an XLAN can identify a VXLAN tunnel, and this VXLAN tunnel between the VTEPs will be covered by two NDEs is common to all VNI.

Options:

A.

True

B.

False

Buy Now
Questions 99

View the IGMP configuration of the interface on the router RTA as follows, and the information about the operation of the RTA is incorrect

Options:

A.

The packet interval for a particular group query is 60 seconds

B.

The interface IP address is 1921681.1

C.

The maximum response time for query messages is 10 seconds

D.

The IGMP protocol version is 2

Buy Now
Questions 100

A campus deployed both IPv4 and IPv6 networks for service testing, and ran IS-S to interconnect the networks. (The S-S routing protocol has good scalability and is widely used in the live network.) Regarding IS-IS extensibility, which of the following statements is true?

Options:

A.

In order to support IPv6, IS-IS needs to add TLV to carry IPv6 address information

B.

IS-IS uses the TLV structure to build messages, making lS-IS more flexible and extensible

C.

NLPID is a new type of TLV added by IS-IS to support IPv6

D.

For IS-IS, adding new features simply adds a new TLV to

Buy Now
Questions 101

When deploying BGP/MPLS IPVPN, OSPF's VPN route tag is not present

The extended properties of MP-BGP are passed only locally, only locally, and only meaningful on routers that receive MP-BGP routes and generate OSPF LSAs.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 102

The following description of the PPPoE data frame is correct?( Multiple choice questions).

Options:

A.

Once a PPPoE session is established, all Ethernet packets are unicast

B.

The Ethernet_Type domain is fixed to Ox8863

C.

When PPPoE passes session data, Code must be set to Ox0

D.

The Session_ID of the PPP session is not allowed to change and must be the specified in the Discovery phase

Buy Now
Questions 103

The following statement about the VPNv4 address is wrongly described as ?

Options:

A.

By default, PE does not perform VPN-target filtering on received VPNv4 routes.

B.

Local PE sets up An Export Target for these routes before releasing VPNv4 routes learned from sites that are directly connected to them to other PEEs attributes, and are published with routes as extended community attributes for BGP.

C.

Carries the RD attribute when BGP publishes both reachable and unreachable VPNv4 routes.

D.

The VPNv4 address has a total of 12 bytes, including an 8-byte route identifier RD (Route Distingulisher) and a 4-byte IPv4 Address prefix.

Buy Now
Questions 104

XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).

Options:

A.

Typel

B.

Type2

C.

Type3

D.

Type4E. Type5

Buy Now
Questions 105

The following statement about the five types of LSAs in OSPF is used to pass external routes, and the following statement about the five types of LSAs is incorrect and flooding in

Options:

A.

OSPF networks in non-Stub/NSSA regions

B.

Routers in the same zone as ASBR can calculate external routes by chanting the LSA and the five types of ISAs in the region

C.

The FA address is included in the five types of LSAs, and the FA address is 000 only as reserved for no practical purpose

D.

Configuring the appropriate filtering policy on the ABR or ASBR can filter five types of LSAs

Buy Now
Questions 106

After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?

Options:

A.

Send an alert

B.

The MAC address blocks

C.

Interface blocking

D.

Traffic filtering

Buy Now
Questions 107

Regarding how the device handles messages in the MPLS network model, what is the following description of the error? A. The label forwarding path LSP is determined and established by various protocols during the forwarding of messages. There is certainly no stripping of the label on the B. LSR.

Both C. LER and LSR are labeled.

D. For IP packets entering the MPLS domain, the device discards them.

Options:

Buy Now
Questions 108

Without dividing the zone, is the following description of the link state routing protocol correct?

Options:

A.

Each router establishes a topology for the entire floodplain

B.

Each router learns route entries directly from the route update and adds them to the routing table

C.

Routers in the flood domain may receive the same link state information repeatedly

D.

Routers throughout the flood domain have the same database of wrong-state states

E.

The router will send all the mis-routing status information from one neighbor to all other neighbors to ensure the synchronization of the database

Buy Now
Questions 109

What does RT do in MPLS VPN? Multiple choice questions).

Options:

A.

Allows the peer PE to decide which VPNv4 routes to import into a particular VRF

B.

