You are on page 1of 9

 

MENU
 PRODUCTS & SOLUTIONS
 

 TECHNICAL SUPPORT
 

 HOW TO BUY
 

 PARTNERS
 

 COMMUNITY 
H12-221 HCNP-R&S-IERS Examination
Last Update:2017-08-03 10:06:31
Primer dia OSPF, IS-IS y BGP

1. (True or False) Each DD packet has a DD sequence number, which is used for DD packet
acknowledgement. DD contains complete link state information. (  )

2. (Single Response) Which of the following statements regarding stub area configuration
notes is true? (  )
A. The backbone area can be configured as a stub area.
B. If an area is configured as a stub area, all the routers within this area must have stub area
attributes configured.
C. An ASBR can belong to a stub area.
D. A virtual link can pass through a stub area.

3. (Single Response) What is the Origin attribute of the routes injected into BGP using the
network command? (  )
A. IGP
B. EGP
C. Incomplete
D. Unknown

4. (Single Response) Which of the following statements regarding Local-Preference is true? (  )


A. Local-Preference is a well-known mandatory attribute.
B. Local-Preference affects traffic that enters an AS.
C. Local-Preference can be transmitted between ASs.
D. The default Local-Preference value is 100.

5. (True or False) The AS_Path attribute cannot take effect within an AS. Therefore, a BGP
router will not advertise any Update message received from an IBGP peer to other IBGP peers.
(  )

6. (True or False) The first four bits of a multicast IP address are fixed as 1110 and are
mapped to the high 25 bits of a multicast MAC address. Among the last 28 bits of a multicast
IP address, only 23 bits are mapped to a multicast MAC address, and information about the
other 5 bits is lost. As a result, 32 multicast IP addresses are mapped to the same MAC
address. (  )

7. (True or False) IGMPv1 defines a mechanism to select a querier when there are multiple
routers on a shared network. (  )
8. (Multiple Response) What services and functions can ACLs be applied to the router
AR3200? (  )
A. Routing policy
B. Traffic classifier
C. Firewall
D. Policy-based routing

9. (Multiple Response) Which of the following statements regarding routing policy and policy-
based routing are true? (  )

A. Policy-based routing is used to control packet forwarding without following routes in the
routing table.
B. A routing policy is used to control import, advertisement, and receiving of routing
information.
C. A routing policy is used to control packet forwarding without following routes in the routing
table.
D. Policy-based routing is used to control import, advertisement, and receiving of routing
information.

10. (Single Response) Port isolation provides secure and flexible networking solutions for
users. Which of the following statements regarding port isolation is false? (  )
A. Port isolation can be used for configuring Layer 2 isolation.
B. By default, interfaces are isolated at Layer 2 but can communicate at Layer 3.
C. Before the port isolation function takes effect on an interface, the port isolation function must
be enabled.
D. The port-isolate enable command can run in the system view.

11. (Single Response) On a network running RSTP, some devices use STP. When RSTP-
enabled switches detect a topology change, which method is used by the RSTP-enabled
switches to notify STP-enabled switches of the topology change? (  )
A. RSTP BPDUs with the TC are used.
B. STP BPDUs with the TC are used.
C. RSTP BPDUs with the TCA are used.
D. STP BPDUs with the TCA are used.

12. (Multiple Response) RSTP defines different ports compared with STP. Which of the
following ports cannot work in forwarding state? (  )
A. Root port
B. Designated port
C. Backup port
D. Alternate port

13. (Single Response) Which of the following statements regarding MUX VLAN is true? (  )
A. You do not need to configure the principal VLAN and subordinate VLAN in sequence.
B. The MUX VLAN function must be enabled on an interface so that it can take effect.
C. The principal VLAN and the subordinate VLAN of the MUX VLAN can be the same VLAN.
D. The MUX VLAN can contain only one subordinate group VLAN.

14. (Single Response) Which of the following statements regarding an SPT switchover after
RPT setup is false? (  )
A. An RPT cannot provide multicast forwarding for a long time.
B. Because all multicast traffic passes through an RP router, the RP router may become the
data forwarding bottleneck.
C. An SPT has the shortest path and provides higher forwarding performance than an RPT.
D. A RPT cannot be used to forward high volumes of traffic.

15. (Single Response) Which of the following statements regarding the summary automatic
command and BGP route summarization is false? (  )
A. This command enables automatic summarization for the locally imported routes.
B. After this command is configured, BGP summarizes routes based on natural network
segments.
C. After this command is configured, BGP sends only the summarized routes to peers.
D. This command is used to implement automatic summarization. Automatic summarization
takes precedence over manual summarization.

