You are on page 1of 24
2 Which of the following tasks need to be completed during the planning stage of a project? (Multiple Choice) TA Work out the technical design TB. Know the project background’ TC. Determine the model of network devices in the project FD. Make clear the requirements of a project T E Plan IP addresses Answer: BD In a route:policy, which of the following BGP attributes can be used in if match clauses? (Multiple Choice) TA Local-Preference DBAS Path Poeras TF D. Community Answer: BD 11.What are differences between the DiffServ and IntServ models? (Multiple Choice) TA The DiffServ model provdes different services destined for different destinations. TB. The DiffServ model provides different senvices destined for diferent Sources TC. The DiffServ model does not need to maintain the status of each flow. I D. The DiffServ model applies to large-scale backbone networks. Answer: CD "2MMhieh eth olowing statements regaring the ary-souce mutiast (ASM) a source speci mutcast (SSM) models are ue? (Mull Coie) TF ihe SSM mod the ecenerhasts hae ota he spc eatin athe mulcas! source in aaa ete maods [FB nthe ASM model reaver ost canteen aatona et mast sures madrance TF © The SSW made and ASM! del oe te sare muicast gp aes range, TF D the SSM model aulast atbuten ees etalahed deel between a mulicast sures ands recahe host Asner: ABD ‘nthe mucasnetnerkenizonmert, how do an IGMPr1 host and an IGMP2 matron the same LAN interact wth gach the? (Mubipe Choice) [FA any ost ona LAN is runring IGM, al hosts onthe LAN must alse ue IGMP TT 8 Membership Repot messages srt fom te IGMP! hos wil bec by the IMPX2 ater TF C-fthe KGMPV! is ina specie goup the IGMPY2 mater must igre all Leave messages receved fom his group TT 0 Theverson 2 miter must set 2 countdown timer associated wth he goup tha takes into accourt he presence othe version thst ‘Anemers 86D 21.Which athe follwing route selection tools can be used by ather routing protacols in addition to BGP” (Multiple Choice) TA route-potcy 24.What features must a risky operation solution have?(Multiple Choice) TA Accuracy TB. Good operability I ©. Verification D. Rollback .25,Which of the following items are used to remind customers of information security? (Multiple Choice) FA Account soft-out reminder 7B Password update reminder T ©. Log protection reminder F D Dota backup reminder Answer: ABCD 24. meh fe foloing starts earn OSPF aes rit aa ree a te? Mle Coie) Fn eal tera eter f wha he aces blr the are ae, 16 an aves Gator Rater (ABR) ta rete crmitest nea ma seas, ow afutich ite Bachna, ABR unctin a gt ter FC Abeckbone ours aot with al east a ieteaces eongingt the backbone, FD AvAatonorcus Sytem Sour Razer ASER) canbe an eral, backbone reer oan ABR, answers ABD a When le eng sees regarding Sco face ks tae LAC nat se? tile Chace) TT vstate LAC? mse ar janine Tank the membartotces snd the sytem ry, sys MAC aso, eae py, a Iretace meet rate etree acne nice, TTB. Alager LAG? system pty ndeates a gh pty Th nd wih lage LACPaystem pry uctns a the Act ce. eto nde hehe sae LACP Stem rot, the nd wih alge UAC aoess clans a the ce ie TFC. The posse side determines act eaces based en he LACP prety aD (race umbar f n reece onthe Act ie [FD On can te omarde nama went ects select dere mteraces 40.n a MPLS VPN network, twolayer MPLS labels are added into data packets before they are transmitted oer the public network. ‘Which af the folowing statements regarding data packet processing ar ru” (dtp Chace (TA. The penutimate hop removes the outer label beore fornardng the data packet toa peer PE. FB The data packet racened by the peer PE doesnot cary labels TT ©The penatimate hop removes the outer label the eter abl in the data packet is expt ul abel 3. FD. The poer PE sends the data packet tothe conect VPN based on te inne abo. Answers AD 42RSTP defines different ports compared with STP. Which of the following ports cannot work in forwarding state? (Multiple Choice) A Root port T B. Designated port T ©. Backup port T D. Alternate por Answer: CD. TA Documentation transfer TB. Transferto-maintenance training F ©. Acceptance meeting T D. Business expense accounting 