You are on page 1of 15

1.

A router that runs OSPF can enter the Full state only after link state database (LSDB)
synchronization is completed.
True
False

2. All ports on the root bridge switch are deisgnated ports.


True
False

3. With SNMP, an NMS can only display the device runnning status but cannot deliver
configurations.
True
False

4. A gateway must be configured for communication between a host and other hosts.
True
False

5. NAPT differentiates IP addresses of different users based on protocol ID in TCP, UDP, or IP


packets.
True
False

6. The load balancing modes of both ends of an Eth-Trunk can be different.


True
False

7. UDP does not guarantee data transmission reliability and does not provide packet sorting
and traffic control functions. It is suitable for the traffic that has low requirements for data
transmission reliabilty, but high requirements for the transmission speed.
True
False

8. If a router does not match a specific route when forwarding a packet and there is no default
route, the router discards the packet.
True
False

9. After a switch restarts, static MAC address entries saved on the switch remain in the MAC
address table.
True
False
10. When a switch port sends a data frame with the same VLAN tag and PVID, the switch port
removes the VLAN tag and forwards the frame.
True
False

11. The Ipv6 address achitecture does not include which of the following address types?
A. Unicast
B. Multicast
C. Broadcast
D. Anycast

12. What is the number range of a basic ACL.


A. 2000-2999
B. 3000-3999
C. 4000-4999
D. 6000-6031

13. Refer to the following configuration of an interface on a switch. What is the PVID of the
interface?

A. 1
B. 2
C. 4
D. 400

14. How many bits ate there in an Ipv6 address?


A. 32
B. 64
C. 96
D. 128
15. As shown in the figure, STP is enabled on both switches. Which port is in Blocking state?

A. G0/0/3 of SWA
B. G0/0/2 of SWA
C. G0/0/3 of SWB
D. G0/0/2 of SWB

16. If PPP authentication fails, which type of packet will be sent to the authenticated peer by
the authenticator.
A. Authenticate-Ack.
B. Authenticate-Nak.
C. Authenticate-Reject.
D. Aunthenticate-Reply.

17. Which of the following methods is not supported by the Versatile Routing Platform (VRP) to
configure a router?
A. Configure the router through FTP.
B. Configure the router through the console port.
C. Configure the router through Telnet.
D. Configure the router through the mini USB port.

18. After a switch receives a unicast frame, it searches the MAC address table for the
destination MAC address. Which of the following statements is false?
A. If the MAC address cannot be found, the switch floods the frame.
B. If the MAC address is found and the port corresponding to the MAC address in the MAC
address table is not the port through which the switch recieves the frame, the switch
forwards the frame
C. If the MAC address is found and the port corresponding to the MAC address in the MAC
address table is the port through which the switch recieves the frame, the switch discards
the frame
D. If the MAC address cannot be found, the switch discards the frame.

19. Which of the following commands is/are used to set the authentication mode to HWTACACS
authentication.
A. authentication-mode hwtacacs.
B. authentication-mode local.
C. authentication-mode none.
D. authorization-mode hwtacacs
20. Which of the following port states is not included in Rapid Spanning Tree Protocol (RSTP)?
A. Forwarding
B. Learning
C. Discarding
D. Blocking

21. Which of the following SNMP packets is/are sent by the agent on the managed device to the
NMS?
A. Get-Request
B. Get-Next-Request
C. Set-Request
D. Response

22. Assuming that all hosts in the following figure can communicate with each other, which of
the following shows the correct mappings between MAC addresses and interfaces in the
MAC address table of SWB?

A. MAC-A G0/0/1
MAC-B G0/0/2
MAC-C G0/0/3

B. MAC-A G0/0/1
MAC-B G0/0/1
MAC-C G0/0/3

C. MAC-A G0/0/2
MAC-B G0/0/2
MAC-C G0/0/3

D. MAC-A G0/0/3
MAC-B G0/0/3
MAC-C G0/0/1
23. What is the number range of a layer 2 ACL?
A. 2000-2999
B. 3000-3999
C. 4000-4999
D. 6000-6031

24. After a network administrator enables the traceroute function on a router, what is the value
of the “Protocol” field in the IPv4 header of the data packet sent by the router?
A. 1
B. 2
C. 6
D. 17

25. As shown in the figure, the MAC address table of SWA is as follows. The switch cannot learn
the MAC address of HOST A. Which of the following reasons is impossible?

A. MAC address learning is disabled on G0/0/1 of the switch


B. MAC address learning is disabled in the VLAN to which HOST A belongs.
C. G0/0/1 of the switch is configured as an access interface.
D. Host A does not send any data frame.
26. The administrator peforms the configuration shown in the figure on a router, and a host is
connected to G1/0/0 of the router. Which of the following statements is true about the IP
address obtained by the host through DHCP?

