Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H12-261 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-261 Exam Dumps - HCIE-Routing & Switching (Written)

Question # 4

The following information about the correct description is BGP4+, ?

A.

Bgp4+ dampening IBGP can use the match to suppress the polling of the routing line.

B.

The modified BGP router id BGP guide connection will be re-established.

C.

BCP4+ Next Hop Pv6, the attribute in the address is represented by the address, which can be the next-hop road-local address chain.

D.

BGP4+ does not support route self-aggregation.

Full Access
Question # 5

As shown, it is a link between R1 R2 PPP R1 R2 IP, and the direct interface is not connected to the same network segment, but can communicate with the straight interface, and the same rule

In the case where the Ethernet channel cannot communicate, what is the reason?

A.

R1 R2 POS IPCP 24 and the interconnection port, learned the parallel subnet routing of the straight interface

B.

R1 R2 POS IPCP 32 and the interconnection port, learned the serial host route of the straight interface

C.

R1 R2 POS LCP MAC ARP MAC and the interconnection port, by learning the familiar address of the end interface, no need to ask for the address

D.

R1 R2 POS ARP MAC and the data of the interconnection port. The text does not need to be encapsulated in the Ethernet header.

Full Access
Question # 6

There must be no type in the OSPF stub LSA area.

A.

Type-7

B.

Type-5

C.

Type-4

D.

Type-3

Full Access
Question # 7

In the broadcast network OSPF RTA.RTB.RTC RTD DR 2. 1. 1 0 network, there are four routers in the same network segment, and its first priority is and

Router ID 192.168.1.1.192.168.2. respectively 1.192.168.3.1 192.168.4.1. 4 and if enabled on this router, OSPF is enabled.

The OSPF BDR is elected as

A.

RTB

B.

RTC

C.

RTA

D.

RTD

Full Access
Question # 8

The router is enabled and the role of the router HW OSPF HW ABR, abr -surmnary, LSA ? is configured and then which classes are summarized

A.

4 LSA class

B.

5 LSA class

C.

2 LSA class

D.

1 LSA class

E.

3 LSA class

Full Access
Question # 9

ISIS CSNP OSPF DD MA , , both the text and the report are reported in the network description of the road data summary role chain library for this report than the two classes below

Correct method

A.

Both types need to be confirmed by the peer router after the message is sent. Otherwise, it needs to be retransmitted.

B.

OSPFA DD, DR/BDR; CSNP DIS in the textual interaction of the master-slave relationship report and the non-identity binding, and the text is only produced by the report.

C.

Once the connection establishes a successful neighbor, the CSNP DD message and the report will stop sending.

D.

After the two texts are sent, the router does not need to be authenticated.

Full Access
Question # 10

When the router is running on the same OSPFv3 ISIS OSPFv3 ISIS and the routes that need to be imported, the following types of import configurations are correct.

selected)

A.

[Huawei] isis 1

[Huawei-isis-1] is-level level-1

[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00

[Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1

[Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huaweiospfv3-1] router-id 2.2.2.2

B.

[Huawei] isis 1

[Huawei-isis-1]is-level level-1

[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00

[Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1

[Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

C.

[Huawei] isis 1

[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00

[Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1

[Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huaweiospfv3-1] router-id 2.2.2.2

D.

[Huawei] isis 1

[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00

[Huawei-isis-1] import-route ospfv3 1

[Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

Full Access
Question # 11

LAND's attack means that the attacker sends a source address and a destination address to the target host. The target is marked as the source port and the destination port.

SYN ACK TCP report text, the receiving end is waiting for the sending end of the final message, and the connection is always connected in a semi-connected state, causing the receiver to receive limited resources.

Waste

A.

Correct

B.

Error

Full Access
Question # 12

Established as shown below, R1.R2 E-BGP, BFD, neighbor and open function detection The following method is correct

A.

R2 BFD 800ms text report detection time is

B.

R2 BFD 600ms text report detection time is

C.

R1 BD 660ms text report detection time is

D.

R1 BFD 1280ms text report detection time is

Full Access
Question # 13

When the DLDP DLDP Disable Trap fiber-optic single-chain exists in the optical path, the default operation includes the Huawei device recognizes that the state is migrated to the state; the outgoing message

Information; since the interface is blocked, it is set to state.