44. Which of the following operations are performed during migration acceptance? (Multiple Choice) Answer: ABC TA Router LSA, TB Network LSA. I C. Summary LSA I D.AS Extemal LSA 46 Which of the following LSAs are advertised only within a single area? (Multiple Choice) Answers AB 47 After the project delivery, the O&M expenses are continuously generated. ‘Which of the following items are the expenses generated during the O&M? (Multiple Choice) TA Energy expenses T B.Line construction expenses TF C Line lease expenses T D. Equipment depreciation expenses 1 E. Staff expenses Answer: ACE, Inne sts rata eonert, oo a IGMP ota an MP eon th sam LA intent ach ta? tiple Ch) TTA ThelGMPt rater conser IGMP? Repet messages ma and rts them 1F when he Prt tr aca an ofc MP gue ta MP Yost must ees IGMP Rr mesage the tt [FC Wen he UP 2 hot eae ta he UP quis nng OMA & mses pnd the ue nah IGMEV! Reo meanes [FD Wenhe Pest ne th ou, al and an GU lene message ante meszage ca a be Spree ners ABE ‘Wie he ovo tates epg OSPF ateteation command aus? Mute Choe TTA Acipbtent parser canbe eh ect is eur TF 8 The op aahenexan ode mas 1 hams conmanahas the ste tna he ep ahenetan ode mat plan Wawel comeing [F.C When an ateneaton sents confer wes auhentiabn anditaraceauhetston spate, te pats carer TF 0 The ose anhericsanode simple have command hash sane uncton 2 the ost auhenticatonmate single lan hue command nawers AD [Which athe folowing statements rogaréing2 route ply ar re? (Mute Choice) TT A Atoutegbey consists of mile nodes, and each nde can contan mice match and pay clauses: TFB Anibnatch clause defines th matching contin othe sede, and an apy cause dines the rung beaver the packets mestag he racing conan TFC The operat betnean nach clauses unde a ads AD. Thats, packets atch the rade at when hey match alte Henatch clauses under the node. TF The operator ete nodes oa route gly is OR. That i, pacha passe ough ne ute ply at ong as they match oe nade ‘Anewers ABCD {L.UMich othe foun saemens togurng VRP last wchow ase? Me Chics) Fan assacitonbebwean VRRP andthe GFD or EEM sesso seria andthe FD cr EEM ses sn tus changes the chang i cfidto ‘he VRRP rvel.mpereing VARP st sch TF A VRRP group cannt manta te peer BO sertin Il BFD stsen and nomal FD session simataneoushy TF ©. Whenthe VRAP gop is associated ith a arma BED session nd he BFD sein sais changes, the pty lhe VEAP gop is changed to tggertheentchonr When he tus afte mantre4EFD session race the party ofthe rater the VRRP gp restored 1 D-F VRRP is congue to montr utile FD sessions te assecitins ay afc seices. 65 What are the mainly methods of data collaction? (Multiple Choice) TA Collection by physical optical splitter TB. Collection through port mirroring T C. Centralized collection by NMS I D. Automatic collection Answer: ABC {59.ich othe along statements regarding etek martrance work ate tre? (Mutiple Cis) TT Fer doce sotare maintenance, ene operations are alowed tu ony ret operations are ecommeie TT B.The device sotware runing i ose, elated to senices ruming/on the dace. TF ¢-The extemal enironment where hardware ans dos nt need speci tet, TT 0 For deice enitcanert mantenace, maintenance personel ned tog othe ste or een use some pcfesina ts fr absenaton and measure swat: 8D TO.Whch ofthe flowing causes may raul fa BGP peer relationship faut”? (Muligle Choice) TF An ACL i conquest sable TCP pr 179 TTB. The peer outer D confit with he lca eter FC. Tne peer ebgo-maxchap command is not contgued when loopback intefaces ae used to establish the EDGP peor elatonship. TT The peer connectitetace commands not configured when loopback nterlaces ae used to establish the BGP peer relationship. ‘Anowers ABCD T1.Which of the following statements regarding BGP are false? (Multiple Choice) TA\TCP provides an acknowledgement and retransmission mechanism for BGP TB Before establishing a TCP connection, BGP devices need to exchange Update messages I C. BGP uses Notification and Update messages to establish and maintain peer relationships TD. BGP uses the TCP port 179 for communication. Answort BC 74. Which of the following procedures are included in |S-IS route calculation? (Multiple