B. False: (Right Answers)
B. False: (Right Answers)
1. AS100 and AS200 are enabled for multicast within their respective autonomous systems are
independent setting BSR and RP the RP USES MSDP protocol interaction between SA information:
ln order to prevent the BSR message across AS boundary the simplest way is to use ACL on ASL
interconnection interface of BSR message filtering.
A. True
2. RIPng released prefix [Link] the prefix length of 32 bits aggregated routing information which of the
following configuration is correct
A. [Huawei] interface gigabitethernet 110/0 [Huawei-GigabitEthernet1/0/0] ripng summary-address
[Link] (Right Answers)
B. [Huawei] ripng 100 [Huawei-ripng-100] ripng summary-address [Link]
C. [Huawei] interface gigabitethernet 1/0/0 [Huawei-GigabitEthernetl/0/0] ripng summary-address
[Link]/32 output
D. [Huawei] ripng 100 [Huawei-ripng-100] ripng summary-address [Link] interlace
GigabitEthernetl/0/0
Answer: A
3. ISIS in the process of establishing P2P networks neighborhood relationship interactive Hello packets twice to
complete neighbor establishing.
A. True (Right Answers)
B False
Answer: A
4. A company from a carrier rented a 1Mbps CIR frame relay special line recent stability is not good frequent
oscillation network administrators found in the configuration of router parameters forgot to configure CIR
parameters. after fixing the problem the line will restore stability.
A. True
Answer: B
5. You want to set the DSCP value of VoIP traffic in HW network device as EF. According to distinguish service
model RFC flow mark EF should be set to:
C. IP Experimental ECN
Answer: E
6. Which of the following description about IBGP neighbor EBGP neighbor is true? (Multiple choice)
A. router will sent the BGP updates learning from its IBGP neighbor to their other IBGP neighbor and
EBGP neighbor
B. router will sent the BGP updates learning from its EBGP neighbor to their other IBGP neighbor and
EBGP neighbor (Right Answers)
F. EBGP neighbor must through direct physical interface address to establish neighbor relationship
Answer: BDE
7. AS-path-filter using regular expression 1[0-9]-1-$ to represent all the AS_PATH attribute.
A. True
E. SSM is recommended to use when having multiple sources and expect to minimize mroute state in the
network
F. the most suitable for the application of many-to-many
Answer: ACD
9. A running OSPF router is connected to Area 0 and Area 1. You will configure area 1 to stub area which kind
does LSA only in the Area 1 internal operate?
A. Class 7 LSA
B. Class 1 LSA and Class 2 LSA
C. Class 1 LSA Class 2 LSA and Class 5 LSA
D. Class 3 LSA and Class 4 LSA
E. Class 1 LSA. Class 2 LSA and Class 3 LSA (Right Answers)
Answer: E
10. When troubleshooting in a local area network you notice that there are a large number of frame alignment
False. FCSFalse and Lag of conflict. what is the possible reason to cause this problem?
A. switch and terminal by 10/100/1000Base-T Ethernet link connected and the working mode of the switch
and terminal is half duplex
B. in most of the environment all have such False
C. working mode on 1000Base-LX/LH link don't match
D. Working mode on 10/100/1000Base-T Ethernet link don't match (Right Answers)
Answer: D
11. Which of the following description about BSR/RP mechanism is true? (Multiple choice)
A. PIM-SM domain can have multiple [Link] can only elect a BSR (Right Answers )
B. BSR through the received C-RP data packet to collect C-RP information (Right Answers )
C. BSR by flooding Bootstrap packets advertised BSR information and C-RP information to all router in PIM-
SM domain (Right Answers )
D. a C-BSR also can collect C-RP information through received C-RP data packets
Answer: ABC
12. Here on the OSI reference model which description about the sixth layer functional is corret?
A. Providing a common data compression and encryption scheme (Right Answers >
B. Establishing maintaining and terminating communication sessions
C. Synchronous Communication
D. Determining the availability of resources
Answer : A
13. auto-negotiation mode is to obtain maximum interface rate and the operating mode the network
administrator will set all Ethernet interface rate of a workgroup switch to 100Mbps operating mode
configured to full-duplex. When a NIC is configured to auto-negotiation of the workstation is connected to
the switch the outcome of consultations is that the interface rate is 100Mbps the operating mode is half-
duplex.
For this phenomenon which of the following explanation is the most reasonable?
A. At higher port speed and operating mode the workstation's network interface card cani-t be
configured to auto-negotiation
B. port rate negotiation consultations through the initial port to send FLP to negotiate work mode
does not negotiated by FLP
C. when STP in initialization will make the port enter the blocking state leading to auto-negotiation fails
so the port should be configured to portfast
D. does not configure auto-negotiation on the switch leading to the switc h can't send the FLP
information to the workstation thereby causing the work station set its own aerating mO<!e to half-
duplex (Right Answers>
E. problem lies in the workstation's network card most due to the workstation NIC drivers too old
leading to the interface on the workstation NIC learning rate and the operating mode switch
configuration
Answer: B
14. Recently the company network often attacked by ARP in order to curb ARP attac ks which of the following
technique can we use? (Multiple choice)
A. DAI (Right Answers >
B. OHCP snooping (Right Answers >
C. uRPF
Answer: ABE
15. The following description of ASM model and SSM model which is right? (please select three correct answer)
A. in SSM model the receiver can know in advance the position of the multicast source (Right Answers)
B. in ASM model the receiver will not be able to know in advance the position of the multicast source
(Right Answers)
C. for the receiver SSM model is better than ASM model
D. ASM model and SSM model use IP multicast address range is different (Right Answers)
Answer: ABD
16. Which description about ISIS extension feature is true? (Multiple choice)
A. ISIS can choose whether verification to received SNP and LSP data packets . (Right Answers >
B. When the amount of information which ISIS will publish in link-state protocol data packet POU is too large
ISIS router will generate multiple LSP fragment to carry more ISIS information. (Right
Answers >
C. After enabled router LSP fragment extension function don't need to restart ISIS process you can use this
feature .
D. If there are other vendors equipment on the network and does not support the LSP fragment function
must configure the fragment extension mode to Mode-1 or the other vendo (s device can't
identify the message. (Right Answers )
Answer : ABD
17. Which of the following description about GVRP interface registration mode in Huawei switch is true?
A. GVRP interface registration mode have four types .
B. When selecting Normal registration mode allows the interface dynamic registration and logout VLAN.
Logout here include deleting dynamically learned VLAN and VLAN administrators created
in the unit .
C. When selecting Forbidden registration mode the interface layer 2 working mode must be Hybrid.
D. When selecting Fixed registration mode interface can't spread dynamic WLAN. (Right Answers)
Answer : D
18. If there is a switch running STP and now the switch G0/0/17 interface and G0/0/18 interface are connected
by a cable then on the scenario described below which is correct ?