A.

Correct

B.

Error

Full Access
Question # 14

In the two IBGP, shutdown, and BGP neighbor devices that have established the home, the interface is closed and the device connection is not immediately disconnected.

A.

True

B.

False

C.

D.

Full Access
Question # 15

As shown in the following topology, establish a phase relationship, and receive the AS400 AS100 1.1.1.1/32 AS-Path routing network. What is the attribute?

A.

100 200 300

B.

400 300 200 100

C.

100 200 300 400

D.

300 200 100

Full Access
Question # 16

The following description of the deployment characteristics is correct 802.1s?

A.

Multiple networks share a generation example bridge

B.

All share a generation instance VLAN tree

C.

Each share a generation instance VLAN tree

D.

Multiple share a generation instance VLAN tree

Full Access
Question # 17

Which of the following statements is true regarding the domain-authentication-mode md5 hello command in the IS_IS process?

A.

This command enables 1S-IS Hello PDUs to carry authentication information.

B.

1S-1S SNP and LSP can be flooded normally only when the domain authentication mode and password of all routers in the same routing domain are MD5 and hello.

C.

IS-IS authentication cannot be applied to IPv6 environments.

D.

Routing domain authentication enables Level-1 and Level-2 SNPs and LSPs to carry authentication information.

Full Access
Question # 18

The function of the HoP Limit field in an IPv6 header is similar to the function of which field in an IPv4 header?

A.

Protocol

B.

Time to Live

C.

Flags

D.

Identification

Full Access
Question # 19

Which of the following statements regarding BGP load balancing are false?

A.

The AS_Path attribute values of equal-cost routes for load balancing must be different.

B.

When BGP load balancing is implemented, the local device can change the next-hop address of routes to its own address when advertising the routes to IBGP peer groups only if the peer next-hop-local command is configured.

C.

Load balancing can be implemented among BGP routes with different origins but having the same destination network segment.

D.

Load balancing can be implemented among IBGP routes and EBGP routes having the same destination on the public network.

Full Access
Question # 20

Which of the following attributes cannot be directly referenced by the if-match clause of route-policies?

A.

Community-filter

B.

IP-prefix

C.

AS-Path-filter

D.

Regular expression

Full Access
Question # 21

The figure shows the topology and configuration. Which of the following method, can he used to exclude the specific route .0.0.3.3/32 from the routing table of R1?

A.

Configure route summarization on R2 and summarize routes as 10.0.0.0/16.

B.

Configure route summarization on R3 and summarize routes as 10.0.0.0/16.

C.

On R1, configure a filter policy, use the ACL applied to the filter-policy to match 10.0.3.3/32, and apply direction.

Full Access
Question # 22

Which of the following statements regarding the Multi-VPN-instance CE (MCE) is false?

A.

An MCE device creates a routing table for each VPN and binds each VPN instance to it’s interfaces

B.

The MCE has been bound to a VPN. Therefore, no VPN needs to be bound to the PE connected to the MCE

C.

Based on the interface for receiving routing information, the MCE determines the origin of the routing information and adds the routing information to the routing table of the corresponding VPN

D.

The MCE can connect to multiple VPNs. The MCE solution isolates services of different VPNs while reducing the cost of network devices

Full Access
Question # 23

Assume R1 and R2 have a valid level-2 ISIS peering for IPv6 and the additional configuration shown is applied. Which of the following statements about routing entries on R2 are true?

A.

2022:: /64 will be displayed in the IPv6 routing table.

B.

2021:: /64 will be displayed in the IPv6 routing table.

C.

2019:: /64 will be displayed in the IPv6 routing table.

D.

2020:: /64 will be displayed in the IPv6 routing table.

Full Access
Question # 24

What advantages does IGMPv2 have over IGMPv1?

A.

The Source-Specific Query message is added.

B.

The Group-Specific Query message is added.

C.

The Leave message is added.

D.

The maximum response time field is added.

Full Access
Question # 25

During troubleshooting for a LAN where Huawei devices are deployed, you find that there are a large number of unicast frames with unknown source MAC addresses. What is the most severe impact these unicast frames have on the switch?