Choice) 7. Neighbor relationship establishment TB. Route calculation T ©. Link information exchange TD. Route advertisement Answer: ABC 75.Which three steps does a migration include? (Muttiple Choice) TA Snapshot before the migration TB. Delivery during the migration I C. Check after the migration I D. Attendance ater the migration Answer: ABC 78 Which of the following statements regarding IS4S characteristics are true? (Multiple Choice) TALISHS suppor various area features TB. ISAS packet format is simple T C ISAS is suitable for arge-capacity route transmission T D. ISHS has good scalability Answer: BCD 98 Which of following statements regarding LACP are true? (Mutiple Choice) A LACP is based on IEEEBO2 3au FB The local dvice sends LACPDUs to exchange information wth the emote end © Devices at bath ends determine the Activ side based onthe LACP system pronty and system ID. FD Devices at both ends determine act interfaces based on the LACP pri and ID ofthe interface onthe passive sie, _ Answer BC 101 Which of the following are migration difficulties? (Multiple Choice) TA. Minimizing on services TB. Achieving optimal risk prevention I C. Formulating a complete migration solution TD. Carrying out the migration smoothly Answer: ABCD 103 Enterprise senices have strict requirements for QoS in networks. Which of the following counters can be used to indicate network QoS? (Multiple'Choice) A Stability FB. Bandwidth PC. Delay PD fitter FP € Security Answer: BCD 112 Ethene supports broadcast. Once anetvork loop occurs, this simple broadcast mechanism wil cause catastoghic consequences. Which othe folonng symtoms may be caused by 2 oop? Multiple Chace) TA Users canna og into the device remaely FB. The display intaface command output shows alge numberof broadcast packets received onan interface. 7 © The CPU usage exceeds 70%. FD Alot of CMP packets ae lst in ping ests. ‘Answer: ABCD 116 .Whicit of the following subsystems are involved in building cabling? (Multiple Choice) TA Horizontal subsystem 1B. Access subsystem C. Backbone subsystem TD. Vettical subsystem 1 E. Switching subsystem Answer: AD {7 2emgtowap opto tt srctd mtn trig poe ich oe org ecard ote ae te 7A Troubleshooting ntrmedate documents TTB Toutechosing summay report TT ©. change backup and maetenance suggestions TD Ueercommuntaton pan Anowar: ABC 125 Which ae the new requirements on the enterprise network stimulated by the mobility trend? (Multiple Choice) FA Unied wired and wisless management TB. Consistent sanice experience anytime, anywhere FC. Fast deployment of mobile aplcations 0 Strict hierarchical networking Answer: ABC 126 MPLS implements data forwarding based on two diferent planes “Uitch ofthe folowing statements regarding the forwacing machansm ave corer? (Multiple Choice) A Ater an P packet enter an MPLS domain, the device recehing the packet queria inthe FI table fst FB. The system automatically assigns an ID tothe uppersayer application that uses a tunnel. This IDs also calle the tunel. FC the tunnel Dis Ox0, the MPLS forwarding process stats. FD the tunnel Dis net Ox, the normal forwarding process stats ‘Answers AB 132 Which of he following tems on the packing list need to be checked duang unpacking and inspection? (Multiple Choice) A Pett number 8. Pat model Fc. Number of pans FD. Project name ‘Answer! ABCD 133 Which ofthe folowing statements regarding DRVBOR are false? (Multiple Choice) FACAIDR others establish neighbor lationship with DR and BDR only. TB Ina broadcast network, DR and BDR must be elected. broadcast network without a OR or BDR cahnot operate normally. TF DR thers isten onthe multicast address 224.0.05. D.DR others listen onthe network address 224.0.0.6 ‘Answer: ABD 136 Which ofthe following statements regarding the physical topology monitoring function of eSight are true? (Multiple Choice) A Sight cisplays the layout and status of NEs, subnets, and links on the GUL FB eSight supports visualized monitoring ofthe network-wide running status. TG. eSight displays the architecture of the entire network and relationship between network entities FD. The physical topology monitoring provides