A. G0/0/18 interface will enter the discarding state (Right Answers >
B. Both G0/0/17 interface and GO 0/18 interface will enter the forwarding state
C. G0/0/17 interface will enter the blocking state
D. Both G0/0/17 interface and G0/0/18 interface will enter the discarding state.
E. G0/0/18 interface will continue change back and forth in listening state and learning state
F. G0/0/17 interface will always remain in the learning state
Answer : A
19. To configure AAA you first need to define the RADIUS server RADIUS server defined manner as follows: (Huawei]
radius-server template EXAM
(Huawei-radius-EXAM) radius-server shared-key cipher HUAwei123
(Huawei-radius-EXAM) radius-server authentication [Link] 1812
(Huawei-radius-EXAM) radius-server authorization [Link] 1812
(Huawei-radius-EXAM) radius-server accounting [Link] 1813
(Huawei-radius-EXAM) radius-server retransmit 2
r A True
r B. False (Right Answers >
Answer: B
20. Router HW1 exists as an MPLS LSR router in the network of the carrier HW The router receives a tagged
packet but the tag entry does not exist in its LFIB. So how does the router handle the message?
A. Router HW1 forwards the packet using the default label
B. Router HW1 strips the label and looks for the FIB to use the IP destination address
C. Router HW1 discards the packet (Right Answers >
D. Router HW1 uses LDP to create an LSP and create a new path in LFIB for the label carried in the
packet.
Answer : C
21. .HW company's network administrator assigned a private IP address for the company's internal
network host and the use of many-to-one NAT strategy enables corporate Internet users to
access the Internet. Shortly thereafter the company added a Web server within the network.
What should the network administrator do to enable external users to access the Web server over
the Internet?
A. To use reverse keyword dynamic mapping technology
B. Record the internal address of the server on the external NAT
C. Configure a one-to-one static NAT entry for the Web server (Right Answers )
D. When dynamic NAT is configured no additional operations are required since they are all
automatic
E. Place the server IP address in the NAT address pool
Answer : C
22. If there is a switch running RSTP then on the switch which interface will send BPDU carrying Proposal logo?
A. The designated port in the forwarding state
B. The designated port in non-forwarding state (Right Answers >
C. The root port in the Blocking state
D. Alternate ports
Answer : B
23. What description about 802.1 s deployment characteristics in the following is correct?
A. multiple network bridge share a spanning tree instance
B. all VLAN sharing a spanning tree instance
C. each VLAN sharing a spanning tree instance
D. more than one VLAN sharing a spanning tree instance (Right Answers
Answer: D
25. . If the topology of the entire network has not changed but the router IP subnet allocation is changed then ISIS
only use the routing information that is for PRC calculating the changes will not recalculate all SPT.
r A. True (Right Answers )
r [Link]
Answer: A
26. In HW multicast network the device needs to send a message SSM. So what is multicast address range that
SSM receives?
A. [Link]-232 .0.0.255
B. [Link]-233.255.255 .255
C. [Link]-232.255 .255 .255 (Right Answers >
D. [Link]-239.255.255 .255
Answer: C
27. Regular expressions can be used for Community-filter and AS-path-filter to define attribute types for route
filtering.
A. True (Right Answers >
B. False
Answer: A
28. There are two gateway router providing the service of connecting to external networks for a host in LAN network
What kind of technology should use on the two redundant router so that make them as the host's default
gateway of the LAM network?
A. DHCP
B. RIP
[Link]
[Link] (Right Answers >
[Link]
Answer: D
29. What do we usually call for the device in MPLS BGP VPN domain? (Multiple choice)
A. P (Right Answers)
B. CPE
C. PE (Right Answers >
D. User router
Answer: A, C
30. The host HW1 in the HW device network wants to join a video conference then what should the host do?
A. Unicast IGMPv2 membership report to the local network default router
B. In the local network sending IGMPv2 membership reports through multicast and in IGMPv2 membership report
the carried multicast address is what the expected multicast address (Right
Answers >
C. sends a unicast IGMPv2 membership reports to RP
D. In the local network send IGMPv2 membership reports through multicast the sending destination multicast
address of the IGMPv2 membership report is "all PIM routers" [Link] multicast address
Answer: B
31. In the MPLS VPN network some devices maintain VPN routing information and the private information to ensure
it can forward VPN packets These devices not only need to run routing protocol but also need to run the MP-
BGP and MPLS protocols What type are these devices?
A. CE
C.P
D. Host
Answer: C
32. How to deal with BPDU by 820.1w and 802.1d?
A. 802.1w bridge just forward BPDU package received from the root bridge
B. 802.1d bridge does not forward BPDU package
C. 802.1d bridge just forward BPDU package received from the root bridge (Right Answers )
D. 802 .1w bridge does not forward BPDU package
Answer: C
33. What are the differences between the traffic regulation and traffic shaping? (Multiple Choice)
A for traffic shaping the router will cache the excess packets until bandwidth available again (Right
Answers >
B. for traffic regulation can adjust the cache for more than CIR traffic area usage
C. for traffic shaping can adjust the cache for more than CIR traffic area usage (Right Answers)
D. using plastic traffic in the entrance direction in export direction using the traffic regulation
E. traffic regulation using the token bucket algorithm traffic shaping the SPD algorithm
Answer: A, C
34. In TCP header information which control position will make the receiver reset the TCP connection?
A. SND
B. ACK
[Link]
E. PSH
[Link]
Answer: D
35. In the VLAN (802 .1Q) data encapsulation the number of showing the priority field is six in total.
A True
Answer: B
36. In BGP what is the common learning BGP routing methods? (Multiple choice)
A introduce direct route (Right Answers>
B. introduce static routes (Right Answers >
C. introduce other AS's BGP routers
D. receiving neighbor routes information (Right Answers >
Answer: A, B, D
37. Which AS_PATH can Command IP as-path-filter 1 permit •12. •74$ be matched to?
A. AS_PATH (321 12 2374)
Answer: B
38. About the description of BGP reflector which is correct? (Multiple choice)
A. in the case of without routing reflector IBGP neighbor relations need to be fully connected. The introduction
of routing reflector can lower demand on the Internet (Right Answers>
B. routing reflector can notify all clients of the routers that it learns from one client. (Right Answers >
C. routing reflector can notify all client and non-client of the routers that it learns from one client (Right Answers
>
D. routing reflector can notify all client and non-client of the routers that it learns from IBGP neighbors
Answer: A, B, C
39. MPLS BGP VPN is L3 VPN technology and it is used to provide VPN solutions (PPVPN). What are the basic
components of MPLS BGP VPN?
A CE and P
C.P and PE
D. SP
Answer: B
40. The interface Serial 0 of an existing router is in OSPF area 1 and the interface Serial 0 is set as the Silent
interface. What effect does this setting have?