A.

TCAM entries are occupied

B.

The power consumption is increased

C.

The available MAC address entries are consumed

D.

The available bandwidth is consumed

E.

The memory for buffering frames is occupied

Full Access
Question # 26

In the process of using the network P4 Pv6 and PV4/IPv6 addresses in the network to change addresses, many techniques have been used. These skills are divided into two

The first one is the v4/P6, Pv4/IP6? ( ) interoperability technology. Which of the following technologies are coexisting technologies?

A.

NAT64

B.

IPv6 over IPv4

C.

Dual-Stack

D.

ISATAP

Full Access
Question # 27

The description of the configuration is correct: (multiple BGP4+ selected)

A.

Ruter-ID BGP4 Router-ID is the same as .

B.

BGP4+ peer Link-Local specified when required

C.

The next hop of the BGP4+ Link-Local route does not use an address.

D.

BGP4+ BGP4 When the reflector is configured, the role of the reflector and the client needs to be the same as the configuration of the user.

E.

BGP4+ does not support route reflectors.

Full Access
Question # 28

Regarding the logical mode of the MPLS TTL pair, is the following description correct?

A.

Pipe IP MPLS IP TTL 1 In MPLS TTL mode, when the message passes through the network, it is mapped to the field at the ingress point.

B.

MPLS TTL IP TTL MPLS A label, which has the same function as the header, can prevent the network from routing the loop (as it is)

C.

Uniform IP MPLS IP TTL 1 MPLS TTL mode is simulated. When the message passes through the network, the entry point is reduced and the field is fixed to the value.

D.

In the case of the MPLS VPN MPLS Ingress uniform, the private network text can be used in the reporting mode.

Full Access
Question # 29

The following is a single attack?

A.

Special control

B.

Scanning and testing

C.

DDoS attack

D.

Malformation

Full Access
Question # 30

The following description of the aggregation is correct for BGP, ?( ) radio

A.

After the configuration, only Aggregate ipv4-address mask is sent, and the route is not specified.

B.

For IPv6, BGP routing supports manual aggregation and self-aggregation.

C.

By default, self-aggregation BGP is enabled.

D.

You can manually aggregate the routes in the BGP local routing table.

Full Access
Question # 31

The topology and configuration are as shown in the figure below, R1 10.0.3.3/32, now I hope that the routing entries that do not exist in the routing table are fine. The following methods can be implemented.

A.

Configure routing R3 above, 10.0.0.0/16 summary.

B.

Configure route R2 above, 10.0.0.0/16 summary.

C.

Configure the above R2 filter-policy, ACL 10.0.3.3/32, expot over match when used in the same direction

D.

Configure the above R1 filter-policy, ACL 10.0.3.3/32, import over match, use the same direction

Full Access
Question # 32

As shown in the figure, the R1 R2 ISIS R1 R2 ? neighbor relationship is established, and the data synchronization process with it is correct.

A.

The message sent by the R1 R2 PSNP is a message.

B.

The message sent by R1 R2 CSNP is a message.

C.

The message sent by the R1 R2 LSP is a packet.

D.

The message sent by R1 R2 Hello is the message.

Full Access
Question # 33

Which of the following is the correct description of the assertion mechanism?

A.

The winner IP will not elect the address size for the election.

B.

In the assertion mechanism, broadcast data to the broadcast network segment. The winner is responsible for the forwarding group.

C.

The DR election used by the assertion mechanism.

D.

The interface to the broadcast network in the assertion mechanism loser shut down.

Full Access
Question # 34

In the Huawei device, when the ISIS ISIS Metric tag is externally routed to the external route and the routing information is imported, the type can be recognized without modification.

A.

Correct

B.

Error

Full Access
Question # 35

Interface Serial 0 of a router is enabled for OSPF Area 1, Serial 0 is configured as a silent interface. What is the impact of this configuration?

A.

The OSPF router receives updated routes from its neighbor

B.

The OSPF router establishes an available adjacency through this interface

C.

The OSPF router does not add the routes learned from the interface to the local routing table

D.