A. The IP address obtained by the host belongs to the 10.10.10.0/24 network segment.
B. The IP address obtained by the host belongs to the 10.20.20.0/24 network segment.
C. The host cannot obtain an IP address
D. The IP address obtained by the host may belong to the 10.10.10.0/24 or 10.20.20.0/24
network segment.

27. Which of the following OSPF versions is specific to IPv6?


A. OSPv1.
B. OSPv2.
C. OSPv3.
D. OSPv4.

28. Which of the following states indicates that the OSPF neighbor relationship has been
established.
A. Down
B. 2-way
C. Full
D. Attempt

29. Which of the following parameters is not contained in STP configuration BPDUs?
A. Root ID
B. Bridge ID
C. Port ID
D. VLAN ID

30. What protocol does OSPF run over?


A. IP
B. TCP
C. UDP
D. HTTP

31. Which of the following statements is true about direct routes?


A. The priority of the direct route is lower than that of the dynamic route.
B. The priority of the direct route is lower than that of the static route.
C. The administrator needs to manually configure the destination network and next-hop
address for the direct route.
D. The direct route has the highest priority.

32. In which state does OSPF determine the master /slave relationship of DD packets?
A. Exstart
B. Exchange
C. Full
D. 2-way

33. An ACL of a router has the following rules: rule deny tcp source 192.168.1.0 0.0.0.255
destintion 172.16.10.1 0.0.0.0 destination-port eq 21.
A. The ACL is a basic ACL.

B. All TCP packets whose source IP address is 192.168.1.2, destination IP address is


172.16.10.2, and destination port number is 21 match this rule.

C. All TCP packets whose source IP address is 192.168.1.1, destination IP address is


172.16.10.2, and destination port number is 21 match this rule.

D. All TCP packets whose source IP address is 192.168.1.3, destination IP address is


172.16.10.2, and destination port number is 21 match this rule.

34. Which layer of the OSI model does a router work at?
A. Application layer
B. Network layer
C. Transport layer
D. Data link layer

35. FTP may be used to upgrade a router’s VRP image. Which of the following transmission
modes should be used to achieve this?
A. Binary mode.
B. ASCII mode.
C. Byte mode.
D. Letter mode.
36. Which of the following is a valid default route configuration?
A. [Huawei]ip route-static 0.0.0.0 0.0.0.0 192.168.1.1
B. [Huawei]ip route-static 0.0.0.0 255.255.255 192.168.1.1
C. [Huawei]ip route-static 0.0.0.0 0.0.0.0 0.0.0.0
D. [Huawei]ip route-static 0.0.0.0 0.0.0.0 0.0.0.0

37. Which of the following fields in an IPv6 header is similar to the TTL field in an IPv4 header?
A. Version
B. Traffic Class
C. Next Header
D. Hop Limit

38. What are the components of the OSI reference model from top to bottom.
A. Application layer, Presentation layer, Session layer, Transport layer, Network layer,
Datalink layer, and Physical layer

B. Application layer, Transport layer, Network layer, Datalink layer, and Physical layer

C. Application layer, Session layer, Presentation layer, Transport layer, Network layer,
Datalink layer, and Physical layer

D. Application layer, Presentation layer, Session layer, Network layer, Transport layer,
Datalink layer, and Physical layer

39. How many TCP connections will be established when FTP is used to transfer files?
A. 1
B. 2
C. 3
D. 4
40. Refer to the following IP ruting table on the router R1. If R1 sends a data packet with the
destination IP address 10.0.2.2, which of the following interfaces will R1 use to send the
packets?

A. GigabitEthernet0/0/0
B. Ethernet0/0/0
C. Ethernet0/0/1
D. Ethernet0/0/2

41. Refer to the following figure showing the configuration of a router. Which of the following
statements about the configuration are true.

A. The authentication mode of the domain named huawei is local authentication.


B. The authorization mode of the domain named huawei is local authorization.
C. No accounting scheme is used in the domain named huawei.
D. If the user name huawei is used for authentication, the password must be 654321.
42. An administrator cannot log in to a Huawei router through Telnet, but other administrators
can log in to the router. Which of the folowing are possible causes?
A. The administrator account has been disabled.
B. The user level of the administrator account has been changed to 0.
C. The administrator account has been deleted.
D. The Telnet service has been disabled on the AR2200 router.

