You are on page 1of 44
Ses poe went ncn ae cmos. ‘Whehofne oer srs ove? it path BPD pen eb RT SP he ech a ep np asp STP aon [© There dota po ats ents eho taconite anges TC Warm eit pr eld ah et cto nines ops RST OPO at ast cag sen sata acts Hie at oat [0 RST us ths eta pea tn, atl acon rs eh Ferg se TE AT ptr ead yore eects och pene TEPOD win actin pd 5. Which of the following statements regarding the firewall zone security level is false? [7A The default security level of the new zone is 1 TB. Only the security level of the user-defined zone can be configured. ©. The configured security level cannot be changed T D. Two zones cannot be configured with the same security level Answer: A © CREATEI 6.Which information of labels is used for simple traffic classification? TA DSCP priority 1 BIIP precedence T C MPLS EXP priorty T D. 8024p priority Answer: C 8.Which ofthe following statements regarding Huawei eSight network management sofware is false? TA Multiple users can be created focmetwork management TB. Users may be asked to log into eSight from specified IP addresses in specific time ranges. TF C. The administrator can force unauthorized login users to log out D. The login time of the administrator role also can be limited. Answer: D Son scum ups vr nto, 1a F2taanctapc tat VPAFE ces VN 1721 1024 a, cans SR si SA he oh 10.At which layer does a packet filtering firewall check data packets? TA Application layer 1B. Physical layer 7 ©. Network layer FD. Link layer Answer: C ‘Inthe Ale Canrles acess conte scenaio. Wich ofthe flowing statements regaring theres ofthe RADWS sere and cert is tue? TTA The Agle Convo regrates al faretions ofthe RADIUS sere an eet FB The Agle Coole 2s the RADIUS sener, wh the use termina as the RADIUS chen TT The authentication dei such a5 802 1X swich as the RADIUS seve, wile the user terminal asthe RADIUS chen [* D-The Agle\Contoler as the RADUS sane, his te athrtiestion doce (euch 502K teh asthe RADIUS clon answer: 0 48.What happens when the topology of a network running RSTP changes? TA Packets are flooded on the entire network. TB. The aging time of MAC address entries is changed. TC. Some MAC address entries are deleted. I D. The entire MAC address table is deleted. Answer: C 16.MPLS performs diferent actions on labels. ‘What is the meaning of the pop action? 1A. The top label is removed from the MPLS label stack. I B. The top label is added to the MPLS label stack. I C. The top label is replaced with another value T D. The top label is replaced with the label of another group. Answers A 17 rmost eases, on Paces thats dmanicaly assigned Winch ae ehowng staemerts egadng te P sdaess a (TA The lease renewal timers SO af he lease When the ease ehewal tier exis, he OHCP sete must even the P aes lease TFB Thesebacdng nei 7 58 ofthe tt lease © the ratinding time eos but the DHCP cht does ct ec ay responses fom te DHCP sere, the DACP clit keeps sending DHCP Request packets oe DHCP ste hich assigned an adres oer, ut he ttl ase expe. 7 ifthe OACP crt ecevas@ DHCP NAK pocket win the lease, the cent tps using he cure adeess medi andretus tothe inisizabon state. The OMCP clan than apps fr new Padres. Aosners © 18 Manin she-mide attacks or IP!MAC Spooting attacks are common on intranets and wil cause information leakage \Which cofiguation method can preven these attacks? A Configure the trusted or untrusted interface. FB Limit the maximum number of MAC addresses that can be leamed on a switch interface, FC. Configure DHCP snooping to check the CHADDR field cared in a DHCP Request packet F D. Configure association between DHCP snooping and IPSG or DAI on the switch. Answer: D 20 Which of the following commands can leak routes of Level-2 areas into Level-t areas? 7A import isis level-2 into level-1 TB. import-oute isis level-2 into level-1 TC. advertise isis level? into level-t TD. export isis level-2 into level-1 Answer: B ‘22.Which ofthe folowing BGP attnbutes can define TA Origin 8. Community T C.AS Path T 0.MeD set of destination addresses with the public characteristics? Answer B 23.Which command is used to enable association between BFD and VRRP? T Acwnp vrid 1 track bfd-session session-name 1 reduced 100 1B. bfe-session wrp vrid 1 track session-name 1 reduced 100 T C. track vip wid 1 bfd-session session-name 1 reduced 100 PF D. wp wid 4 track bfd-session-name 1 reduced 100 Answer: A 26\hen a Huei eter senes as an SSH ct and atemgts blog into anther Huan mater. the loge as. tis suspected that the SSH Sener onkgation is naect. ‘iti fh Stowe eases fete most poset fr the cen fat? ITA The SSH ptacl isnot bound inthe VTY ue etece ew F 8Tho sar sane yp, athetaton ype, and ur secs type ae not congue 1F -The SSH Sener and lent haw neansstert erin TF The SSH festime auentcstion fiction is 8b ‘newer: D 2 neh te loig stamens prio saticLACP ote a as? TT A He ph bon eft ik even Wo ect cmecied Seca ogre De ete desc bs sup LACP you cn yee ‘ran a aacing mace TBs LAC te, gw ACP yes i ye Mh pay cnn eae TTC Th nerace ht ead tai cal hain nace, wheat ta dost nd iti adhe main tric, The 2357700094 70 sychs we Huon 's mou canes sees, Congued tn ne 7700 taragesostne SON ha? 1 The 5570 pone moe sane trace FF 8 The S700 spp non ong atari TF 6 The ss00supprs ne esdaney en for engies, owe maces, aan TF 0 The S800 poe nts exter atres sch Tangent ramen often (TRL ar Fite Chan! wr tae FE) domes 8 31. Wich ole fotonng causes fora VARP top twosastr fa isthe mot impossite? TTA The configurations of he devces tho VRRP grup ae erent 18 Thelinewhore VRRP Aawnitmnt packet frame ty TT © The VRRP Atvetsement packets rected by the VRRP backup group wh a lowe port me tan as ina packets and ate Ciscoe FD. The maser deice sends a VRRP Adterisemert packet ey 1 second ‘asm 32 Por isolation provides secure and flexible networking solutions for users. ‘Which af the following statements regarding por isolation i alse? TA. Per isolation can be used for configuring Layer 2 isolation. TB. By default, interfaces are isolated at Layer 2 but can communicate at Layer 3. TTC. Befoce the por isolation funeton takes efect onan interface, the pot isolation function must be enabled TT D. The por-isolate enable command can run in the system view. Answer D 33 Which of the following is the function of MPLS forwarding equivalence class (FEC)? TA. The FEC determines forwarding of IP data packets on the MPLS ISP. TB. The FEC determines establishment of LSPs. 17 C. The FEC determines the mapping between LSPs and IP data packets. 17 D. The FEC determines how label addition on LSPs. Answer: C ‘37.Which of the following statements regarding the delay and jitter is true? TA The jitter is relevant to the detay: TB. The jitter occurs because the EZE delays of data packets in the different flow are different. TC Along delay indicates a shor jitter and a short delay indicates a large jitter TD Jitter is independent of delay Answer: A. 45.Switches run the MSTP protocol by default. ‘Which of the following statements regarding the default status is true? A All switches run in the same region by default. 