The OSPF router does not establish any adjacency through this interface

Full Access
Question # 36

Which of the following statements regarding MP-BGP is false?

A.

The MP_UNREACH_NLRI attribute of Update packets does not contain path information

B.

MP_REACH_NLRI and MP_UNREACH_NLRI are optional transitive attributes

C.

The complete MP_REACH_NLRI attribute structure contains the address family, next hop, and prefix information

D.

MP-BGP can be used to allocate labels

Full Access
Question # 37

Which of the following are key differences between RIP version 1 and RIP version 2? (Multiple Choice)

A.

RIP version 2 uses multicasts while RIP version 1 does not

B.

RIP version 1 supports authentication while RIP version 2 does not

C.

RIP version 1 does not support VLSM while RIP version 2 does

D.

RIP version 1 is distance vector while RIP version 2 is not

E.

RIP version 1 uses hop counts as the metric while RIP version 2 uses bandwidth information

Full Access
Question # 38

Which of the following are used in Ethernet networks? (Multiple Choice)

A.

802.5 encapsulated frames

B.

802.3 encapsulated frames

C.

CSMA/CD for media access

D.

Non Canonical format MAC addresses

E.

Canonical format MAC addresses

Full Access
Question # 39

Which of the following are single-packet attacks?

A.

Malformed packet attacks

B.

Special control packet attacks

C.

Scanning and snooping attacks

D.

DDoS attacks

Full Access
Question # 40

A Local Area Network Denial (LAND) attacker sends a SYN packet in which the source and destination addresses are the same as the target host's address and the source port is the same as the destination port. While the receiver waits for the final ACK packet from the sender, the connection is in half-connected mode, which wastes limited TCP resources at the receive end.

A.

TRUE

B.

FALSE

Full Access
Question # 41

Which layers are shared in the OSI reference model and TCP/IP model?

A.

Presentation layer

B.

Application layer

C.

Transport layer

D.

Session layer

E.

Data link layer

Full Access
Question # 42

which of the following statements is true according to the topology shown?

A.

Routing entries 10.0.3.3/32 and 10..0.0./16 exist in the IP routing table of R1.

B.

Routing entries 10.0.2.2/32 and 10.0.3.3/32 exist in the IP routing table of R1.

C.

Because route summarization is configured on R2, only the routing entry 10.0.0./16 exist in the IP routing table of R1.

D.

Routing entries 10.0.2.2/32 and 10.0.0.0/16 exist in te IP routing table of R1.

Full Access
Question # 43

Which of the following certificate items does not contain the number?

A.

Public information key

B.

Digital envelope

C.

Number Name Signature

D.

Issuer

Full Access
Question # 44

The RD VPN IP RD bit is used to distinguish the same address in different. How much is included?

A.

16

B.

64

C.

32

D.

128

Full Access
Question # 45

There is an AS-path-filter ip as-path-filt , er 1 permit ^100(_100)*(_400)*, As- which path-filter AS-PATH cannot match which genus

Sex

A.

100 400

B.

100 400 400 400

C.

100 200 900

D.

100

Full Access
Question # 46

The following topology diagram can be established through the R1 R2 R3 internet R1 R2 R1 R3 EBGP R2, R3 and access, and , and

By AS BGP R1 internet R2 ( ), the default route is advertised, and the traffic required for access is preferred. The following practices can be implemented.

A.

R2 R1 export MED 150 specifies that the body pair is set in the direction attribute

B.

R1 R3 import MED 150 specifies the body to be set in the direction attribute

C.

R2 R1 export 150 specifies the body to set the priority in the direction

D.

R1 R2 import 150 specifies that the body is set to the local direction in the direction.

Full Access
Question # 47

As shown in the figure, the branches and branches use the redundant path to establish the total chain IPSEC VPN Router_B 1 URPF , and the traffic from the branch pair is on at the same time.

Which of the following are correct options? ( ) Multiple choices

A.

When using the main channel redundancy IPSEC URPF URPF backup link, use the function under the physical interface to build the loose mode.

B.

When using multi-channel redundancy IPSEC tunnel URPF URPF chain backup, enable the function under the interface, you can use the grid mode

C.

When the primary channel redundancy IPSEC URPF URPF backup link is used, the function can be enabled on the physical interface.