Allows peer PE to decide which VPNv4 routes not to import into a particular VRF

C.

Allows the peer CE to decide which VPNv4 routes to import into a particular VRF

D.

Allows the peer CE to decide which VPNv4 routes not to import into a particular VRF

Buy Now
Questions 110

When you deploy BGP/MPLSIPVPN, when two VPNs have a common site, the common site must not use overlapping address spaces with the other sites of the two VPNs.

Options:

A.

TRUE

B.

FALSE ?:B

499The series description for configuring static lSPs in MPLS networks is correct?

C.

When an LSR is Ingress LSR, only configure Out Label, which ranges from 16-1048575

D.

When an LSR is a Transit LSR, you need to configure both In Label and Out label, both in the range of 16-1023

E.

When an LSR is TransitLSR, you need to configure both ln Label and Out Label, both of which are 161023 The Out Label ranges from 16 to 1048575

F.

When an LSR is An Egyptian LSR, only in Label needs to be configured, ranging from 16-1023

Buy Now
Questions 111

Which of the following default routing delivery methods does OSPF support?( Multi-select)

Options:

A.

It can be issued without force

B.

Can be issued on ABR

C.

Issuance can only be enforced

D.

Answer can be issued on ASBR

Buy Now
Questions 112

When DLDP detects the presence of a one-way link in the fiber, the default actions of Huawei equipment include: the DLDP state machine migrates to the Disable state, outputs Trap information, and automatically sets the interface to a blocked state.

Options:

A.

True

B.

False

Buy Now
Questions 113

Which of the following parameters should be modified to re-establish the is-IS neighbor relationship?

Options:

A.

Modify the Cost value of the IS-IS interface

B.

Modify the send interval for the IlH of the IS-IS interface

C.

Modify the Level of the IS-IS interface

D.

Modify the IP address of the IS-IS interface

Buy Now
Questions 114

Which of the following routing tools is unique to BGP?

Options:

A.

Route-policy

B.

ACL

C.

IP-prefix

D.

AS-path-filter

Buy Now
Questions 115

Which of the following parameters are not required when configuring BGP Peers?

Options:

A.

as-number

B.

password

C.

peer IP Address

D.

Description

Buy Now
Questions 116

The existing router HWl running BGP is configured with both IBGP neighbors and EBGP tenants. The following descriptions about IBGP Neighbors and EBGP Neighbors are correct?

Options:

A.

The router will have an EBGP BGP neighbor from it must be connected directly, otherwise, IBGP-Multi-hop must be configured

B.

The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors

C.

IBGP neighbors can establish neighbor relationships through the Loopback interface

D.

The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors

E.

EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must be configured with

Buy Now
Questions 117

For Layer 2 VPN technology, the following statement is correct? Multi-select

Options:

A.

VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access.

B.

The VPLS configuration is complex and the Layer 2 network transmits BUM packets.

C.

BGPEVPN supports features such as tenant isolation, Multi-homing, and broadcast suppression. D. BGPEVPN addresses mac address drift and multi-tenancy that VPLS cannot support.

Buy Now
Questions 118

RD is used to distinguish the same IP address in different VPNs, how many bits does RD contain ? (Single choice)

Options:

A.

64

B.

32

C.

16

D.

128

Buy Now
Questions 119

There is a new HW office that needs to use their router as a DHCP server. When configuring the DHCP server to provide DHCP services to the current office, what of the following items need to be configured?

Options:

A.

Exclude unused IP addresses from the DHCP server

B.

Configure the timeout period for ping packets

C.

Configure the startup file for the DHCP server

D.

Configure manual binding

E.

Configure dhcp address pool

Buy Now
Questions 120

You expect to deploy multicast video applications on your private, on-premises network. To achieve this, you need to have a private multicast IP address in your network . So which range of IP addresses can be used?( Single choice questions).

Options:

A.

239000-239255255255

B.

241.000-241.255255255

C.

224000-224255255255

D.

240000-254255255255 E. 226000-226255255255

Buy Now
Questions 121

What are the characteristics of Syslog information?

Options:

A.

The transmission of Syslog messages is not secure

B.