1” B. The STP calculation speed is faster than that when multiple instances are configured TC. Due to lack of configuration, all switches switch the running mode to RSTP. TD. Each switch runs in an independent region. Answer: D 48 Which of the following statements regarding OSPF neighbor relationship and adjacency is true? A OSPF routers must establish an edjacency before exchanging information. 1 B Not all neighbors can establish adjacencies. TC Adjacencies are maintained using OSPF Hello protocol D. Neighbor relationships are selected from adjacencies to exchange routing information. Answer: B .49.Which ofthe following stataments regarding the operation window time for 2 sotware upgrade is false? F Ais determined by the accepted serie imemuption duration. tt must be longer than the upgrade execution time. FC. Troubleshooting time must be reserved TD. Only network maintenance personnel neod tobe natifed of the operation window time, while the customer doos nat. Answers D © CREATED BY M.AAMIR ‘51.Which ofthe following operations is performed inthe risky operation process? TT A Solution formulation TB. Authorization obtaining TG. Technical eviow T D. Implementation and result feedback Answer: C £2,o impzoe STP runing stably a network administer wats to congue soe STP features or protection mechanem on suitches ‘Which ete fotoning conigurstionoadrps i cect? TA Cong tne user acess potas an edge pr to prover the use oi connecting tothe swich onthe Fe. FB Configure cot protection onthe usec access po ensue that the user dss not connact toa switch with a higher pty TT ©. Congr teap protectin on postions where leaps have occured so tat loop ae always Hocked D.Conigure BPDU protection so that the sith checks he vay ofeach recsved BPDU to peeve attacks of orged BPOUs. newest 8 ‘55.0n the bods between an entrprise network and its extamal network, which ofthe flowing devices i deployed athe temo sie fhe ‘emtepisenetwok? CA ws Fars rerw Proven Anowers © '57.Which of the following statement regarding IEGP and EBGP peers is false? [A Two BGP-running routers must have IP connectinty if they need to establish a TCP connection. TB. ftwo BGP peers exchanging BGP messages belong to the sam AS, the two peers are IGP peers T C.ftwo BGP peers exchanging BGP messages belong to different ASs. the two peers are EBGP peers. T D.IBGP peers must be physically directly connected Answer: D 60 During network design, VLANs are assigned in many ways ‘Which of the following ways is seldom adopted? TA. VLAN assignment based on the access device type 5. VLAN assignment based on the access location TC. VLAN assignment based on security system requirements I D. VLAN assignment based on service design Answert A 62.How many bits does an MPLS label field have? TAB rB3 Cet r v.20 63.AR series routers provide various slots. ‘Which of the following is not included? TA. SIC PB wsic C.HsIC Tp. xsic Answer: C 64.The project scope can be determined from three aspects ‘Which of the following is not included? [A Functions and modules to be realized by the project T B. Geographic range of the network T C Investment budget of the project T D. Responsibility division between the project and other matching systems Answer: C {67.0n a large-scale network, some switches run MSTP and some switches run RSTP Wan MSTP switch detects that the neighboring switch works in RSTP mode, which mode does the MSTP switch work? Case 8.RSTP rc MstP F D.Uncertain ‘2,Mich lo floning atoms egadng MUX VLAN tos? TTA. The MUX VLA consne a pnp VAN ane subrsinae VLAN Te rcp! VLAN and subst VRAI cana communicate FB Te MUXVLANcomais a pielpd VIAN and auburdste VLARS The stone VLAN ae clit subertate spate LARS and ‘subrcnate goup VLA. The east nthe sburintegoup VLAN can conmusiat wih chet TC Theireaaces baton suboinate separate VLA can conmutcate wth each ar bu cane carmuricato wt eines inthe nil VAN TF'D The pica VLAN and suboriate VLAN canrtconmancte Ponvar 8 72.Which of the following is the purpose of management security optimization? I~ A To ensure that sensitive management information will not be intercepted 17 B To prevent or reduce extemal network attacks and harm. I C. To ensure secure access to key senices I” D To achieve secure user access control Answer: A say 73.How is OPEX defined? 1A Maintenance cost TB. Total cost of ownership (TCC 1 C. Operating cost T D.O8M cost Answert C 76. Which ofthe following statements is false? [FA Acdevice with a higher router priority has a higher election prionty FB ftwo devices have the same muterpronty. the device wth a lager outer ID has a higher election pity 7 tthe cument OR fale, the curent BOR automaticaly become new DR, and @ BOR willbe elected again D. When a muter withthe highest router priority joins an OSPF network, this outer wil become the new OR Answer: 18 ONCP uses eet ype of packs to mcement ite rcs. Which ate tong ste neon etka OHGP Or packet? (TA The OHGP Ofer packs re tossae By the OCP ce to dec natal senor TT & The DHCP stra sands ONCP Gr pachate to expndo the CHOP Bacon pchats set by ha OH chan, pnng eqs conguraton TTC. The HCP cient sends 3 DNCP Ofer pacha tothe DNCP sener to request confguatonpareneters coniguaton alnowedperen of tatenson of he P aes ease TTD. TRe DHCP sen sends « OHCP Oech othe cent. caning conkgaton params sich athe Pls 80 Which of the following BGP attributes is Huawei's unique attribute? TA Prefval TB. MED TP CAS Path TD. OFgin Answer: A 81 Which ofthe folowing command is used to-apply the trafic policy to an interface on an AR router? A trafic-policy pt inbound TB. traffic classifier pt inbound TC. trafic behavior pt inbound TD. senices-poicy pt inbound Answer: A © CREATED BY M.AAMER 82.On seater ening STP. same dees use STP. \Vinen SYP nated sntches detect atopy change hich maha i sky ne RSTP-naled athe ty STP anal uth be tego che? TT RSTP BPOUs wn the TC ae wed 17 8 STPBPOUs wiht TC eared FC RSTPBPOUs win the TCA weed TFB STPBPOUs withthe TOA ae used 83 On the USG series firewall, what is the security level of the DMZ? Cas B50 rcs T D. 100 Answer: 8 14 Duing MSTP woteshotng.the Spl euantconiguation commands etecuted to casi he configuration fle ofthe dice We ete losing statements sale? (7A Checkthe per coniwaen vet th the MSTPenables pots cane for example, using the penal command) 0 Send prac pelos TF © The por conaced toa usr doce hs MASTP dated ois congue athe oe po. TT © The BPOU tune contguaton has no impact on STP TF haceisar einen i abees tate eonact VA Answers © 85 What is the broadcast domain of VXLAN called? TA Broadcast domain TB. Switching domain T C. Bridge domain TD. VLAN domain Answer: C £86 The firewall and router can both implement Security defense functions and replace each other. CATRUE CB FALSE Answer: F 87 According to BGP route selection rules, which is the correct Origin attribute prionty order? 