A. OSPF receives routing updates from its neighbors
B. OSPF establishes the available adjacenc y through this interface
C. OSPF does not add routes learned from this interface to the local routing table
D. OSPF does not establish any adjacenc y through this interface (Right Answers>
Answer: D
41. The following description about the pop-up on the penultimate jump which is correct? (Multiple choice)
A PHP only for direct subnet or aggregate route
B. The penultimate hop pop-up can only be used in LOP
C. The penultimate jump pop-up only applies to the label stack where one or two labels are present
D. When using PHP the edge LSR may ask its upstream neighbor to performthe operation of the label pop-up
(Right Answers >
E. The last jump pop-up requires a special label to pass through the LOP which is also called an implicit tag
(Right Answers >
Answer: D, E
42. What is the correct order of using TCP port 443,179,137,110 and 23 protocols?
A. BGP, POP3, SNMP, TFTP, Telnet
B. LDAP, SNMP, TFTP, POP3, Telnet
C. HTIPS, SNMP, POP3, DNS, Telnet
D. Finger, DHCP Server, NetBios Name Server, POP3, Telnet
E. HTIPS, BGP, NetBios Name Server, [Link] (Right Answers )
Answer: E
43. . What benefits can the link bring after enabling WRED? (Multiple choice)
A. thoroughly to avoid congestion
B. Avoid TCP synchronization (Right Answers )
C. offer a minimum bandwidth guarantee
D. provide a certain amount of low latency
E. can avoid UDP taking up most of the bandWidth when congestion (Right Answers >
Answer: B, E
44. When VRP's ACL has a number of matching rule about the match order, which of the following statement is
true?
A. By default , in accordance with the rule-id, from small to large to match . (Right Answers >
B. By default , according to the first match permit , then match deny order to match .
C. By default , in accordance with the principle of "depth first " match .
D. Only one match order can not be changed.
Answer: A
46. Which of the following is access control method which is provided by the NAG? (Multiple choice)
A. 802.1x authentication (Right Answers )
B. AAA authentication
C. MAC address authentication (Right Answers )
D. Web authentication (Right Answers )
Answer: A, C, D
47. Command ip as-path-filter as-path-filter-number {deny I permit} regular-expression is used to configure AS-
path-filter . On this command, many clause may form as-path-filter sentence . So what is the relationship
between multiple statements?
A. and relationship
B. or relationship
C. routing sequential matching, after a route match to a clause, no longer matching downward (Right Answers >
D. routing sequential matching and routing must match all clauses
Answer: C
48. command:Ip ip-prefix ip-prefix-name [ index index-number ) { permit Ideny } ipv4-address mask-length [ greater-e
qual greater-e qual-value ) [ less-equal less-equal-value ) is used to configure IP prefix-filter.
If a prefix list less-equal has been specified, but greater-e qual is not specified, then what is the range of prefix?
A. [O,less-equal-valueI
50. In multicast networks, what conditions will lead to forwarding the multicast traffic failure? (Multiple Choice)
A. the router doesn't have RPF routing (Right Answers >
Answer: A, B, C
51. . Which of the following description about the Register messages of PIM-SM is correct ? (Multiple Choice)
A. Register messages are sent by the recipient router
B. Register messages can make RP learn the multicast source information (Right Answers )
C. Register messages are sent by source's DR (Right Answers )
D. Register message are sent to RP via unicast instead of multicast (Right Answers )
Answer: B, C, D
52. When the router builds its own routing table according to the routing entries which are learn from different
routing protocols, which of the routing entries will be added to the routing table?
A. has a maximum preference value's routing entry
B. the routing table with low Router ID
C. route entry with largest next-hop address
D. the route entry which has the fastest routing process
E. unique routing entry (Right Answers >
Answer: E
54. Now there is a running OSPFs routing HW1. HW1 interface serial 0 published in area 0, interface serial 1
published in area 1. Under the OSPF process, configuring commands "nssa default route advertise".
Accordi ng to the previous description, which of the following options is correct? (Multiple Choice)
A. HW1will inject Class 3 default route to area 1
B. HW1will inject Class 7 default route to area 1 (Right Answers >
C. HW1will inject Class 7 default route to area 0
D. When HW1 inject default route to area 1, HW1 local router table needs to have a default route (Right
Answers)
E. When HW1 inject default route to area 1, HW1 local routing table cannot contain a default route
55. You are to complete a job that is to try to compress the length of the 1Pv6 address.
Existing 1Pv6 address is [Link] :0000 :09C0:876A:130B,in order to enable the 1Pv6 address more
concise, which kind of the following the 1Pv6 address can be compressed into?
A. [Link]
B. 2013::130F::9C0 :876A:130B
C. [Link] :876A:130B
D. 213 ::13F::9C:876A:13B
E. [Link] :876A:130B (Right Answers )
Answer: E
56. Except the stateless address auto-configurati on,1Pv6 device may also obtain address, gateway, DNS and other
information via DHCPv6.
r A True
57. The following description of about ISIS routing priority, which is correct?
A. ISIS database's Level-1 and Level-2 routing, the routing priority value is different.
B. ISIS default routing priority is 15. (Right Answers >
C. ISIS routing priority cannot be mod ified.
D. ISIS polymerization route priority is 10.
Answer: B
58. The following on ISIS LSP fragment extension description which is correct?
r A make ISIS router generate more LSP fragments to carry more ISIS information. (Right Answers >
r B. ISIS fragment extension is also valid to the Hello packets.
r C. ISIS fragment extension is implemented by adding a virtual system, it can be extended up to 1000 virtual
systems.
r D. The number of fragments that ISIS router can generate is up to 1024
Answer: A
59. Routers HW1 and HW2 are IP multicast routers. These routers use (S,G) entry to forward the packet. Which is
the correct description about the "S" on the forwarding entry of the following?
A. SSM address
B. Management a part of the multicast address
C. SDP/SAP address
D. Any Type A, Type B or Type C host address (Right Answers)
E. GLOP address
Answer: D
60. In HW MPLS network, which parameters are used to define a forwarding equivalence class? (Multiple choice)
A. IP prefix (Right Answers)
B. Layer 2 link (Right Answers)
B. reserving Neighborhood configuration and maintain BGP neighbor relations, but cannot accept the router sent
by a neighbor.
C. reserving Neighborhood configuration and maintain BGP neighbor relations, but cannot notify routes to neighbors.
D. reserving Neighborhood configuration and interrupt the BGP neighbor relationship and clears all the related routing
information (Right Answers )
Answer: D
62. You have two routers run BGP connected to different ISP. You want to affect the Internet into your network traffic ,but
your company is prohibited to use BGP communities. The best way to achieve the aforementioned requirements?
A. the route(s cost adjustment
B. use MED
C. increase the router PreVal
D. reduce the route(s Local Preference
E. use AS-path additive (Right Answers>
F. use Metrics
Answer: E
C. access terminal
D. policy server (Right Answers >
Answer: A, B, D
64. If you are a company's network engineer, you want to make the two routers across a firewall to form EBGP neighbor
relationship. In your network, the firewall in the beginning has been allowing TCP sessions (the Internet connection
firewall internal interface).
In order to enable the network to run correctly BGP, what kind of preparatory work needs to be done?
A. In the network, need to configure EBGP multi-hop (Right Answers >
B. just normal BGP neighbor,do not do any other operations on the router or firewall
C. firewall must open BGP protocol port
D. impossible to make BGP sessions to pass through the firewall
Answer: A
65. The switch uses IPSG technology to verify the source address of the IP packet. The calibration table that IPSG uses
is obtained by monitoring the ARP analysis in the network.