an entry for unied network montoring, improving ORM eficiency. ‘Answer: ABCD 141 Which of the following traffic can be mirrored through port mirroring? (Multiple Choice) TA Packets received by a port 1B Packets sent by a port T C Packets received and sent by a port I D. Packets discarded on a port Answer: ABC 1143 Which ofthe folowing statements regarding the characteristics of HA network are true? (Mliiple Choice) TA Faults cannot occur frequently 17. Faults can be recovered rapidly TC. No fauit oceurs TD. When fauits occur, services can be only restored manually ‘Answer: AB ‘1 Which oe felowg statements regarding web knom dectebonary tbe a tue? (Maile Chics) TF A\AV GP reuters must dry teas eros, 1 8 Thoae atrbuoe must be trams between EP poe 1F Thase anise do net nocescary tobe cared in Update message, and SGP routers can determine whathar to cany tem in Upde messages. FD Thoseatss do net necessary tobe ransmited betwen BGP peers ‘nomen: ACO 160 Which ofthe folowing causes may resultin an I-18 neighbor relationship fault? (Multiple Choice) FA. The devices on two ends ofa ink have the same system FB The devices onto ands ofan have inconsistent ISS levels TT ©. When an S18 Levelt neighbor relationship is estabished, tho devices on two onds of ain hav inconsistent area addresses IF 0. ThelP adresses ointraces on two ends of lin are on erent network segments Answers ABCD 164 Which of the following statements regarding traffic policing is true? (Multiple Choice) TA Packets cannot be colored. 1 B. Packets can be colored, T C. The packets of which the rate is exceeded can be buffered 1 D.The packets of which the rate is exceeded cannot be buffered Answer: BD 166 -Which configuration modes are supported by VXLAN? (Multiple Choice) [7A Virtualization sofware configuration TB. SDN controller configuration [7 ©. SNMP configuration T D Automatic configuration Answer 1 AB 16) nel bur tees pata WLS ib nceuatn oma we? Bat Cows) FF neat ng ofan US ta 28) 1 Tel fatima tS tls ese mesa ae ttn pct anc pet ok TG he Shad ma PLS hot andy heb he berth bh an, the ali pei te bet TF Fars PP cats kia een Lay 2 acheter nat Ya An ate, th bd ack led ete te VA 175 DHCP snooping is a security feature that can be used to defend against various attacks, including: (Multiple Choice) TA Starvation attacks by changing the CHADOR field value TB. Bogus DHCP server attacks T ©. TOP fag attacks TD. Manvin-the-middle atacks and IPIMAC spoofing attacks ‘Answer: ABD 180 Which ofthe following trainings are transf-to-maintonance trainings ater project delivery? Multiple Choice) FA. Networking and configuration training TB Routine maintenance training FC. Emergent troubleshooting training D. Management and security production training ‘Angwer: ABC 183 Which of the fllowing statements regarding IP address allocation are true? (Mutiple Choice) TT ACAIIP addresses on 2 network must be unique except wen anycast i used TB IPM addresses are classified into Classes A. B, and C TG. The mask length of 24 can simply network design. 7 0. Vara length subnet mask (VLSM) is often used for determining mask lengths to improve IP address efciency. ‘Answers AD 184_.BGP is an interdomain routing protocol. Which of the following statements regarding BGP are tru? (Multiple Choice) 1” \A BGP uses a reliable transport protocol. T B.BGP supports automatic neighbor discovery. T” C.BGP supports plaintext authentication. I D.BGP supports rich routing policies. Answer: AD 189 Which ofthe following networks are invohed during construction of a large enterprise network? (Multiple Choice) A Backbone network 7’ Transport network TC. Data center network TD. Wireless network TE Storage network Answer: ACD Fa Femicrteston FB iemeton colicin FG caetst 0 Trlestectng asessnent 182 uing he stuctredrtver eleshatng proces, nich fe ong phase ithe ut pated rate ther dapatiers? eChoice) nrwaes 8609 194 Which of he flowing packets are warsritied in uricast mode ding IP adress application bythe DNCP clint and adress location by the DHCP sener?