D.

When using multi-channel redundancy IPSEC URPF URPF chain backup, enable the function on the physical interface, you can use the grid mode

Full Access
Question # 48

Which of the following statements regarding optimal route selection of various protocols is true?

A.

All routes learned through OSPF in the LSDB are added to the IP routing table

B.

The optimal route is selected after comparison costs of routes that are learned through BGP and destined for the same network segment

C.

The optimal route is selected after comparison between preferences of routes that are learned through BGP and OSPF and that are destined for the same network segment

D.

BGP routes with unreachable next hops are also added to the IP routing table

Full Access
Question # 49

Which of the following statements regarding ISIS route leaking are true?

A.

IS-15 route leaking can be configured in IPv6 environments.

B.

In IS-IS route leaking, the routes to be leaked cannot be summary routes.

C.

IS-IS route leaking will not cause neighbor flapping.

D.

IS-15 route leaking is used to prevent route loops.

E.

IS-IS route leaking can be configured on Level-1 routers.

Full Access
Question # 50

In the aggregate ipv4-address {mask | mask-length} [as-set | attribute-policy route-policy-name1 | detail-suppressed | origin-policy route-policy-name2 | suppress-policy route-policy-name3] command, multiple parameters can be used to affect the BGP summarized route and summarization result. Which of the following statements regarding this command are true?

A.

If the origin-policy parameter is specified, only the specific routes matching route-policy are summarized.

B.

If the attribute-policy parameter is specified, attributes of the summary route can be modified.

C.

If the suppress-policy parameter is specified, a summary route is generated. The if-match clause of the route-policy can be used to filter specific routes to be suppressed. The specific routes matching route-policy are still advertised to other BGP peers.

D.

If the as-set parameter is specified, the AS_Path attribute of the summary route contains AS path information about all specific routes to prevent loops.

Full Access
Question # 51

Routers HW1 and HW2 are IP Multicast routers. These routers use (S, G) entries for multicast packet forwarding. Which of the following address types are used in the “S” entry?

A.

The block of administratively scoped multicast addresses

B.

Source Specific multicast addresses

C.

SDP/SAP addresses

D.

Any class A, Class B, or Class C host address

E.

GLOP addresses

Full Access
Question # 52

Which of the following statements regarding ISIS route summarization is true?

A.

Route summarization can be configured and takes effect on all types of routers.

B.

Route summarization takes effect only on Level-1 routers

C.

Route summarization takes effect only on Level-2 routers.

D.

Route summarization takes effect only on Level-1-2 routers.

Full Access
Question # 53

The network management has set a traffic management strategy as follows:

The router port that should be used by the policy has been idle for about 10 c1 seconds. Sometimes the type of massive burst is in the instant, so the coloring is green.

How many bytes will the packet have?

A.

6K bytes

B.

32K bytes

C.

48128 bytes

D.

80128 bytes

Full Access
Question # 54

In a basic network packet layer, which information can be included (more?)

A.

Data Road Department Chain Head

B.

Upper data layer

C.

Network Department

D.

Path record

E.

net tail layer

Full Access
Question # 55

Router HW1 and Router HW2 are connected to network A and B Network B respectively. Referring to the figure, if you want to set up an IPsec VPN tunnel between HW1 and HW2, which of the following ACL rules needs to be configured on HW1 to transmit the traffic across network A and B pass through the encrypted VPN tunnel?

A.

rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255

B.

rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255

C.

rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0

D.

rule permit ip source 192.168.1.1 0 destination 10.1.2.0 0.0.0.255

E.

rule permit ip source 192.168.1.1 0 destination 192.168.1.2 0

Full Access
Question # 56

The interface of an existing router Serial0 OSPF 1 Serial0 Silent is going to go and set the interface as an interface. Then what will happen?

Impact?

A.

OSPF does not pass the interface to establish any connection.

B.

OSPF does not add routes learned from the interface to the local routing table.

C.

OSPF will receive routing updates from neighbors.

D.

The OSPF interface establishes the available connections.

Full Access
Question # 57

The network administrator can use the CAR CAR technology in the traffic management. Which of the following techniques can be used during surgery?