The transmission of Sysiog messages is reliable

C.

The transmission of Syslog messages is confirmable

D.

The transmission of Syslog messages is secure

E.

The transmission of Syslog messages is not acknowledgable

F.

The transmission of Syslog messages is unreliable

Buy Now
Questions 122

An engineer uses 2 routers to test Pv6 services and runs OSPFV3 to achieve interconnection and interoperability of IPV6 networks The RI has access to the loopback address of R2 The engineer looks at ri's OSPF3 routing table entry and finds that there is no route reaching the R2 loopback address It can't be caused by which of the following?

Options:

A.

R2 does not enable OSPFv3 on the loopback port

B.

R2 does not advertise the loopback address

C.

R2 in area 0 to advertise the loopback into a different OSPFv3 process

D.

R2 does not configure the Router ID used in the OSPFv3 process

Buy Now
Questions 123

Network managers can use CAR technology in traffic policing. What of the following technologies can be applied in CAR?

Options:

A.

Double barrel two-speed

B.

Double barrel single speed

C.

Single barrel single speed

D.

Three barrels of single quick

Buy Now
Questions 124

The following description of LDP reliability is incorrectly ?( Radio).

Options:

A.

LGP GR takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed

B.

Manually configured LDP FRR policies default to 32-bit backup routes that trigger LDP to establish backup LSPs

C.

LLDPFRR also allows LSPs to be generated for tag mappings from non-optimal next hops, and as a live LSP backup, supervising forwarding table entries

D.

LDP and IGP linkage, the need for IGP has been routed to release, to ensure that LDP and LGP path consistent

Buy Now
Questions 125

As shown in the figure, there are two IP6 networks that can access the IPv4 network, and the IPsec tunnel needs to be established between the two IPv6 networks to communicate, which of the following requirements?(). Single choice questions).

Options:

A.

ESP + tunnel mode

B.

AH + transmission mode

C.

AH + tunnel mode

D.

None of the above options are correct

Buy Now
Questions 126

The following statement about the BFD one-arm echo function is correct (multiple choice).

Options:

A.

The BFD one-arm echo function must be configured with local identifiers and carrier identifiers

B.

The default destination IP address for the protocol message for BFD one-arm echo is 22400184

C.

After the BFD one-arm echo function is turned on, the destination IP and source IP of the BFD message are inducted

D.

BFD One-Arm Echo function is suitable for scenarios where one device supports BDD and the other device does not support

Buy Now
Questions 127

Between two directly attached devices that have established an IBGP neighbor, execute the shutdown command to close the interface of one of the devices. The BGP connection is not immediately disconnected.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 128

Regarding the description of VRRP Fast Switching, the error is ?

Options:

A.

Use VRRP to monitor BFD sessions or EFM features, either in BPD sessions or EFM session states After the change, the VRRP module is notified to achieve fast VRRP switching

B.

A VRRP backup group cannot monitor Peer BFD, Link BFD, and Normal BFD

C.

at the same time If you configure to monitor multiple BFDs at the same time Then the various configurations are interrelated and may have an impact

D.

When a VRRP backup group monitors normal BFD, when the BFD state changes, the active-standby state is changed by modifying the backup group priority

Buy Now
Questions 129

In which of the following cases, RSTP refreshes the MAC address table?( Multi-select)

Options:

A.

When the port state transitions from Forwarding to Disking

B.

Only when the port state transitions from Listening to Disccarding

C.

When a topology change notification is received

D.

When the status of a port changes

E.

CE when the port state transitions from Disking to Forwarding

Buy Now
Questions 130

The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks using the TCP Flood attack prevention method.

Options:

A.

True

B.

False

Buy Now
Questions 131

IPV6 multicast introduces the concept of multicast scope, which of the following ways is the multicast scope concept implemented? Multi-select

Options:

A.

When the group shake source sends IP6 multicast data, the TTL value of the packet is set to limit the transmission range of the group shake

B.

There is a special field in the IPv6 multicast address that specifies the propagation range of multicast.

C.

Multicast scope is just a concept of spreading scope, and there is no specific technical implementation.

D.

