Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

H12-811_V1.0 Exam Dumps - HCIA-Datacom V1.0 Exam

Question # 4

IPCP dynamic address negotiation can automatically obtain the address()

A.

True

B.

False

Full Access
Question # 5

CSS refers to the combination of two switch devices that support cluster features. Logically combined into one switch device. ()

A.

True

B.

False

Full Access
Question # 6

On Huawei switches, you can use the vlan batch command to create multiple VLANs in batches, simplifying the configuration process. ()

A.

True

B.

False

Full Access
Question # 7

Protocol Priority Switch A. and Switch B. adopt LACP mode link aggregation, and all interfaces join the link aggregation group. At the same time, set the maximum number of active ports to 3. Then which port of switch A is not an active port? ()

A.

B. G0/0/1

B.

G0/0/3

C.

D. G0/0/0

Full Access
Question # 8

The ACL on the ARG3 series routers supports two matching sequences, configuration sequence and automatic sorting. ()

A.

True

B.

False

Full Access
Question # 9

As shown in the figure below, what kind of network equipment can host A and host B use to communicate? () (Single-choice question)

A.

B. Hub

B.

router

C.

D. HUB

Full Access
Question # 10

For switches running the SIP protocol, the port needs to wait for the forwarding delay in the Learning state before it can be converted to the Forwarding state. ()

A.

True

B.

False

Full Access
Question # 11

When using the ping command on the VRp platform, if you need to specify an IP address as the source address of the echo request message, which of the following parameters should be used? ()

A.

=-a

B.

B. =-S

C.

=-d

D.

D. =-1n

Full Access
Question # 12

Which of the following 0SPF protocol packets can ensure the reliability of LSA update? ()

A.

LSACK

B.

C. LSR

C.

D. DD

Full Access
Question # 13

If the network address of a network is 10.1.1.0/30, what is its broadcast address? ()

A.

10.1.1.3

B.

C. 10.1.1.4

C.

D. 10.1.1.1

Full Access
Question # 14

Which category does the IPv6 address FE80:2E0:FCFF:FE6F:4F36 belong to? ()

A.

Link local address

B.

C. Global semicast address

C.

D. Anycast address

Full Access
Question # 15

To ensure that the same data flow is forwarded on the same physical link, which load sharing method does the Eth-Trunk adopt? ()

A.

Flow-based load sharing

B.

B. Packet-based load sharing

C.

C. Load sharing based on application layer information

D.

D. Load sharing based on data packet inbound interface

Full Access
Question # 16

In the MAC address table of the switch, which of the following entries will not age?

A.

Static MAC address table entry

B.

B. Port MAC address table entry

C.

C. Dynamic MAC address table entry

D.

D. Device MAC address table entry

Full Access
Question # 17

As shown in the figure, if the command ping 10.1.1.2 is executed on R1, the data frame of VLAN 10 received from LSW2 by LSW1 is tagged. ()(True or False)

A.

True

B.

B. False

Full Access
Question # 18

The output information of the router is shown in the figure. Which of the following statements is wrong? () (Single-choice question)

A.

The MTU value of the Ethernet0/0/0 interface is 1480

B.

B. The broadcast address corresponding to the Ethernet0/0/0 interface is 10.0.12.255

C.

The physical link of the Ethernet0/0/0 interface is normal

D.

D. Ethernet (The IP address of the /0/0 interface is 10.0.12.1/24

Full Access
Question # 19

In the network shown in the figure below, when the 0$PF neighbor status is stable. What is the neighbor status of Router B and Router C?

A.

2-way

B.

C. Attempt

C.

D. Down

Full Access
Question # 20

The MPLS label header is encapsulated between the data link layer header and the network layer header of the message. ()

A.

True

B.

False

Full Access
Question # 21

In the OSPF protocol, which of the following descriptions of DR is correct? ()

A.

If the priority values ​​of the two routers are equal, the router with the larger Router ID is selected as the DR

B.

By default, all routers in this broadcast network will participate in the DR election

C.

If the priority values ​​of the two routers are different, the router with the lower priority is selected as the DR

D.

D. DThe adjacency relationship should also be established between R and BDR

Full Access
Question # 22

By default, it takes at least 30s for the port status in the STP protocol to change from Disable D. to Forwarding status. ()

A.

True

B.

False

Full Access
Question # 23

Two switches use manual link aggregation at the same time. The following statement is wrong. () (Single-choice question)

A.

Only switch off G0/0/2 port on switch B. The Eth-Trunk status is still UP

B.

Turn off the G0/0/1 and G0/0/2 ports on switch B, and the Efh-Trunk status is still UP

C.

C. Only switch off G0/0/1 port on switch B. The Eth-Trunk status is still UP

D.

D. Turn off the G0/0/1 and G0/0/2 ports on switch B. The Eth-Trunk status is down

Full Access
Question # 24

As shown in the figure, host A and host B want to implement inter-VLAN communication through single-arm routing. What configuration should be done under the G0/0/1.1 interface of RTA?()(Single-choice question)

A.

dotlq termination vid 10

B.

C. dotlq termination vid 20

C.

D. dotlq termination vid 30

Full Access
Question # 25

The MAC address table of existing switches is shown in the figure. Which of the following statements are correct? () (Single-choice question)

<Huawei>display mac address

MAC address table of slot 0:

MAC Address VLAN/PEVLAN CEVLAN Port Type LSP/LSR-ID

VSI/SI MAC-Tunnel

5489 9811 0b49 1 Eth0/0/3 static 0/

Total matching items on slot 0 displayed =1

MAC address table of slot 0:

MAC Address VLAN/ PEVLAN CEVLAN Port Type LSP/LSR-ID

VSI/SI MAC-Tunnel

5489-989d-1d30 1 Eth0/0/1 dynamic 0/-

5489-9885-18a8 1 Eth0/0/2 dynamic 0/-

Total matching items on slot 0 displayed =2

A.

The MAC address 5489-9811-0b49 is manually configured by the administrator

B.

After the switch restarts, all MAC addresses need to be relearned

C.

The MAC address 5489-989d-1d30 is manually configured by the administrator

D.

The MAC address 5489-9885-18a8 is manually configured by the administrator

Full Access
Question # 26

At what percentage does the DHCP client send the lease renewal message for the first time? ()

A.

0.5

B.

B. 0.875

C.

C. 1

D.

D. 0.25

Full Access
Question # 27

In the wLAN network architecture, terminal devices that support the 802.11 standard are called? ()

A.

Client

B.

AC

C.

STA

D.

AP

Full Access
Question # 28

The second layer switch belongs to the data link layer device, which can identify the MAC address information in the data frame, forward data according to the MAC address, and record these MAC addresses and corresponding port information in its own MAC address table. ()

A.

True

B.

False

Full Access
Question # 29

All ports on the root bridge exchange machine are designated ends ()

A.

True

B.

False

Full Access
Question # 30

Telnetlib is a module that implements the Telnet protocol that comes with Python ()

A.

True

B.

False

Full Access
Question # 31

Which of the following statements about the usage scenarios of the DHCP protocol is correct? ()

A.

network does not allow multiple DHCP servers

B.

After receiving the DHCP request or response message, the DHCP relay does not modify the message format and forwards it directly

C.

If the DHCP client and the DHCP server are not on the same network segment, the DHCP relay needs to be used to forward DHCP messages

D.

D. DHCP client and DHCP server must be connected to the same switch

Full Access
Question # 32

What is the number range of the Layer 2 ACL? ()

A.

B. 3000-3999

B.

4000~4999

C.

D. 6000~6031

Full Access
Question # 33

The MAC address table of existing switches is shown in the figure. Which of the following statements are correct? () (Single-choice question)

A.

The MAC address 5489-9811-0b49 is manually configured by the administrator

B.

B. The MAC address 5489-989d-1d30 is manually configured by the administrator

C.

After the switch restarts, all MAC addresses need to be relearned. The MAC address 5489-9885-18a8 is manually configured by the administrator

D.

The MAC address 5489-9885-18a8 is manually configured by the administrator

Full Access
Question # 34

The output information of the STP port of a certain switch is shown in the figure. Which of the following statements is wrong? () (Single-choice question)

ï¼»Huaweiï¼½display stp interface Ethernet 0/0/1

-------[CIST Global Info][Mode STP]-------

CIST Bridge: 32768.4c1f-cc46-4618

Config TimesHello 4s MaxAge 20s FwDly 15s MaxHop 20

Active Times:Hello 2s MaxAge 20s FwDly 15s MaxHop 20

CIST Root/ERPC:0.4c1f-ccf7-3214/200000

CIST RegRoot/IRPC: 32768.4c1f-cc46-4d18/0

A.

Forward-delay is 20s

B.

B. Configure the MaxAge of the BPDU to 20s

C.

C. The period for sending configuration BPDUs on this port is 2s

D.

D. The switch is not a root bridge

Full Access
Question # 35

In the OSI reference model, what can complete end-to-end error detection and flow control is ()

A.

Physical layer

B.

data link layer

C.

