Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Huawei > HCIP-Datacom > H12-821_V1.0

H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Question and Answers

Question # 4

Which of the following statements is true about BGP?

A.

If the export routing policy applied to a BGP peer changes, manual intervention is required so that the device resends Update messages to the peer.

B.

IGP routes can be converted into BGP routes only through the network command.

C.

A router cannot be configured with multiple BGP processes.

D.

Open messages carry only the BGP header.

Full Access
Question # 5

An enterprise administrator views the following details about a BGP route during routine O&M:

yaml

CopyEdit

display bgp routing-table 192.168.1.1

BGP local router ID: 10.1.1.1

Local AS number: 100

Paths: 2 available, 0 best, 0 select

BGP routing table entry information of 192.168.1.1/32:

From: 10.1.1.2 (10.1.1.2)

Route Duration: 00h01m31s

Relay IP Nexthop: 0.0.0.0

Relay IP Out-Interface: --

Original nexthop: 172.16.1.2

AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable

Not advertised to any peer yet

Which of the following statements are true about the BGP route?

A.

The original next hop of the route is 172.16.1.2.

B.

The local BGP router ID is 10.1.1.1.

C.

The local AS number is 100.

D.

The route is preferentially selected because its Local_Pref has a higher priority.

Full Access
Question # 6

On an IPv6 network, intermediate forwarding devices do not fragment IPv6 packets for the purpose of reducing their packet processing pressure. Packets are fragmented only on the source node.

A.

TRUE

B.

FALSE

Full Access
Question # 7

IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?

A.

Link-local addresses can be quickly generated using the EUI-64 method.

B.

Anycast addresses can be used only as destination addresses.

C.

Each interface can have multiple global unicast addresses with different network prefixes.

D.

Manually configured link-local addresses have a higher priority than automatically generated ones.

Full Access
Question # 8

When deploying a VRRP network, an enterprise administrator sets the virtual IP address to 192.168.1.254 and VRID to 1. Which of the following is the virtual MAC address after the network becomes stable?

A.

0000-5e01-0101

B.

0000-5e01-0254

C.

0000-5e00-0101

D.

0000-5e00-0254

Full Access
Question # 9

When receiving a packet, a router matches the packet againstACL rules. The ACL matching result is eitherMatchedorUnmatched. If the matching result isUnmatched, which of the following are possible causes?

A.

All rules are traversed but no matching rule is found.

B.

The packet matches an ACL rule with the deny action.

C.

No ACL is configured on the device.

D.

An ACL is configured but it does not contain any rules.

Full Access
Question # 10

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

A.

1

B.

128

C.

4096

D.

32768

Full Access
Question # 11

As shown in the figure, VRRP is associated with a BFD session. When a backup device detects a fault through BFD, the backup device immediately assumes the master role after the Master_Down_Timer timer expires.

A.

TRUE

B.

FALSE

Full Access
Question # 12

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.

Full Access
Question # 13

In the SNMP management model, which of the following elements defines the attributes of a managed device?

A.

MIB

B.

Agent

C.

Managed Object

D.

NMS

Full Access
Question # 14

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Full Access
Question # 15

RSTP provides different functions in different scenarios. Which of the following statements Is false?

A.

After TC-BPDU attack defense function is enabled, you can set the number of times the switch processes TC BPDUs within a certain period

B.

The role of the designated port that is enabled with root protection cannot be changed

C.

If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation

D.

When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state

Full Access
Question # 16

On an IS-IS network, Level-1 routers can access the IS-IS backbone area only through Level-1-2 routers.

A.

TRUE

B.

FALSE

Full Access
Question # 17

In addition to numerous normal service packets, the CPUs of devices on a network may also receive large numbers of attack packets. To ensure that the CPUs can properly respond to normal services, the devices provide the local attack defense function.

Which of the following statements are true about this function?(Select all that apply)

A.

The device can schedule the protocol packets to be sent to the CPU in the attack defense policy based on the protocol priorities so that the packets with higher priorities are processed preferentially.