During network configuration, the administrator uses the configuration command at the edge of the network to limit the multicast scope.

Buy Now
Questions 132

Regarding the OSPFv3 protocol, the following description is incorrect?

Options:

A.

In the case of sharing a single router, each OSPFV3 process runs independently

B.

In the same OSPFv3 process under the same interface, you can run multiple instances of

C.

You can support running multiple instances on a single link

D.

OSPFv3 message header will contain the Instance ID field

Buy Now
Questions 133

If an administrator wants to manage certain routes on the router during operations, the following tools are listed below. These routes can be flagged so that administrators can configure policies

Options:

A.

If the BGP protocol is running, the route is marked with the community attribute

B.

Use ACLs to tag routes on the router.

C.

Use the Tag value to mark the route on the router.

D.

Use ipprefix to tag routes on the router.

Buy Now
Questions 134

As shown below, what routes will R2 learn?( Single choice questions).

Options:

A.

R2 can learn the 101.20/24 and 101.30/24 routes.

B.

R2 can learn the 101.1.0/24 route.

C.

R2 can receive an LSP for R1, but cannot join to the routing table.

D.

R2 can learn all routes to R1.

Buy Now
Questions 135

What are the problems with manually creating static VXLAN tunnels in campus networks? Multi-select

Options:

A.

Although the static VXLAN tunnel mode can support distributed gateway application scenarios, the configuration workload is large and the configuration adjustment is complex

B.

N devices to establish static VXLAN tunnels, you need to manually configure up to N(N-1)/2 tunnels, the amount of configuration is large

C.

VTEP can only learn remote MAC addresses in a way that relies on data flooding

D.

Static VLAN tunnel also uses related protocols on the control plane, which will cause equipment resource loss

Buy Now
Questions 136

The OSPF3 protocol is a separately developed protocol that differs somewhat from OSPF2 in that OSPFv3 is link-based rather than network segmented, and the following statement is incorrect?(). Single choice questions).

Options:

A.

Two OSPF routers connected to the link can establish a neighbor relationship even if their IPv6 address prefixes are different

B.

The routing information obtained by the B. OSPFv3 router from the neighbor uses the neighbor's Link-Local address as the next hop in the forwarded packet

C.

For two OSPF routers connected to the link, you can establish a neighbor relationship even if you do not configure a unicast IPv6 address

D.

All OSPFv3 interfaces use the Link-Local address as the destination address of the message

Buy Now
Questions 137

In an IPv6 network, two nodes A and B are neighbors to each other if Node A sends NS messages to Node B if node B is B After receiving the message, reply to the NA message, then view it on node A, what will the neighbor status be marked? (Single Choice Questions).

Options:

A.

Reachable

B.

Incomplete

C.

Stale

D.

Probe

Buy Now
Questions 138

What designs in the router can improve the reliability of the router?

Options:

A.

Dual power supply design

B.

Module hot-swappable design

C.

Issu Design

D.

Dual-engine design

Buy Now
Questions 139

A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the virtual MAC address?

Options:

A.

O0-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

01-00-5E-00-01-54

D.

00-00-5E-00-01-03

Buy Now
Questions 140

Huawei's two switch SWA, SWB is connected together through 7 Ethernets, and static route aggregation is configured, and the corresponding ports on the switch SWA are E1/0/1, E1/02, E1/0/3, E1/0/4, E1/ 0/5, E1/0/6, E1/0/7, configured sequentially as if switch SWA, SWB Each aggregation group supports only 6 ports.

Options:

A.

With the same configuration across ports, the Ethemet 1/0/7 port is the aggregate group Unselected port

B.

With the same configuration of each port, the Ethemet 1/0/6 port is the aggregate group Unselected port

C.

With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselected port

D.

With the same configuration of each port, the Ethemet1/0/1 port is the aggregation group Unselected port

Buy Now
Questions 141

By default, which of the following security MAC address types lose table entries after the device restarts?

Options:

A.

Sticty MAC address

B.

Black hole MAC address

C.

Secure static MAC address

D.

Secure dynamic MAC address

Buy Now
Questions 142

Run the SSM across the entire HW IP multicast network. The following about SSM understands correctly?( Multiple choice question)

Options:

A.