Network layer

D.

Transport layer

Full Access
Question # 36

The router receives a data packet with a destination IP address of 11.0.12.1 from host A. After this data packet is forwarded by the router, what are the destination MAC. and destination IP? ()

A.

B. MAC-D.10.0.12.2

B.

MAC-D.11.0.12.1

C.

D. MAC-B.11.0.12.1

Full Access
Question # 37

In the figure below, all switches have enabled the STP protocol, assuming that the path cost value of all ports is 200. What is the root path cost value contained in the configuration BPDU message received by the G0/0/4 port of $WD? () (Single-choice question)

A.

600

B.

200

C.

0

D.

400

Full Access
Question # 38

The switch becomes a logical switch after stacking and clustering, and Eth-Trunk across physical devices can be deployed to improve network reliability. ()

A.

True

B.

False

Full Access
Question # 39

An existing switch is connected to a designated port through a port, but the port does not forward any packets, but can monitor network changes by receiving BPDUs, then the role of the port should be ().

A.

Alternate port

B.

Disable port

C.

D. Root port

Full Access
Question # 40

How many types of OSPF packets are there? ()

A.

B. 4

B.

5

C.

D. 3

Full Access
Question # 41

Switch stacking supports more than two devices, and multiple switches can be grouped into a logical device through stacking. ()

A.

True

B.

False

Full Access
Question # 42

Which of the following descriptions of wireless devices is correct? ()

A.

FIT AP-Generally complete user access, authentication, service forwarding and other functions independently

B.

The wireless controller AC is generally located at the convergence layer of the entire network, providing high-speed, safe and reliable VLAN services

C.

D. FAT AP generally works with wireless controller

Full Access
Question # 43

VRP operating system commands are divided into four levels: access level, monitoring level, configuration level, and management level. Which level can run various business configurations and set commands but cannot operate the file system?

A.

Configuration level

B.

B. Access level

C.

C. Management level

D.

D. Monitoring level

Full Access
Question # 44

Use the ACL shown in the figure on the router RTA to match routing entries. Then which of the following entries will be matched?

(RTA) acl 2002

(RTA-acl-basic-2002) rule deny source 172.16.1.1 0.0.0.0

(RTA-acl-basic-2002) rule deny source 172.16.0.0 0.255.0.0

A.

172.18.0.0/16

B.

B. 172.16.1.0/24

C.

192.17.0.0/24

D.

D. 172.16.1.1/24

Full Access
Question # 45

A router in the backbone area has complete LSDBs of routers in other areas.

A.

TRUE

B.

FALSE

Full Access
Question # 46

Which of the following are true about the Ethernet data frame with the "Length/Type" field being 0x0806?

A.

The source MAC address of the data frame is definitely not FFFF-FFFF-FFFF.

B.

The data frame is an Ethernet II frame.

C.

The data frame is an IEEE 802.3 frame.

D.

The destination MAC address of the data frame must be FFFF-FFFF-FFFF.

Full Access
Question # 47

After an Eth-Trunk in LACP mode is created, devices on both ends send LACPDUs to elect the Actor. Which of the following parameters in LACPDUs determine the Actor election?

A.

Device priority

B.

Interface number

C.

MAC address

D.

Interface priority

Full Access
Question # 48

In a broadcast address, all host bits are set to 1, and a broadcast address can be used as a host address.

A.

TRUE

B.

FALSE

Full Access
Question # 49

Which of the following statements regarding static routing and dynamic routing is incorrect?

A.

Dynamic routing will use more resources than static routes.

B.

The static routing can automatically recover when a link failure is encountered.

C.

The use of dynamic routing is more convenient for the administrator to manage the network following network convergence.

D.

The static routing can be easily configured and managed on the enterprise network.

Full Access
Question # 50

The IP address 192.168.1.127/25 represents a ( ) address.

A.

Broadcast

B.

Multicast

C.

Host

D.

Network

Full Access
Question # 51

Which of the following descriptions regarding the TTL field of the IP packet is correct?

A.

The TTL value will decrement by 1 each time the packet is routed.

B.

The TTL defines the duration during which the source can send packets.

C.

The TTL defines how many packets the source can send.

D.

The TTL value will increment by 1 each time the packet is routed.

Full Access
Question # 52

Which of the following statements is true about root bridge election in STP?

A.

The device with the largest bridge priority becomes the root bridge.

B.

If the bridge priorities of devices are the same, the device with the largest MAC address becomes the root bridge.

C.

The device with the smallest bridge priority becomes the root bridge.

D.

If the bridge priorities are the same, the device with the largest number of ports becomes the root bridge.

Full Access
Question # 53

Which of the following commands is used to configure the country code on an AC?

A.

country-code

B.

province-code

C.

nation-code

D.

state-code

Full Access
Question # 54

Refer to the following configuration of a switch interface. Which of the following statements is false?

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 200

port trunk allow-pass vlan 100

A.

If the VLAN tag carried in a data frame is 100, the switch removes the VLAN tag before sending the data frame.

B.

If the interface receives data frames without VLAN tags, the switch needs to tag the data frames with VLAN 200.

C.

The interface cannot send data frames tagged with VLAN 200.

D.

The link type of the interface is trunk.

Full Access
Question # 55

Which of the following packets are exchanged between STAs and an AP to obtain the AP's SSID before association with the AP?

A.

Probe Request

B.

Discovery

C.

Probe Response

D.

Beacon

Full Access
Question # 56

Which of the following is correct regarding the configuration of the trunk port and access port on a switch?

A.

Access ports can only send untagged frames.

B.

Trunk ports can only send tagged frames.

C.

Access ports can only send tagged frames.

D.

Trunk ports can only send untagged frames.

Full Access
Question # 57

The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments.

A.

TRUE

B.

FALSE

Full Access
Question # 58

As shown in the figure, which of the following ports will be in blocking state?

A.

G0/0/3 of SWA

B.

G0/0/3 of SWB

C.

G0/0/2 of SWC

D.

G0/0/1 of SWC

Full Access
Question # 59

The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.

A.

TRUE

B.

FALSE

Full Access
Question # 60

Which of the following are valid static route configurations?

A.

ip route-static 129.1.0.0 16 serial 0/0/0

B.

ip route-static 129.1.0.0 255.255.0.0 10.0.0.2

C.

ip route-static 10.0.0.2 16 129.1.0.0

D.

ip route-static 129.1.0.0 16 10.0.0.2

Full Access
Question # 61

What is the number range of an advanced ACL?

A.

2000-2999

B.

3000-3999

C.

6000-6031

D.

4000-4999

Full Access
Question # 62

If the IPv4 address of a host on a LAN is 192.168.1.1/30, the host will process IP packets with specific destination IP addresses. Which of the following IP addresses may be the destination IP addresses?

A.

192.168.1.3

B.

192.168.1.1

C.

192.168.1.2

D.

255.255.255.255

Full Access
Question # 63

After the administrator performs the configuration shown in the figure on a router, which of the following commands can be used to specify a short lease for addresses assigned using DHCP?

A.

dhcp select relay

B.

lease 0

C.

lease day 0 hour 10

D.

lease 24

Full Access
Question # 64

As shown in the figure, RTA uses NAT and has an address pool configured to implement many-to-many non-NAPT address translation, so that hosts on the private network can access the public network. Assume that the address pool has only two public IP addresses, which are translated for Host A and Host B. If Host C wants to access the public network, which of the following statements is true?

A.

All hosts use public IP addresses in turn and can access the public network.

B.

No public IP address is assigned to Host C, and Host C cannot access the public network.

C.

RTA performs NAT based on the source port number of Host C, and Host C can access the public network.

D.

RTA assigns an interface address (200.10.10.3) to Host C, and Host C can access the public network.

Full Access
Question # 65

Which of the following statements is true about link aggregation in manual load balancing mode?

A.

A maximum of four active interfaces can be configured in manual load balancing mode.

B.

In manual load balancing mode, devices at both ends of a link send LACPDUs to each other.

C.

In manual load balancing mode, all active interfaces forward data and load balance traffic.

D.

The number of active interfaces can be set in manual load balancing mode.

Full Access
Question # 66

Network devices running SNMP can proactively report traps to help network administrators detect faults in a timely manner.

A.

TRUE

B.

FALSE

Full Access
Question # 67

On the network shown in the figure, host A logs in to router A through Telnet and obtains the configuration file of router B through FTP on the remote CLI. How many TCP connections exist on router A?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 68

Which of the following WLAN security policies support open link authentication?

A.

WPA2-PSK

B.

WPA

C.

WEP

D.

WPA2-802.1X

Full Access
Question # 69

The tree topology is a hierarchical star topology, facilitating network expansion. A consequence of this topology is that faults on a node at a higher layer are more severe.

A.

TRUE

B.

FALSE

Full Access
Question # 70

UDP does not guarantee data transmission reliability and does not provide packet sorting and traffic control functions. It is suitable for the traffic that has low requirements for data transmission reliability, but high requirements for the transmission speed and delay.

