You are on page 1of 20
me stose etRuon Ancien aitietomih action @ © 2, If two Huawei $5700 switches are connected through TOGE optical modules, the connecting ports workin fll duplex mode by ‘efaut. 5 © the © Fate true fae /60Question Assow bs 1, On Huawei switches, VLAN 4095 cannot be created and VLAN 1 cannot be deleted. © Tue O False EE Em » 7, tmsome scenarios both the source and destination IP adresses ned translation This calle biracial NAT om © haw true offic €/60Question rom bey 8, You can run ‘vian batch’ command to create multiple VLANS in batches on Huawei switches. © Te © Fale 9, In DHCP, a DHCP-Offer packet can carry only one DNS server address. O Tue © False me otake 1oReOseon dnoniepesietomichqntion @ O 10, Huawei USG series frewalls provide a defout bandwith policy when all matching fd ae any the ation irate imng. © te © se wueorrase 1 1yovuuesvon 11, SSL can provide secure connections for Hypertext Transfer Protocol (HTTP). © The © False true offalse 12/60Question 12, Fora encryption algorithm, a longer key takes more time to crack. © Te O False trucoffalse —13/60Question Aows 13, An AP can obtain an IP address only after establishing a CAPWAP tunnel with an AC. b © Tue O False 14, ACCAPWAP tunnels maintained trough heartbeat pacts. By default an AP sends a heartbeat paket othe AC at an interval of 1S seconde. Ow © fake 15, The IEEE is responsible for the use of wireless radio frequencies in the US. O Te © False tsotiase Taseston hg neta sch 16, Wi supports a maximum of 8 spatial streams, while Wi-Fi 6 supports a masimum of 16 spatial streams. © tw 5 © fate 116, Wi-Fi supports a maximum of 8 spatial streams, while Wi-Fi 6 supports a maximum of 16 spatial streams. O te © Fase Maple ee ne meet an Anowteneaitet nin gustos @ © 17, Using the Wacert command onthe host o detect the path tothe destination device. During the detection process, which ofthe {allowing ICMP messages wil be sent back tothe source device? © A Tae ceeded © 4 thon © € tots @ © D Portuneseabie ‘Multiple choice single answer 18/00Uuestion 18, Which port is used by the SSH protocol by default? OA 20 O82 Ocz On 23h IMumuple choice single answer youuuestion 20. Which of the following statements about TTL in an IP: packet is false? © A. TILis the abbreviation of Time To Live. © 8. Ifa router receives a packet with the TTL value being 0, the router discards this packet. © C. The TTL value is reduced by 1 every time the packet is forwarded to a Layer 3 node. © D. The TTL value of a packet isin a range from 0 to 4095. asi mer 2 Anton eiticto och sis @ © 21, After NAPT is configured, some intranet IP addresses can sill png extemal networks, while some cannot Which ofthe following Isa possible cause? © A mete ngee © 8 manta pony a, © € tpn wong rte < © 0. TeNAT configuration does ot take eect 22, Python identifiers are used to represent the names f constants variables, functions, and other objets. An identifier usually consists of eters, digits, and underscores, but cannot begin wth which ofthe folowing? OA eter 0 oe : © cme @ 0D Unesco 23, Because tual machines (VMS) shield the diferences between CPU instruction sets interpretive languages are elativaly portable. Python san interpretive language Which ofthe folowing is used to translate ython source code into bytecode for interpretation and exection by a VM? OA compile © 8 Asembler €& © tinker 0 Lender 24, Whatare the network address, broadcast address and number of available addresses of172.16.101/162 © A wraxe109, 1721610255, 65536 © 8 1721800, 17216255255, 05596 © € 17216100, 172160255, 05504 © 1721600, 17216255255, 65534 Sam for Chile Network Tak 2210/2024 Ma it ow es dems 24 Tome 05255 EE 5 seem seer mise ntciqntons © © +25, Mestre motel ii ced thst yer mal Wich he flonng cae bow he Sine rom baton ; opt + | 0A seen ge Pmtnlageenelar Taner arena >but Plone 1 | 0 pst on nr netgear ron ner Apne Tf Ccrpetyrecteiyectemiyecteiemenegsiiqnnmmetnigeiemaminn CLD <0 © Aptian yr» sane Preenaton yer nape nr» Nebel ar 26, Which ofthe fllowing statement about the STP is false? © A nanew TP rater he fist stp is lacing rot big all thes wl compare he BO © 8 tall sche rity are the same, they wil compare the MAC adress, ad the value i the smaller the eter (© C. Thealtemate pot isthe backup por forthe pot. (© 0 Allthe port onthe root bridge i root port. 4, Users can view the running status and statistics in the user view, but not inthe system view. © we © fase eo 28, Whicr ofthe folowing types ofogs does the firewall ouput by tveat logs, content logs. poley matching logs, mal tering logs Ung ng ory © A song 0 & pms © saaeg @ © 8 sete sole ices meer 2 Anon onic with ansion © © 28, Ina cloud data center which af the lowing technologies can be used with edge Firewall to protect east wast tafe and north south afc of vtwl machines (vs OA seurtyqeup oa nw © comin @ 0.0 Aor ne sbove 30, Which of the following sequences for PIM-DM implementation is correct? © A Registration-Pruning-Flooding © B.Flooding-Pruning-Gratting © ©. Flooding Registration Pruning © 0. Pruning Flooding Grating b 31, In