A. True
B. Fales (Right Answers )
Answer: B
66. Which of the following option is true? (Multiple Choice)
A. unicast and broadcast cannot effectively achieve data transmission between a source and a plurality of
destination in the P2MP, but multicast technology enables
B. Multicast is used for "many" applications (Right Answers >
C. Because multicast create the connection based on TCP, so multicast technology ensures the data
transmission is reliable
D. multicast technology can reduce redundant traffic , thus saving network bandwidth (Right Answers >
Answer: B, D
67. What is the role of the Hello message in PIM-SM? (Multiple Choice)
A. Be used to establish and maintain neighbor relationship (Right Answers >
B. Be used to advertise the information of BSR/RP
C. Be used to elect DR and BDR
D. Be used to negotiate the parameters between neighbors (Right Answers >
Answer: A, D
69. When you troubleshoot error to a LAN which deployed Huawei device, you find that there are a large number of
unicast frames unknown the source MAC address in LAN. What is the greatest harm to the switch caused by the
large number of unknown unicast source MAC address?
A. Consume the available MAC address table entries in the system (Right Answers >
B. Increase power consumption
C. Occupy the memory of the cache frame
D. Occupy TCAM table entry
E. Consume available bandwidth
Answer: A
70. In a switched network, what's the reason for leading to rapid growth of the TAC set BPDU packet? (Multiple Choice)
A. For a switched network, it is normal to find the TAC set BPDU packet
B. Used an incorrect cable in the network (Right Answers >
C. Does not configure the edge port on the interface connected terminal in the network (Right Answers >
D. In this network, the root switch CPU utilization is too high, cannot send any BPDU packets
Answer: B
71. According to the current network and configuration information, after completing the configuration , what will happen?
RTA £0
72. Which command is related with BGP route reflector? (Multiple Choice)
A. peer reflect-client (Right Answers >
B. reflect between-clients (Right Answers >
C. reflector cluster-id (Right Answers >
D. group 1 internal
Answer: A, B, C
73. In the data communication session of the two hosts ,which hierarchy of OSI model of the other end of the host
communicates with the session layer of OSI model of the end of the host?
A. communicate with the presentation layer of the other end
B. communicate with the Physical layer of the other end
C. communicate with the session layer of the other end (Right Answers >
D. communicate with the data link layer of the other end
E. communicate with the application layer of the other end
Answer: C
74. ICMPv6 uses Type field to identify the type of packet, according to the value of the Type field, we can divide the
ICMPv6 packets into two catergories: one is the error packets, the other is the information packets.
A. True (Right Answers )
B. Fales
Answer: A
75. In RSTP, which kind of port can provide the backup path to reach the root node of the spanning tree? What is the
status of the port?
A. Root Port and Listening State
B. Alternate Port and Forwarding State
C. Alternate Port and Listening State
D. Designated Port and Listening State
E. Alternate Port and Discarding State (Right Answers >
Answer: E
76. About VRRP load balancing, which of the following description is correct? (Multiple Choice)
A. You can create multiple VRRP groups on an interface of a router. The router can be used as either a master
VRRP backup group, oy also as a backup of other VRRP backup group (Right Answers)
B. VRRP load balancing requires at least two virtual routers to provide forwarding services (Right Answers)
C. When deploying load balancing, requires a host with a local area network to configure different virtual router IP
address as the default gateway address (Right Answers )
D. When configuring priority, ensure that the same router in three VRRP groups as master
Answer: A, B, C
77. A HW new users complain that his computer connect to the Internet network qualit y is very poor.
Which reason can lead to poor quality of network, network conflict and intermittent communication interrupt
between the user and switch interface?
A. use the wrong type of cable
B. work pattern don't match (Right Answers >
C. switch ports are disabled
D. interface rate does not match
Answer: B
78. Which of the layers are shared in OSI reference model and TCP/IP model? (Multiple Choice)
A. Session Layer
D. Presentation Layer
E. Physical Layer
F. Application Layer (Right Answers >
Answer: C, F
79. As following, about the LOP synchronization in ISIS, which statement is correct ?
A. LOP establishes neighbor faster them ISIS, so LOP synchronization is off by default.
B. LOP synchronization can avoid the traffic lost when the standby link switch. (Right Answers )
C. LOP synchronization just open globally.
D. LOP synchronization can be deployed on the Loopback interface.
Answer: B
80. About IPvG over 1Pv4 tunnels, the correct statement as following is:(Multiple Choice)
A. Generally, create a Tunnel interface when configure the manual tunnel on the VRP platform; but create a
Virtual-Template interface generally when configure the manual tunnel.
B. Automatic Tunnel has a great advantage relative to the manual tunnel, it will phase-out the manual tunnel.
C. 6to4 automatic tunnel need to use the specified IPvG address field, the prefix of the assigned address is 3ffe::/
16.
D. All the data encapsulation types of automatic tunnel are the same. (Right Answers >
E. ISATAP tunnel decides the tunnel's destination IPvG address according to the destination 1Pv4 address.
(Right Answers )
Answer: D, E
81. In a basic network layer data packet, what information may be contained in it? (Multiple Choice)
A. Data Link Layer Header
B. Upper Layer Header (Right Answers )
C. Network Layer Header (Right Answers >
D. Trail
82. If you want an EBGP neigh bor advertisement [Link]/27, then which is correct command of the following?
A. network [Link]
Answer: A
84. You want only telnet traffic to access the server (address is [Link]).
85. When RIPng configured authentication, the password information used by the authentication will occupy the position
of the first routing message in the routing update.
A. True
B. Fales (Right Answers >
Answer: B
86. There is a new HW office needs to use their router as a DHCP server.
When configuring the DHCP server to provide DHCP services for HW office ,which of the following two need to
configure? (Please select 2 correct answers)
Answer: B, C
87. As shown, the packet content field of HVRP's frame structure contains all the legitimate user VLAN information.
Destination MAC Source MAC Agreement Sign Agreement Type MSTP Instance Number Pacl<et content
Answer: A
88. When three layers switches will originate from IP message of a VLAN is sent to another VLAN, which fields of the
message will be rewritten?
A. Three layer destination address
B. Three layer source address
C. Two layer TIL
D. Three layers TIL (Right Answers >
89. DHCP server can specify the assigned IP address according to the MAC address of the client,can also assign IP
address according to the client's access switch and access port .
A. True (Right Answers >
B. Fales
Answer: B
B. Domain checking
C. Accounting
D. Privacy (Right Answers >
Answer: A, D
91. Each DD message has the serial number which is used for data confirmation. A DD sequence number length is 2
bytes.
A. True
B. Fales (Right Answers >
Answer: B
92. In the following Huawei device, which description about port mirroring is correct ?
A. Huawei devices support to make control flow which gets to the CPU be port mirroring. (Right Answers)
B. If observing that port congestion occurs, due to the priority of mirrored packets is high, so it will not be
discarded.
C. Huawei device supports flow-based port mirroring, and mirroring stream can be copied to multiple observing
ports.
D. The traffic in RSPAN transmit to the observing port via multicast way.
Answer: A
93. 1Pv6 introduces Solicited-Node address, which of the following description about the address is correct?
A. This is a particular address, it is used to resolve MAC addresses in ARPv6.
B. router interface's Solicited-Node Address is generated automatically, and can have more than one. (Right
Answers >
C. If you do not configure Solicited-Node address, the router will automatically generate one on each interface .
D. 1Pv6 introduces Solicited-Node address is to support 1Pv6 multicast.
Answer: B
94. In the ISIS broadcast network database synchronization process, which of the following statement is correct ?
Rl
R3
R2
DIS
96. You need to configure policy routing on the router to specify a particular traffic through an interface to forward.
When using policy-based routing, which of the two most typical information can be used to make traffic forward
along a specific path?