A.

TRUE

B.

FALSE

Full Access
Question # 71

Which of the following network parameters can be allocated using DHCP?

A.

Address of the DNS server

B.

Operating system

C.

Gateway address

D.

IP address

Full Access
Question # 72

Which of the following statements about switches is false?

A.

A switch can provide network access services for terminals such as PCs and servers.

B.

A switch can exchange data frames.

C.

A switch is typically deployed as an egress device of a network.

D.

A switch usually works at the data link layer.

Full Access
Question # 73

If Proto of a route displayed in the routing table is OSPF, the preference of the route must be 10.

A.

TRUE

B.

FALSE

Full Access
Question # 74

Which of the following VRP commands can be used to enter area 0 view?

A.

[Huawei-ospf-1] area 0.0.0.0

B.

[Huawei-ospf-1] area 0 enable

C.

[Huawei-ospf-1] area 0

D.

[Huawei] ospf area 0

Full Access
Question # 75

Which of the following advantages is/are provided by inter-VLAN routing in one-arm routing mode?

A.

Reduced use of IP addresses

B.

Reduced number of links

C.

Reduced number of entries in the routing table

D.

Reduced number of devices

Full Access
Question # 76

What is the main function of the DNS protocol?

A.

Remote access

B.

File transfer

C.

Domain name resolution

D.

Email transmission

Full Access
Question # 77

To provide the information about the IP addresses that a user packet traverses along the path to the destination, which of the following does Tracert record in each expired ICMP TTL packet?

A.

Source port.

B.

Destination IP address.

C.

Source IP address.

D.

Destination port.

Full Access
Question # 78

A Layer 2 switch works at the data link layer. As such, it can identify MAC addresses in data frames, forward data based on MAC addresses, and record mappings between MAC addresses and interface numbers in its MAC address table.

A.

TRUE

B.

FALSE

Full Access
Question # 79

On the Huawei VRP, what is the default preference of different route types, in descending order?

A.

Direct > Static > RIP > OSPF

B.

Direct > OSPF > RIP > Static

C.

Direct > RIP > Static > OSPF

D.

Direct > OSPF > Static > RIP

Full Access
Question # 80

Which of the following statements are true about transport-layer protocols?

A.

UDP uses SYN and ACK flags to request and confirm connection establishment.

B.

UDP is suitable for transmitting delay-sensitive traffic, and UDP packets can be reassembled based on the sequence number field in the packet header.

C.

Establishing a TCP connection requires the three-way handshake mechanism, while terminating a TCP connection requires the four-way handshake mechanism.

D.

The well-known port number range is from 0 to 1023.

Full Access
Question # 81

Which statement is true regarding the following command?

ip route-static 10.0.12.0 255.255.255.0 192.168.1.1

A.

The configuration represents a static route to the 10.0.12.0 network.

B.

The configuration represents a static route to the 192.168.1.1 network.

C.

If the router has learned the same destination network via a dynamic routing protocol, the static route will always take precedence.

D.

The preference value of this configured route is 100.

Full Access
Question # 82

Assuming all STP enabled switches have the same bridge priority. The MAC address of switch A is 00-e0-fc-00-00-40, the MAC address of switch B is 00-e0-fc-00-00-10, the MAC address of switch C is 00-e0-fc-00-00-20, and the MAC address of switch D is 00-e0-fc-00-00-80. Which switch will be elected as the root switch?

A.

Switch B

B.

Switch A

C.

Switch D

D.

Switch C

Full Access
Question # 83

FTP transfer data at a time requires several TCP connections to be established

A.

2

B.

C. 3

C.

D. 4

Full Access
Question # 84

Refer to the graphic, 00e0-fc99-9999 is a specific host MAC address learned by a switch through ARP, and the host changes the IP address three times.

A.

TRUE

B.

FALSE

Full Access
Question # 85

When two switches are connected through link aggregation, what are the requirements for the interfaces on the two switches?

A.

The physical interface rates of the interconnected switches are the same.

B.

The physical interface quantities of the interconnected switches are the same.

C.

The models of the optical modules used by the interconnected switches are the same.

D.

The duplex modes of the physical interfaces on the interconnected switches are the same.

E.

The physical interface IDs of the interconnected switches are the same.

Full Access
Question # 86

For the Versatile Routing Platform (VRP), the login timeout period can be set only on a VTY interface.

A.

TRUE

B.

FALSE

Full Access
Question # 87

RSTP uses the proposal/agreement mechanism to shorten the time that an upstream port waits before transitioning to the Forwarding state, but no temporary loop occurs. Why?

A.

RSTP introduces the edge port role.

B.

RSTP accelerates port role election.

C.

RSTP uses a synchronization mechanism to prevent temporary loops.

D.

RSTP shortens the time taken by port status transition (Forward Delay).

Full Access
Question # 88

As shown in the figure, if host A has the ARP cache of host B, host A can ping host B.

A.

TRUE

B.

FALSE

Full Access
Question # 89

Which of the following parameters is used to elect the root bridge in STP?

A.

Bridge ID

B.

System name of the switch

C.

Port ID

D.

Root path cost

Full Access
Question # 90

Which of the following fields are contained in an ARP packet?

A.

Source Protocol Address

B.

Source Hardware Address

C.

Hardware Type

D.

Operation Code

Full Access
Question # 91

Which of the following statements about the routing table shown in the figure are true?

A.

The local router forwards data packets destined for 10.0.2.2 from Ethernet0/0/0.

B.

The next hop in the route to the destination network 10.0.3.3/32 is not directly connected. Therefore, the local router does not forward data packets destined for 10.0.3.3.

C.

The local router forwards data packets destined for 10.0.12.1 from Ethernet0/0/0.

D.

The local router forwards data packets destined for 10.0.3.3 from Ethernet0/0/0.

Full Access
Question # 92

Which of the following IEEE 802.11 standards supports a theoretical negotiated rate of 5 Gbit/s or higher?

A.

802.11a

B.

802.11ax

C.

802.11n

D.

802.11b

Full Access
Question # 93

Which of the following statements is true about the Forward Delay timer of STP?

A.

Reduce the interval for sending BPDUs.

B.

Improve the STP convergence speed.

C.

Improve the configuration BPDU lifetime, ensuring that the configuration BPDUs can be forwarded to more switches.

D.

Prevent temporary loops.

E.

Delay is required when a port transitions between Blocking and Disabled.

Full Access
Question # 94

Which of the following methods is not supported by the Versatile Routing Platform (VRP) to configure a router?

A.

Configure the router through FTP.

B.

Configure the router through the mini USB port.

C.

Configure the router through Telnet.

D.

Configure the router through the console port.

Full Access
Question # 95

It is advised to assign static IP addresses to servers during campus network planning.

A.

TRUE

B.

FALSE

Full Access
Question # 96

According to the one-armed routing configurations shown in the figure, even if ARP proxy is disabled on the sub-interface of R1, the Administration Dept and Finance Dept can still communicate with each other.

A.

TRUE

B.

FALSE

Full Access
Question # 97

What is used as the data link-layer MAC address that identifies each VAP on an AP?

A.

BSS

B.

SSID

C.

BSSID

D.

ESS

Full Access
Question # 98

Which of the following packets are OSPF packets?

A.

LSA

B.

HELLO

C.

LSR

D.

LSU

Full Access
Question # 99

How many bytes are there in a basic IPv6 header?

A.

40

B.

48

C.

32

D.

64

Full Access
Question # 100

When a host uses the stateless address autoconfiguration solution to obtain an IPv6 address, the host cannot obtain the DNS server address.

A.

TRUE

B.

FALSE

Full Access
Question # 101

A Layer 2 ACL can match information such as the source MAC address, destination MAC address, source IP address, and destination IP address.

A.

TRUE

B.

FALSE

Full Access
Question # 102

After a switch restarts, static MAC address entries saved on the switch remain in the MAC address table.

A.

TRUE

B.

FALSE

Full Access
Question # 103

Which of the following protocols does the RA. message used by IPv6 stateless autoconfiguration belong to? ()

A.

ICMPv6

B.

C. UDPv6

C.

D. TCPv6

Full Access
Question # 104

What function does Ctrl+Z have in the VRP system?

A.

Exits the console interface view.

B.

Exits the interface view.

C.

Returns from any view to the user view.

D.

Exits the current view.

E.

Returns from the system view to the user view.

Full Access
Question # 105

NAPT distinguishes the IP addresses of different users through the protocol numbers in TCP, UDP, or IP packets ()

A.

True

B.

False

Full Access
Question # 106

UDP cannot guarantee the reliability of data transmission, and does not provide functions such as message sequencing and flow control. It is suitable for flows that do not require high transmission reliability, but require high transmission speed and delay ().

A.

True

B.

False

Full Access
Question # 107

Which of the following information prompts is used by the VRP operating platform for incomplete input commands? ()

A.

False Incomplete commanD.founD.at'position

B.

C. Error:Too many parameters founD.at'position

C.