No RP is required

B.

SSM uses only shared trees

C.

SSM uses only the SPT tree

D.

Ideal for 1-to-many applications

E.

SSM is recommended when you have multiple sources and expect to minimize the state of mroute in your network Ideal for many-to-many applications

Buy Now
Questions 143

If the Interface Sticky MAC function is enabled, what is the number of MAC addresses that the interface learns by default?

Options:

A.

15

B.

10

C.

5

D.

1

Buy Now
Questions 144

In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of the router's links, as well as the RouteriD of the neighbor router.

Options:

A.

True

B.

False

Buy Now
Questions 145

The advantages of building a campus network using stacking, clustering technology include which of the following?( Multi-select)

Options:

A.

Improved network equipment and link utilization

B.

It can effectively reduce network power consumption

C.

Business disruption time is greatly reduced

D.

Simplifies network management and reduces the complexity of network deployment planning

Buy Now
Questions 146

In order to reduce the number of OSPF routes in some unscheduled areas, the OSPF protocol has developed special area functions, and the following characteristic description of ospf special areas is correct?( Single choice questions).

Options:

A.

ASBR-Sunmary-LSA is allowed to be published to NSSA regions

B.

AS-External-LSA is allowed to be published to Stub regions

C.

Any OSPF zone can be configured as a special zone

D.

Special area routers cannot establish OSPF neighbor relationships with regular area routers

Buy Now
Questions 147

The following about BGP routing, describing the error, is ?

A, non-aggregate routes take precedence over aggregate routes

B. In PrefVal, Local_ Preference is equal to the case if the route is generated locally, IBGP Routing, the BGP preference for EBGP routing, is generated effectively referring to route priority.

C. See the following entry in the BGP routing table:* 172161.11/32 000010 0? Indicates that the route is available non-optimal

D. For next_hop unreachable routes when invalid routes, do not participate in the preferred.

Options:

Buy Now
Questions 148

/R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration, the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then the possible cause is the question).

Options:

A.

This router does not have an OSPF process number configured

B.

This router is configured with a different zone ID than its neighbor router's zone ID

C.

This router does not have authentication features configured, but neighbor routers configure authentication features

D.

The declared network address of this router does not match the interface mask

Buy Now
Questions 149

Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test#

interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct:

Options:

A.

If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3

B.

If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3

C.

If the packet source IP address is 1001.2, it cannot be forwarded

D.

If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains unchanged

Buy Now
Questions 150

Auto-negotiate mode is to obtain the maximum interface rate and operating mode, the network administrator configures all Ethernet interface rates of a working switch to 10OMbps, and the operating mode is configured as Full-duplex, when a network card is configured After the auto-negotiate workstation is connected to the switch, the negotiation result is that the interface rate is 10OMbps and the working mode is half-duplex, which of the following explanations is the most reasonable for this phenomenon?

Options:

A.

The problem is on the workstation's NIC, mostly due to the aging of the NIC driver on the workstation , which causes the workstation NIC to learn the interface rate and operating mode configured on the switch

B.

Port rate negotiation is negotiated through the initial port sending FLP , and the operating mode is not negotiated through FLP

C.

STP initializes the port into the blocking state, causing auto-negotiation to fail, so the port should be configured as an edge port

D.

At higher port rates and operating modes, the workstation's network interface card cannot be configured as auto-negotiate

E.

Auto-negotiation is not configured on the switch, resulting in the switch not being able to send FLP messages to the workstation, causing the workstation to set its own operating mode to Half-duple

Buy Now
Questions 151

Is the following description of the differences between IGMP name versions correct?

Options:

A.

IGMPv1/v2 cannot elect the queryer itself, while IGMPv3 can

B.

IGMPv1 does not support specific group queries, while IGMPv2 does

C.

IGMPv1/2/v3 cannot support the SSM model

D.

For members to leave, IGMPv2/v3 can actively leave, while IGMPvl cannot

Buy Now
Questions 152

Among the routing policy tools commonly used by BGP, which ones can be used to filter routes?

Options:

A.

filter-policy

B.

Route-policy

C.

lp extecommunity-filter

D.