B.

To ensure that session-based application-layer data runs properly during an attack, you can configure the dynamic link protection function.

C.

Regardless of the packet type, the same rate limit must be set to reduce the number of packets sent to the CPU.

D.

CPU attack defense can also take effect on the management interface of the device.

Full Access
Question # 18

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Full Access
Question # 19

In IPv6, interface IDs can be manually configured, automatically generated by the system, or generated based on the IEEE EUI-64 standard.

A.

TRUE

B.

FALSE

Full Access
Question # 20

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

A.

TRUE

B.

FALSE

Full Access
Question # 21

IGMP group entries play an important role in multicast forwarding. An administrator runs a command to view information about a multicast entry. The information is as follows:

sql

Copy

display igmp group

Interface group report information

Vlanif100(10.1.6.2):

Total 1 IGMP Group reported

Group Address Last Reporter Uptime Expires

225.1.1.2 10.1.6.10 00:02:04 00:01:17

Given this, which of the following statements are true?

A.

This entry can be used to construct the corresponding (S, G) entry.

B.

This entry is created when the device receives an IGMP Join message from a user.

C.

Expires indicates the aging time of the IGMP group.

D.

225.1.1.2 is the address of the group that the user joins.

Full Access
Question # 22

A switch running a later IGMP version can identify Report messages of an earlier IGMP version, but the switch running an earlier IGMP version cannot identify Report messages of a later IGMP version. To ensure that IGMP runs properly, you are advised to set the IGMP version on the switch to be the same as or later than the IGMP version of member hosts.

A.

TRUE

B.

FALSE

Full Access
Question # 23

To overcome the disadvantages ofSTP,RSTPchanges the format ofconfiguration BPDUs. Which of the following fields inSTP BPDUsis used to specify theport role?

A.

Flags

B.

BPDU Type

C.

PID

D.

PVI

Full Access
Question # 24

The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?

A.

Address resolution

B.

Neighbor state tracing

C.

Duplicate address detection

D.

Redirection

Full Access
Question # 25

On a broadcast IS-IS network shown in the following figure, a DIS needs to be elected to create and update pseudonodes. Which of the following routers is elected as the DIS?

A.

R1

B.

R3

C.

R4

D.

R2

Full Access
Question # 26

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy nameddefault, where all matching conditions areanyand the default action ispermit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Full Access
Question # 27

On an OSPF network, there are multiple types of packets, each with a different function. Which of the following are the main functions of Hello packets?

A.

Neighbor relationship maintenance

B.

Neighbor discovery

C.

Neighbor deletion

D.

Neighbor relationship establishment

Full Access
Question # 28

Hackers often obtain the login permissions of system administrators through various attacks.

Which of the following measures can be taken to enhance the security of administrator accounts?(Select all that apply)

A.

Periodically check whether unnecessary administrator accounts exist in the system. If such accounts exist, delete them to reduce the attack surface.

B.

Encrypt passwords before transferring them. Whenever possible, transfer passwords by email.

C.

Assign exclusive accounts for administrators with different maintenance roles to avoid account sharing.

D.

To ensure security and make the password easier to remember, you can set the password to be valid for a long time.

Full Access
Question # 29

On an OSPF or IS-IS network, the filter-policy import command can be run on a router to filter out the LSAs forwarded by its neighbors.

A.

TRUE

B.

FALSE

Full Access
Question # 30

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Full Access
Question # 31

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Full Access
Question # 32

Match the following IPv4 multicast protocols with the corresponding functions.

Full Access
Question # 33

IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?

A.

Group-Specific Query message

B.

Leave message

C.

Report message

D.

Specifying a multicast source

Full Access
Question # 34

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Full Access
Question # 35

Which of the following statements is false about BFD?

A.

The asynchronous mode is the primary BFD operating mode.

B.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection interval, the BFD session is declared down.

C.

The asynchronous mode does not support the echo function.

D.

