Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following H31-211 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H31-211 Exam Dumps - HCNA - Carrier IP

Question # 4

On the VRP platform, which of the following is the command to delete a VLAN?

A.

undo vlan

B.

vlan undo

C.

delete vlan

D.

vlan delete

Full Access
Question # 5

All the protocols in the standard HDLC protocol suite run on synchronous serial line.

A.

True

B.

False

Full Access
Question # 6

Which of the following statements about broadcast in IPv6 is correct?

A.

Broadcast in LAN can affect all nodes.

B.

Broadcast is not used in IPv6.

C.

The definition of broadcast in the IPv6 network is pending.

D.

Broadcast, as a basic mechanism, is used in various IPv6 operations.

Full Access
Question # 7

For a class С IP address, how many bits at most can be used for sub-netting?

A.

8

B.

14

C.

6

D.

12

Full Access
Question # 8

Where is A VLAN in the Ethernet used to separate?

A.

Layer 2 multicast domain

B.

Layer 2 broadcast domain

C.

Layer 2 MAC address

D.

Layer 2 unicast domain

Full Access
Question # 9

Which of the following are the advantages of RSTP compared with STP? (Select multiple)

A.

If the designated port is connected with P2P link, it can make a handshake with the connected bridge and enter the forwarding state immediately after it receives a response.

B.

Once a port of the switch which is configured as edge port has been enabled, it will become designated port immediately and transit to forwarding state.

C.

If the designated port is connected with P2MP link, it can make a handshake with the connected bridge and enter the forwarding state immediately after it receives a response.

D.

A new root port is elected on the non-root switch and the previous old root port is no longer in forwarding state. Moreover the designated port of the segment which connects with the new root port already starts to forward the data. In this case, the new root port can enter forwarding state immediately.

Full Access
Question # 10

Which method of authentication is supported in the RIPv1 seal text?

A.

Clear text

B.

Ciphertext

C.

MD5 ciphertext verification

D.

Does not support authentication

Full Access
Question # 11

The following description of the advantages of the three-layer exchange is correct?

A.

Based on hardware packet forwarding, low latency, low cost

B.

Based on package forwarding, low latency, high cost

C.

Based on package forwarding, low latency, low cost

D.

Based on hardware packet forwarding, high latency, low cost

Full Access
Question # 12

On the Eudemon firewall, NAT is enabled. What are the functions of NAT? (Multiple choice)

A.

Save public IP address

B.

Protecting private networks

C.

Facilitating network consolidation

D.

Improve access efficiency

Full Access
Question # 13

In PPP, when both ends of the communication side detect the physical line activation, they will transition from the link unavailability phase to the link establishment phase. In this phase, which of the following protocols is used to configure the link parameters?

A.

IP

B.

DHCP

C.

LCP

D.

NCP

Full Access
Question # 14

Which type of port can implement VLAN tag stripping and forwarding? (multiple choice)

A.

Access

B.

Trunk

C.

Hybrid

D.

Norma

Full Access
Question # 15

What kind of data encapsulation method does OSPF use as an application layer protocol?

A.

Encapsulated by the transport layer, UDP port number hop

B.

Encapsulated by IP, protocol number 89

C.

Encapsulated by the transport layer, TCP port number 89

D.

Directly run above the data link layer

Full Access
Question # 16

How does Hub work?

A.

Simplex

B.

Half duplex

C.

Full duplex

D.

Auto-negotiation

Full Access
Question # 17

Which of the following are the ways of flow control? (multiple choice)

A.

Acknowledgement technology

B.

Buffering technology

C.

Source quench messages (source quench messages)

D.

Window mechanism (windowing)

Full Access
Question # 18

What is the Age time of the RIP routing protocol that is viewed by the command on the router?

A.

RIP packet update interval

B.

RIP route aging time

C.

RIP route suppression time

D.

RIP route switching time

Full Access
Question # 19

For such a network segment 192.168.2.16/28, how many hosts can I accommodate?

A.

16

B.

8

C.

15

D.

14

E.

7

Full Access
Question # 20

How many layers the IS-IS can divided into?

A.

3

B.

5

C.

4

D.

2

Full Access
Question # 21

A MAC address consists of 48 bits and is generally expressed in 12-bit dotted decimal notation. What kind of address does a MAC address consisting of all 1s stand for?

A.

Virtual address

B.

Multicast address

C.

Broadcast address

D.

Unicast address

Full Access
Question # 22

Which attribute is selection of a root bridge based on when the spanning tree is calculated by the STP?

A.

Path Cost

B.

Port ID

C.

Bridge ID

D.

Port Cost

Full Access
Question # 23

Which of the following communication types are defined based on information interaction between the transmitter and the receiver? (Select multiple)

A.

Simplex

B.

Half-duplex

C.

Duplex

D.

Auto-negotiation

Full Access
Question # 24

In a TCP/IP protocol stack, the headers of packets at each layer are removed in the decapsulation process in a specified manner. Which of the following is the right manner?