16. (Single Response) What is the function of the detail-suppressed keyword in the aggregate
command? (  )
A. It suppresses the delivery of generated summarized routes to the IP routing table.
B. It suppresses the delivery of specific routes to the IP routing table.
C. It only advertises the summarized routes to other BGP peers.
D. It advertises both the summarized routes and specific routes to other BGP peers.

17. (Multiple Response) Which of the following statements regarding the MED value are true?
(  )
A. According to BGP route selection rules, the MED value has a lower priority than AS_Path,
Preferred-Value, Local-Preference, and Origin.
B. The default MED value of BGP routes is 0.
C. By default, BGP can compare the MED values of routes from different ASs.
D. By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-
none-as-maximum command is configured, the maximum MED value 4294967295 is used.

18. (Multiple Response) Which of the following statements regarding DR/BDR are false? (  )
A. All DR others establish neighbor relationships with DR and BDR only.
B. In a broadcast network, DR and BDR must be elected. A broadcast network without a DR or
BDR cannot operate normally.
C. DR others listen on the multicast address 224.0.0.5.
D. DR others listen on the network address 224.0.0.6.

19. (Single Response) Which of the following statements regarding OSPF external route types
is false? (  )
A. OSPF includes Type 1 and Type 2 external routes.
B. The cost of a Type 1 external route is the addition of the AS external cost and the AS
internal cost (the cost from a router to an ASBR).
C. The cost of a Type 2 external route is the AS external cost.
D. A Type 2 external route is always preferred over a Type 1 external route when other
conditions are the same.

20. (Single Response) Which of the following statements regarding different LSA types is
false? (  )
A. DD packets contain only LSA summary information, including LS Type, LS ID, Advertising
Router, and LS Sequence Number.
B. LS Request packets contain only LS Type, LS ID, and Advertising Router.
C. LS Update packets contain complete LSA information.
D. LS Ack packets contain complete LSA information.
Answer: 1.F  2.B  3.A  4.D  5.T  6.T  7.F  8.ABCD  9.AB  10.D  11.B  12.CD  13.B  14.A  15.D 
16.C  17.ABD  18.ABD  19.D  20.D

H12-222 HCNP-R&S-IENP Examination


Last Update:2017-08-03 10:13:20
1. (Multiple Response) Which of the following LSPs are established in Downstream Unsolicited
(DU) label advertisement mode and ordered label distribution control mode? (  )
A. When the edge node finds a new destination address in its routing table that does not
belong to any existing FEC, the edge node does not create a new FEC for the destination
address.
B. An LSP is established by binding an FEC to a label and advertising the binding relationship
to the neighboring LSR.
C. If the egress node has available labels for distribution, it allocates labels for the FEC and
sends a label mapping message to the upstream node.
D. After receiving a label mapping message, the LSR adds the corresponding entry to the label
forwarding table.

2. (Multiple Response) Which of the following statements regarding the LDP session
establishment process are true? (  )
A. Two LSRs send a Hello message to each other. If the Hello message carries the transport
address, the LSR with a greater transport address initiates a TCP connection.
B. If the Hello Message does not carry the transport address, destination IP addresses of the
Hello Message are used to establish a TCP connection. The LSR with the larger IP address
initiates a TCP connection.
C. The initiator sends an Advertisement message to negotiate parameters for establishing an
LDP session. These parameters include the LDP version, label distribution control mode, value
of the Keepalive timer, maximum length of the PDU, and label space.
D. If the responder accepts negotiated parameters, it sends an Initialization message and then
a Keepalive message to the initiator.

3. (Single Response) MPLS VPN is used to solve some limitations of traditional VPN
technology. Which are the major limitation that MPLS VPN solves? (  )
A. Private routes cannot communicate with each other.
B. Leased lines are expensive.
C. Bandwidth resources cannot be fully used.
D. The address space is overlapping.

4. (Single Response) A VPN instance is also called a VPN routing and forwarding (VRF) table.
Which of the following statements is false? (  )
A. VPN instances on a PE are independent of each other.
B. Each VPN instance can be regarded as a virtual router, which maintains an independent
address space and has one or more interfaces connected to the VPN.
C. A PE maintains multiple routing and forwarding tables, including a public routing and
forwarding table and one or more VRFs.
D. A VPN instance can be bound to multiple sites. Multiple sites can be bound to one VPN
instance.