A.

Double barrel double speed

B.

Single barrel speed

C.

Three barrels

D.

Double barrel speed single

Full Access
Question # 58

The following is about reliability, describing LDP errors?

A.

The LDP FRR LSP LSP can also be generated from the mapping of the non-lowest hops as the privilege label, and the primary device is configured as the primary device. The table forwarding entry B. LDP IGP IGP LDP IGP is associated with the association. , guaranteed to be consistent with the path

B.

Hand-configured dynamic LDP FRR 32 LDP LSP policy is the default route to the backup device.

C.

LDP GR (Graceful Restart) MPLS uses the feature that the plane and the control plane are separated, and is forwarded when the device protocol is replaced by the restart or the primary or the reverse.

No interruption.

Full Access
Question # 59

BGP BGP introduces other post-routing protocols. The next hop in the routing table is consistent with the next hop of the redistributed route.

A.

Correct

B.

Error

Full Access
Question # 60

The router passes two parallel cables and two EPE serial neighbors. What method do you use to implement the cable in two parallels?

Two EBGP of the connection? Two-way sharing of the neighbor load

A.

Use the interface to establish a relationship and configure Loopback EBGP EBGP Multi--hop, Loopback, IGP neighbor configuration interface as the update source for

The equivalent load of the address is used to share the load between the implementations.

B.

Without any method, the traffic will be shared by different autonomous systems on the available roads, and the BGP dynamic chain will realize the inter-system load.

C.

Use the command "ebgp-load-balance" at both ends

D.

Configure Loopback EBGP with the interface as the update source. AS IGP EBGP is the neighbor relationship. Each of the two neighbor rings that arrive at the home address is required.

Price path and need to use the command; "next-hop-local"

E.

Configure the loopback EBGP with the interface as the update source. AS IGP EBGP is the neighbor relationship. Each neighbor ring that needs to arrive at the home loop address is required.

Equivalent path and need to use the command and ; "ebgp-max-hop "next-hop-local

Full Access
Question # 61

If the PIM-SM is running in the broadcast network, the forwarding tree needs to be set up between the broadcast source and the receiver to enable the receiver to receive the broadcast data set.

Then for the group forwarding tree option, the following is the correct description of the built broadcast? Multiple ( )

A.

The RP RPT is constructed with the recipient.

B.

The multicast source and the RP RPT are constructed by the tree.

C.

RP SPT and the recipient's construction is the tree

D.

The multicast source and the RP SPT are constructed by the tree.

Full Access
Question # 62

In which port can provide a copy of the path to the generated root point RSTP sufficient tree section? What is the port?

A.

Alternate Learning port and status

B.

Alternate Forwarding Port and Status

C.

Root port and shape Listening state

D.

Designate Listening port and status

E.

Alternate Discarding port and status

Full Access
Question # 63

If more than one candidate group is selected for RP RP RP ( ) in a broadcast, the election of multiple candidates from the multiple candidates is more selective than the following parameters.

A.

C-RP's priority

B.

The mask of the C-RP service that matches the address of the added group.

C.

Address of the C-RP IP interface

D.

Number of the C-RP interface

Full Access
Question # 64

In the following topology diagram, all the interfaces of the router are all open. Figure ISIS ( ), the following methods are correct.

A.

If the interface is then R3 GE0/0/0 down, R2 master is the device

B.

If the interface is , then it will become R3 Ethernet 0/0/0 down R2 master as device

C.

If the interface is , then it will become R1 Ethernet 0/0/0 down R2 master as device

D.

If the interface is , then it will become R1 Ethernet 0/0/1 down R2 master as the devicec

Full Access
Question # 65

As shown in the figure, in IPv4 and IPV6 environments, the value of the SEL filed in the IS-IS NET address is always 00.

A.

TRUE

B.

FALSE

Full Access
Question # 66

Which of the following statements regarding the stub area in OSPF are true?

A.

A virtual link cannot pass through a stub area.

B.

A backbone area cannot be configured as a stub area.

C.

Type 7 LSAs cannot be flooded to a stub area.

D.

A stub area contains no ASBR.

Full Access
Question # 67

The following is about MPLS BGP VPN?