In demand mode, after a BFD session is set up, the system does not periodically send BFD Control packets.

Full Access
Question # 36

A switch runs MSTP. The configuration is shown in the figure. What is the role of this switch in MSTI 1?

A.

Uncertain

B.

Root switch

C.

Non-root switch

D.

Secondary root switch

Full Access
Question # 37

In special scenarios, when advertising routes to an IBGP peer, a BGP device needs to set the next hop to its IP address to prevent blackhole routes. Which of the following commands can be run in this case?

A.

peer next-hop-local

B.

peer mpls-local-ifnet

C.

peer private-nexthop

D.

peer next-hop-invariable

Full Access
Question # 38

On an RSTP network, you can set the STP priority of a switch to specify the switch as the root bridge.

Which of the following values is thedefault STP priorityof a Huawei switch?

A.

4096

B.

128

C.

32768

D.

1

Full Access
Question # 39

A wide area network (WAN) is a remote network that connects local area networks (LANs) or metropolitan area networks (MANs) in different areas for communication purposes. It is typically used to interconnect campus networks or data center networks.

A.

TRUE

B.

FALSE

Full Access
Question # 40

Which of the following statements are true about theLocal_Prefattribute in BGP? (Choose all that apply)

A.

The default Local_Pref value is 0.

B.

The Local_Pref attribute can be transmitted to all BGP peers.

C.

The Local_Pref value remains unchanged during transmission unless it is affected by a routing policy.

D.

The greater the value of the Local_Pref attribute, the higher the priority.

Full Access
Question # 41

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

A.

TRUE

B.

FALSE

Full Access
Question # 42

ASBRs cannot exist in an OSPF stub area.

A.

TRUE

B.

FALSE

Full Access
Question # 43

Alarge enterprisedeploys aWLAN in VRRP HSB modeto ensureWLAN reliability. Which of the following statements arefalseabout theVRRP configuration?

A.

The default priority of a device in a VRRP group is 100. A smaller value indicates a higher priority.

B.

The VRIDs must be configured to be the same on the master and backup ACs in the same VRRP group.

C.

The virtual IP addresses must be configured to be the same on the master and backup ACs in the same VRRP group.

D.

The default interval for sending VRRP heartbeat packets is 1s.

Full Access
Question # 44

Which of the following protocols are multi-channel protocols?

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Full Access
Question # 45

Which of the following configurations are not mandatory when an administrator configures VRRP?

A.

Preemption mode

B.

Preemption delay

C.

Virtual router priority

D.

Virtual IP address

Full Access
Question # 46

Which of the following statement regarding the display ospf peer command output is true?

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Full Access
Question # 47

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Full Access
Question # 48

On an IS-IS network, all routers generate LSPs. Which of the following types of information isnotcontained in the LSPs generated by pseudonodes?

A.

Interface information

B.

Information about supported network protocols

C.

Route information

D.

Neighbor information

Full Access
Question # 49

Which of the following attributes must be carried when BGP sends route update messages?

A.

MED

B.

Next_Hop

C.

AS_Path

D.

Local_Preference

Full Access
Question # 50

Which of the following attacks is not the network layer attack?

A.

IP spoofing attack

B.

ICMP attack

C.

Smurf attack

D.

ARP spoofing attack

Full Access
Question # 51

IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.

A.

TRUE

B.

FALSE

Full Access
Question # 52

Which of the following statements about the forwarding plane of a switch is false?

A.

Provides high-speed and non-blocking data channels.

B.

Can encapsulate and decapsulate packets.

C.

Can collect packet statistics.

D.

Consists of main control boards and interface boards.

Full Access
Question # 53

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

Full Access
Question # 54

Which of the following statements regarding the display bgp routing-table command output is true?

A.

The route to the destination address 192.168.1.0 is learned through AS 200.

B.

The MED value of the route to the destination address 192.168.1.0 is 100.

C.

The route to the destination address 192.168.1.0 is not the optimal route in the BGP routing table.