A. TIL and source IP address of the packet
B. source IP address and the second floor source address
C. source IP address and a specific protocol (such as FTP, HTIP, etc.) (Right Answers >
D. service type header and message length
Answer: C
97. LS serial number field is used to detect the outdated and duplicate LSA This field is a 32bit signed integer, so the
smallest serial number is Ox80000000 .
A. TRUE
B. FALSE (Right Answers)
Answer: B
99. In traffic monitoring policing, using double barrel double speed, the number of tokens in C bucket is TC, the number
of tokens in P bucket is TB. When a message whose length is B enters, which of the description is correct? (Please
select three correct answers)
A. If TP -B>O and TC-B>O, the message is marked green (Right Answers >
B. If TP-B>O and TC-B<O, the message is marked yellow (Right Answers)
C. If TP-B<O and TC-B<O, the message is marked red (Right Answers)
D. If TP -B>O and TC-B<O, the message is marked green
Answer: A, B, C
Answer: D, E, F
101. The users want the router to forward the packet and choose the routing according to their own defined policy and
based on traditional routing forwarding. In order to implement the goal, you can use policy routing.
Which of the following description about policy routing is wrong?
A. policy routing cannot be used to set the IP precedence (Right Answers )
B. policy routing can't set the DSCP routing in a statement
C. policy routing can set the next-hop IP address
D. policy routing can be used to match a message length
Answer: A
102. Which of the following description about OSPF adjacenc y and link-state database synchronization is correct?
A. When the OSPF router status reaches LOADING state, then FULL adjacenc y forms
B. adjacency begins from EXSTART state (Right Answers )
C. In the broadcast network, FULL adjacenc y will be formed among all routers
D. INIT state indicates that the router has received Hello message from the neighbor, and the Hello message
has already contained its own Router ID
Answer: B
103. In Huawei devices, when ISIS imports external routes and set routing information's external route tag, ISIS's Metric
keep the default type without modification.
A. True
B. False (Right Answers >
Answer: B
104. The quality of a company's network link is poor. it often failure leads to route flapping. even occasionally routing
loop, in order to prevent recurring of this phenomenon, the network administrator decided to deploy the uRPF in
the whole network to improve network stability.
A. True
B. Fales (Right Answers )
Answer: B
105. On the router HW1,you want to see the status of the frame relay connection. Which command displays the status
of the frame relay PVC? (Multiple Choice)
A. display frame relay pvc
B. display fr interface Serial 01010 (Right Answers >
C. display fr inarp-info
D. display fr lmi-info
E. display fr map-info interface Serial 01010 (Right Answers >
106. uRPF is split into loose mode and strict mode, to the harsh environment with more attack, it is recommended to
use strict mode to close check to attack data; and that the internal network with good management can use the
loose mode to conseive device resources.
A. True
B. Fales (Right Answers )
Answer: B
107. One company has deployed the SSM multicast, in order to save the bandwidth consumption that the multicase date
in the LAN,network administrators made the following configuration on the switch 85700 :
A. True
B. Fales (Right Answers )
Answer: B
Answer: D
109. If need to configure the routing policy on a router.
Which of the following parameters are based on by the administrator when deployed the routing policy? (Multiple
Choice)
A. The size of the package (Right Answers >
Answer: A, B, C, D
110. The following description about link-state routing protocol, which is correct ? (Multiple Choice)
A. The router will send all the link-state information which come from one neighbor to all the other neighbors to
ensure the synchronization of the database.
B. The router in the flooding domain may receive the same link state information repeatedly. (Right Answers >
C. Each router establishes an entire flooding domain topology structure. (Right Answers >
D. The routers in the entire flooding domain have the same link state database. (Right Answers >
E. Every router directly learn from routing updates routing entries and added to the routing table.
Answer: B, C, D
112. When DLDP detects a unidirectional link in the fiber, the default actions of Huawei device include: the DLDP state
machine migrates to Disable state; output Trap information; set the interface as the blocking state
automatically.
A. True (Right Answers )
B. Fales
Answer: B
113. In the MPLS VPN network, it needs to establish the MP-IBGP neighbor relationship between PE, so which
interface will be recommend to use to establish MP-IBGP neighbor relationship?
A. [Link]
B. 224.0.0 .1
C. [Link]
D. [Link]
E. [Link] (Right Answers >
Answer: E
116. Now there are two community-filter: ip community-filter 1 permit 100:1 200:1
Which of the description about the above community-filter is correct? (Multiple Choice)
A. Only when the community attribute value carried in BGP routes contains 100 :1 and 200:1, the BGP
routing will match community-filter 1 (Right Answers)
B. As long as the community attribute value carried in BGP route contains 100:1 or 200 :1, or both, the BGP
routing will match community-filter 1
C. Only when the community attribute value carried in BGP routes contains 100:1 and 200:1, the BGP routing
will match community-filter 2
D. As long as the community attribute value carried in BGP routing contains 100: 1 or 200:1, or both, the BGP
routing will match community-filter 2 (Right Answers )
Answer: A, D
117. In Huawei Switch, the Hybrid port can choose the VLAN1 as Untagged ULAN.
A. True (Right Answers >
B. Fales
Answer: A
118. In the ISIS broadcast network type, when establishing the process of adjacenc y, if the router interface priority
is set as 0, it will not participate in DIS election.
A. True
B. Fales (Right Answers >
Answer: B
119. Which timer of the STP timer does stipulate the frequency that the root bridge sends configuration BPDU?
A. STP timer
B. Hold timer
C. Hello timer (Right Answers )
D. MaxAge timer
E. Forward Delay timer
Answer: C
120. In HW IP multicast network, there are multiple sources, and each source has a number of recipients.
Which of the following protocol allow the flow from the source to the RP and the flow from RP to receivers share the
same tree?
A. PIM-DM
B. MOSPF
C. DVMRP
D. Bidirectional PIM (Right Answers )
E. PIM SM
Answer: D
121. In command, aggregate ipv4-address {mask I mask-length} (as-set I attribute-policy route-policy-name1 I detail-
suppressed I origin-policy route-policy-name2 I suppress-policy route-policy-name3]. in multiple arguments can be
used to affect the summary route and its results.
About the command description, which is correct? (Multiple Choice)
A. If you have configured As-set, the summary route AS_PATH contain all detailed routers AS information to
prevent routing loops. (Right Answers )
B. If you configure the Suppress-policy, will produce an aggregation route, the if-match clause in Route-policy to
select suppression specific routes. The specific routes of matching Route-policy will still be advertised to
other BGP neighbors
C. If you configure the Origin-policy, only the specific routes matched with the Route-policy can participate
aggregation (Right Answers )
D. If you configure Attribute-policy, you can change the attributes of the aggregation route (Right Answers )
E. Answer: D
122. IPTV business send the video data using multicast type, when the user changes the channel, the multicast traffic
of the original television program will continue to send for sometime, when the user frequently changes channels,
the situation is more serious.
To minimize the unwanted multicast traffic , what agreement is recommended to deploy?