(tpe Cras) TA DHCP Ofer 1 B.DHCP Request FC DHCP Oseoer Fb pHcPAcK ‘nowers AD 195 Which of the following statements regarding border security optimization are true? (Multiple Choice) TA Border security optimization sims to prevent or reduce extemal network attacks and harm. [ B. The optimization position is usually located at the network edge. T © Optimization measures include attack defense technologies, packet fitering, and hardware firewalls, TD. Border security optimization aims to achieve secure user access control Answer: ABC icaly Bend wih te MAC ates of clin th datbae ofthe OHCP see 8 adress that has bee located the cent hat te Pass in he Requested P Aa Opton the DHCP Cisco packet see by the 17 Festal Pade fue bythe senrin the DHCP aes poo TF 0 Onthe ONCE sener ue Exped and conicngPadsesee, you dan mala IP ada, you can assign, Fass ht once cots whe P aster of anther ent 211 An advanced ACL is a series of ordered rules with permit or deny clauses. Which of the attributes can be used in ACL rules to describe IP packets? (Multiple Choice) TA Source IP address 1 B. Destination IP address © C. Port number T D. ICMP packet type and message code Answer: ABCD 212 Which of the following BGP attributes are well-known mandatory attributes? (Multiple Choice) TA Local Pref TB. Next_hop CAS Path TD MED Answer: BC 218 Which ofthe flowag deicedsconey modes a8 supped by Huawel eight astnark management stare? (Mutile Chace) TT By pected P adress FB By spected I acres sehen 7 C.By pected product mde! F 0. Bach igor by Excel i (comaining spciad P acsesses) ‘Answers ABD 219 Which ofthe following are included inthe fll ifscycle quest management of the Agile Controller? (Mutigle Choica) TA Account registration TB. Account approval and distibtion TG Account authentication TD Account auct and deregistation Answer: ABCD 226 Which ofthe following statements regarding OSPF packets are true? (Multiple Choice) [A An interface sends Hello packets immediately after being added to an OSPF area TB. After receiving a LSA Update packet, a router must send a LSAck packet for acknowledgement. T C.LSA Update packets carrying detailed LSAs are sent to synchronize the LSDB. [7 D.LSA Update packets are sent only when adjacencies are established Answer: AC 228 tm nark design, a redundant network topology can be used to prvde highs elabilty for customer senices. ‘Which othe elloningtopeogies can be Use to profde redundancy? (Mute Choice) TA Star topology TB Ring topology TC Bus topology T D. Duatstar topology ‘Answer: BD 230. Which of the folowing items can be used as the tering conditions for historical alarm query on eSigh? (Mutipla Choice) TAlAlaim seventy FB First occurence tine TC Alam soutce 1 0 Alarm name ‘Answer: ‘aco 233 Which of the following are the differences. between IGMP versions? (Multiple Choice) [7 ALIGMPV1 and IGMPv2 do not support querier election, but IGMPV3 does. TB. IGMPW2 and IGMPV3 allow users to leave a group proactively, whereas IGMPY1 does not > C. None of IGMPV1, IGMPV2, and IGMP¥3 supports the SSM model TD. IGMPV1 does not support group-specific query, whereas IGMPV2 does Answer: BD 2 RTA sce despa ad OF ang TB dence it) The maa soc seks ala tate RTA, bat TB ont ‘et have the reassure wth PIM ge pack ‘ch he og ab pres eats? ips Choe) TFA Thee er nia rie ram TB TT RTAcanet eam the RP inoration, Fc Thee eno mies uso RTA to RIB, 0 The RP leaes by RTA is not TB, Anse BD 239 Which drop policy is not inclued by congestion avoidance? (Multiple Choice) TC AFIFO TB. RED T C.WRED Tr D.WFa Answer: AD 241 Which ofthe following statements regarding Huawei network optimization service (NOS) is true? (Mutipe Choice) A Improves network availabilty and performance TB. Improves the productvty T ©. Reduces costs TD. Implements knowledge transfer. ‘Answer: ABCD 244 Which of the following messages are supported by BGP? (Multiple Choice) A Keepalive TB. Open c. Update FD Hello Answer: ABC 248 Compared with OSPF, which ofthe fllowing statements regarding ISS re tue? (Multiple Choice) TA ISHS supports more network typas TB ISAS supports more area types T C.ISAS has better scalability. TD. ISHS supports fewer protocol packet types Answer: CD 252 Ina MPLS VPN network, tno layer MPLS labels are add to data packets before they re ransmtid oe the publ network. ‘iich atthe fetowing statements rearing ive ayer labels ate fa58?