1 ACEGP > Incomplete > IGP 1 BLIGP > Incomplete > EGP I C.IGP > EGP > Incomplete T D Incomplete > EGP > IGP Answer: C {8c te ong tarts regain PSM Hl pckts i Tr f\On PMSA nek mutica (ues ht he js stated toed torsos to messages to acon ibs and mtn sgh TTB Mutcast odes pineal snd Hello messages to cach tra matin ommucaon TFC ADR sateen aac epee tated on Helo messages exchanged een FF 0 Malo messages ae ents muicat goupaaecs 226005 posweet 0 {88 Which fhe folowing statements raring MAC ads spoofing stacks is ee? TT Attackers itiate MAC adress epading tacks using the MAC adds learning mechanism TFB. Attackers send data fares vith ora MAC adess tothe swizh to intate MAC adress spoting attacks TFC. When MAC adoss spoofing attacks occur, the switch may lam incorect mapping between MAC addresses and P addesses. TF D Wen MAC acess spoafing attacks occur the ston may send packets tothe stacker Anowers © 90 MPLS.VPN is used to sohe some limitations of traditional VPN technology. Which are the major limitation that MPLS VPN solves? 1A. Private routes cannot communicate with each other. T B Leased lines are expensive. T C. Bandwidth resources cannot be fully used. T D. The address space is overlapping Answer: D- ‘51 Which tte owing staat egg te STP contguion is ts? TT ATP atonatealy runs by aa and ere does rt equate cation IF 8. The STP commence sued ison whch may cause network nteraption Terr, dating STP 2» plored sotion TFC Sint the plement fing resecl ea fs bewaun ewiches canbe agusted by mesg ink costs 170 Fotrouine STP cortuatin,te poston ofthe SP Blocked pots conte ensue tha the Heche pt rt eae en a backbone nk TE. TheRSTP alps ipl ant la note 32a fat caregence. tee, a ates onthe new e conigued to warn RSTP ‘sues 0 52 Which ofthe following statements regarcng QoS packet oss are false? FA When 2 outer recenes data packets packet loss may occur becauséthe CPU is busy and cannot proces data packets TB When data packets ae scheduled to queues, packat los may cécur because the queve isl TF C.When data packets ae transmitted ona link. packet loss may occur because of ink fut. TD Packet loss i generaly caused bythe delay, the tal dop packet loss may occur because othe queveis fl ‘Answers © 99 Which othe folonng statements regarting route selection tose false? TF 6 An accece contr! het (ACL) matehesrvtngfomaten or adéessas i dota packets titer et routes or dota packets tat donot mest ‘matching conditions TFB. An IP prox matches destinaton addresses of utes or rcty apps to rote obec gate) ©. AnASPath iter matches the AS-Path att in BGP mutes, soi can only fer BGP mses, TT D.A conmuny-ter matches community atte in BGP routes, 50 can only ter BGP mates. TE Aote-poley can only match mutes and data pacts, but cannot change oueatibutes or forwarding Bohayrs fr data pacha Anowers E 94 Which of the following authorization items is not required for risky operations? TA Management authorization TB Technology authorization F ©. Customer authorization T D. Administrative authorization Answer: D 95 Which ofthe following statements regarding PIM-DM is false? FA PIN-DM stands for Protocol Independent Multicast_Dense Mode. I jg’ dense-mode multicast routing protocol TB. PIM-DM assumes that each subnet on @ network has atleast on receiver station interested inthe multicast source, TC. PIM.DM uses the gra machanizm to restore multicast packet forwarding proactively. D. PIN-DM does not have periodic food prune processes. Answer: D. {96 .Compared with trafic policing, trafic shaping uses queues to cache the traffic that exceeds the limit. ‘Which ofthe following statements regarding traffic shaping is false? A. Compared with trafic policing, traffic shaping has good anti-burst capability FB Trafic shaping enables packets to be transmitted at an even rate TC. Because queues are used, the delay is added when congestion occurs. TF D. Compared with trafic policing, trafic shaping is more suitable for woice services 98 .Which of the following statements regarding virtual ink is false? TA Ifa virtual link exists in a network, network design problems often exist and need to be optimized TB The existence of vitual link increases network complexity. C Virtual link may lead to loops. D. The interval for sending Hello packets on a virtual link is 10s. Answer: D 100 Which ofthe following statements regarding the network command in BGP is false? FA The routes injected using the network command must exis in the IP fouting table FB The routes injected using the network command must accurately match the mask length inthe I roiting table. TC. By default, BGP does not adverse any local route T D. The network command cannet be used together with coresponding policies Answer D 102 Huawei enterprise network NMS eSight has three editions: simplified. standard, and professional. Unlike the standard ecition, which of the following features is provided by the professional edition? (A Provide a database backup too! TB. Support mutti-user management C. Support management of the WLAN and MPLS VPN T D. Suppor hierarchical management model Answer: D. 104 ich atte tong statements eget ther i tt SPFFAUTFALOO) [1 3612134 1526) A pacha recone on arama SSpteeton se tented) ant porch Pe al stony aan ipacress, Ad rssiasthiefocesnder] Process w[pcessid Router ser PackeSie~(soucetp aes], Scegcronypeeooype Pocttypeeche el anane fsince sare TP ncoreet maface abortion eonigae TFB Inconsistent Hel inane TFC Unmatched ste maser TF Otncoreitet sea De 106 Which of the following commands can enable ISS on an interface? TA ip router isis 100 TB. router isis 100 P C.isis enable 100 T D route isis enable 100 108 ich ofthe otowing statements regarding VRP sae? [The Vituat utr Redundancy Pcl (VRRP eg rtwéweh micas nd broadcast capes, suchas Etat netwa [VRRP cues tha thet hp roe ant ace by anche tter #0 al waented a able commune is guaatens TT 8. When VRRP se, he ual utr ID and wal P aes ned to be congue ot he ou, the MAC ade ofthe master ote se, soa yun ris add on th atc TTC Hosts on he network communicate wth th wal oe. Thee isn neato eam a nomaion physical oes onthe newer. [0 Avatar conse fone master er ard zeal bch etre. The master oer proves nara incon When the macerroter fats backup utr becom the new astra natates ot te wae 109 Which ofthe following information can be learned based on the industry background of the project? A Gommon solutions in the industry 1B. Problems to be resohed by the project TC. Organizational stricture of customers TD Implementation scope ofthe project Answer: A 108 nih ne owing statements rgucing VERE i ae? Tf The Veta Router Rene Pataca (VRRP) scsi sti wth WRAP ensues thatthe nxt hop route can be repaces by ate ot asso TB When VSP i used. he wml aerD ao Pasa span oe ed on te note anc toadcascapables. suchas Eten! netuas ‘uterptd and eae coneuncabon'sguarted edt be coriguod eo the et, the MAC ass othe master uteri use, TTC Hone onthe stk cmmamcate wih the wits tr Ther ened i lam al ncmation of physical tron he netmask Tr 0. Avis route consists on mast ete ad several Bacup fours. The ase ue owes oar unton When the master ter fats, bck router becomes the ew maser ete an tales ow fs wok poem: 8 109 .Whict of the following information can be teamed based on the industry background of the project? [A Common solutions in the industry