STP, which of the following options is used to elect the root bridge? © A Bridge 1D © B. Path Cost © ©. Port cost © D. Port iD Multiple choice single answer 32/60Question 32, Which of the following is the lowest level of cyber security incidents? © A Low-level per security incident © B. Ordinary cyber security incident O C. Serious cyber security incident © D. Relatively serious cyber security incident 33, Which ofthe following attacks is nota special packet attack? © A lehvPracrac stack © 8 lew uence tack © € Paneep tack (© Large MP packet attack 34, Which of the following algorithms uses the same key for encryption and decryption? OA 08s © 8 RSA(T028) Mos Ob shat 35, Which of the following messages is used to encapsulate L2TP VPN? O A ICMP O 8. ARP Oc TP © D. Ppp 37, If you use the ‘display ap all command to check that the AP status is ‘dload!, what is the reason? OA APisontine © 8 APisregistering © €. APis upgrading © D. Apis discovering AC 238, Which ofthe following nfrmation cannot be displayed by running the spay ap all command on a Huawei AC? © A. MAC adres ofan AP 08 ype 0c apehanne « 0D. AP umning satus 40, What do we generally use to connect APs and antennas during WLAN network deployment? © A Power splter © 8 combiner © € Areser 0 0 Feeaer 41, Which ofthe felloning statement about multicast dtibuton trees (MOTH are core? (© A Asha path tee (7 const sort pats btn te mia suc and ees ising 2 namin dy © 5. nen arandevus pit ue FT i sed router ms se outing formation fer ey mutica sure Th consumes many tn resources on requester oman nares ie ae 2c Remeron mnnmreattntoen ceteris te tn ED 2 anseris ede macs sce mnt send packets tan A andthe tect Th mea ht the paths ae not besarte one Weer an St nqurerhe Ro proce nigh aby on prcetang cps 42, Which ofthe following sttererts about Pv6 are correct? (© A rs adress recast into unas mutica, nd bonds adress by PS ade pei (© 8. Alinkocal adress (Lariat v6 aes ht canbe ud ony onthe intranet Bacaee LAS cane be routed on th Pv pub ‘eon thy camo be neta diet secs the ube Sewer © € sont AW re mn nn CINE nN po pic does rotor tction AED Sane (hv aden 200 208800000000022A. 000000002079 ca be abbreviated ¢ 209198800324:2070, 45, Which of the following phases are included inthe ifecycle of a campus network project? Blaming and design 1 8. Deployment 0 Network 0804 © D. Network optimization i 48, Routers have several route selection approaches, ach based on a set of rules, policies, or conditions. In which ofthe folowing approaches does the system automaticaly ad ‘ery al to the end of such rules, policies or condtions? Aaa Ot ete oe many € © 0 communty iter ate ce mse snr _0pQuen pty eto 49, Which ofthe following parameters need tobe matched for an Ethemet trunk pot an LAG? © A tnetece rate © 8 Dwplermode & © Pert No © Device Mode o i =a Mutinle choice multiple answer S0/6OQuestion 50, Which information can be backed up by HRP? & A. TCP/UDP session table © B. Server map entry © ©. Dynamic blacklist & 0. Routing table EE Ea & Mate ace mite anmer S2Dbeston ‘Aone aattetowichgesion, © 52, Which ofthe following network aspects canbe automated through tools to gradually reduce dependence on manual operatic ‘and ole the problems of traditional network O&M? 2 A Deployment © 8. Upgrade © 6 hte qa 0 oom Multiple choice multiple answer — $3/60Question 53, Which of the following attacks target the web servers? OC A Website phishing © 8B. Website Trojan & ©. $QLinjection & D. Cross-site scripting Msiplecice me snmer Stan ork to mh 54, Alinkcgroup has three physica interfaces. f any of the interfaces fas, which of the following statement are core? A. Thesytem changes the stats fal other ites to Doan (8. Thestaus of he othr itraces dosnt change 1 ter some traces inthe rou econ the stm changes the tats fl intertcesto Up. (© D. After aintertaces inthe group recover the sytem changes the tatu fa interfaces to Up, 55. Onan IPv6 network, which ofthe following extension headers can be used to enhance network security? A Hop-byHop Options (8H) 8: Routing © © authentication ® © 0. encapsulating Security Payioad (ESP) Multiple choice multiple answer S7/60Qvestion 57, Which of the following can be used to supply power to WLAN APs? | A. Independent power adapter © 8, Pot switeh & C. Pot adapter OD RFeable rmurupte cnotce murupie answer 39/ouuestion 59, What types can APs be categorized into by environment? @ A. Indoor AP © B. Building AP & C. Outdoor AP © D. Indoor distributed AP b {60 Which of the following devices’ operating frequency bands may interfere with Wi-Fi signals? © A Microwave oven © & Cordless phone O € Bluetooth device © ©. Short wave radio Multiple choice multiple answer 56/60Question 56, Which of the following are Layer 3 VPNs? OC A LTP VPN ‘& 8. GREVPN © ©. IPSec VPN Ob ssivpn tmesttte soctston Aron iasnaiietowiunanson @ © 5, When to devices have the same rot bridge pro the device wth a larger MAC address wil be selected a the rot bridge. © tee © fale 8 3, The length of an Ethernet data frame in the range from 64 bytes to 1518 bytes. @ te O False

You might also like