D. Error: Wrong parameter founD.at'position

Full Access
Question # 108

What is the value of TPID. defined by IEEE802.1Q? ()

A.

B. 0x7200

B.

0x8100

C.

D. 0x9100

Full Access
Question # 109

Which of the following IPv4 addresses can be used by a host to directly access the Internet? ()

A.

192.168.1.1/24

B.

172.32.1.1/24

C.

172.16.255.254/24

D.

10.255.255.254/24

Full Access
Question # 110

Neither the A1 ternate interface nor the Backup port in RSTP can forward user traffic, nor can they receive, process, and forward BPDUs ()

A.

True

B.

False

Full Access
Question # 111

The host's IPv4 address is 200.200.200.201/30. Which of the following hosts has an IPv4 address and its communication does not need to be forwarded by a router? ()

A.

200.200.200.202

B.

B. 200.200.200.200

C.

C. 200.200.200.203

D.

D. 200.200.200.1

Full Access
Question # 112

The tree network topology is actually a hierarchical star structure, which is easy to expand the network scale, but the higher the level, the more serious the network problem caused by the node failure ()

A.

True

B.

False

Full Access
Question # 113

In the RSTP standard, in order to improve the convergence speed, the port that the switch is directly connected to the terminal can be defined as ()

A.

Edge port

B.

B. Root port

C.

C. Fast port

D.

D. Backup port

Full Access
Question # 114

When the host frequently moves, which VLAN division method is most appropriate? ()

A.

Based on MAC. Address division

B.

B. Based on strategy division

C.

C. Based on IP subnetting

D.

D. Based on port division

Full Access
Question # 115

Trunk ports can allow multiple VLANs to pass, including VLAN4096. ()

A.

True

B.

False

Full Access
Question # 116

The following description about the specified port of the spanning tree is correct ()

A.

The designated port can forward configuration BPDU packets to the network segment connected to it

B.

C. The port on the root switch must be a designated port

C.

D. The port on the root switch must not be a designated port

Full Access
Question # 117

The RSTP protocol uses the P/A mechanism to speed up the speed of the upstream port to the F orwarding state, but what is the reason for the no temporary loop? . Shorten the time of ForwarD.Del ay

A.

Shorten the time of ForwarD.Del ay

B.

Edge port

C.

Speed ​​up port role election

D.

Ensure that there will be no temporary loops through the synchronization mechanism

Full Access
Question # 118

The change of the Router ID of the OSPF process takes effect immediately.

A.

True

B.

False

Full Access
Question # 119

When two OSPF routers form a 2-WAY neighbor relationship, the LSDB. has been synchronized. ()

A.

True

B.

False

Full Access
Question # 120

What kind of message does the OSPF protocol use to confirm the received LSU message? ()

A.

LSU

B.

LSR

C.

LSACK

D.

LSA

Full Access
Question # 121

In order for the STA to obtain the SSID related information on the AP, which of the following messages is used by the AP to proactively declare the wireless network SSID information? ()

A.

Join

B.

eacon

C.

Probe

D.

Discovery

Full Access
Question # 122

The DHCPv6 server supports the provision of other configuration information such as DNS server addresses for the host.

A.

True

B.

False

Full Access
Question # 123

Which statement about OSPF area division is wrong? ( )

A.

AreA.0 is the backbone area. All other areas must be connected to this area

B.

The LSDBs in the routers in the same OSPF area are exactly the same

C.

Dividing OSPF areas can reduce the size of the LSDB of some routers

D.

Only ABR can be used as ASBR

Full Access
Question # 124

To ensure that the same data stream is forwarded on the same physical link, which load sharing method does Eth Trunk use?

A.

Load sharing based on data packet inbound interface

B.

Packet-based load sharing

C.

Load sharing based on application layer information

D.

Flow-based load sharing

Full Access
Question # 125

AC uses CAPTAP control tunnel transmission to FIt AP management packet

A.

True

B.

False

Full Access
Question # 126

A network engineer prompts the following message when entering the command line: Error: UnrecognizeD.commanD.founD.at 'ï¼¾' position. Which of the prompt information is correct? ()

A.

The input command is incomplete

B.

Wrong parameter type

C.

Keyword not found

D.

The input command is ambiguous

Full Access
Question # 127

There is no channel overlap in the 14 available frequency bands in the 2.4GHz frequency band. ()

A.

True

B.

False

Full Access
Question # 128

VLAN4095 cannot be created on Huawei switches, and VLAN1 cannot be deleted. ()

A.

True

B.

False

Full Access
Question # 129

What is the value of the Type field in the RStp configuration BPDU message? ()

A.

0x01

B.

0x00

C.

0x02

D.

0x03

Full Access
Question # 130

The configuration information of a certain port of the switch is shown in the figure. Then, when the data frame of which VLAN is sent by this port, it carries the VLAN TAG? ()interface GigabitEtherneto/0/1 port hybriD.taggeD.vlan 2 to 3 100 port hybriD. untaggeD. vlan 4 6#

A.

1, 2.3, 100

B.

2, 3, 100

C.

1, 2, 3, 4.6, 100

D.

2.3, 4, 6, 100

Full Access
Question # 131

STA. Before associating to AP, it needs to obtain SSID through some message exchange. What are these messages? ()

A.

Discovery

B.

Beacon

C.

Probe

D.

ResponseProbe Request

Full Access
Question # 132

In the broadcast network, OSPF runs on four routers in the same area and on the same network segment. OSPF will automatically elect one DR and multiple BDRs to achieve a better backup effect ()

A.

True

B.

False

Full Access
Question # 133

1/128 is the IPv6 loopback address ()

A.

True

B.

False

Full Access
Question # 134

What are the characteristics of VLAN based on ports? ()

A.

Add an AVLAN tag to the data frame according to the IP address carried in the message

B.

B. Assign VLAN ID according to the protocol type and encapsulation format of the data frame

C.

C. No need to reconfigure VLAN when the host moves

D.

When the host moves, the VLAN needs to be reconfigured

Full Access
Question # 135

VRP operating platform, which of the following commands can only view static routes? ()

A.

display ip routing-table protocol static

B.

B. display ip routing-table

C.

C. display ip routing-table verbose

D.

D. display ip routing-table statistics

Full Access
Question # 136

The Backup port in RSTP can replace the failed root port ()

A.

True

B.

False

Full Access
Question # 137

Which of the following commands to configure the default route is correct? ()

A.

B. (Huawei)ip route-statiC.0.0.0.0 255.255.255.255192.168.1.1

B.

(Huawei)ip route-statiC.0.0.0.0 0.0.0.0 192.168.1.1

C.

D. (Huawei)ip route-statiC.0.0.0.0 0.0.0.0 0.0.0.0

Full Access
Question # 138

The tracert diagnostic tool in Huawei routers is used to track the data forwarding path. ()

A.

True

B.

False

Full Access
Question # 139

Telnet is based on TCP protocol ()

A.

True

B.

False

Full Access
Question # 140

When using the FTP protocol to upgrade the router software, the transmission mode should be selected ()

A.

Binary mode

B.

B. Byte mode

C.

C. Text mode

D.

D. Stream byte mode

Full Access
Question # 141

Regarding the IPv6 address 2031:0000:720C:0000:0000:09E0:839A:130B, which of the following abbreviations are correct? ()

A.

2031:0:720C:-9E0:839A:130B

B.

2031:0:720C:0:0:9E0:839A:130B

C.

D. 2031:720C:9E0:839A:130B

Full Access
Question # 142

Which of the following statements about Prefix Segment is wrong? ()

A.

Prefix Segmont needs to be configured manually

B.

Prefix Segment spreads to other network elements through the IGP protocol, which is globally visible and effective

C.

Prefix Segment is used to identify a destination address prefix in the network (Prefix)

Full Access
Question # 143

As shown in the figure, you only need to configure this static route on R1, and the two hosts can communicate with each other normally.

A.

True

B.

False

Full Access
Question # 144

In the network shown in the figure below, the bridge ID of the switch has been marked. Enter the command stp rootsecondary on the sWD. switch and the following switch will become the root bridge of this network. ()

A.

SWA

B.

SWB

C.

D. SWD

Full Access
Question # 145

What is the full name of the general routing platform VRP? ()

A.

Versatile Redundancy Platform

B.

Versatile Routing Protocol

C.

Versatile Routing Platform

D.

Virtual Routing Platform

Full Access
Question # 146

The host uses the IP address 192.168.1.2 to access the Internet-it must go through NAT. ()

A.

True

B.

False

Full Access
Question # 147

The device port running the STP protocol is in the Forwarding state. Which of the following statements are correct? ()

A.

This port port not only forwards user traffic but also processes BPDU packets

B.

B. This port only receives and processes BPDUs, and does not forward user traffic

C.

The port will construct a MAC address table based on the received user traffic, but does not forward user traffic

D.

The port not only does not process BPDU packets, but also does not forward user traffic

Full Access
Question # 148

The election of the root switch in STP only compares the priority of the switch, while in RSTP, the priority of the switch and the MAC address are compared at the same time. ()

A.