TB. Problems to be resolved by the project FC. Organizational structure of customers FD. Implementation scope of the project Answer: A, 1110 Which ofthe following statements regarding the software and configuration backup is true? A. The software version needs to be backed up for multiple times forthe Same product and the same version, TB. Licenses do nat need to be backed up. F C. After the device configuration changes, the configuration file does not need to be backed up. FD. Backup is used to restore network functions in extreme cases Ans 111. MSTP hae erent por roles Which statoments are false? A Other pots except the edge pt paricipate in MSTP calulaton T B.A pot can tinction as diferent roles in dierent MTs. FC -Arogional edge pot is located atthe edge ofan MST region and connected to pots of ther MST regions or STs FD. The Backup port functions as the Backup ofthe roct por, and provides a pth fem the designated brig to the oat bilge ‘Answers D 114 How is CAPEX defined? TA Cost expenditure 1 B.Captal expenditure I C Onetime expenditure PF D. Daily expenditure Answer: B 115. Which command is used to enable association between BFD and OSPF on all interfaces? A bid enable 7B. bfd all'nterface enable 1 © allinterface bid enable T D. undo bid allinterface disable 118 Which of the following is the purpose of access security optimization? 17 A.To ensure that sensitive management information will not be intercepted TB. To prevent or reduce external network attacks and harm, T C.To ensure secure access to key services. I D. To achieve secure user access control. Answer: D "120 Which of he fallonng statement epg te MPLS fang proces is se? 1A fa LSP fais oer ea, the UPLS canto ane espnstle fo SP Stu can detec this er FB The man tron of PLS tary pan cn ad lal dlte lls fom an IP pact and oad erected pacats based the label ‘orwardig table. The forarng pane is comactinn cnet TFC. Afar an © pacha eter he MPLS natare he nates LER wal analyze tha P packet anda proper abso the packet 7 0 MPLS can use Png or Tacerot odtet LSP errs and lea tut nodes. newer: 12) ett ig tears gen AS Phi as? FAAS ah iabt ofA at BO rae paces tog 1 B.AS Pah aay imp liver mat buen SGP FF ecP errr acest ne raee wore AS Pat stot FF Wwe avatr far oar now atte sane esi, er conpe he Aa atts thane rates dt a th ne eye ASP ate 12 Inthe ACL coniguation command a ruber | taut [atchréer {up con. the adrumber parameter species an ACL number. Wich afte fotowng ene ange of bane ACL bers? A 10003998 Te 20002000 7 © 30003880 F 0.e-000 Answers 8 124 whan two BGP poe exten a TCP cennscton nara but thei AS numbete and BGP versione ar consent. 8 EGP poer tan ands 2 Neteation message to sasannact the TCP eevnecton er hey etabich 2 TCP conection and exchange same mation Wich message il be etd a mconect dong negotaon the Eat Code othe Notion message? TA Rowtetesh TB. Open FC keepane FD Update newer 8 127 Which of the following statements regarding isolation is false? [7A Patt isolation controls access between interfaces of switches. TB. Port isolation prevents the computers connected to diferent interfaces from accessing each other. TF C. Port isolation can be configured based on VLANs. TD. Pott isolation is an isolation mechanism at the physical layer Answer: C 428 Which of the following statements regarding ASBR-Summary-LSA is false? TA Link State ID indicates the router ID of an ASBR. TB. Advertising Router indicates the router ID of an ABR. I C. The Advertising Router fields in ASBR-Summary-LSAs of all areas are the same. T D. Metric indicates the cost of routes from an ABR to an ASBR. Answer: C 129 ima DHO® chet ass tee ater BT 5% the as is cached hich acts used bythe cet been the aes FA Dice Discover oadcast pect FB DACP Release uiast packet TF 6 DHCP Reqnet broadcast packet FD DHCP Reauest unicast packet nso C 120 RSTP provides multiple protection nctons. For example, wen an edge ports conBgured to workin protection state, how does the edge por process the receied BPOUS? (A The ag port forwards BPOUs FB The edge port éscards BPOUS, F © The edge pr is shut down. [TD The edge port parses BPDUs to obtain corespondng information. Anawet: © 4134 Employees inan enterprise ten need to connect tothe enterprises intra et for remote access when going on business. |Whech ofthe flowing technologies can mest tis demand? A MPLS VPN 1 B.PSec VPN Tc sswven F 0.1SON Dian Answers C 128 To pie iteomited senics fr leet uses, users or series are cassie based on pach inomaton such asthe packet pry, souce, IP ates ane po rue ‘ier Gos techs ar ten used implement laesicston? FA Trae ating 6 Complex ae classicaton TF © ongestenaeidance 0 Congesten managment sue 8 139 Which of the following tests is not performed in the joint software commissioning? [7A Connectivity test TB. Standalone device test CHA capability test TD. Senice performance test Answer: B 1140 Which ofthe following statements regarding the OSPF protocol is false? 7 A-An ABR is connected to multiple aréas and maintains the same LSDB fr all areas. T7'B The metric of an AS-extemal-LSA can be spectied during the import of extemal mutes and defaults ta TC. Extemal muting information can carry @ ta, the tag information is contained in a Type 5 or Type 7 LSA TF D.The Link State 1D in an ASBR-Summary-LSA i set as the muter ID of this ASBR Answer: A 142 Which of he following toms isnot the diackartage of the tational congestion avoidance mechanism (al rop/? FA Gltal TOP synchronization 7B High ter and tong delay T C.High cost TF D Packets ae discarded without diterentiating the priomty Answers C 4146 On the network running STP, when the network topology changes, mutiple topology change notifications are sent, How many types of RSTP TC BPDUs are defined? TA One F Btw FC. Three F 0.Four Answer: A, 147 Which commend is used to enable associetion between BFD and OSPF on all interfaces? A. bid enable 1B. bid alh.interface enable I C. allinterface bfd enable 7 D. undo bfd allinterface disable Answer: B (© CREATED BY M.AAMIR "148 Which fe flowing i ot he entation of aiona networes? TTA The newark protocol impleertaon's complex, andthe ORM is det 178 The wai path camo be ajsted Nexiy TT ©. The upgrade of now network soca is slow TF Orert vendors dewces pre srr mplertatin there is les france in operation commands, and operations are cay. Answer: D 449 Which of the following causes will lead to.a failure to establish BGP peer relationships? [A An ACL is configured to prohibit all TCP connections between two BGP neighbor. TB. Two ISGP peers are not physicaly directly connected. [- C. BGP synchronization is enabled on fully: meshed IBGP peers TD Two BGP peers are configured with diferent routing Update intervals. Answers A 152 Huansisches proce pon isto ich fe flowing Eatemees egung pn isolations le? (TA You can congue Layer 2 and Layer oaten a Layer 2sltin an Layer 3 tevating TF Huawe swaches suppor 6 olen groupe rumbere O03 [FC tmeface Ais soled tom retaceB, packets ert tm neface A canna reach eteface , bu pockats set Hom eteace Bean reach snetace TT 0 FE inteaces, GE