Traffic-policy

Buy Now
Questions 153

Mainstream Layer 2 technologies such as VXLAN, TRILL, NVGRE and MPLS

Options:

A.

True

B.

False

Buy Now
Questions 154

The main routing policy tools that BGP can use are Filter-policy and Route-policy, where Fate-policy can only filter routes and Route-policy can only modify routes

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 155

The following statement about IS-IS (IPv6) is correct?

Options:

A.

In order to support the processing and calculation of IPv6 routes, IS-IS has added TLV232 and 236

B.

By default, IS-IS has the multi-topology feature turned on

C.

IS-IS works at the data link layer and only needs to add a new TLV to support IPv6

D.

In order to support the processing and calculation of IPv6 routes, IS-IS has added NLPID to the 129 TLV

Buy Now
Questions 156

Huawei's two switches SWA and SWB are connected together by 7 Ethernet cables, and static link clustering is configured, and the corresponding port on the switch SWA is Ethernet 1/0/1 ?Ethernet1/0/2?Ethernet 1/0/3?Ethernet 1/0/4?Ethernet 1/0/5, Ethernet1/0/6, Ethernet 1/0/7, configured in order of port if the switch SWA, SWB supports only 6 ports per aggregation group

Options:

A.

In the case of consistent configuration of each port, Ethernet 1/0/6 port is an aggregate group Unselected port

B.

In the case of consistent configuration of each port, the Ethernet1/0/1 port is an aggregate group Unselected port

C.

With the same configuration of each port, the Ethernet 1/0/7 port is the aggregate group Unselecte port

D.

With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselecte port

Buy Now
Questions 157

WRED is configured on the newly deployed router HW. What is the correct description of the WRED features below? (Multiple choice questions).

Options:

A.

WRED can set different drop thresholds and packet loss rates for packets of different priority

B.

When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop)

C.

Avoid global synchronization by selectively dropping multiple TCP streams

D.

Low-bandwidth traffic is easier to drop than high-bandwidth traffic

Buy Now
Questions 158

What is the following correct for the process of registering the source-side DR with RP in PIM-SM?

Options:

A.

Encapsulated in the registered message is multicast service data

B.

RP sends a registration stop message as soon as it receives the registration message.

C.

Registered messages are used to build the RPT tree between source DR and RP

D.

Registered packets are multicast packets.

Buy Now
Questions 159

The multicast IP address is 2291301301, and its corresponding MAC address is :(Multilist)

Options:

A.

01-00-5E-O2-82-01

B.

01-00-5E-82-82-01

C.

00-00-5E-02-82-01

D.

00-00-5E-82-82-01

Buy Now
Questions 160

What categories can ACLs be divided into? A. Advanced ACLs

B. Two-layer ACL

C. User-defined ACLs

D. Basic ACL

Options:

Buy Now
Questions 161

Firewall security policies have the condition for traffic matching to be ?( Multi-select)

Options:

A.

apply

B.

Source item security zone

C.

Source item IP address

D.

Message length

Buy Now
Questions 162

The correct statement about the IGMP proxy is ? Multi-select

Options:

A.

The downstream interface of the IGMP proxy device generates multicast relay table items

B.

IGMP proxy can detect the link status with the linkage through the information of the member host joining/leaving the multicast group, and realize the rapid switching of the primary and standby device links

C.

IGMP proxy is typically deployed on devices between hosts that are members of the access device

The

D.

IGMP proxy device cannot send query messages to downstream member hosts in place of the IGMP queryer to maintain group membership

Buy Now
Questions 163

In an MPLS BGPVPN networking that does not enable MPLS penultimate hop pop-up technology. When the message reaches the last hop PE, the message has two layers of labels, and the two layers of label values can be the same.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 164

The following is an error in the OSPF routing calculation (single choice).

Options:

A.

Compared to the PRC algorithm, the ISPF algorithm only calculates the changed leaf nodes when the route changes PRC algorithm to recalculate routes

B.

When the first and second class LSAs on the network change, OSPF uses the ISPF algorithm to recalculate the routes The

C.

OSPF router uses the FULL SPF algorithm to calculate all nodes in the network when initially calculating routes

Buy Now
Questions 165

Regarding BGP route filtering, the following description is wrong?