A. IGMPv1
B. IGMPv2 (Right Answers >
C. MLD
D. GVRP
E. IGMP snooping
Answer: B
123. What are the methods for dividing VLAN in Huawei Switch? (Multiple Choice)
A. Divide based on Port (Right Answers>
B. Divide based on IP Subnet (Right Answers>
Answer: A, B, C, D
125. Multicast address range of SSM model default is [Link]/[Link] of the following configuration can modify SSM
model multicast address range?
A. in the system view, running command ssm-policy basic-acl-number can modify SSM model multicast
address range
B. in the system view, running command ssm-policy advanced-ad-number can modify SSM model multicast
address range
C. in PIM view, running command ssm-policy basic-acl-number can modify SSM model multicast address range
(Right Answers >
D. in PIM view, running the command ssm-policy advanced-ad-number can modify SSM model multicast address
range
Answer: C
126. Router HW1found on a large number of DE the frame of the bit is set to 1. In the frame relay, DE is part of the
congestion control. Generally, which of the following mechanism DE will bits unite to use?
A. BECN/FECN (Right Answers)
B. CoS
C. ToS
D. FRTS
E. DSCP
Answer: A
127. Run OSPFv3 and ISIS on routers at the same time ,need to be introduced OSPFv3 routing into ISIS, what kinds
of following introduced configuration is correct? (Multiple choice)
A. (Huawei) isis 1 (Huawei-isis-1) is-level level-1 (Huawei-isis-1) network-entity 47.0001.0000 .0000 .0002.00
(Huawei-isis-1) ipv6 enable topology standard (Huawei-isis-1) ipv6 import-route ospft3 1 level-1 [Huawei-isis-1)
quit (Huawei) ospft3 1 (Huawei-ospft3-1) router-id [Link] (Right Answers )
B. (Huawei) isis 1 (Huawei-isis-1) is-level level-1 (Huawei-isis-1) network-entity 47.0001.0000.0000 .0002 .00
(Huawei-isis-1) ipv6 enable topology standard (Huawei-isis-1) ipv6 import-route ospft3 1 (Huawei-isis-1) quit
(Huawei) ospft3 1 [Huawei-ospM-1) router-id [Link]
C. (Huawei) isis 1 (Huawei-isis-1) network-entity 47.0001.0000.0000.0002 .00 (Huawei-isis-1) ipv6 enable
topology standard (Huawei-isis-1) ipv6 import-route ospft3 1level-1 (Huawei-isis-1) quit (Huawei) ospft3 1
(Huawei-ospft3-1) router-id [Link] (Right Answers )
D. (Huawei) isis 1 (Huawei-isis-1) network-entity 47.0001.0000.0000.0002.00 (Huawei-isis-1) import-route
ospft3 1 (Huawei-isis-1) quit (Huawei) ospft3 1 (Huawei-ospM-1) router-id [Link]
E. [Huawei) isis 1 (Huawei-isis-1) is-level level-1 (Huawei-isis-1) network-entity 47.0001.0000 .0000 .0002.00
(Huawei-isis-1) import-route ospft3 1 level-1 (Huawei-isis-1) quit (Huawei) ospft3 1 (Huawei-ospM-1) router-id
[Link]
Answer: A, C, D
129. An existing network running OSPF, what type of LSA can cause ISPF operation? (Multiple choice)
A. category 1 LSA (Right Answers >
B. category 2 LSA (Right Answers >
C. category 3 LSA
D. category 4 LSA
E. category 5 LSA
Answer: A, B
130. Which of the following description on the external route tag of ISIS is correct? (Multiple choice)
A. Only when the IS-IS cost type is Wide, Wide-compatible or Compatible, released LSP will carry the external
route tag. (Right Answers >
B. ISIS external route tag only takes effect on the Level-2 routes .
C. ISIS external route tag is enabled by default.
D. the value of ISIS external route tags is in the range of 1 to 4294967295. (Right Answers )
E. ISIS external route tag is used to filter routing. (Right Answers >
Answer: A, D, E
131. Router HW cannot access the remote network host. Did not run a routing protocol on the router HW and only
reach the remote network through a default route. On the router HW using the extended ping remote file server
address is 10.5 .[Link] on the router HW ping rendered as;' Request time out'".
According to the above description, which of the following statement is wrong?
A. next-hop router of router HW has no path to the destination address
B. Router HW has no legal route to the destination address (Right Answers >
C. ICMP packets can reach the destination address, but the destination device failed to reply
D. Ping is successful , but the route to the destination address occur congestion
E. There is a firewall the remote destination network, and there is no release of ICMP traffic
Answer: B
132. Community-filter has two types of basic community attribute filter and advanced community attribute filter.
Which filtering tools can enable advanced community attribute filter is more flexible than the basic community filter
to match the community attribute?
A. IP-prefix
B. AS-path-filter
C. Regular-expression (Right Answers >
D. ACL
Answer: C
133. ISISI- types of authentication include interface authentication, area authentication, routing domain
authentication.
A. True (Right Answers l
B. False
Answer: A
134. Compared with 1Pv4 multicast, which of the following description is the 1Pv6 multicast features?
A. 1Pv6 multicast loading splitting function extends multicast routing rules, which does not entirely depend on the
RPF check
B. 1Pv6 multicast clients use IGMPv3 to join a multicast group
C. 1Pv6 Multicast doesn't contain MSDP and dense mode
D. the first 8bit of 1Pv6 multicast address is always FF (1111 1111) (Right Answers )
Answer: D
135. Which of the following PIM protocol packets use unicast address as their destination address? (Multiple choice)
A. Assert message
Answer: B, C, D
136. Which of the following description about the Ethernet VLAN is True?
A. VLAN does not support batch created on the device .
B. VLAN range is from 0 to 4096.
C. Huawei equipment default retention VLAN of 4000 to 4010.
D. VLAN can expand the use scope through QinQ technology (Right Answers >
Answer: D
137. A router receives a BGP route with the community attribute No-Export, how will the router handle the BGP
routing?
A. Discard the route directly.
B. No longer advertise to other BGP routers.
C. Only advertise to IBGP neighbors. (Right Answers >
D. Normally advertise the route, but the route is not used to forward data
Answer: C
138. HW device network administrators plan to migrate IGMPv2 in the multicast network to IGINPv3. IGMPv3 compared
with IGMPv2, what place should be improved? (Multiple Choice)
A. IGMPv3 adds the function which specified to not join the multicast group with specific multicast source
(Right Answers >
B. IGMPv3 adds the function which specified to join the multicast group with specific multicast source (Right
Answers >
C. IGMPv3 adds the Request-to-sen and Clear-to-send between the source and the local IGMP queries
D. IGMPv3 deletes report-suppression function for membership report (Right Answers >
E. IGMPv3 deletes the function that a wildcard join all sources in the multicast group
Answer: A, B, D
139. Now there is an As-path-filter: ip as-path-filter 1 permit.'£- 1001400 £© $,what AS_PATH attributes can be matched
by this As-path-filter?
A. 100 (Right Answers >
B. 3100 (Right Answers )
C. 1234 1400 (Right Answers >
D. 300 4200
Answer: A, B, C
140. Which routing selection tool can only specify the matching conditions aiming at the autonomous system (AS) path
domain?