itedeces, GE eteces, and th Trunks can be lacaed fom one another, bt an iteace carat be inltd tom ue or ‘rota maraperetnatace waeechonay Ivan, a Eth est canal be elated uceconaly Rom #3 arb wteaces Asner 8 oc 155 Which of the following formulas is used to calculate availability? [7A MTBFIMTTR x 100% 7B. MTTRIMTBF x 100% TC. (MTBF + MTTRY MTBF x 100% 7 D. MTBF) (MTBF + MTTR) x 100% Answer: D 156 Which ofthe following causes for VRRP group lapping is the most impossible? FA The link where VRRP Advertisement packets are transmitted changes from Up to Down frequently. TB. The interal for sending VRRP Advertisement packets is small T ©. Association between VRRP and BFD is configured to implement a rapid mastet/backup switchover. T D. VRRP packets are discarded randomly because congestion occurs Answort C 159 .Which of the following LSA packets carries master/slave relationship information? TA Hello packet TB. DD packet I C.LSA Update packet T D.LSA Request packet Answer: B 160. Mutirotocol Label Switching (MPLS) dofined in ETF isa Layer 3 switching technology and consists of different devices ‘Which ofthe following devices is responsible for adding labels or delting labels rom packets? A Label distribution outer TB Label edge router (LER) TF C.Labal swatching outer (LSR) 0 Label transmission router Answer: B 161 On the USC series firewall, which zone can be deleted by the administrator? TA Security zone TB. Trusted zone 1 C. Untrusted zone T D.DMz Answer: A ‘162 Which fhe folowing statements regarding the basic concegt of ink aggregations ase? TF Link aggegetion uncles» grupo physical inteiaces together int ep intartice to erence bandh and ingot 17 Link aggregation comples wth IEEE 802 3a, TF Link Aggregation Grup (LAG), aso called unk, fers to the logical ink thats formed by buncing several physical inks together. TF DLink agregation mes only the act intrace ‘Answer: D 1 ic te ion statment reggie ang cst? TF Yvean nth dep menos emma cache men gt ce eh ik Ung Pacamap ef tn ee 8 Yovean cs mn gas and He Boni ina of Oe da ese FF Yovean ant dy tpseme commune cect FP pts. FT pt ine sh be ae 164. a camplex tor enonercertaing france, OR, producer an mate ice yes, which fhe lowing ims ihe st concom fr wus? 118 New eae mel 17 ©. Dao econ f ach ei sytem FD Eaupewer oom enuonment pons 165 Ina broadcast network, which mechanisms used in ISS to ensure neighbor relationship establishment reliability? FA Status synctvonization 7B Checksum F C.Aging timer PF 0. Thvee-nay hand ‘Answer: D 167i he loving satamerts egrding mica! ptosis alse? TF MP rane betwen recaeroete and mins ters, nd does the mechanism fr reing ard mang goup mebrhpbtween thar 18 Detnce Vector Muticart Rang Protocol OVURP) c= dene mode protocel dene count it of 32 IF © itis atypical na domai mutica! ting potca and can operat nthe dence moe (Ol) er pace mae (SI) FF ANSOP an spread maleate serae ASE Ansa: © 168 Which ofthe folowing statements regarding diferent LSA types i false? [FADD packets conan only LA summary formation, including LS Type, LSID, Adetising Router. and LS Sequence Number. TT B.LS Request packets contain any LS Type, LSD, and Advertising Router © LSUpeate packets contain complete LSA information TT D.LS Ack packets contin complete LSA information Anew: D 172 .Which of the following tools cannot be used for route filtering? TA policy-based-route TB IP-preix TC route-policy D ip community-itter Answer: A 117 For interzone packet fitering. which trafficis belong to transmitted to outbound direction? TA Trusted zone -> Untrusted zone TB. Untrusted zone -> Trusted zone 7 C. Untrusted zone > DMZ T D Trusted zone -> Local zone Answer: A, 178 For interzone packet firing, which of following traffic is not transmitted in the outbound direction? [A Traffic from the DMZ to the untrusted zone TB Traffic from the trusted zone to the DMZ I C. Traffic from the trusted zone to the untrusted zone I D. Traffic rom the trusted zone to the local zone Answer: D 179 Which of the following statements regarding authentication in BGP configuration is true? [A Allthe routers in the same AS must use the same password T B.A pair of BGP peers must use the same plaintext password. T C_AIBGP peers of a router must use the same password. I DA pair of BGP peers must use the same MD5 password Answer: D 181 Which of the following events represent the end of the network planning stage? TA Project initiation TB. Bid release T C. Contract signing IT D. Preliminary project acceptance Answer: B 182 Which ofthe folowing statements regarding OSPF extemal rout types i fle? TF A OSPF icudos Type 1 and Type 2 extemal utes 1B The cost ofa Type | out isthe ation ofthe AS extemal cost andthe AS intemal cost (he coat fom a route to an ASR). TF C.The cost ofa Type 2 extemal rout isthe AS extemal cost. F D.A Type 2 oxomal outs i avays prefered ow a Type 1 extemal route when cer conditions a tho same. Anowers D 185 Which command is used to configure association between VRRP and a physical interface? 1A wp wrid 4 track interface GigabitEthemet0/0/0 TB track wp wid 1 interface GigabitEthemet0/0/0 T C. vip wid 1 interface Gigabitétheret0/0/0 track TD. mp wid 4 interface GigabitEthemet0/0/0 Answer: A 187 Which are the two subfields in the port identifier of the uplink port on @ non-toot switch in RST? FA byte port priority and ‘-byte port number TB. t-byte port priority and 2-byte port number TF C. 2-yte port priority and 1-byte port number TF D.2-byte port priority and 2-byte port number Answers A. 188 Which ofthe folowing statements regarding Router SA connection type (Type) is false? TA Point-to-Point describes about the Point-to-Point connection from the local router to a neighboring router TB TiansNet describes a connection from the local outer toa transit network segment TC. StubNet describes a connection from the local router to a stub network segment, T D. P2MP describes connections ftom the local router to multiple neighboring routs Answer: D 191 Which command is used to configure the VRRP preemption delay? TA wip wid 1 preempt-timer 20 1B wrp wiid 1 preempt-mode timar delay 20 I C. wip wid 1 timer detay 20 I D. rp wid 4 preempt-delay 20 Answer: B 193 During BFD session establishment betw TA 2aay TB. down PF Cinit T D.up n devices, which state is not involved? Answer: A 186 BGP isan enhanced distance eto mating protocol ‘ich ste major reason fr ts? TTA BGP doesnot accept the mutes whose AS_Path abut conta the local AS number TF B Nexthop isa wellknown mandatory stibte of BGP mites. TT C.The AS Path attibute records al the ASS that a BGP route passes though onthe ransmission path nut selection ues, avout witha hoes AS Pathe prefered TT D.The AS Path atinute records al the AS that 2 BGP route passes though on the transmission path nut selection ues, a route witha shorter AS. Path speared, and the AS, Path stint ease checked in BGP paswers © 198 Which of the following command is used to configure the listening address of the SON controller? TA copentfow listeningip 1.1.1.1 TB sdn controller souce-address 1-11.41 T C. controlierip 1.1.1.4 TF