(Muliple Choice) TA The cuter lal isthe priate network abel and th inne labels the public network abo FB The MPLS VPN outer label is stituted manual by the LDP protocol The inner abel is dstbute by the peer MP-BGP neighbor. FG. By deter, the outer label in data packets is popped cut before being forwarded to the lst hop. FD The cuter label is used to instruct he PE to send data packets othe corect VEN, Answer: AD 253 LDP uses Discovery massages to discover neighbors through differant neighbar discovery mechanisms ‘Which ofthe following statements regarding basic discovery mechanisms are ttue? (Multiple Choice) TA. The destination IP address of the LDP Discovery message isthe muticast IP address 224.0.0.2. T B The LDP Discovery message is sent tothe specified LDP peer. TF ©. The LSR does not send Hello messages any longer after TCP connections are established. F D. The LDP Discovery message is encapsulated into a UDP packet and its de ination port number is 646, Answer: AD TA Key risk positions TB Risk impact scope T C.Riskimpact time D Loss caused by risks 256 Which ofthe following aspects should be considered for migration risk assessment? (Multiple Choice) Answer: ABCD 259 Which information are included in the DHCP binding entry? (Multiple Choice) T A MAC address TB IP address TF C Lease time D Physical port and UDP port Answer: ABC 260 DHCP snooping is a valid security mechanism. Which of the following attack prevention methods can DHCP snooping provide? (Multiple Choice) (A Defense against bogus DHCP server attacks [ B Defense against DoS attacks on the DHCP server I ©. Defense against MAC address flooding attacks T D Source MAC address check for data packets in collaboration with DAI T E. Source IP address check for data packets in collaboration with IPSG Answer: ABE 262 Which packet information can be used for complex trafic classification? (Multiple Choice) TA Packet length 1 B. Source and destination addresses TF ©. Protocol type T D. Source and destination MAC addresses Answer: BCD 263 Which ofthe following statements regarding BGP route advertisement are false? (Multiple Choice) [7 A Allthe BGP routes leamed from all BGP peer will be advertised to other BGP peers. TB. Only the routes leamed from IGPs can be advertised to other BGP peers. © By defauit, the routes learned ftom an IBGP peer will not be forwarded to other ISGP peers. T D. Only the optimal routes preferred by BGP can be advertised to other BGP peers Answer: AB 288 PLS uses LOP te poe ret abel ston medes. ‘nih ete falowag serene egg LOP bel Grin corte mo ease? (ule Croce) (TA LDP abl dtatin canbe eaten orcad mode hp SR 5 In reredmede, when a LS the ig of ots, can sn abel mapping messages ta he ups terial a oes et eo at abel mapping messaps on TFC. LOP abl stration amet be corals in independent mode 0. nindepecent mec, an LR cana sen ae mappng messages tothe vstiam eter ble ee ont hops abe mpg massape tom the 214 Hf there. ave no receivers on a PIN-SM network, which of the flowing routers wil have multicast outing entries? (Multiple Choice) TA Source OR 1B. Recewers router FC Lasthop outer TF D.RP router ‘Answers AD. 276 Which of the following contents are included in a project implementation solution? (Multiple Choice) TA Time plan 1 B Personnel anangement FC. Migration process D. Risk control measures Answer: ABCD 278 Which othe folowing statemorts regarding muticast fase? Mute Chics) [FA Unicest nd broadcast technologies cant mplmentpoit-o-muiprt rnerissin. Only micas clog can implement his eich, TB Mutcast technology is appeabie o most of port to-mutpit dts ransmsson applications. F © tutes chine Based an TCP sian ence eho anarssin of acts, techrley an reduces educa aia conse banat on 8 er Anse: AC A Migration preparation TB. Migration implementation 7 C. Rollback solution [> D. Contingency plan 281 Which of the following contents are included in a migration project solution? (Multiple Choice) Answer: ABCD 286 Which ofthe following are highlights ofthe Senice Chain component of the Agile Controller? (Multiple Choice) TA Senices are orchestrated based on the Layer 3 GRE tunnels and sence devices can be deployed flexibly TB Senice orchestration operations are visualized in the topology. simplifying the confguration and management. C- Adding or deleting senice devices does nat change the physical topology ofthe Ive network and existing routes. F D Sewices are orchestrated automaticaly, without the need for manual maintenance. Answer: ABC 287 .Which ofthe following statements regarding BGP route selection rules are true? (Multiple Choice) TA The route with the higher local preference is preferred. 