D.

The route to the destination address 192.168.1.0 is injected into the BGP routing table using the network command.

Full Access
Question # 55

On an OSPF network, routers learn routing information on the entire network by exchanging LSAs. Which of the following values is the LS Age in the LSA header when an LSA is deleted?

A.

1800s

B.

3600s

C.

1200s

D.

600s

Full Access
Question # 56

When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.

A.

TRUE

B.

FALSE

Full Access
Question # 57

BGP is generally applied to complex networks where routes change frequently. Frequent route flapping consumes a large number of bandwidth and CPU resources, and even affects the normal operation of the network. This is an unavoidable problem that cannot be solved in BGP.

A.

TRUE

B.

FALSE

Full Access
Question # 58

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Full Access
Question # 59

Which of the following statements regarding the MED value in BGP are true?

A.

According to BGP route selection rules, the MED value has a lower priority than AS_Path, Preferred-Value, Local-Preference, and Origin.

B.

The default MED value of BGP routes is 0.

C.

By default, BGP can compare the MED values of routes from different ASs.

D.

By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-none-as-maximum command is configured, the maximum MED value 4294967295 is used.

Full Access
Question # 60

There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)

Full Access
Question # 61

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value ofgreater-equal-valueis ____, and the value ofless-equal-valueis ____.

Full Access
Question # 62

IGMPV3 not only supports IGMPv1 General Query and IGMPv2 Group-Specific Query, and also IGMPv3 Source/Group-Specific Query.

A.

TRUE

B.

FALSE

Full Access
Question # 63

On Huawei switches, which of the following planes provides network information and forwarding entries that are mandatory for data plane forwarding?

A.

Forwarding plane

B.

Control plane

C.

Data plane

D.

Monitoring plane

Full Access
Question # 64

On an IS-IS network, each router can generate LSPs. Which of the following events trigger the generation of a new LSP?

A.

Related IS-IS interfaces go up or down.

B.

Periodic updates occur.

C.

Inter-area IP routes change.

D.

The IS-IS interface cost is increased.

Full Access
Question # 65

What is the default sending interval of BFD packets?

A.

10s

B.

5s

C.

100ms

D.

1000ms

Full Access
Question # 66

During routine operation and maintenance, an engineer checks the IGMP configuration on RTA. The configuration is as follows:

Interface information of VPN-Instance: public net

GigabitEthernet0/0/1 (192.168.1.1):

IGMP is enabled

Current IGMP version is 2

IGMP state: up

IGMP group policy: none

IGMP limit: -

Value of query interval for IGMP (negotiated): -

Value of query interval for IGMP (configured): 60 s

Value of other querier timeout for IGMP: 0 s

Value of maximum query response time for IGMP: 10 s

Querier for IGMP: 192.168.1.1 (this router)

Given this, which of the following statements is false?

A.

The IP address of the interface is 192.168.1.1.

B.

The maximum response time to Query messages is 10s.

C.

The interval for sending Group-Specific Query messages is 60s.

D.

The IGMP version is IGMPv2.

Full Access
Question # 67

Which of the following statements about WLAN roaming are true?

A.

APs for roaming do not need to have overlapping signal coverage.

B.

APs for roaming must be in the same extended service set (ESS).

C.

APs for roaming must have overlapping signal coverage.

D.

APs for roaming must be in the same basic service set (BSS).

Full Access
Question # 68

In VRRP networking, devices assume the Master and Backup roles after election. Match the two roles with their working mechanisms.(Token is reusable)

Full Access
Question # 69

PBR is a mechanism for selecting routes based on user-defined policies. There are two types of PBR: interface-based PBR and local PBR. Which of the following statements is false about these two types of PBR?

A.

Interface-based PBR takes effect only for forwarded packets.

B.

Local PBR takes effect only for locally originated packets.

C.

Interface-based PBR is configured on an interface and takes effect only for incoming packets on the interface.

D.

Local PBR is configured in the protocol view.