Options:

A.

The filtering relationship between Route-Policy's noodes is "or." ", that is, as long as a node filter is passed, it can pass through the Route-policyo

B.

For routes published locally, configure a routing policy that takes effect before the route is added to the BGP route table.

C.

In the same node of Route-Policy, multiple if-match clauses for different attributes are "or" relationships.

D.

When a route to a BGP peer is received, a routing policy is enforced to filter unwanted BGP routes that are not added to the local BGP routing table.

Buy Now
Questions 166

If four routers run ISIS and have established an adjacency relationship, and the area code and router rank are marked as shown in the figure, what is the cost value of R4 reaching 10022/32?

Options:

A.

10

B.

20

C.

30

D.

40

Buy Now
Questions 167

When the IPv6 address of a host is configured with a stateless address configuration, and other parameters other than the address are obtained through DHCPv6, how to set the M and 0 bits in the RA message ?

Options:

A.

M=10=1

B.

M=10=0

C.

M=1 0=0

D.

M=00=1

Buy Now
Questions 168

What is the significance of reserved multicast address 224000~22400255?

Options:

A.

The multicast address range is reserved for the management of multicast addresses, and is valid locally

B.

The address identifies Global lnternet, and the address range is valid for the entire network

C.

This multicast address range is reserved for the management of multicast addresses, which cannot transmit multicast traffic to the Internet

D.

Any legitimate multicast traffic and multicast application Junhui adopts an address change

E.

The multicast address range is reserved for link-local multicast traffic, including network control messages, and the address range is only valid locally

Buy Now
Questions 169

The message types of ISIS mainly include SNP, IIH, and LSP

Options:

A.

True

B.

False

Buy Now
Questions 170

The switch SWA and SWB are connected together by 2 Ethernet links, where the switch SWA has the following interface configuration:

Options:

A.

Without changing the current configuration, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 can join the same aggregation group

B.

Because of the different VLANs allowed, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 cannot join the same aggregation group

C.

After link clustering is configured on both SWA and SWB, if MSTP is enabled on the switches SWA and SWB Both GigabitEthernetl1/0/1 and GigabitEthernetl/O/2 are the forwarding status of MSTP

D.

Only if the configuration of GigabitEthernet 1/0/2 is changed to match GigabitEthernet 1/0/1 can the two join the same aggregation group

Buy Now
Questions 171

RTA is the source DR router, RTB is the RP router, and the multicast source sends multicast data to the RTA, but the PIM is not visible on the RTB Register the multicast source to which the message is registered, then the possible causes are ?

Options:

A.

Multicast network statically configures RP, while RTA router does not statically configure RP

B.

The RP elected by RTA is not an RTB

C.

RTB to RTA has no unicast routing, causing the RTB to fail RPF checks for the source

D.

The multicast network dynamically elects the RP instead RTA failed RPF check for BSR

Buy Now
Questions 172

The means of the LAND attack is that the attacker sends an SVN packet message with the same source and destination addresses to the target host, the source port and the destination port are the same, and the receiver waits for the final ACK packet to be sent , the connection is always in a semi-connected state, resulting in a full limited TCP reception Waste of resources

Options:

A.

True

B.

False

Buy Now
Questions 173

The following statement about static VXLAN tunnel configuration is correct?

Options:

A.

A BD needs to create an NVE country, and when there are multiple BDs, multiple NVE interfaces must be created

B.

An NVE interface can be associated with multiple VNls, so you can create only one NVE interface when there are multiple BDs

C.

For a VXLAN tunnel, you need to create a corresponding NVE interface, in which you explicitly specify the source IP address and the destination IP address , so there are multiple VXLAN tunnels on the VTEP that must be vE interfaces

The destination address of the VXLAN tunnel is specified in the

D.

NVE interface, and multiple VXLAN tunnels can create only one NVE interface

Buy Now
Questions 174

Which nationality meets the following two conditions: 1] BGP Router A can choose whether the Ulpdate message is based on the nationality. ( ) If Router B receives a Updae message containing a cross-hatch, run-by B does not have an identified solidity, but will also contain a multifaceted] Ulpdate retracts the advertisement to Router C. Router C may recognize and apply this attribute. (Multiple choice questions).