43. Which authorization mode(s) is/are supported by the AAA on Huawei AR G3 series routers?
A. Non-authorization
B. Local authorization
C. HWTACACS authorization
D. RADIUS authorization after successful authentication

44. Which of the following WLAN security policies support open link authentication?
A. WPA
B. WPA2-PSK
C. WPA2-802.1X
D. WEP

45. Which of the following address types are of IPv6 addresses?


A. Unicast address
B. Anycast address
C. Multicast address
D. Broadcast address

46. Which of the following are types of network communicaton?


A. Chatting with friends through instant messaging software (Facebook Messenger,
Whatsapp, etc.)
B. Watching an online video on your computer
C. Downloading emails from a mailbox to your computer
D. Accessing the official website of a company on your computer

47. An administrator currently manages AR2200 devices in the network through a single
password, however the company wishes to introduce another two administrators and
provide unique user credentials and privilege levels for telnet access to the network devices.
What action can be taken?
A. Configure three users under the AAA-view, and assign each a different password.
B. The authentication mode must be changed to AAA.
C. Each administrator must be assigned a privilege level.
D. A public IP address must be assigned to each user for telnet access.
48. The following figure shows the configuration on G0/0/1 of Router A. Which of the following
statements are true?

A. The interface can establish OSPF neighbor relationships with other routers.
B. This interface does not forward received FTP packets.
C. This interface does not forward received SNMP packets.
D. This interface does not forward ICMP packets.

49. If an Ethernet data frame carries Length/Type = 0x8100, which of the following cannot be
the payload of the data frame?
A. RSTP data frame
B. STP data frame
C. ARP response packet
D. OSPF packet

50. To enable the FTP server function on a router, set the user name and password to “huawei”,
and set the FTP root directory to “flash:/dhcp”, which of the following commands must be
configured?
A. ftp server enable
B. local-user huawei password cipher huawei
C. local-user huawei ftp-directory flash:/dhcp/
D. local-user huawei service-type ftp

51. On the network shown in the figure, which of the following commands can be used to
enable host A to successfully ping host B?

A. Router A: ip route-static 10.0.12.5 255.255.255.252 11.0.12.2


Router B: ip route-static 10.0.12.1 255.255.255.252 11.0.12.1

B. Router A: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2


Router B: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1
C. Router A: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1
Router B: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2

D. Router A: ip route-static 10.0.12.5 255.255.255.252 11.0.12.1


Router B: ip route-static 10.0.12.1 255.255.255.252 11.0.12.2

52. Which of the following fields exist in both IPv6 and IPv4 packet headers?
A. Source Address
B. Destination Address
C. Version
D. Next Header

53. As shown in the figure Router A has the following configurations. Which of the following
statements are true?
ip route-static 10.0.2.2 255.255.255.255 10.0.12.2
ip route-static 10.0.2.2 255.255.255.255 10.0.21.2 preference 70

A. In the routing table of Router A, the next hop of the route to 10.0.2.2 is 10.0.12.2.
B. In the routing table of Router A, the next hop of the route to 10.0.2.2 is 10.0.21.2.
C. If G0/0/1 goes Down, the next hop of the route from Router A to 10.0.2.2 is changed to
10.0.21.2.
D. If G0/0/1 goes Down, the next hop of the route from Router A to 10.0.2.2 is changed to
10.0.12.2.

54. Which of the following parameter settings must be consistent on two devices for an OSPF
adjacency to be established?
A. Router Priority
B. Router Dead Interval
C. Router ID
D. Area ID

55. Which of the following fields are included in an MPLS header?


A. Label
B. Tos
C. EXP
D. TTL
56. Which of the following are not layers in the TCP/IP model?
A. Application layer
B. Session layer
C. Presentation layer
D. Network layer
E. Transport layer

57. Which of the following statements are true about transport-layer protocols?
A. The well-known port number range is from 0 to 1023.
B. UDP uses SYN and ACK flags to request and confirm connection establishment.
C. Establishing a TCP connection requires the three-way handshake mechanism, while
terminating a TCP connection requires the four-way handshake mechanism.
D. UDP is suitable for transmitting delay-sensitive traffic, and UDP packets can be
reassembled bases on the sequence number field in the packet header.

58. Refer to the output of the display current-configuration configuration ospf and display ospf
peer commands on the router R1. Which of the following statements are false?

A. It can be determined that R1 is faulty because the incorrect router ID has been
configured.
B. R1’s router ID is 10.0.1.1.
C. R1’s router ID is 10.0.12.1.
D. Area authentication is enabled on R1.
59. Which of the following devices are involved in a typical WLAN deployment for enterprise
scenarios?
A. AC
B. AP
C. PoE switch
D. CPE

60. Refer to the following configurations of SWA and SWB. Which of the following mappings
between MAC addresses, VLANs, and interfaces are true in MAC address table of SWA and
SWB?

A.
B.

C.

D.

You might also like