A.

IBGP ALoopback BGP establishes a stable neighbor relationship for the interface address.

B.

PE-CE OSPF IS-iS EBGP exchange routing can be static routing, multiple instances, multiple examples,

C.

The TTL field in the tag has a function to prevent the path.

D.

BGP Soo VPN MPLS Soo MP-BGP is used to prevent routes routed from one site from going back to the site through the backbone network. Self-generated Expansion group

Full Access
Question # 68

As shown in the figure below, R1 and R2 are connected through a PPP link, and the IP addresses on the directly connected interfaces are not on the same network segment. Rl and R2 can communicate with each other through the directly connected interfaces. However, communication on the Ethernet link fails if the IP addresses on the directly connected interfaces are on the same network segment. What are the causes of this?

A.

R1 and R2 that are directly connected through a POS interface learn the 32-bit host route of each other through IPCP.

B.

R1and R2 that are directly connected through a POS interface learn the MAC address of each other using LCP, and ARP does not need to be used to obtain MAC addresses.

C.

The Ethernet header does not need to be encapsulated into data packets between R1 and R2 that are directly connected through a POS interface, and ARP does not need to be used to obtain MAC addresses.

D.

R1 and R2 that are directly connected through a POS interface learn the 24-bit subnet route of each other through IPCP.

Full Access
Question # 69

Which of the following configurations regarding OSPFv3 route aggregation are true?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E Option E

Full Access
Question # 70

Which of the following statements regarding OSPF route filtering is false?

A.

The filtering of Type 3 LSAs needs to be configured on ABRs in OSPF.

B.

In a NSSA, when external routes are imported to the OSPF router and LSAs are advertised to its neighbors, LSA filtering can be performed on the ASBR or ABR.

C.

All LSAs, except Grace LSAs, can be filtered based on interfaces in the inbound and outbound directions.

D.

When routes are calculated based on the LSDB, the filter-policy import command can be executed to filter routes. This filtering mode affects only the addition of routes in the routing table, and has no impact on the OSPF LSDB.

Full Access
Question # 71

In the figure, the first record shown in LSP in the LSDP of a router, and the second record shown a newly received LSP, Which of the following statements is false?

A.

The router adds the newly received L5P to the LSDB.

B.

The router will ignore the LSPs received from neighbors.

C.

The router sends PSNPs if it is a point-to-point network.

D.

If it is a broadcast network, the DIS adds the summary information of the newly received LSP to the next CSNP.

Full Access
Question # 72

If host HW1 on the network wants to join a video conference, what will the host do?

A.

The host multicasts an 1GMPv2 Membership Report message that carries the expected multicast address to the local network.

B.

The host multicasts an IGMPv2 Membership Report message with the multicast address for all PIM routers (224.0.0.2) to the local network.

C.

The host unicasts an IGMPv2 Membership Report message to the default router on the local network.

D.

The host unicasts an IGMPv2 Membership Report message to the RP.

Full Access
Question # 73

Which of the following statements regarding BGP confederations is false?

A.

By default, sub-AS numbers of a confederation are advertised to BGP peers outside the confederation.

B.

A BGP confederation divides an AS into several sub-ASs. ASs outside a confederation still consider the confederation as an AS.

C.

Confederations can easily detect routing loops inside an AS because EBGP is run between sub-ASs.

D.

Sub-A5s within a BGP confederation can use private AS numbers. For Huawei NE and AR routers, a maximum of 32 sub-ASs can be configured in a BGP confederation.

Full Access
Question # 74

About the basic procedure MPLS, ? Forwarded the following description is the error

A.

When IP MPLS, IP Tunnel ID Tunnel ID 0x0, and MPLS report domain, check the destination address. If the value is 1, enter the forwarding process.

B.

, PHP Egress1 3 The point allocation of the support point is the default. The value of the section of the penultimate hop is set to .

C.

When IP MPLS is entered and the MPLS IP is reported to the domain, the device reporting layer inserts a new label in the header and header of the text.

D.

When the packet is reported in the MPLS, , and MPLS domain, it is forwarded according to the table label. The label of the top label is replaced by the label allocated by the next hop.

Full Access