A. ACL
B. IP-prefix
C. AS-path-filter (Right Answers )
D. Community-filter
Answer: C
141. As following is the process of the RSVP bandwidth reseivation:R1 applies for the bandwidth reservation to the
downstream node R2 through Path information, R2 uses Resv information to reply after receiving the requestment
; then R2 continues to apply for the bandwidth reservation to its downstream node R3 using Path information, and
so forth, until the egress router reached.
A. True
B. Fales (Right Answers >
Answer: B
142. About the description of configuring BGP4 + which is correct? (Multiple Choice)
A. The Router-ID of BGP4+ is consistent with the Router-ID of BGP4. (Right Answers )
B. When BGP4+ specified the peel, it must use the Link-Local address.
C. BGP4+ route s next hop does not use the Link-Local address. (Right Answers >
D. When BGP4+ configuring the reflector, the roles of reflector and client need to be consistent with the BGP4
configuration.
E. BGP4+ does not support the router reflector .
Answer: A, C
143. If a switch Ethernet interface by twisted-pair is connected to another switch Ethernet interface, then what the
line sequence should be like?
A. 1->3 £, 2->6 £, 3->1 £, 6->2 (Right Answers >
Answer: A
144. HW users are very much transmission via TFTP file. What protocol is relied on by TFTP for transmission?
A. ICMP and UDP
B. IP and TCP
C. NFS
D. FTP
E. UDP (Right Answers >
Answer: E
145. An existing As-path-filter: ip as-path-filter 1 permit A 100 L100) '(- 400) '$,which AS-PATH attribute cannot the
As-path-filter match?
A. 100
B. 100 200 900 (Right Answers)
C. 100 400
D. 100 400 400 400
Answer: B
146. Which of the following information does STP based on to calculate path cost?
A. interface bandwidth (Right Answers >
B. interface delay
C. interface bandwidth and delay
D. hops
E. bridge priority
Answer: B
147. There is a network composed by router R1, router R2, router R3 and router R4. The four routers are
interconnected by a LAN network. All four routers deploy the basic OSPF. When you are executing the command
"display ospf peer" on Router 2 you will find the status between Router2 and Router3 is "2-way".
So from this output, what conclusion can you draw? (Multiple choice)
A. the router R2 is DR or BDR
B. router R3 is neither DR, nor the BDR (Right Answers >
C. router did not form a full adjacency relationship between R2 and R3 router (Right Answers >
D. router R2 is not DR (Right Answers >
E. the router R4 is DR
Answer: B, C, D
148. You are now in a LAN troubleshoot, and you suspect that the error was due to operating mode mismatch .
Which switch interface error indicates the 10/100/1000 IEEE Gigabit interface operating mode mismatch? (Multiple
choice)
A. Alignment Error (Right Answers >
B. FCS Error (Right Answers l
C. Multiple Collisions
D. Ultra-small Frame (Right Answers >
E. Excessive Conflict (Right Answers l
F. Lag Conflict (Right Answers >
Answer: A, B, D, E, F
Isis1
network-entity 10.0000.0000.0001.00 import-route direct
filter-policy ad-name abc export Isis 2
#
interface LoopBack0
ip address l0.1.1.1255.255.255.0
ip address l0.1.3.1255.255.255.0 sub
ip address l0.1.2-1 [Link] sub
#
interface GigabitEthernet0/0/0
ip address 100.1.1.1255.255.255.0 lsls2
isis enable1 network-entity 10.0000.0000.0002.00
#
#
Interface GigabitEthernet0/0/0
acl name abc Ip address100.1.1.2 [Link]
rule 10 permit ip source [Link] [Link]
A. R2 can learn R1 all routes (Right Answers l
B. R2 can learn [Link]/24 router.
C. R2 can learn [Link]/24 and [Link]/24 two routes.
D. R2 can receive R1 LSP, but cannot be added to the routing table.
Answer: A
150. In order to improve the securit y of ISIS protocol, you can configure the authentication in ISIS protocol, there are
three authentication methods, namely the interface certification, domain authentication and routing domain
authentication.
A. True (Right Answers )
B. False
Answer: A
151. When MPLS network carrying IP packets, TIL will be how to deal with? (Please choose 2 correct answers)
A. MPLS label head TIL is set to 255 (Right Answers >
B. In the direction of the boundary of LSR, IP packet TIL is copied into the TIL field of MPLS (Right Answer)
C. MPLS label header TIL is set to 0
D. In the direction of the boundary of LSR to disable the TIL
E. In the MPLS domain, TIL cannot be disabled
Answer: A, B
152. Judgement: NAC is an end-to-end security solutions. From user terminal rather than equipment to protect the
network securit y.
A. True (Right Answers >
B. False
Answer: A
153. Which of the following description about data traffic load sharing in Huawei equipment is true?
A. only LACP and LLDP protocol in Huawei devices can implement data traffic load sharing.
B. Huawei device supports PoS, Serial, Ethernet and other types of interface link aggregation and load sharing.
(Right Answers >
C. under the Huawei switches Eth-trunk interface, the default is based on source MAC address and destination IP
address foreignlands for load sharing.
D. under Huawei switches Eth-trunk interface may be based on data frame CoS values do hash algorithm to
achieve load sharing.
Answer: B
154. As shown, in the configuration of router R3 set ISIS overload bit, which of the following statement is True?
(Multiple choice)
A. R3 starts overload state, R1 and R2 will not calculate the R3 generated LSP in SPF tree.
B. R3 LSP will not be able to spread to R1 and R2.
C. R3 direct route because of the overload bit set will be ignored by R1 and R2.
D. R3 imported routes through import-route will not be able to publish. (Right Answers >
E. when router memory is insufficient, the system will automatically set the overload flag bit in sent LSP packets,
it is irrelevant to whether the user configure the set-overload command. (Right Answers)
Answer: D, E
155. Which of the following is only used for BGP to choose routing? (Multiple choice)
A. ACL
B. IP-prefix
C. AS-path-filter (Right Answers >
D. Community-filter (Right Answers >
Answer: C, D
156. Which type of prefix will router running BGP circular to their IBGP neighbor (assuming that the router is not configured as a
route reflector)?
A. prefix is learned through other BGP neighbors, or prefix is introduced by the local network or routing learned
B. the prefix exists in the routing table
C. prefix is learned through EBGP neighbors, or prefix is introduced by the local network or routing learned (Right
Answers >
D. prefix is learned through EBGP neighbors, or learn the prefix from the RR
E. prefix is learned through other IBGP neighbors, or prefix is learned from EBGP neighbor, or the prefix is introduced
by routing learned E. prefix learned through other IBGP neighbors, or learn the prefix from the RR
Answer: C
157. RD is used to distinguish same IP address between different VPN. RD contains how many bit?
A. 16
B. 32
C. 64 (Right Answers >
D. 128
Answer: C
158. In RIPng network, hope the router can publish a default route to the entire network, which of the following configuration is True?