D sein isteningip 1.4.4.4 Answer: A 199 Which of the following statements regarding BGP Update messages is false? TA. Generally, Update messages are sent after Keapalive messages. TB. Update messages are used to exchange routing information between BGP peers. T C. Update messages can be used to advertise multiple reachable mutes T D. Update messages are sent in multicast mode Answer: D 201 When OSPF runs in a broadcast network, DR and BDR need to be elected. In which state will DR and BDR be elected? [A Init state B Attempt state C. 2way state [~ D. Exchange state Answer: C 206 STP ensues loop tee network bt has. slow network oplogy convergence speed, afertng communication quay. RSTP has mae soe improvements based on STP ‘Whnch oe flung mgrvements is nt acloed? TA. RSTP detes toe pot states and 2s to po es TB RSTP reduces hepa stats tothe pr sss based on usec owaing and MAC oes earing FC. The nensotswich nnning RSTP sends conguaton BPOUs athe teal paca by the Hall ine, hich is pafmad independ by ach vce TT Ditiapot dos not rece cantgraion BPOUs tom the upstveam dee win fur Hel intr, the sich cans that the repptation wih the eghitor fats 208 On aNPLS ratwork, sche can ders lable ‘Wich ene alonng statements regacing label srbuon con mode i te? [TA The doartieam USR determines 2 abe! bound toa specie FEC, ard ten rails the upstream LSA 8 tn Downveam on Damand (20) moda, an LSR dette label to an FEC without hang to resi th abl equet mast age fom As uptream SR TF In Dounveam Unsoletad (DU) mode, an LSR detrbtes abl oan FEC ater ecohing abl equet massage Hom #s upateam LSR TF .Theupsteam LSR and downsteam LSR wih label abersementadacencies may use dient label distance mode aware 200 Which te flowing statements regsdng MPLS i se? TA MELS suppots various network ayer rool andthe packats caring MPLS labels must be encapsul to PPP fares befor being. tamed FB MPLS Its uniquely tetity specie packets in eet sutets. FC Theroitr can sarge mle P flows nto an FEC acca othe orang target F 0 Werk conectins must be established tre he packets caying MPLS labels canbe transite, 7 MPLS tepices Pte ith abel sting powers A 210. Which ft flowing statment egaring MUK VLA is fe? [TA Each group IAN must be bond apni VLA. 1 Wiha VAIO na ben uted by the rei VLAD thie VLAN eat be uted fr the VLANF tae, supe LAN, sub VLA TTC ter MUX VLAN is enabled onan tera, VLA mapong and VLAN stacking can be cen on te inteface. TT D Annee can use he piri eto cone he eterpe ste, a sepuate prt comnts elie customers anda goa pu to camect to erteprseemplyeesEntfpecasomers aa emloyees can bh acces eps snes, fleptse ematoyees cn commune wh ‘Sich ee. eerie customs canna conmuncas wih sacha ad ones coslamets an ampoyees cant crmmuncate wi ac) cht nouns € 214 Which ofthe following operations should be performed preferentially for Telnet login failure troubleshooting? TA Check whether the cant can ping the sever. TB Check whether the number oflogin users reaches the upper limit ©. Check whether an ACL is configured inthe VTY user inteface vw. T D. Check whether the access protocol is corectly configured in the VTY user interface view. Answ A 217 Which of the following regulations does not belong to the onsite behavior regulations during the senice process? A Rights regulations TB. Operation regulations FC. Attitude regulations 1 D. Preparation regulations Answer 220 When configuring source NAT with no-pat confguration parameters, which of the following statements is true? [A Only the source IP address is translated. TB. Only the destination IP address is translated, 1 C. The source IF address and source port number are both translated. FD. The destination IP address and destination port number are both translated. Answers A 222 What is the default sending interval of BED packets? TAS TB. 100ms T C.1000ms T D. 10s Answer: C 223 af carmot bo rctiied no sho tine n a complex eter bt the customer neds to eters network avait immediately which ofthe folowing actors s wcommended? (7A alte customer that hs isp FB Setup an tema network enonmert 1 Canrmunzate with the customer on shiping the aly nde, and setup an aematie net enorme. FD. tempt to ret the aut the fat cannot be recifid ater peri oftime, communicate wth the custome. newer: © 224 A VetUnstance ls a ‘ich ah lng state Ven utng and fomasdng (VRF) abe se? (TA VPN instances ona PE are deenden ofeach te. TT & Each VPN instance can be garded as atu utr, wich matsns an independertaess space and has ene more etfacesconectd tote vn TT CAPE mantains mute outing ant farang ables nclicing pic ating ad Sorearing tbe aoe ot mate VRFS TF 0 AVPWinstance canbe boss multiple ses Mite tes can be boudaone VPH stance 225 What is the default Hello interval of a DIS in a broadcast network? T Ads TB. 10s T C.33s T D.40s Answer: C 231 hn fe fing statements eng te ttl space ra is te? TF The satoinsacton rl ge to mieten rach naming paca 176 Because UDF is a cemectnlees poet othe st iepcten eva camet mach UDP pats wh he sas tbe FC nen the stetinspecan ewe checks rackets, packets of fe same conection ae et cones. rom. ntinspecion wa el en 6 mach th it elapse perso the saber chsh cece a maces eety esate ade sooner D A Configuration comparison TB. Top-down FC Bottom-up TD. Replacement ‘234 Whict of the following troubleshooting methods is not based on the TCP/IP reference model? Answer: A. 236 .Which of the following is not overtay VPN technology? AGRE TB. IPSec VPN T C._SSLVPN T D.L2TP VPN 31 Vbicn fhe loving methods used contol rtmal employees and guess acces mtr inthe Ag Contoler wiles acess conta A Access cone by username F 8 Acorn oh the weiss ein MAG sie egitston cet acess 1 ©: cess contl by SSI (arent SSOs or xemal employes and guests) FD Access cont by wiles teins ype 230. Yan 0G? mur rca 2 et wth a neachte net hop, ow de acess the rte? [TA ifsecs an ror message ttm over hat sends te piste message 7 nee nat ath ett ts BGP roung abe and scars the ete 1 naccopts and abi sot FO naccaps toe tS BGP tin able Hower. ts ot lot be peered by BGP and ct aed the rsting able. as soe 0 ts BGP ting al Tis ote wil parc BGP rage selection and may become he optimal te and be fe P ong tale Answer © 240 Wich ofthe folowing tems is conducted in the cau FA One-by one check FB information ter Temporary envionment setup FB Troubleshooting assessment iat pave ofthe structured network troubleshooting procass? Anower 242 han BGP rete oad balancing i ange, and hee ae to oa balancing rues whe et oigt BCP atibutes decade in BGP route Selection ues anche AS Path toate ae the same how lhe to espe be shee erage? FA The wo routes wale tth series to other GP peers TF B One optimal route i selected tom the to tes and then aoertised to other BGP pees TF 6 Thotworautes wl ct be arise ether BGP peers TF D One optima ue selected forthe tn aes a then acartsed to GP pees ‘nswers A 243 On a statetinspectionfrewal hes thet is ne Sesion al, when the status detectan mchanimis ented andthe sacond packet {SYRFADK) of ray handshakes reaches the fewal ‘Wet of he flown sateen iste? TTA ifthe eel secunty pec pert packets to