True

B.

False

Full Access
Question # 149

Which of the following port states is not included in the RSTP protocol? ()

A.

Learning

B.

Discarding

C.

Forwarding

D.

Blocking

Full Access
Question # 150

Which of the following statements about the role of the STP protocol ForwarD.Delay is correct? ()

A.

Prevent temporary loops

B.

B. There is a delay in the transition between Blocking state and DsiableD state

C.

Reduce the time interval of BPDu transmission and improve the convergence speed of STP

D.

D. Improve the survival time of BPDUs to ensure that the configured BPDUs can be forwarded to more switches

Full Access
Question # 151

By default, what is the ForwarD.Delay time of the STP protocol in seconds? ()

A.

B. 10

B.

15

C.

D. 20

Full Access
Question # 152

192.168.1.127/25 represents () address ()

A.

broadcast

B.

B. Multicast

C.

The internet

D.

D. Host

Full Access
Question # 153

The CAPWAP protocol stipulates the communication standard between AC. and Ap. Which of the following statements about the CAPWAP protocol is correct? ()

A.

CAPWAP is an application layer protocol based on TCP transmission

B.

In order to establish a CAPWAP tunnel, the FIT Ap can only discover the AC through broadcast messages

C.

In order to reduce the burden on the AP, CAPWAP uses a tunnel to simultaneously transmit control messages and data messages

D.

The AP can encapsulate the user's data message in CAPWAP and hand it over to the AC.

Full Access
Question # 154

On Huawei ARG3 routers, the -i parameter of the Ping command in VRP is used to set ().

A.

Destination IP address for receiving Echo Reply reply

B.

The source IP address of the Echo Request message

C.

Interface for receiving Echo Reply messages

D.

Interface for sending Echo Request messages

Full Access
Question # 155

There are multiple route entries to the same destination network in the routing table. These routes are called? ()

A.

Equal cost routing

B.

B. Multipath routing

C.

Default route

D.

D. Suboptimal routing

Full Access
Question # 156

Which of the following fields is not included in the He1lo packet of the OSPF protocol? ()

A.

sysname

B.

C. HelloInterval

C.

D. Neighbor

Full Access
Question # 157

Which of the following IPv4 addresses the host uses cannot directly access the Internet? ()

A.

100.1.1.1

B.

50.1.1.1

C.

10.1.1.1

D.

200.1.1.1

Full Access
Question # 158

In the VRP system, what function does the Ctrl+Z key combination have? ()

A.

Return to user view from any view

B.

B. Return from system view to user view

C.

C. Exit interface view

D.

D. Exit the current view

E.

E. Exit the console interface view

Full Access
Question # 159

What kind of packets does the OSPF protocol use to describe its LSDB? ()

A.

DD

B.

B. HELLO

C.

LSR

D.

D. LSU

Full Access
Question # 160

VLAN4095 cannot be created on Huawei switches, and VLAN1 cannot be created ()

A.

True

B.

False

Full Access
Question # 161

In what state does the OSPF protocol determine the master-slave relationship of DD. packets? ()

A.

B. Full

B.

2-way

C.

D. Exchange

Full Access
Question # 162

Layer 3 devices like routers receive data frames based on () Forwarding data frames.

A.

ARP table

B.

MAC. address table

C.

Routing table

Full Access
Question # 163

Use the command kdir test in the VRP operating platform. The system will create a directory named test.

A.

True

B.

False

Full Access
Question # 164

In the network shown in the figure, which of the following descriptions is correct? () (Multiple Choice Questions)

A.

The network between RTA and SWC is the same conflict domain

B.

The network between SWA and SWB is the same broadcast domain

C.

The network between SWA and SWC is the same conflict domain

D.

The network between SWA and SWC is the same broadcast domain

Full Access
Question # 165

The administrator plans to implement route backup by configuring static floating routes, the correct way to achieve this is ().

A.

The administrator needs to configure different protocol priority values ​​for the main static route and the standby static route

B.

B. The administrator only needs to configure two static routes

C.

The administrator needs to configure different metric values ​​for the main static route and the standby static route. The administrator only needs to configure two static routes

D.

D. The administrator only needs to configure two static routes

Full Access
Question # 166

Which of the following statements about Python is incorrect?

A.

Python has a wealth of third-party libraries.

B.

Python is a fully open source high-level programming language.

C.

Python can be used for automated operation and maintenance scripts, artificial intelligence data science and many other fields.

D.

Python has a clear grammatical structure, is simple and easy to learn, and runs efficiently.

Full Access
Question # 167

The config mode is the default ACL matching order on Huawei devices. ()

A.

True

B.

False

Full Access
Question # 168

For multiple paths to the same destination network, the router needs to select by comparing the magnitude of the Prererence value. If the Preference is the same, the router selects according to the magnitude of the Cost value. ()

A.

True

B.

False

Full Access
Question # 169

What is the port number used by the FTP protocol control plane? ()

A.

23

B.

24

C.

21

D.

22

Full Access
Question # 170

SNMP messages are carried over UDP.

A.

True

B.

False

Full Access
Question # 171

Which of the following IPv6 addresses is a multicast address? ()

A.

FE80:2EO:FCFF:FEEF:FEC

B.

FC0O:2EO:FCFF:FEEF:FEC

C.

FF02::2EO:FCFF:FEEF:FEC

D.

2000::2EO:FCFF:FEEF:FEC

Full Access
Question # 172

The IPv4 address assigned by the network administrator to a host in the network is 192.168.128, how many more hosts can be added to the network where this host is located? ()

A.

12

B.

15

C.

13

D.

14

Full Access
Question # 173

Now you need to implement a Python automation script Telnet to the device to view the running configuration of the device. What is wrong with the following statement? ()

A.

TelnetliB. can achieve this function.

B.

Use telnet.Telnet (host) to connect to the Telnet server.

C.

You can use telnet.write (b\) to input the command to view the current configuration of the device.

D.

Telnet.close() is used every time a command is entered, and the function is that the user waits for the switch to return information. ·

Full Access
Question # 174

When a switch receives a unicast data frame with a VLAN tag, but finds that the destination MAC address of the data frame cannot be queried in its MAC address table, the switch's processing behavior for the data frame is ().

A.

The switch will broadcast this data frame to all ports (except the receiving port) in the VLAN where the data frame is located

B.

The switch will broadcast the data frame to all ports

C.

The switch will discard this data frame

D.

The switch will broadcast this data frame to all Access ports

Full Access
Question # 175

As shown in the figure below, assuming that the MAC address table of SWA. is as follows, now host A. sends a data frame with a destination MAC address of MAC-B. Which of the following statements is correct? ()

A.

Forward this data according to the G0/0/2 port

B.

SWA. Discard the data frame

C.

D. Forward this data frame from port G0/0/3

Full Access
Question # 176

When the host frequently moves the office, which VLAN division method is most suitable? ()

A.

Based on MAC. Address division

B.

Based on port division

C.

Based on IP subnetting

D.

Based on strategy division

Full Access
Question # 177

Which of the following descriptions about firewalls is wrong? ()

A.

Firewall can realize user identity authentication

B.

Firewall can realize access control between different networks

C.

The firewall can isolate the network of unreachable security level

D.

The firewall cannot implement network address translation

Full Access
Question # 178

By default, on the broadcast networkOSPFWhat is the transmission period of the protocol HELLO message? ()

A.

10s

B.

40s

C.

30s

D.

20s

Full Access
Question # 179

After the network administrator uses the Tracer tRoute function on the router device, in the data packet sent by the router, the value of the Protoco1 field in the IPv4 header is?

A.

17

B.

B. 2

C.

1

D.

D. 6

Full Access
Question # 180

NFV (Network Functional Virtualization), network function virtualization, realizes the deployment of network applications in a software-based way. ()

A.

True

B.

False

Full Access
Question # 181

The election of the root switch in STP only compares the priority of the switch, while in RSTP, the priority of the switch is compared with the MAC address at the same time. ()

A.

True

B.

False

Full Access
Question # 182

The bridge ID of the STP protocol in the switching network is as follows. Which of the following bridge IDs will be the root bridge? ()

A.

409600-01-02-03-04-DD

B.

3276800-01-02-03-04-AA

C.

3276800-01-02-03-04-CC

D.

3276800-01-02-03-04-BB

Full Access
Question # 183

The FIT AP can obtain the IP address of AC. through the DHCP Option to establish a CAPWAP tunnel. Which Option needs to be configured on the DHCP server for this? ()

A.

Option 82

B.

B. Option 10

C.

C. Option 43

D.

D. Option 55

Full Access
Question # 184

Broadcast network. OSPF runs on four routers in the same area. Same network segment. OSPF will automatically elect one DR and multiple BDRs to achieve better backup results

A.

True

B.

False

Full Access
Question # 185

If a windows host is started for the first time, if it uses DHCP to obtain an IP address, what is the source IP address of the first packet sent by this host? ()

A.

127.0.0.1

B.

169.254.2.33

C.