A.

From lower to upper

B.

From Transport Layer to the lower layers

C.

From upper to lower

D.

From Network Layer to the upper layers

Full Access
Question # 25

Which of the following statements regarding routing convergence is correct?

A.

Convergence is a process of combining the routing tables of two routers.

B.

Convergence is a process of synchronizing all routing tables for all the routers in the network. It is the process for a router to reach the stable and consistence state after the network changes.

C.

Convergence is a process of establishing neighbor relationships between any two routers by sending hello packets.

D.

Convergence is a process that occurs due to network topology changes.

Full Access
Question # 26

Network protocols are diverse and are now the most widely used, and have become the standard protocol for the Internet?

A.

TCP/IP

B.

IPX

C.

SNA

D.

SPX

Full Access
Question # 27

What part of a complete data communication system should be composed (multiple choice)

A.

Message (message)

B.

sender (sender)

C.

Receiver (receiver)

D.

Medium

E.

Power (power)

Full Access
Question # 28

In the STP calculation, when the port is in the following options, the data frame is not forwarded, and the MAC address table is not learned.

In this state, the port receives and processes STP packets, but does not send STP packets.

A.

Listening

B.

Blocking

C.

Learning

D.

Forwarding

Full Access
Question # 29

When the port of Hybridrid sends a message, what are the following statements correctly? (multiple choice)

A.

Hybrid port can implement packet stripping label sending in multiple VLANs.

B.

When the Hybrid port and the trunk port send data, the processing method is the same.

C.

Hybrid port does not contain VLAN tag for sending data.

D.

The data sent by the Hybrid port may have a VLAN 1 tag.

Full Access
Question # 30

Which of the following commands can switch a view from the system view to the user view?

A.

Quit

B.

Router

C.

User-view

D.

System-view

Full Access
Question # 31

Regarding the TTL field of the IP packet header, what are the following statements correct? (multiple choice)

A.

The maximum possible value of TTL is 65535

B.

Under normal circumstances, the router should not receive packets with TTL=0 from the interface.

C.

TTL is mainly to prevent the cyclic forwarding of IP packets in the network, wasting network bandwidth.

D.

Each time a IP packet passes through a network device, including Hub, LAN SWITCH, and router, the TTL value is subtracted from a certain value.

Full Access
Question # 32

Which of the following statements regarding OSPF area are incorrect? (Select multiple)

A.

Area ID must be assigned by IANA and we can not simply assign it.

B.

OSPF supports area division.

C.

Every OSPF area is identified by a 32-bit Area ID number.

D.

Without manual configuration, an OSPF area is a backbone area with area ID 0 by default.

Full Access
Question # 33

What are the duplex modes supported by the Ethernet electrical port? (multiple choice)

A.

Full duplex

B.

Half duplex

C.

Simplex

D.

Auto-negotiation

Full Access
Question # 34

OSPF runs over the IP protocol and the IP protocol No. used by which OSPF?

A.

89

B.

512

C.

80

D.

2328

Full Access
Question # 35

The firewall does not provide detection for encrypted data or for data in tunnels that traverse it.

A.

True

B.

False

Full Access
Question # 36

What level of functionality is addressing and routing in the OSI reference model?

A.

Physical layer

B.

Data link layer

C.

Network layer

D.

Application layer

Full Access
Question # 37

Which of the following types of ports allow transparent transmission of VLANs? (multiple choice)

A.

Trunk

B.

Access

C.

Hybrid

D.

Normal

Full Access
Question # 38

Since the FR virtual circuit is connection-oriented and the different local DLCIs are connected to different peer devices, the local DLCI can be considered as the "frame relay address" of the peer device.

A.

True

B.

False

Full Access
Question # 39

The following may result in the inability to establish an adjacency relationship between OSPF routers? (multiple choice)

A.

The interface network segment is inconsistent

B.

Ethernet or NBMA network interface priority is all zero

C.

Timer parameters are inconsistent

D.

The same router ID

Full Access
Question # 40

Which of the following is the abbreviation of the ICMP protocol?

A.

Internal Control Mail Protocol

B.

Intranet Control Message Protocol

C.

Internet Connection Message Protocol

D.

Internet Control Message Protocol

Full Access
Question # 41

Directly connected to the specified port of the peer device, does not forward any packets, but which port is the port that receives BPDUs to monitor network changes?

A.

Root Port

B.

Designated Port

C.

Alternate Port

D.

Disable Port

Full Access
Question # 42

After the switch receives the complete data frame, it performs a CRC check. After the check is passed, the frame is forwarded. What is the forwarding mode called?

A.

Cut-Through

B.

Store-and-Forward

C.

Fragment-free

D.

Store-free

Full Access
Question # 43

When the router forwards data (without address translation), which of the following items have not been changed in forwarding? (multiple choice)

A.

Source network address

B.