pass, he packets can pass the frewal TF he frewal sacuty pec pete packets to pass, the zesio able is crested TF © By éeaut when status ceectin i sated andthe permt poly i configured, packets can pass. ‘sesben tate estabiohed, 246 An enterprise network usually uses privaté IP addresses for intemal communication ‘Which of the following addresses is a private IP address? TA 0.1.11 B.127.543 TC. 128.0.0.5 PD. 172.24.35.56 7 & 231.33.24.35 Answer: D 210 ich fone tera gpg he no mel ies? TF ARDVP ete uname eat nS erst. ting te a Oe eines pein 8 t power garmin bh an aye worn Tt pean TG tea pote lod cra snc to eu lene entre, an oe ess re eto his et toned tats eves mea neste ta rate emus tht sc se asa cab pee th ny 5 nt oa th to mtn at ae Fe a ot umber fo an none and se ors star sche wecesutes ace grt Schedaed Peery pcan eee 250 Which af the faouing statement eguedng Neturk Ades and Pea Tanlaon(UAPT) and No Pot Tianslation (Ne-PAT) is tue? TTA. Ater WAPTuanslaton al packets ae hom the same P adress fr ecemal users. TT 8 tntoPAT mode, only the anspor layer protocol por numer canbe comered. TC AnNAPT modo, nly the network layer protocol aes canbe coneted TT D-tntePAT mode, the nator ayer ptecoladess canbe conve, newer: 254 A customer needs to select Layer 3 100M switches from a series of Huaweijs campus switches, Which of the following series is proper?, A szro0 T B.s3700 Fr c.ss700 F D. 86700 Answer: B © CREATED BY M.AAM 255 Which ofthe following commands can display route calculation statistics in an OSPF process? TA display ospf cumulative TB. display ospf sptstatistics F C display ospf global-statistics T D. display ospf request-queve Answer: B 258 Which of the following attacks is not the network layer attack? AIP spoofing attack TB Smurf attack C. ARP spoofing attack F D.ICMP attack Answer: C 251.Which ofthe olling statements regarding jon member itarices aes shen ink aggregation works mn mania mde? TF A An Ethnic cannt be neste. en a member itrtcecanet be an Eh rank FB An Etomeintartace can in ny one Et-Trnk. Ble ang an Etheme intace oan ET: ensure that the Etemtefacé dos ot FG tthe local dee uses the Eh Tank he remtenterace recy comnected the mamber interface mus nthe EthTrnk otha both ends can communis TF An EthTunk can wot in Layer 2 or Layer 3 mode. The two woking modes can be deified azomaicaly an not nad to be suitched analy ‘ene: D 254 What are three features of SDN network architecture? TA Separated forwarding and control layers, centralized control, and open interfaces TB. Separated forwarding and control layers, distributed control, and open interfaces T ©. Centralized forwarding and control layers, centralized control. and open interfaces 1 D. Separated forwarding and control layers, centralized control, and closed interfaces Answer: A TA PMP TB. NBMA PC. SNAP FD. LAN (broadcast network) 267 In addition to P2P network, which of the following network types is supported in IS-IS else? Answer: D. 268 Which of the following statements regarding diferent types of firewalls is false? TA The packet filtering firewall checks each data packet against ACL rules, TB. The stateful inspection firewall uses security policies to check only the first packet of non-matched se: C. The security policies in two directions need to be configured on the stateful inspection firewall. T D. The proxy frewall processes senices of users on internal and extemal networks. ‘Answer: C 269 What is the multicast destination address of VRRP packets? TA 2240018 TB. 224.0.0.20 MC. 22401.18 PD. 224.0120 Answer: A 270 Which ofthe following statements regarding the LSA header information in AS-ExtemalL SA is false? TA Link State ID indicates a destination network address, 7B. Advertising Router indicates the router ID of an ASBR. 7 CNet mask inicates the network mask of the destination network segment TD. Forwarding Address is always 0.0.0.0. ‘Answer: D 271 ADHEP sen proves dierent adiess locaton rades to meet varus application requirements ‘Which adeessatocaten made can be used to abocate an P ares toa Hos equing emporay neterkacc8ss or alocat a up of tted P _adtesses that canbe shared by a up ef temporary hosts? FA Astomate allocation FB Dynami alocaton Fc manus slecaton FD. Manual or dynamic allocation Answer: B 272 Which te folowing statements regan the summary tomatic command and BGP out summation i alse? TF This command enables automatic sumrrarzatn fhe local imported tes TT 8 Ate this command is cones, BGP summarizes retes based on neural netwrk segments TF ©. Ate this command is config, BOP sends onthe summarized rates to peers 0 fterthis command is costs, BGP dvs not acme he sunt fites abso by ISPs, Terfe the numba ef ing inbmatian reduced TE This command is usedto implement aumate summarestan Automatic summarzain takes precedence ae mania summarzation newer: 275 When a large numberof P phones and WLAN APs exist on a network, which ofthe fllouing switches is used? A Soitches supporting STP edge ports FB. Switches supporting PoE FC. Switches supporting SACG FD. Switches supporting Qos Answer! B 278.The pow: delat-mte- sean carmant is executed on aSGP mero adie a tut mut to neighboring routers, ‘Wit the owing statements regarang the change coca BGP muting tele sue? 1A Ainacive deft mute wl Be gerrated nthe local BGP rating table, bu this mut wl net be deere tthe IF rang table FB Anactne deft mute wi be generated inthe local EGP ming table and delivers tothe P rating te TF No dtu te wl be geerted inthe local BGP ming abe DA dott mate wl be generate inthe ocal BGP muting tale, Whether rte selecten rsa. taut mute willbe delivered tothe IP muting tale depends on the rower: & 280 _Which ofthe following firewalls has the highest forwarding eficiency when processing non-frst-packet data flows? 1A Packet fitering firewall 1B Proxy firewall FC. Statetul inspection frewall TF D. Sofware frewall Answers C 283. Which the folowing statements garding ABR ls? TT An ABR has mafileLSOBs ae aitans one LSDB fr each area TF 8 An ABR abstracts nk tte inbrtion within te eorneted non backbone arenas iin ima and adie the rating formation within the borden 0a TT C-ANABR nee to ebtact ink tt formation within te backbone are a outing iferaton and adetises th retin ifrmaion wth al sontackbone seas TD ANABR can generate Type 3LSAs, Type 4SAS, and Type SAC. ‘newer: 284 .Which ofthe following is not an external risk to a project? TA xchange rate change TB. Rainstorm disaster T C. Social unrest I D. Differences of industrial standards Answer: D 285 Which of the following statements regarding Huawei eSight network management software is false? TA eSight is a lightweight system and a wizard is available for eSight installation TB. eSight adopts the C/S architecture, so users can access eSight using a browser anytime, anywhere T C. eSight provides corresponding solutions for diferent customers. TD. eSight can uniformly manage devices from multiple vendors. Answer: B 288. Upn VRRP ou tapping, th wp wine atte command is exes onthe rue nrease te rer secing VRRP packets, and ‘hon the spay orp commande exesea