5. (Multiple Response) DHCP snooping is a security feature that can be used to defend against
various attacks, including (  )
A. Starvation attacks by changing the CHADDR field value
B. Bogus DHCP server attacks
C. TCP flag attacks
D. Man-in-the-middle attacks and IP/MAC spoofing attacks

6. (Multiple Response) Which of the following are included in the full lifecycle guest
management of the Agile Controller? (  )
A. Account registration
B. Account approval and distribution
C. Account authentication
D. Account audit and deregistration

7. (Multiple Response) Which of the following statements regarding terminal security


management of the Agile Controller are true? (  )
A. Supports one-click restoration to reduce maintenance costs of terminals.
B. Allows installation of only standard software, implementing desktop office standardization.
C. Forces installation of clients meeting security requirements and prevents terminal data
leaking.
D. Prohibits installation of non-standard software to reduce the virus infection risks.

8. (Multiple Response) What are the mainly methods of data collection? (  )


A. Collection by physical optical splitter
B. Collection through port mirroring
C. Centralized collection by NMS
D. Automatic collection

9. (Multiple Response) Which of the following items can be used as the filtering conditions for
historical alarm query on eSight? (  )
A. Alarm severity
B. First occurrence time
C. Alarm source
D. Alarm name

10. (Single Response) Which information of labels is used for simple traffic classification? (  )
A. DSCP priority
B. IP precedence
C. MPLS EXP priority
D. 802.1p priority

11. (True or False) After add interface GigabitEthernet0/0/1 is configured in the trust zone view
of the USG series firewall, GigabitEthernet0/0/1 does not belong to the local zone anymore. (  )

12. (Single Response) For interzone packet filtering, which traffic is belong to transmitted to
outbound direction? (  )
A. Trusted zone -> Untrusted zone
B. Untrusted zone -> Trusted zone
C. Untrusted zone -> DMZ
D. Trusted zone -> Local zone

13. (Single Response) Which of the following statements regarding Network Address and Port
Translation (NAPT) and No Port Translation (No-PAT) is true? (  )
A. After NAPT translation, all packets are from the same IP address for external users.
B. In No-PAT mode, only the transport layer protocol port number can be converted.
C. In NAPT mode, only the network layer protocol address can be converted.
D. In No-PAT mode, the network layer protocol address can be converted.

14. (Single Response) Which of the following statements regarding VRRP is false? (  )
A. VRRP determines the device role in the virtual router based on device priorities.
B. If the backup router works in non-preemption mode, the backup router with a higher priority
does not become the master router as long as the master router does not fail.
C. Even if there is the master router, the backup router will preempt to be the master router.
D. When two routers with the same priority preempt to be the master router, the IP addresses
of interfaces are compared. The router with a larger IP address of the interface is selected as
the master router.

15. (Single Response) Which command is used to enable association between BFD and
VRRP? (  )
A. vrrp vrid 1 track bfd-session session-name 1 reduced 100
B. bfd-session vrrp vrid 1 track session-name 1 reduced 100
C. track vrrp vrid 1 bfd-session session-name 1 reduced 100
D. vrrp vrid 1 track bfd-session-name 1 reduced 100

16. (Single Response) In the SDN network architecture, which device is used to calculate the
path and deliver the flow table? (  )
A. Application server
B. Controller
C. Orchestrator
D. Device

17. (True or False) VXLAN is irrelevant to SDN technology. (  )

18. (Single Response) How is OPEX defined? (  )


A. Maintenance cost
B. Total cost of ownership (TCO)
C. Operating cost
D. O&M cost

19. (Single Response) In vAR application scenarios, which functions of the AR Router can be
virtualized on a server? (  )
A. Firewall
B. VoIP
C. NAT
D. VPN

20. (True or False) SDN and NFV are essentially the same concept and both define network
function virtualization. (  )

Answer:1.BCD  2.AD  3.D  4.D  5.ABD  6.ABCD  7.ABCD  8.ABC  9.ABCD  10.C  11.F  12.A 
13.D  14.C  15.A  16.B  17.T  18.C  19.ABCD  20.F
H12-223 HCNP-R&S-IEEP Examination
Last Update:2017-08-30 09:57:21
1. (Multiple Response) Which of the following cabling modes are commonly used in a data
center? (  )
A. TOR
B. DOD
C. EOR
D. PHP
E. NSF

2. (Simple Response) Which of the following features is not applied to enterprise WANs? (  )
A. Wide coverage
B. Difficult O&M
C. Multiple types
D. High costs of utilization

3. (Multiple Response) Data center switches greatly differ from campus switches. Which of the
following features are specific to data center switches but are not supported by campus
switches? (  )
A. MSTP
B. TRILL
C. NFV
D. FCoE
E. VXLAN

4. (True or False) If the number of checked goods is different from the number of goods on the
packing list, you can unpack and inspect goods and then contact the vendor to handle the
inconsistency. (  )

5. (Single Response) Which of the following authorization items is not required for risky
operations? (  )
A. Management authorization
B. Technology authorization
C. Customer authorization
D. Administrative authorization

6. (Multiple Response) Which of the following statements regarding the device software
upgrade necessity are true? (  )
A. The new software version continuously increases new functions.
B. The new software version continuously improves usability.
C. The new software version continuously improves stability.
D. You are advised to immediately upgrade the system software to the latest version.