Full Access
Question # 70

GRE is a VPN technology that can implement packet transmission over heterogeneous networks. Which of the following statements are true about GRE?

A.

GRE is a Layer 2 VPN encapsulation technology.

B.

GRE enables encapsulated data packets to be transmitted over another network layer protocol, butcannot encapsulate multicast data.

C.

GRE tunnels can work with IPsec to ensure the security of multicast services such as voice and video.

D.

GRE tunnels can extend the working range of network protocols with hop limits.

Full Access
Question # 71

By default, a router interface sends PIM Hello messages at an interval of __________ seconds.

Full Access
Question # 72

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

A.

TRUE

B.

FALSE

Full Access
Question # 73

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Full Access
Question # 74

ACLs are a common tool for matching routes. ACLs are classified into multiple types based on ACL rule functions. An ACL can be identified by a number, and the number range for each type of ACLs is different. Which of the following type of ACLs are numbered from 4000 to 4999?

A.

User-defined ACL

B.

Basic ACL

C.

Layer 2 ACL

D.

Advance ACL

Full Access
Question # 75

During routine O&M, an engineer finds that theHold Timeparameters of two devices are inconsistent. In this case, which of the following situations occurs?

A.

A peer relationship can be established, and the smaller Hold Time is selected after negotiation.

B.

A peer relationship can be established, and the larger Hold Time is selected after negotiation.

C.

No peer relationship can be established.

D.

A peer relationship can be established, and the devices use their own parameter values to send messages.

Full Access
Question # 76

Which of the following statements is false, based on the following IGMP information on an interface of RTA?XC

A.

The interval for sending group-specific Query messages is 60s.

B.

The maximum time for response to Query messages is 10s.

C.

The IP address of the interface is 192.168.1.1.

D.

The IGMP version is IGMPV2.

Full Access
Question # 77

Which of the following statements regarding the OSPF protocol is false?

A.

Each OSPF router uses only one Router-LSA to describe the local active connection status of an area.

B.

Routing information can be advertised only between backbone and non-backbone areas and cannot be advertised directly between non-backbone areas.

C.

Router-LSA describes four connection types: P2P, TransNet, SubNet, and virtual link.

D.

Link State ID in a Type 3 LSA indicates the router ID of an ABR.

Full Access
Question # 78

On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?

A.

2

B.

4

C.

3

D.

1

Full Access
Question # 79

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

A.

TRUE

B.

FALSE

Full Access
Question # 80

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Full Access
Question # 81

On a WLAN, MAC address authentication controls network access rights of a user based on the user's access interface and terminal MAC address.

Which of the following statements is false about MAC address authentication?

A.

User passwords can be processed using PAP or CHAP.

B.

By default, the MAC address of a terminal is used as the user name and the last 6 hexadecimal digits of the terminal MAC address are used as the password for MAC address authentication.

C.

No client software needs to be installed on user terminals.

D.

A MAC address authentication system consists of three types of entities: terminal, access device, and authentication server.

Full Access
Question # 82

The Interface \P address and VRRP virtual IP address can be the same.

A.

TRUE

B.

FALSE

Full Access
Question # 83

Compared with STP, RSTP defines the different port states. Which of the following statements regarding discarding and learning states are true?

A.

The port In discarding or learning state does not forward data frames.

B.

The port in discarding state does not learn MAC addresses table.

C.

The port in discarding or learning state does not learn MAC addresses

D.

The port In learning stole docs not learn MAC addresses table.

Full Access
Question # 84

On an OSPF network, Type 7 LSAs can be generated only by ASBRs in NSSAs or stub areas and describe AS-external routes.

A.

TRUE

B.

FALSE

Full Access
Question # 85

TheBFD (Bidirectional Forwarding Detection) state machineimplements athree-way handshakefor BFDsession setup or teardown.Which of the following session states are involved in BFD session setup?

A.

Up

B.

AdminDown

C.

Init

D.