pated on the Raa vento enek he State ld He oun that the als of Ske ons change ‘ich ae loving statements eparing TTA A small tonal fr sevcng VRRP packsts may cause satus Npring fhe backup dice. TFB Alaige tena sening VARP pacha may cause status Haping fhe backup doce TFC Stats Rapping ofthe backup dace ie wrlant tothe tna fr ending VRRP packets TF 0. Tre tau aur sat ound and testa rth Seice to recon orth ul newee A 230 During EBGP pee lationship oulesheotng, itis ound that to det connected dices setup coonectons using lopbarkinataces. Trees the dplaycumentonfgoncontgumion bap command i sxacited to cack he conguraten of pas ebgp-mas hop kapcaune ia fe alwing stzements scone? FA The hop count must be geste than 1 1 & The hop cout mut be geste than 2 © The hap cout must Be geste than 15. FD Thehap count must be guste thn 256, noua: 292 Which of the following protocols can be deployed to quickly detect network link faults? A BFD TB. RSTP T C.isPF 1 D. Smart-Link Answer: A 296 Which of the flowing isnot the application scenato ofthe quest access management function of the Agile Contoler? TA Customers access the enterprise network, public resources, oIntemét during exchanges with or visits tothe enterprise TB Citizens access the Intemet through the network provided by public tities TF C. Consumers connect tothe Intemet over the enterprise network. D. Enterprise employees on a business trp connect tothe enterprise network through the branch network Answer: D 286 When's BGP museroctes 2 mute with an uneachabl next hop how est aces the ms? [Teena an ener massan tthe er that sds the Update message FB dons net abd his mute tots BGP mang abe an cas ths mut. FC iRacoape and ads this tet ts BGP muting ale How, hs mt let be prea by BGP and et ad othe Pasig tbe 1 0. taecpt ad ae his mute tote BGP muting tae Ths mute wl pricpae'n BGP mute selecon and may become the epi mate and be ded otha P mating able, AnemersC [302 The IP peti confguratoncommane sip profippreicname [nex index umber permit | ony) ip-adeess maskengh restr equal ‘gestceqia rai] [ese gua leer qual I6geaterequal ie pec bt lasagne, whale the I pei ange? TA (0 geme-equaalue] FB masklengh, greaterequalaue) TC igeseroquaaie, 22) 0. Unites Anowers & 306 Which of the following LSA packets carries master/slave relationship information? TA Hello packet TB. DD packet I C_LSA Update packet T D.LSA Request packet Answer: B 307 Which ofthe following statements regarding OSPF multinstance i alse? TT ACOSPF mlt.instance takes eect globally FB An intertace ofa router belongs to only a certain OSPF proce FC Route exchange between aiferent OSPF procesce is similar to oute exchange between erent routing protocels T 0. Mutiple OSPF processes can in on the same router and they ata independent of each ater Answers A 316. Whih the folowing statements epadng VRRP i ase? [Fhe mastorinthe VRRP group i seicted based on pontos. FB. The master sends gauitus ARP packs and noes the conic vice ot hos os wal MAC [FC tne mast fis, he new master is elected ston backup dices Baza en provi: F 0-The peony tangs om 1 256 When the Biclupreceved VERE Adtcement packets which he pet i 0, the bap ecards he packets none 52 Wich ofthe atoning statements rguding the OSPF fate sae? TF OSPF esse ikea algreton 17 acheter ais local ink stat neato by Nodng LSA TF © Each OSPF cence colts LAs sent by cheers. AE LSA fom the nk ste dtbare (S08) TF D Aline raters OSPF Ava hae the same HOE, Based on the rected gph each eter ues SPF algrthmto compute shortest path ie wih st asthe et. The shots path vee shows test nodes nan AS 313 What is the function of the detail-suppressed keyword in the aggregate command? TA ft suppresses the delivery of generated summarized routes to the IP routing table. TB. It suppresses the delivery of specific routes to the IP routing table. C.tonly advertises the summarized routes to other BGP peers. T D. It advertises both the summarized routes and specific routes to other BGP peers. Answer: C 314 Which ofthe following statements regarding BGP is false? TA BGP is an exterior routing protocol and is FB. BGP is a link-state routing protocol T C.BGP supports CIDR TD. BGP provides abundant route fitering and routing policies used to transmit routing information between ASS Answer: 8 316 fan alarm P2GPPIBACKWARD: C0 [ol Te BGP FSM moves rom a higher eumbored state oa lower numbared stat is goed ding [BGR confguate, whch ofthe flowing satrents regarding the cause othe lam fal? [TA The BP Hold iner sepia and no Keep mestage is ect FB GP vecehes an inconect BGP message F 6. The BGP poor mightori reset and proactholy acannets the peer atonship, 7 0.8GP reais a Neteston message om a nighbor 7 E-Thisatarm s norma and no action rue, newer: A 317 Which of the following statements regarding OSPF stub area is true? [7 A AS-external-LSAs can be advertised within a stub area 7 B.AS extemal route can only be based on 2 default route that is manually configured on an ABR. [7 C.Avirtual link cannot pass through a stub area. [7 D.Any area can be a stub area. Answer: C FA as-pathsiter FB Prefix FC route-policy T 0 polcy-basedroute 321 Which ofthe following tools is used to fiter routing information and set route attributes based on routing information? Answer: © 324 .On the DifServ network, what is the main purpose of defining the service type of the EF classification? TA Prelerentialy guarantee the serices that requie short dela. low packet loss, low jer, and assured bandwith TB Provide channels for packet fonearding FC. Ensure bandwidth for specie trafic D. Ensure that packets are forwarded with the minimum delay Answers A 325 Which of the following statements regarding MUX VLAN is true? ITA You do not need to configure the principal VLAN and subordinate VLAN in sequence. TTB. The MUX VLAN funetion must be enabled on an interface so that it can take effect. 7 © The principal VLAN and the subordinate VLAN of the MUX VLAN can be the same VLAN. 7 D. The MUX VLAN can contain only one subordinate group VLAN. Answer: B 328 What is the default priority of the device ina VRRP group? TA 200 TB. 150 P c. 100 [ b.o Answer: C 4328 An stacker sends ICMP Request packet wth the destination addess asthe broadcast adress of the attacked user host Wnaristhisatack? TAP spoon attack. FB Smut atack FC ICMP reirecton attack 7 D.SYN Flood atsek 332 During conigutin ofthe WRED doppefi, the lower hop tresolé and uperdopveshld for AF21 fic te 35 and 90, the loner op trash ar upper drop tthe fr APZ2 rae ae 20 and $0 and the lowe op tel nd pe op esl er AF23 Wai are 35 a 2, ‘Tha maxon dp prota fr AFZ1,AFZ2, and AFZ3 va 10% Bel congestion occur, wich type orale can eta bandwith guarantee? PAAR 1 Bare Fear 1 D.AFD1,AF22, and AF23 tic ‘rawees A 333 MUX\VLAN provides a mechanism for network resource control based on VLANS. Which of the following concepts do not belong to the MUX VLAN? TA Principal VLAN B. Subordinate VLAN PF C Guest VLAN T D. Subordinate group VLAN Answer: C £325. an FSIS broadcast nator, which mullcast MAC adres is used by s Lael 2 mera FE aoten

You might also like