7. (Single Response) Which of the following is the core idea of network troubleshooting? (  )
A. Service traffic path check
B. Determining and analysis
C. Information collection
D. Top-down

8. (Multiple Response) Which of the following tasks need to be completed during the planning
stage of a project? (  )
A. Work out the technical design
B. Know the project background
C. Determine the model of network devices in the project
D. Make clear the requirements of a project

9. (Multiple Response) Which of the following contents are included in a migration project
solution? (  )
A. Migration preparation
B. Migration implementation
C. Rollback solution
D. Contingency plan

10. (Single Response) Which of the following work is not prepared before the migration? (  )
A. Hardware test
B. Software test
C. Expenses
D. Tools

11. (Single Response) During MSTP troubleshooting, the display current-configuration


command is executed to obtain the configuration file of the device. Which of the following
statements is false? (  )
A. Check the port configuration to verify that the MSTP-enabled port is configured (for
example, using the bpdu enable command) to send protocol packets.
B. The port connected to a user device has MSTP disabled or is configured as the edge port.
C. The BPDU tunnel configuration has no impact on MSTP.
D. Check whether the interface is added to the correct VLAN.

12. (Single Response) If all data packets are lost when you ping the peer host, which of the
following methods is the most appropriate for subsequent troubleshooting? (  )
A. Configuration comparison
B. Bottom-up
C. Service traffic path check
D. Top-down

13. (Multiple Response) During follow-up operations of the structured network troubleshooting
process, which of the following parties does not require advertisement of information? (  )
A. Parties affected by the fault
B. Authorization parties in each phase of troubleshooting
C. Other vendors and service providers
D. Users who are interested in the root cause for the fault

14. (Single Response) A network administrator fails to access devices on the internal network
through Telnet. Which of the following causes is the most impossible? (  )
A. The route is unreachable, and the client fails to establish a TCP connection with the server.
B. The number of login users reaches the upper limit.
C. An ACL is bound in the VTY user interface view.
D. The protocol inbound all command is configured in the VTY user interface view.

15. (Multiple Response) Which of the following items are used to remind customers of
information security? (  )
A. Account sort-out reminder
B. Password update reminder
C. Log protection reminder
D. Data backup reminder

16. (Single Response) During the structured network troubleshooting process, which of the
following statements regarding the fault identification phase is true? (  )
A. Focus on how to better solve faults, regardless of whether a fault is within your own
responsibility scope.
B. Pay attention to user feedback and identify faults based on user feedback.
C. To minimize the fault effect, try not to let others know the network fault.
D. Check whether the troubleshooting is within your own responsibility scope.

17. (Single Response) If a fault is located on a router that works in redundancy mode with
another router, which of the following methods is the most appropriate for subsequent
troubleshooting? (  )
A. Configuration comparison
B. Bottom-up
C. Service traffic path check
D. Top-down

18. (Multiple Response) Which of the following causes may result in an IS-IS neighbor
relationship fault? (  )
A. The devices on two ends of a link have the same system ID.
B. The devices on two ends of a link have inconsistent IS-IS levels.
C. When an IS-IS Level-1 neighbor relationship is established, the devices on two ends of a
link have inconsistent area addresses.
D. The IP addresses of interfaces on two ends of a link are on different network segments.

19. (Single Response) Which of the following events represent the end of the network planning
stage? (  )
A. Project initiation
B. Bid release
C. Contract signing
D. Preliminary project acceptance

20. (Single Response) Which of the following network features is described by counters such
as mean time between failures (MTBF) and mean time to repair (MTTR)? (  )
A. Scalability
B. Availability
C. Security
D. Cost-effectiveness

Answer:1.AC    2.C  3.BDE  4.F  5.D  6.ABC  7.A  8.BD  9.ABCD  10.C  11.C  12.B  13.ABC 
14.A  15.ABCD  16.D  17.A  18.ABCD  19.B  20.B

You might also like