Destination network address

C.

Source MAC address

D.

Destination MAC address

E.

Source port number

F.

destination port number

Full Access
Question # 44

Asynchronous Response Mode (ARM) is a way of allowing any node to initiate a transfer.

A.

True

B.

False

Full Access
Question # 45

What is the packet that the STP downstream device uses to notify the upstream device that the network topology changes?

A.

Agency BPDU

B.

TCN BPDU

C.

Discover BPDUs

D.

Reverse BPDU

Full Access
Question # 46

Which of the following IPs may be broadcast addresses if the subnet mask is not clear? (multiple choice)

A.

199.32.59.1

B.

199.32.59.3

C.

199.32.59.191

D.

199.32.59.192

Full Access
Question # 47

In full-duplex mode, both parties can receive and transmit data simultaneously.

Which of the following options is working in full duplex mode?

A.

Keyboard

B.

Display

C.

Interphone

D.

Telephone network

Full Access
Question # 48

When two routers perform LSDB database synchronization, which of the following messages is used to describe their own LSDB?

A.

Hello

B.

DD

C.

LSR

D.

LSU

Full Access
Question # 49

Which of the following protocols is used to transfer files that make up a page on the World Wide Web?

A.

TCP

B.

UDP

C.

DNS

D.

HTTP

Full Access
Question # 50

What is the interface type of .10BASE-T twisted pair?

A.

RJ11

B.

RJ23

C.

RJ45

D.

R755

Full Access
Question # 51

The computer automatically obtained the address 169.254.136.228, what are the following statements correct? (multiple choice)

A.

This is a unicast address

B.

Get this IP to communicate with other hosts

C.

is a reserved address, indicating that no available DHCP server is found on the network.

D.

This is a private address

Full Access
Question # 52

The HTTP protocol uses TCP communication, and the default port is

A.

80

B.

8080

C.

110

D.

25

Full Access
Question # 53

Which of the following options is used to view the route that IP datagrams pass from one host to another?

A.

FTP

B.

Tracert

C.

ICMP

D.

Telnet

Full Access
Question # 54

Which of the following devices are working at the network layer?

A.

Hub

B.

Bridge

C.

Switch

D.

Router

Full Access
Question # 55

Which commands can be used to view the configuration information of interface Serial 1/0/1? (multiple choice)

A.

[Quidway] display current-configuration

B.

[Quidway-Serial1/0/1] display this

C.

[Quidway] view saved-configuration

D.

[Quidway] show current-configuration

Full Access
Question # 56

180On the VRP platform, how many OSPF processes can a router enable by default?

A.

1~64

B.

1~1024

C.

1~64512

D.

1~65535

Full Access
Question # 57

Which Telnet protocol is used for data transmission?

A.

RTP

B.

SIP

C.

UDP

D.

TCP

Full Access
Question # 58

RlP protocol, in the RIPV2 version, which address is sent by default to the update message?

A.

224.0.0.2

B.

224.0.0.9

C.

224.0.0.5

D.

224.0.0.13

Full Access
Question # 59

Which of the following two types of interfaces can the switch be? (multiple choice)

A.

MDI

B.

MDI_S

C.

MDI_X

D.

MDI_R

Full Access
Question # 60

The network administrator is removing multiple VLANs from the switch. When the administrator enters the undo vlan 1 command, he receives an error message.

What is the cause of the error message?

A.

VLAN can only be deleted by the user who created it

B.

VLAN 1 can be deleted only after the role of VLAN 1 is assigned to other VLANs.

C.

The command was not entered correctly, resulting in a syntax error

D.

VLAN 1 is the default management VLAN and cannot be deleted.

Full Access
Question # 61

TFTP协议是简单文件传输协议,它使用什么协议来进行文件的传送?

A.

SIP

B.

UDP

C.

TCP

D.

RTP

Full Access
Question # 62

When a router that enables proxy ARP receives an ARP request packet, it finds that the destination address of the packet is not its own. Which operation is required? (Multiple selection)

A.

Discard the message

B.

Find the route to the destination address

C.

If there is a route to the destination address, send its own MAC address to the ARP requester.

D.

Broadcast ARP request message

Full Access
Question # 63

172. DHCP establishes and maintains a UDP connection between the PC client and the DHCP server, so that the client PC automatically obtains a temporarily fixed IP address.

A.

True

B.

False

Full Access
Question # 64

Which of the following statements about VRRP is correct? (multiple choice)

A.

Under normal circumstances, the business is all undertaken by the Master.

B.

When the Master fails, the Backup device takes over the work.

C.

VRRP can only monitor the interface status of VRRP.

D.

VRRP can implement active/standby backup and cannot implement load balancing.

Full Access
Question # 65

On the VRP platform, what methods can be used to make the interface of the router only receive RIP routing updates? (multiple choice)

A.

silent-interface

B.

rip in

C.

rip out

D.

rip work

Full Access