0.0.0.0

D.

255.255.255.255

Full Access
Question # 186

The output information of a router's routing table is shown in the figure. Which of the following statements is correct? () (Multiple Choice Questions)

A.

The outbound interface of this router to 10.0.0.1 is Ethernet0/0/1

B.

The outgoing interface of this router to 10.0.0.1 is Ethernet0/0/0

C.

C. The outgoing interface of this router to 10.0.2.2 is Ethernet0/0/0

D.

The outbound interface of this router to 10.0.2.2 is Ethernet0/0/1

Full Access
Question # 187

What is RouterDeadInterval of the OSPF protocol on the broadcast network by default? ()

A.

40s

B.

10s

C.

20s

D.

30s

Full Access
Question # 188

The DHCPv6 server supports the provision of other configuration information such as DNS server addresses for the host. ()

A.

True

B.

False

Full Access
Question # 189

It is known that there are two entries in the routing table of a router. If the router wants to forward packets with the destination address of 9.1.4.5, the correct one of the following statements is ()

A.

Choose the second item as the best matching item, because the cost of the RIP protocol is small

B.

The second item is selected as the best matching item, because the route is a more accurate match relative to the destination 9.1.4.5

C.

Select the second item as the best match, because the speed of Ethernet0 is faster than the speed of serial0

D.

Chooses the first item as the best matching item, because the priority value of the ospf protocol is higher

Full Access
Question # 190

What kind of network equipment can host A and host B use to achieve communication?

A.

router

B.

Hub

C.

HUB

D.

Layer 2 switch

Full Access
Question # 191

To provide different network services for different users on the AP, which of the following can be configured?

A.

TAP

B.

VAP

C.

VAC

D.

VT

Full Access
Question # 192

The link aggregation interface can only be used as a Layer 2 interface (C)

A.

True

B.

False

Full Access
Question # 193

All ports on the root bridge switch are designated ports. ()

A.

True

B.

False

Full Access
Question # 194

What is wrong about the ARP message? ()

A.

ARP packets cannot be forwarded to other broadcast domains

B.

ARP reply message is sent by unicast party

C.

ARP request message is sent by broadcast

D.

Any link layer protocol requires ARP protocol to assist in obtaining data link layer identification

Full Access
Question # 195

When the device running STP receives the RSTP configuration BPDU, it will discard it. ()

A.

True

B.

False

Full Access
Question # 196

The mask length is 12 bits can be expressed as?

A.

255.240.0.0

B.

255.248.0.0

C.

255.255.0.0

D.

255.255.255.0

Full Access
Question # 197

When using the ping command on the VRp platform, if you need to specify a P address as the source address of the echo request message, which of the following parameters should be used? ()

A.

=-d

B.

=-a

C.

=-S

D.

=-n

Full Access
Question # 198

The basic header length of IPv6 packets is a fixed value ()

A.

True

B.

False

Full Access
Question # 199

When two OSPF routers form a 2-WAY neighbor relationship, LSDB. has been synchronized. ()

A.

True

B.

False

Full Access
Question # 200

The IP addresses of the VLANIF interfaces of the same switch cannot be the same. ()

A.

True

B.

False

Full Access
Question # 201

AAA. Which of the following is not included? ()

A.

Audit

B.

Accounting

C.

Authentication

D.

Authorization

Full Access
Question # 202

AP does not need AC. It can independently complete the work of wireless user access, wireless user authentication, and business data forwarding.

A.

True

B.

False

Full Access
Question # 203

In order for the STA to obtain the SSID related information on the AP, which of the following messages is used by the AP to proactively declare the wireless network SSID information?

A.

Join

B.

Beacon

C.

Probe

D.

Discovery

Full Access
Question # 204

The Layer 2 networking of WLAN refers to STA. It uses AC as its own gateway. ()

A.

True

B.

False

Full Access
Question # 205

The two switches shown in the figure below have both enabled the STP protocol, which port will eventually be in the Blocking state? ()

A.

STB's G0/0/3 port

B.

C. G0/0/2 port of STA

C.

D. G0/0/3 port of STA

Full Access
Question # 206

The network management workstation manages network devices through the SNMP protocol. When an abnormality occurs in the managed device, what kind of SHMP message will the network management workstation receive? ()

A.

trap message

B.

B. get-response message

C.

C. set-request message

D.

D. get-request message

Full Access
Question # 207

Which statement about the 0SPF protocol DR is correct? ()

A.

DR must be the highest priority device in the network

B.

Router ID, the larger the value, the more preferred it is to be elected as DR

C.

DR election is preemptive

D.

An interface priority is 0, then the interface cannot be a DR

Full Access
Question # 208

The information shown in the figure is the port status information displayed on a switch running STP. According to this information, what is wrong in the following description? () (Single-choice question)

A.

B.The priority of this switch is 0

B.

C.This network may only contain this switch

C.

This switch may be connected to 6 other switches

Full Access
Question # 209

The router running the 0SPF protocol can reach the FULL state after completing the LSDB. synchronization. ()

A.

True

B.

False

Full Access
Question # 210

Which of the following are not the characteristics of a small campus network? ()

A.

Low number of users

B.

Single network level

C.

Simple network requirements

D.

Wide coverage

Full Access
Question # 211

Which of the following types of addresses are not included in IPv6 addresses? ()

A.

Anycast address

B.

Broadcast address

C.

Unicast address

D.

Multicast address

Full Access
Question # 212

The configuration information of a certain port of the switch is shown in the figure. Which of the following statements is wrong? () (Single-choice question)

A.

The port type is Hybrid

B.

If the VLAN TAG carried in the data frame is 200, the switch will strip off the VLAN TAG and send it out

C.

If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG100

D.

If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it out

Full Access
Question # 213

The network shown in the figure below assumes that all routers can enable OSPF at the same time. Which router is the DR in this network? () (Single-choice question)

A.

Router B

B.

B. Router D

C.

C. Router A

D.

D. Router C

Full Access
Question # 214

By default, network devices running the SNMPv2C. protocol use which of the following port numbers to send trap messages to the network management system? ()

A.

6

B.

161

C.

17

D.

162

Full Access
Question # 215

As shown in the figure, when the switch needs to forward frames with the destination mac address of 5489-98ec-f011, which of the following descriptions is correct? () (Single-choice question)

A.

The switch will send a message that the destination is unreachable to the source device

B.

The switch did not find a matching entry in the mac address table. So the frame will be discarded

C.

The switch needs to send a request to discover the device with the mac address of 5489-98ec-f011

D.

The switch will be All ports outside flood the frame

Full Access
Question # 216

In the history of WLAN development, which of the following is not included in the main wireless protocol standards in the primary mobile office era? ()

A.

802.11g

B.

802.11a

C.

802.11b

D.

802.11ac

Full Access
Question # 217

The configuration information of a certain port of the switch is shown in the figure. What is the PVID of this port? () (Single-choice question)

A.

100

B.

2

C.

4

D.

1

Full Access
Question # 218

Complete the ACL configuration shown in the figure on the router RTA. Which of the following descriptions is correct? () (Single-choice question)

(RTA) acl 2001

(RTA-acl-basic-2001) rule 20 permit source 20.1.1.0 0.0.0.255

ï¼»RTA-acl-basic-2001ï¼½rule 10 deny source 20.1.1.0 0.0.0.255

A.

The VRP system will adjust the sequence number of the first rule to 5 according to the configuration sequence.

B.

The VRP system will not adjust the sequence number, but will first match the rule permit source 20.1.1.00.0.0.255

C.

The VRP system will first match the rule deny source20.1.1.00.0.0.255 according to the sequence number.

D.

The sequence number of configuration error rules must be configured from small to large

Full Access
Question # 219

The network shown in the figure below. Which router is the BDR in this network? () (Single-choice question)

A.

B. Router B

B.

No BDR

C.

D. Router C

Full Access
Question # 220

As shown in the figure below, all hosts can communicate normally. Is the correspondence between the MAC address and the port in the MAC address table of SWB correct? () (Single-choice question)

A.

MAC-A GO/0/1

MAC-B GO/0/2

MAC-C GO/0/3

B.

MAC-A GO/0/2

MAC-B G0/0/2

MAC-C GO/0/3

C.

MAC-A GO/0/3

MAC-B GO/0/3

MAC-C GO/0/1

D.

MAC-A GO/0/1

MAC-B GO/0/1

MAC-C GO/0/3

Full Access
Question # 221

Which of the following is not included in AAA? ()

A.

Audit

B.

B. Authentication

C.

C. Authorization

D.

D. Accounting)

Full Access
Question # 222

As shown in the figure, the network administrator creates VLAN2 on SWA and SWB. The ports connecting the hosts on the two switches are configured as Access ports. They are assigned to VLAN2. G0/0/1 of SWA and G0/0/2 of SWB are configured as Trunki ports. All VLANs are allowed to pass. What is needed to achieve normal communication between two hosts? () (Single-choice question)

A.

Configure G0/0/1 on SWC as a trunk port and allow VLAN2 to pass. Set G0/0/2 as an access port. PVID is 2.