Down

Full Access
Question # 86

In addition to a route reflector, the confederation is another method that reduces the number of IBGP connections in an AS.

Which of the following statements are true about the confederation technology? (Choose all that apply)

A.

This technology is applicable to large-scale networks.

B.

Special EBGP connections are established among sub-ASs in a confederation, and the sub-ASs need to be fully meshed.

C.

All member devices in a confederation need to be reconfigured.

D.

The logical topology does not need to be changed when a confederation is used.

Full Access
Question # 87

By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.

A.

TRUE

B.

FALSE

Full Access
Question # 88

Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)

Full Access
Question # 89

On the network shown in the following figure, the management VLAN is VLAN 10, and the AP isconfigured to obtain an IP address on the network segment 10.1.1.0/24 through DHCP. The AP, AC, and AR function as the DHCP client, DHCP relay agent, and DHCP server, respectively. Which of the following configurations for the DHCP relay agent and DHCP server are correct?

A.

[AC] dhcp server group AP[AC-dhcp-server-group-AP] dhcp-server 172.21.1.2[AC-dhcp-server-group-AP] quit[AC] interface Vlanif 10[AC-Vlanif 10] dhcp select relay[AC-Vlanif 10] dhcp relay server-select AP[AC-Vlanif 10] quit

B.

[AR] ip pool AP[AR-ip-pool-AP] network 10.1.1.0 mask 24[AR-ip-pool-AP] gateway-list 10.1.1.2[AR-ip-pool-AP] excluded-ip-address 10.1.1.1[AR-ip-pool-AP] quit[AR] interface GigabitEthernet 0/0/1[AR-GigabitEthernetO/O/1] dhcp select global[AR-GigabitEthernet0/0/l] quit[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

C.

[AR] ip pool AP[AR-ip-pool-AP] network 172.21.1.0 mask 24[AR-ip-pool-AP] gateway-list 172.21.1.2[AR-ip-pool-AP] excluded-ip-address 172.21.1.1[AR-ip-pool-AP] quit[AR] interfaceGigabitEthernet 0/0/1[AR-GigabitEthernetO/0/1] dhcp select global[AR-GigabitEthernetO/0/1] quit[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

D.

[AC] dhcp server group AP[AC-dhcp-server-group-AP] dhcp-server 10.1.1.2[AC-dhcp-server-group-AP] quit[AC] interface Vlanif 10[AC-Vlanif 10] dhcp select relay[AC-Vlanif 10] dhcp relay server-select AP[AC-VlaniflO] quit

Full Access
Question # 90

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Full Access
Question # 91

On an STP network, only the designated port processes inferior BPDUs. On an RSTP network, a port with any role processes inferior BPDUs.

A.

TRUE

B.

FALSE

Full Access
Question # 92

After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.

A.

TRUE

B.

FALSE

Full Access
Question # 93

To prevent loops on anSTP network, after adesignated portis elected, it mustwait for a long timeand can forward packetsonly after the status of all ports on the entire network is determined. To solve this problem,RSTP uses the P/A mechanismto speed up thedownstream port's transition to the Forwarding state.

A.

TRUE

B.

FALSE

Full Access
Question # 94

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Full Access
Question # 95

NETCONF is a network configuration protocol that automates network configuration in a programmable manner, simplifying and accelerating network service deployment. Which of the following operations can be performed by using this protocol?

A.

Modifying configurations

B.

Deleting configurations

C.

Restoring configurations

D.

Backing up configurations

Full Access
Question # 96

Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. Which of the following statements is true?

A.

The LSDB of R2 does not contain the LSP of R4.

B.

The LSDB of R1 does not contain the LSP of R4.

C.

The LSDB of R2 does not contain the LSP of R3.

D.

The LSDB of R3 does not contain the LSP of R4.

Full Access
Question # 97

Which of the following statements regarding an IP prefix are true?

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

Full Access
Question # 98

The following figure shows the BGP state switching mechanism. Drag the following BGP states to the corresponding sequence numbers.

Full Access