Options:

A.

Aggregator

B.

Local_Pref

C.

Multi_Exit_Disc

D.

Community

Buy Now
Questions 175

A router Router LSA is shown in the figure below, and the following statement is incorrect?

Options:

A.

This router is a DR

B.

This router has established an adjacency relationship

C.

This router supports external route ingestion

D.

The Router ID of this router is 100121

Buy Now
Questions 176

In a multicast network running PIM-SM mode, how does the router choose the upstream interface?

Options:

A.

looks up the outgoing interface corresponding to the RP address in the unicast routing table

B.

Interfaces to which multicast group members are directly connected

C.

Find the outbound interface corresponding to the mapping proxy in the unicast routing table

D.

The interface that is fast to the PIlM Join message

E.

Interface for sending PIM Heilo messages.

Buy Now
Questions 177

In an intra-domain MPLSVPN network, when a packet enters the public network and is forwarded, it is encapsulated with two layers of MPLS tags, and the description of the two layers of tags in the following options is incorrect

Options:

A.

The outer label of mpls VPN is assigned by the LDP protocol or statically, and the inner label is assigned by the MP-BGP neighbor of the peer

B.

The outer label of MPLS VPN is called a private network label, and the inner label is called a public network label

C.

The outer label is used to correctly send packets to the appropriate VPN in

D.

on the PE device By default, the outer label is ejected before the packet is forwarded to the last hop device

Buy Now
Questions 178

QinQ technology is a technology that extends the VLAN space by adding a layer of 8021Q tag messages to the extended VLAN. The function of space, the following statement about QInQ is mispronounced?

Options:

A.

basic QinQ is implemented based on the interface orientation

B.

QinQ increases the number of VLANs to 4095*4095

C.

Flexible QinQ can be based on different inner layerS Tag and different outer layers of Tag, for user VL The division of AN is more granular

D.

QinQ technology enables private VLANs to pass through the public Network

Buy Now
Questions 179

IS-IS supports the processing and computation of IPv6 routes by adding ATLPs to carry IPv6 addresses and reachability information.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 180

The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.

Options:

A.

True

B.

False

Buy Now
Questions 181

The BSR/RP mechanism described below describes the correct determination ?( Multiple choice questions).

There can be multiple C-BSRs in the

Options:

A.

PIM-SM domain, but only one BSR can be elected.

B.

BSR collects C-RP information by receiving packets of C-RP

C.

BSR advertises BSR and C-RP information to all routers in the PIM-SM domain via flood bootstrap messages

D.

A C-BSR can also collect C-RP information by receiving C-RP packets

Buy Now
Questions 182

Regarding the description of the permanent multicast address, the error is ?

Options:

A.

All routers running the PIM protocol listen on 22400100

B.

All routers listen on 224002

C.

All hosts and routers in the network segment listen on 224001

D.

All routers running the OSPF protocol listen to 224005

Buy Now
Questions 183

What command can be used to prevent users from accessing multiple devices through the HUB on the switch's access port?( Radio).

Options:

A.

[Huawe interface Gigabithemeto/0/1[Huawei-GigabiEthermeto/O/lport linktypetrunk [Huawel-GigabithemetO/1]port trunk allow pass vlan 10

B.

[Huawei interface GigabiEthemet/0/1[Huawe-GigablEthemetO/0/1Jpor ink type acess(Huawei GigabitEthemet/O/Tipsg enable

C.

Huawei interface GigabiEthemetO/0/1Huawei-GigabiEthemetO/OJport link-type acces Huawei GigabilEthemet/0/1port-secunty enable0

D.

[Huawei iterface Gigabithemeto/0/1 (Huawei-GigabitEthemeto//1)pot ink type access(Huawel-CigabiEthemeto/1]portisolate enable

Buy Now
Exam Code: H12-891_V1.0
Exam Name: HCIE-Datacom V1.0
Last Update: Nov 14, 2024
Questions: 610
$64  $159.99
$48  $119.99
$40  $99.99
buy now H12-891_V1.0