B.

Create VLAN2 on SWC, configure G0/0/1 and G0/0/2 as trunk ports, and allow VLAN2 to pass

C.

C. Just create BLAN2 on SWC

D.

Configure G0/0/1 on SWC as a teunk port and allow VLAN2 to pass through

Full Access
Question # 223

The following rules exist in an ACL of a router. Rule deny top source192.168, 1.00.0.0.255 destination 172.16.10.1 0.0.0.0 destination-port eq 21 is the correct statement? ()

A.

sourceIP is 192.168.1.1, destination P is 172.16.10.1, and all TCP packets with destination port number 21 match this rule

B.

The source IP is 192.168.1.1, the destination IP is 172.16.10.2, and all 1CP packets whose destination port number is 21 match this rule

C.

Rule sourceIP is 192.168.1.1, the destination IP is 72.16.10.3, and all TCP packets with the destination port number of 21 match this rule

D.

D. The type of ACL is basic ACL

Full Access
Question # 224

The configuration information of a certain port of the switch is shown in the figure. Which of the following statements is wrong? ()

interface GigabitEthernet0/0/1 port link type trunk port trunk pviD.vlan 200 port trunk allow-pass vlan100#

A.

If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it out

B.

This port cannot send data frames carrying VLAN TAG200

C.

C. The port type is Trunk type

D.

If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG 200

Full Access
Question # 225

As shown in the figure, a static NAT command is deployed on router R1. When the PC accesses the Internet, the destination address in the data packet will not change. ()(True or False)

A.

B. False

Full Access
Question # 226

The ACL configuration information of a certain router is shown in the figure. Which of the following statements is correct? () (Single-choice question)

A.

The packet whose source IP address is 192.168.1.254 is matched by the permit rule

B.

Packets with source IP addresses of 192.168.1.1 and 192.168.1.254 are matched by the permit rule

C.

The packet with the source IP address of 192.168.1.1 is matched by the pemit rule

D.

D. The packet with the source IP address 192.168.1.1 is matched by the deny rule

Full Access
Question # 227

As shown in the figure below, host A and host B cannot communicate ()

A.

True

B.

False

Full Access
Question # 228

In the network shown in the figure below, the host has an ARP cache, and host A sends a packet to host B. What are the destination MAC and destination IP of this packet? () (Single-choice question)

A.

MAC-C,11.0.12.1

B.

B. MAC-B.11.0.12.1

C.

C. MAC-A.11.0.12.1

D.

D. MAC-C.10.0.12.2

Full Access
Question # 229

Among the configuration BPDUs sent by the switch, which bridge D. is unlikely to appear? ()

A.

819200-01-02-03-04-CC

B.

409600-01-02-03-04-CC

C.

000-01-02-03-04-CC

D.

204800-01-02-03-04-CC

Full Access
Question # 230

The number of VLANs that can be created using the commands "vlan batch1020 and "vlan batch10to20" respectively is ()

A.

11 and 11

B.

11 and 2

C.

2 and 2

D.

2 and 11

Full Access
Question # 231

The Layer 2 Ethernet switch generates entries in the MAC address table according to the () of the Ethernet frame received by the port. ()

A.

Source MAC. Address

B.

C. Destination MAC. Address

C.

D. Destination IP address

Full Access
Question # 232

As shown in the broadcast network. 0SPF runs on four routers. And in the same area. Same network segment. OSPF will automatically elect one DR and multiple BDRs to achieve a better backup effect. ()(True or False)

A.

True

B.

False

Full Access
Question # 233

Which of the following networks belong to a local area network? ()

A.

A home network

B.

A company office network

C.

Internet

D.

Broadband Metropolitan Area Network

Full Access
Question # 234

On Huawei AR G3 Series routers, which authentication modes does AAA support?

A.

Radius

B.

None

C.

Local

D.

802.1X

Full Access
Question # 235

Which of the following statements about IPv6 address configuration is correct? ()*

A.

IPv6 supports stateless automatic configuration

B.

IPv6 addresses can only be configured manually

C.

IPv6 address supports automatic configuration of multiple clocks

D.

IPv6 supports DHCPv6 for address configuration

Full Access
Question # 236

Which of the following statements about encapsulation and decapsulation are true?

A.

Encapsulation and decapsulation can locate network faults.

B.

Encapsulation and decapsulation shorten the packet length.

C.

Encapsulation and decapsulation participate in achieving different network protocol functions.

D.

Encapsulation and decapsulation can implement network communication.

Full Access
Question # 237

Which of the following methods can be used to add APs on an AC?

A.

Import APs when they are offline.

B.

Add APs when they are online.

C.

Configure the AC to automatically discover APs.

D.

Manually confirm APs in the list of unauthorized APs.

Full Access
Question # 238

In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 239

An AR2200 router needs to restore the initial configuration, which of the following operations are necessary? ()*

A.

Clear current configuration

B.

Re-specify the configuration file to be loaded at the next startup

C.

Reset saved.configuration

D.

Restart the AR2200 router

Full Access
Question # 240

In order to detect the connectivity status of the CAPWAP tunnel, after the CAPWAP tunnel is established, which of the following CAPTAP messages is used by the AC for detection? ()*

A.

Hello

B.

DPD

C.

Keepalive

D.

Echo

Full Access
Question # 241

Which of the following is a link-state routing protocol?

A.

FTP

B.

OSPF

C.

Direct

D.

Static

Full Access
Question # 242

Virtualization is the basis for implementing NEV. Which of the following statements about the characteristics of virtualization is correct? ()*

A.

Hardware independence: Virtual machines and hardware are decoupled, and virtual machines can be migrated between servers.

B.

Encapsulation: All virtual machines share the operating system, and encapsulation is achieved through namespaces.

C.

Isolation, where virtual machines on the same physical server are isolated from each other.

D.

Partitioning: Multiple virtual machines can be run on a single physical server at the same time.

Full Access
Question # 243

When an AP and an AC are located on different Layer 3 networks, which of the following methods is recommended for the AP when discovering the AC?

A.

Broadcast

B.

DHCP

C.

Manually specified on the AP

D.

DNS

Full Access
Question # 244

Which of the following commands is used to display the CPU usage of a router?

A.

display cpu-state

B.

display interface

C.

display cpu-usage

D.

display memory

Full Access
Question # 245

Dynamic routing protocols can automatically adapt to network topology changes.

A.

TRUE

B.

FALSE

Full Access
Question # 246

To enable Router A to communicate with Loopback 0 on Router B on the network shown in the figure, which of the following commands needs to be run on Router A?

A.

ip route-static 10.0.2.2 32 GigabitEthernet 0/0/0

B.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.1

C.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.2

D.

ip route-static 10.0.2.2 0 GigabitEthernet 0/0/0

Full Access
Question # 247

Which of the following features does the OSPF protocol have? ()*

A.

Easy to produce routing loops

B.

Calculate the shortest path by number

C.

Support area division

D.

Trigger update

Full Access
Question # 248

As specified by the RSTP protocol, when a root port fails, which type of port will function as a new root port and enter the forwarding state without any delay?

A.

Alternate Port

B.

Forwarding Port

C.

Backup Port

D.

Edge Port

Full Access
Question # 249

Which of the configurations in the following options belong to a Layer 2 ACL? ()*

A.

rule 10 permit 12-protocol arp

B.

rule 25 permit source 192.168.1.1 0.0.0.0

C.

rule 20 permit source-maC.0203-0405-0607

D.

rule 15 permit vlan-iD.100

Full Access
Question # 250

Which of the following statements about static routes on Huawei devices is false?

A.

The default preference value of a static route is 60.

B.

When the preference value of a static route is 0, this static route is selected as the optimal route.

C.

The cost of a static route cannot be changed.

D.

The preference value of a static route is in the range 1 to 255.

Full Access
Question # 251

Which of the following statements is true?

A.

Routers work at the physical layer.

B.

Switches work at the network layer.

C.

Switches work at the physical layer.

D.

Routers work at the network layer.

Full Access
Question # 252

Which of the following IPv4 addresses can be directly used by a host to access the Internet?

A.

172.32.1.1/24

B.

10.255.255.254/24

C.

192.168.1.1/24

D.

172.16.255.254/24

Full Access
Question # 253

Which of the following packets is used by OSPF to describe its link state database (LSDB)?

A.

LSR

B.

DD

C.

LSU

D.

HELLO

Full Access
Question # 254

In the STP protocol, which of the following factors will affect the election of the root switch? ()*

A.

MAC address of the switch

B.

IP address of the switch

C.

Switch priority

D.

Switch interface bandwidth

E.