1 B.A summarized route is preferred over a non-summarized route. TF C The priotties of three Origin attributes types are in the following order: EGP, IGP, Incomplete. D. Among the equal-cost routes, the route with the shorter Cluster-List is preferred. Answer: ABD thon he scose hemo aga och ih long semarte Staats Ces [7A The DHCP chr bates aOFCP Ose pak TOMO ate pete [8 The DHCP chon anes buna a OHGP Rees pact certain te P ens ane at tin, oe nl ee oan Dyce Beco oe ah I daca DHCP com ct HE ra nH eh oti hn as dr tg 11 9a DHCP Reet ch ONP re aHO HEKca te e a 301 Which of the following BGP routing policy tools can filter routes? (Muttiple Choice) TA ip extcommunity-fiter TB. route-policy P C filter-policy PD. peerdist Answer: ABC 303 In VAR application scenarios, which functions ofthe AR Router can be virtualized on a sever? (Multiple Choice) CA Firewall 8 vor 1 c.NaT F D.VPN ‘Answer: ABCD ‘304 Which ofthe fllonng statements regarding well-known attibutes ae true? (Multiple Choice) FA Well known atiutes include well known mandatory attabutes and wel known transite attributes. FB. BGP must iden all wellknown atbutes. F ©. Welbknown mandatory attributes canbe ideried by all BGP routers and must be cared in Update messages. TD Weltknown discretionary atbutes canbe dentifed by all BGP reuters but donot necessary to be caried in Update messages, Answers BCD 305 eh the ong ttent eug mutica! NAC asses ae fae? utile One) Tr Ths high 2 bt the macas MAC ates ae Ox 05 te 29H bi edt, anche lows 2. he MAC as map othe 2s une rina Pease TB One ancas MAC ass maps 032 micas Paosses FC Amant MAC attess eres shore» micas gap onthe dts ink yer TF D One mast MAC aess map tony om mutica des. pooner: AD ‘311 Which ofthe following statements regarding BGP route advisement rules ate tue? (Mutiple Chics) TT -ACABGP Speaker advertises all BGP mutes to new peers immediately ater they establish BGP connections TB ABGP Speaker aderises all BGP routes tots peers FC Generally, hen multiple mutes exist, s SGP Speaker adds ony the optimal mute into its muting table. DABGP Speaker advertises the mutes leamed fom an EBGP poe ll BGP peer, including EBGP paers and ISGP pases ‘Anawart ACD 316 What are the basic work process steps of SDN? (Multiple Choice) TA. Collect network topology information TB. Collect NE resource information T C. Collect fonvarding information T D. Generate routes for intemal exchange Answer: ABD 318 Which of the following are roles in port mirroring? (Multiple Choice) A Mirrored port TB. Local observing port T C. Remote mirroring port D. Trunk port Answer: ABC $20 How des an IGMPY2 rue matin gop membership onthe local netwksegren? (utile Choice) [TA Areatr marian a timer for ack up membership and paodcaly rests he vert receives Repel essoges to reco hosts, Khe tina ola gp members ines othe ode tes he goup amano. F' Areatrpetodeay sends Query messages, an cen tots rend Reprt messages ar recetig the Quay messages. TF © Aut: peodaty sens Group Specie Query messages peredcaly. 