You are on page 1of 4

1.

The port cost is the total of the path to the root bridge, and the root path cost is the cost of the
switch port.
a. True
b. False
2. After the interface loopback 0’ command is run, the physical layer of the loopback 0 interface is
Up and the protocol layer is Down.
a. True
b. False
3. When configuring PPPoE, run ‘the dialer bundle’ command to specify the Dialer bundle used by
the dialer interface.
a. True
b. False
4. The ARG3 series routers support the configuration of the authentication scheme and accounting
scheme.
a. True
b. False
5. After the root bridge is faulty, other switches are elected as the root bridge. After the original
root bridge recovers, the network does not change.
a. True
b. False
6. Link backup can be used in manual load balancing mode link aggregation.
a. True
b. False
7. Huawei network devices allow multiple users to log in the system through the console port at
the same time.
a. True
b. False
8. The subnet mask is used distinguish, the types of IP addresses.
a. True
b. False
9. The IPSec VPN forwards the protected data flows though the IPSec tunnet.
a. True
b. False
10. When the default route is configured, the destination network address is 255.255.255.255.
a. True
b. False

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>.

11. Which of the following routing table parameters indicates the priority of a route?
a. Interface
b. Preference
c. Cost
d. Protocol
12. Which field in an Ethernet data frame determines the upper-layer protocol a network device?
a. FCS
b. SMAC
c. DMAC
d. Type
13. Which ports are supported by the FTP control plane channel by default?
a. 21
b. 20
c. 23
d. 22
14. How many packets need to be exchanged in CHAP authentication mode?
a. 2 packets
b. 3 packets
c. 4 packets
d. 5 packets
15. What is the function of the TTL field in the IP packet header?
a. Prevent broadcast storm.
b. Limit the lifetime and discard the packets that cannot reach the destination.
c. Prevent mac address flapping.
d. Record the path information that the packet passes through.
16. What is the function of synchronization in the P/A mechanism?
a. Determine the switch role
b. Determine the port role
c. Run the spanning tree protocol in multi-instance scenarios.
d. Avoid the generation of temporary loops.
17. What is the first step when a terminal device receives a data frame?
a. Check the source MAC address.
b. Discard
c. Check the FCS field.
d. Check the destination MAC address.
18. Which of the following transmission media is used when Gigabit Ethernet is deployed on an
enterprise network?
a. Serial port cable.
b. Twisted-pair cable.
c. Optical fiber.
d. Coaxial cable.
19. What is OSPFv3 used to uniquely identify a router?
a. Mac address
b. Dr-priority
c. Router ID
d. IP address
20. Which field in the MPLS header identifies the stack bottom label?
a. Exp
b. S
c. TTL
d. Label

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

21. Which of the following parameters are used by the router to select the optimal router?
a. Next Hop Address.
b. Outbound interface
c. Metric
d. Priority of route
22. Which IP addresses are reserved in the address pool?
a. Gateway IP address.
b. Interface IP address of the DHCP server
c. IP address reserved for a specific host.
d. IP address assigned to the server.
23. Which of the following parameters can be defined for IPSec peers by Security Association?
a. Encryption algorithm.
b. Authentication algorithm
c. Data encapsulation mode
d. Charging Mode
24. What are the function and feature of NAPT?
a. Only one-to-one mapping between private addresses and public addresses can be
implemented
b. Allow external users access internal servers.
c. NAPT is Port-based transition.
d. NAPT allows multiple internal addresses to be mapped to different port of the same
public address.
25. What are the possible operations if a router receives broadcast packets from hosts on the
network?
a. Discard
b. Response part packet if necessary
c. Forwarding to other broadcast domains
d. Saved on the local
26. After the VRP is upgraded and restarted, how can the administrator confirm that the upgrade is
successful?
a. Run the ‘display startup’ command
b. Run the ‘compare configuration command
c. Run the ‘display version’ command
d. Run the ‘ the display current-configuration command
27. Which of the following packet filed can be used for advanced ACL rules?
a. TCP flag
b. Protocol Type
c. Source/Destination IP address
d. Source/Destination port number
28. Which of the following flags are involved in TCP three-way handshake?
a. Fin
b. Seq
c. SYN
d. ACK
29. Which types of ICMP messages are used for ping?
a. Echo Request
b. Redirect
c. Echo reply
d. Error packet
30. What is the VRP Version Used by Huawei Datacom Devices?
a. VRP8
b. VRP2
c. VRP5
d. VRP4

You might also like