Switch interface ID

Full Access
Question # 255

From a security perspective, router A refuses to receive OSPF packets. ICMP packets received from the cO/0/1 interface. Which of the following commands can achieve this requirement? ()

A.

acl rumber 300o rule 5 deny ospf rule 10deny icmp interface

GigabitEthernet0/0/1 traffic-filter inbounD.ac1300o#

B.

acl rumber 2000 rule 5 deny 89 rule 10 deny 1 interface

GigabitEtherneto/0/1 trafficfilter inbounD.ac12000#

C.

acL rumber 300o rule 5 deny 89 rule 10 deny icmp interface

GigabitEthernet0/0/1 traffic-filter inbounD.ac1 30oo#

D.

acl number 3000 rule 5 deny 89 rule 10 deny 1 interface GigabitEtherneto/0/1 trafficfilter inbounD.aci 3000

Full Access
Question # 256

Static NAT can only implement one-to-one mapping between private and public addresses.

A.

TRUE

B.

FALSE

Full Access
Question # 257

Which of the following statements about IPv6 anycast addresses are correct?

A.

The group anycast address and the single address address use the same address space

B.

Back to provide services with more than functions

C.

The packet whose destination address is the anycast address will be sent to the nearest network interface in the sense of routing

D.

Back to achieve service load sharing

Full Access
Question # 258

Refer to the display startup command output shown in the figure. Which of the following statements are true?

A.

The current VRP configuration file is different from that used for next startup.

B.

The current VRP configuration file is the same as that used for next startup.

C.

The current VRP version file is different from that used for next startup.

D.

The current VRP version file is the same as that used for next startup.

Full Access
Question # 259

Which of the following port states does the RSTP protocol include? ()*

A.

Learning

B.

Discarding

C.

Listening

D.

Forwarding

Full Access
Question # 260

Which of the following MAC addresses cannot be used as the MAC address of host network adapters?

A.

0002-0304-05-06

B.

02-03-04-05-06-07

C.

01-02-03-04-05-06

D.

03-04-05-06-07-08

Full Access
Question # 261

In STP, which of the following items may affect the selection of the root switch?

A.

Switch interface bandwidth

B.

Switch priority

C.

Switch MAC address

D.

Switch port ID

E.

Switch IP address

Full Access
Question # 262

The output information of a certain router is shown in the figure. Which of the following statements are correct? () (Multiple Choice Questions)

A.

The Router ID of the router is 10.0.1.1

B.

This router is DR

C.

The interface address of this router is 10.0.12.2

D.

The Router ID of the router is 10.0.2.2.

Full Access
Question # 263

What is the role of link aggregation? ()*

A.

Improve network reliability

B.

Increase bandwidth

C.

Facilitate analysis of data

D.

Achieve load sharing

Full Access
Question # 264

The router ID of the OSPF process takes effect immediately after being changed.

A.

TRUE

B.

FALSE

Full Access
Question # 265

The output information of a certain device is shown in the figure. Which of the following statements are correct? () (Multiple Choice Questions)

A.

The standby main control board of the device is operating normally

B.

The VRP operating version of this device is CRP5

C.

The device name is Huawei

D.

The device has been running for 1 minute

Full Access
Question # 266

Wi-Fi 6 is also known as the IEEE 802.11ax standard.

A.

TRUE

B.

FALSE

Full Access
Question # 267

SDN requires the control and forwarding planes to be separated.

A.

TRUE

B.

FALSE

Full Access
Question # 268

Which of the following parameters need to be considered when electing a root port in STP? ()*

A.

Port priority

B.

Port slot number, such as G0/0/1

C.

Duplex mode of the port

D.

The cost of the port reaching the root switch

E.

MAC address of E port

Full Access
Question # 269

What command line views exist on the VRP operating platform? ()*

A.

User view

B.

Interface view

C.

Agreement view

D.

System view

Full Access
Question # 270

In the CAPWAP tunnel establishment phase, after AC. receives the Join Request message sent by the AP, AC. will check the validity of the AP. Which of the following is the authentication method supported by AC. ()*

A.

SN certification

B.

PassworD. certification

C.

MAC. Authentication

D.

Not certified

Full Access
Question # 271

Link aggregation is a common technology in enterprise networks. Which of the following descriptions are the advantages of link aggregation technology? ()*

A.

Improve safety

B.

Improve reliability

C.

Achieve load sharing

D.

Increase bandwidth

Full Access
Question # 272

According to the VTY user interface configuration shown in the following figure, the user level is set to 3.

A.

TRUE

B.

FALSE

Full Access
Question # 273

By referring to the topology and the configurations of G0/0/1 interfaces on LSW1 and LSW2 shown in the figure, it can be determined that data frames tagged with VLAN 10 can be normally forwarded between LSW1 and LSW2.

A.

TRUE

B.

FALSE

Full Access
Question # 274

What is the default lease time of the IP address allocated by the DHCP server?

A.

18 hours

B.

12 hours

C.

1 hour

D.

24 hours

Full Access
Question # 275

Which of the following message types does DHCP contain?

A.

DHCP DISCOVER

B.

DHCP REQUEST

C.

DHCP OFFER

D.

DHCP ROLLOVER

Full Access
Question # 276

Which of the following IEEE 802.11 standards supports the 2.4 GHz frequency band only?

A.

802.11a

B.

802.11g

C.

802.11n

D.

802.11ax

Full Access
Question # 277

NAT configuration is as follows, which IP can be converted when accessing the public network (RTA) acl2000 (RTA-acl-basic-2000) rule5 permit source 192.168.1.00.0.0.255 RTA-acl-basic-2000) rule 10 permit source 192.168. 2.0 0.0.0.255 RTA-acl-basic-2000)quit RTA)interface serial1/0/0

(RTA-Serial1/0/0 )nat outbound 2000 address-group1 no-pat *

A.

192.168.1.254

B.

192.168.2.222

C.

198.162.1.222

D.

100.1.1.3

Full Access
Question # 278

In STP, the bridge ID on the switching network is as follows. With which of the following bridge IDs is the switch selected as the root bridge?

A.

32768 00-01-02-03-04-BB

B.

4096 00-01-02-03-04-DD

C.

32768 00-01-02-03-04-CC

D.

32768 00-01-02-03-04-AA

Full Access
Question # 279

On the network shown in the figure, the router receives a data packet with the destination IP address 11.0.12.1 from Host A.

After the packet is forwarded by the router, which of the following are the destination MAC address and destination IP address of the data packet?

A.

MAC-C, 11.0.12.1

B.

MAC-D, 11.0.12.1

C.

MAC-B, 11.0.12.1

D.

MAC-D, 10.0.12.2

Full Access
Question # 280

Link aggregation is a common technology in enterprise networks. Which of the following descriptions are the advantages of link aggregation technology? ()

A.

Improve safety

B.

Achieve load sharing

C.

Increase bandwidth

D.

Improve reliability

Full Access
Question # 281

Which of the following port states does the RSTP protocol include?

A.

Discarding

B.

Forwarding

C.

Listening

D.

Learning

Full Access
Question # 282

The G0/0/1 interface configuration information of router A is shown in the figure. Which of the following statements are correct? () (Multiple Choice Questions)

A.

The interface will not forward the received FTP packets

B.

This interface can establish OSPF neighbor relationships with other routers

C.

This interface will not forward ICMP packets

D.

This interface will not forward received SNMP packets

Full Access
Question # 283

Which of the following WLAN security policies support open link authentication?

A.

WPA

B.

WEP

C.

WPA2-PSK

D.

WPA2-802.1X

Full Access
Question # 284

What are the functions of OSPF protocol DR and BDR?

A.

Reduce the number of adjacencies

B.

Reduce the types of OSPF protocol packets

C.

Reduce the time to establish adjacency

D.

Reduce the number of exchanges of link state information

Full Access
Question # 285

If the application-layer protocol is Telnet, what is the value of the "Protocol" field in the IPv4 header?

A.

67

B.

53

C.

6

D.

17

Full Access
Question # 286

The TCP protocol uses the three-way handshake mechanism to establish and disable connections. Therefore, TCP supports reliable data transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 287

Which of the following functions does the LCP protocol in the PPP protocol support? ()*

A.

Negotiate network layer address

B.

Negotiate authentication agreement

C.

Detect link loop

D.

Negotiated maximum receiving unit MRU

Full Access
Question # 288

In the OSPF protocol, the correct one in the following description of DR is (). ()*

A.

Establish an adjacency relationship between DR and BDR

B.

If the priority values ​​of the two routers are equal, the router with the larger Router ID is selected as the DR

C.

By default, all routers in this broadcast network will participate in the DR election

D.

If the priority values ​​of the two routers are different, the router with the smaller priority value is selected as the DR

Full Access
Question # 289

Which of the following commands sets the data forwarding mode on an AC to direct forwarding?

A.

forward mode tunnel

B.

forward-mode direct-forward

C.

forward-mode capwap-forward

D.

forward-mode direct

Full Access
Question # 290

During STP calculation, the port cost is associated with the port bandwidth by default. Which of the following statements about the relationship between port cost and port bandwidth is true?

A.

The port cost varies randomly according to port bandwidth.

B.

A higher port bandwidth indicates a smaller port cost.

C.

The port bandwidth is equal to the port cost.

D.

A higher port bandwidth indicates a larger port cost.

Full Access