0 Arter mt soe any goupmemtarehi ness teste ear messages Answer: ABC 4322 An SR suport aro le retention roses. ‘ich fe fatowny sates rgarang ne eral mode ae te? Mute Choice) (A AnLSR reser al bel sat by i eight TF B The brl mode requrea mare memory ardlabel space TT © AnLf retains labels fom a righting LS ony when the neightoris is met hap TT D Tis late retin mode saves the mamary and le! spac. B. This labeleteion ase reduces the LSP comergence time when he P routes comeige andthe ext hop charge. Answers ABE 323. Which of the folowing statements regarding the OSPF protocol are tre? (Mukiple Choice) [F(A ‘An OSPF topology has three endpait types: router node, stub newark Segment, and transit notwork seg FB A broadeast network segment or a NBMA network segment with at least two routers area type of transit network segment FG. The detaut bandwidth rafornce value of OSPF is 100 Mei FD. The cost fom a transit network segment tothe router connected to this network segment is 100 ‘Answer: ABC 326 Which problems ofthe single spanning trée network can be soWed by MSTP? (Multiple Choice) IA Some VLAN paths are unreachable, TB. Traffic cannot be load balanced: I C. The secondary optimal path is selected. TD. Improve the network reliability Answert ABC 481 Which fo foning LSPs ae established in Dounsteam Unsokted (OU) label ators ment mode nd adres lel dstinon contol mass, iMate Croce) TA Wien the edge rode nds 2 ew destination acess in ring nl that doesnt blog to any ising FEC, the ede ode dos dt ate tng an FEC a be and adeising tend alsonsip tothe nab SR hae aa {or stron alcatel rhe FEC an snd 2 bs mapping message tothe vpeteam rade TF 0 ter een alae mappg masta. the LSA ate the cnesponig ey ote abel lorardng ale ‘asm: 80D 324 Which ofthe following aspects should be considered during preliminary analysis of a migration project? (Mukiple Choice) TA Necessity 8 Feasibiity FC Risks F .costs Answer: ABC [341 Which of the following commands can display OSPF neighbor infocmation onthe VRP platform? (Mutiple Choice) TA liplay ospf poor TT’ display ospf interface T 6 display ospfisdb TD. display ospf routing ‘Answer: AB 342 Which application environment of following is NFV often deployed? A Data center TB. Network node T C. User access side T D. Client/Server Answer: ABC 345 To avid global TCP synchronization, which congestion avoidance mechanisms can be used? (Multiple Choice) TA RED PB wreo FC Tali drop TF o.wra Answer: AB 348 In a route-policy, which of the following BGP attributes can be used in apply clauses? (Multiple Choice) TA Local Preference TB Tag 1D C.MED PF D.AS Path ‘Answers ACD “4S Which ofthe folowing satamentsregaréng P2MP network is te? Mule Coie) TF na P2UP pata aovees wah fart masklenghs cant establish nghor aonb thi ration ca be enveame use he 66 ospmatkignre command TTB ina POMP natnark. OR and BOR nad be lated 17 OSPF does not rear network as POMP neterk ype by deta regress of any nk ayer protocol A POMP netork must oily changed rom the two eho. [FD ina POMP natok atk LSA canbe Gre using the fiterem ot peer command ‘Answers ACD 360 Which are lower-layer physical devices of NFV framework? (Multiple Choice) A Storage device TB. Network device TP ©. Sener TD. Air conditioning system Answer: ABC 352 A DHCP server allocates IP addresses to clients. Which ofthe following steps are required when configuring a DHCP server? (Multiple Choice) [A Enable DHCP globally B. Configure the DHCP Option 82 field. T C. Configure the global address pool ifthe DHCP server based on the global address pool is used. D. Configure the interface address pool if the DHCP server based on the interface address pool is used. ‘Answers ACD 365 Which of the following Hello packets are used in IS-4S? (Muttiple Choice) TA Levelt LAN IH TB. Level-2 LAN IIH T C. Level-3 LAN IIH TD. P2P LAN IIH Answer: ABD 366 Which of the fllowing are possible causes for an MSTP failure in a LAN? (Multiple Choice) TA\MSTP is configured incorrectly 7B A physical link allemates between Up and Down, triggering the device to send 2 large number of TC packets. FC The MSTP-enabled device receives MSTP TC packets that are transparently sant or from the client FD. The proity ofthe pot in the specified MSTIis not configured Answer: ABC 357 Which ofthe folowing statements regarding Network SummaryLSA are true? (Multiple Choice) TT A Link State ID in Network-Summary-LSA is set as the destination network IP adress TB. Net mask in Network Summary-LSA is set a the network mask ofthe destination network segment TG. Metric in Network-Summary-LSA is set the cost ofa route fom an ABR to a destination network segment TD .Network-Summary-LSA is generated by an ASBR Answer: ABC

You might also like