A. (Huawei) ripng 1 (Huawei-ripng-1) import-route static cost 2 (Huawei-ripng-1) quit (Huawei) ipv6 route-static::0 NULL0
B. [Huawei) interface GigabitEthernet0/0/1 [Huawei-GigabitEthernet0/0/1) ipv6 enable [Huawei-GigabitEthernet0/0/1] ipv6
address 2001 £0 12:1/64 [Huawei-GigabitEthernet0/0/1) ripng 1 enable (Huawei-GigabitEthernet0/0/1) ripng default-route
originate [Huawei-GigabitEthernet0/0/1) quit (Right Answers }
C. (Huawei) ripng 1 (Huawei-ripng-1) import-route static cost 2 (Huawei-ripng-1) quit (Huawei) ipv6 route-static :0 [Link]
D. (Huawei) ripng 1[Huawei-ripng-1] ripng default -route originate [Huawei-ripng-1) quit
Answer: B
159. Which of the following can be used for BGP routing? (Multiple choice)
A. ACL (Right Answers >
B. IP-prefix (Right Answers)
C. AS-path-filter (Right Answers >
D. DSCP
Answer: A, B, C
160. What field of 1Pv6 head is similar with the 'Type of Service" field of 1Pv4 head?
A. Flow Label
B. Version
C. Next Header
D. Traffic Class (Right Answers >
Answer: D
161. You want to make sure that key business in the network HW get high priority. which field does IP Precedence of
data packets based on to set?
A. All the 8 bit of ToS field
B. the first 4,5 and 6 bit in ToS field
C. three least significant bits in ToS field
D. three most significant bits in ToS field (Right Answers >
Answer: D
D. Join/Prune mechanism
Answer: C
163. The SPF algorithm, which of the following description is correct? (Multiple choice)
A. SPF algorithm also called Djkstra algorithm (Right Answers)
B. SPF algorithm only uses in the first time to calculate the shortest path tree (Right Answers >
C. When router calculate the shortest path tree, with itself as the root to build SPF tree (Right Answers >
D. when router calculate the shortest path tree, with its target segment as the root to build SPF tree
E. HW router default OSPF reference bandwidth is 10A9/BW
Answer: A, B, C
164. As shown in figure, ISIS neighbor relationship between R1 and R2 just created, which of the following
statement about database synchronization process between R1 and R2 is True?
165. To check if figure below about the process of NDP analysis link-layer address is True.
A. True
B. Fales (Right Answers >
Answer: B
166. Which of the following configurations are true OSPFv3 routing aggregation configuration ? ( Multiple choice)
A. (Huawei) ospfv3 1 (Huawei-ospfv3-1) abr-summary fc00:0 :0 ::48 cost 400
B. [Huawei) ospfv31 [Huawei-ospfv3-1) asbr-summary [Link] cost 20tag 100 (Right Answers >
C. (Huawei) ospfv3 1 (Huawei-ospfv3-1) area 1 (Huawei-ospfv3-1-area-0 .0.0.1) asbr-summary [Link] ::48 cost 20 tag 100
D. (Huawei) ospfv3 1 (Huawei-ospfv3-1) area 1 (Huawei-ospfv3-1-area-0 .0.0 .1) abr-summary [Link] cost 400 (Right
Answers >
E. [Huawei) interface gigabit ethernet 1/0/0 [Huawei-GigabitEthernetl/0/0) asbr-summary [Link] ::48 cost 20
F. (Huawei) interface gigabit ethernet 1/0/0 [Huawei-GigabitEthernetl/0/0) abr-summary [Link] cost 400
Answer: B, D
167. You're troubleshooting frame relay interface serial 0 on HW router. When the interface is up and quickly enters the
down state You use the command display interface, see LMI status message of interface serial has been sent but
not received.
So what causes the problem occur?
A. Receive too much error message on the link
B. Frame Relay lmi-type configuration error (Right Answers >
C. Sub interface number exceeds the limits of the IDB
D. DCD configuration errors on the frame relay line
E. Ends of keep alive configuration error
Answer: B
168. Which of the following DNS resource record is legitimate? ( Multiple choice)
A. NS (Right Answers >
B. PTR (Right Answers }
C. A (Right Answers >
D. MX (Right Answers >
E. FQDN
Answer: A, B, C, D
169. Branches using telnet and FTP and through an 256k HDLC link visit the headquarters application By what
compression method can optimize the current network?
A. Compression timely transfer protocol
B. TCP header compression
C. Stacker compression (Right Answers >
D. Predictor compression
Answer: C
170. Which of the following operations can achieve rapid fault detection on the multicast network? (Multiple choice)
A. shorten Join/Prune message Hold time
B. reduce time interval of interface sending Hello message (Right Answers >
C. neighbors to build PIM BFD session (Right Answers )
D. reduce time interval of sending Join/Prune message
Answer: B, C
171. As shown, under the environment of 1Pv4 and 1Pv6, SEL field in [Link] address always values of 00.
Answer: A
172. In BGP,AS-path-filter is for filtering the AS_PATH attribute. AS_PATH attribute is actually a string defined by the
regular expression.
A. True (Right Answers l
B. False
Answer: A
173. Which of the following description about the process of sending and receiving data frame in switch interface Access
mode is True?
A. in Access mode only receive data frames without labels .
B. in Access mode when receiving data frames with labels directly discarded
C. in Access mode when sending it will strip off the data frame VLAN tag. (Right Answers >
D. when data frames entering the switch interface, the switch will learn the destination MAC
address of data frame .
Answer: C
174. Which of the following routing selection tool is peculiar to the BGP?
A. Route-policy
B. IP-prefix
C. AS-path-filter (Right Answers >
D. ACL
Answer: C
175. The network topology change will cause flooding to occur,and then what kind of OSPF packets will be used in LSA?
A. Hello
B. Link State Update (Right Answers >
Answer: B
176. Customers in a UNIX server using the network time protocol (NTP) to provide network reference [Link] the clock
network equipment needs and UNIX server clock synchronization. Which of the following should be on the network
device configuration command?
A. ntp master
B. ntp server (Right Answers >
C. ip ntp clock
D. ntp peer
E. sntp master
Answer: B
177. Which messages will be sent to Agent by running SNMPv1NMS (Network Management Station)?
A. Trap £ Get and Set
179. Between PE and CE of MPLS VPN. You can use a variety of IGP routing protocols, including RIP,OSPF and ISIS,
does not support other protocols temporarily.
A. True
B. False (Right Answers >
Answer: C
180. HW IP multicast network in a (', G) entries and multicast features associated with which of the following? (Multiple
choice)
A. shared tree (Right Answers >
B. PIM bidirectional (Right Answers)
C. Dense Mode
D. source tree
E. Sparse Mode (Right Answers >
F. dense tree
Answer: A, B, C
181. HW1 on the router configured with CAR Committed Access Rate. The following description of the CAR
is the most appropriate?
A. CAR permitted speed for the traffic shaping
B. CAR able to limit the rate of traffic inbound or outbound (Right Answers)
C. CAR with the queue to form a hierarchical strategy, and as part of it. CAR must be applied in the parent
policy-map, rather CBWFQ must be applied in the child policy-map [Link] is actually a queue
D. CAR only match UDP port range of ports 16384 – 32767
Answer: A, B, C
Answer: B
183. In order to view the router R1's routing table the router R1 execute the command "display the IP routing table".
Router R1 runs OSPF protocol. Which description of OSPF information in routing table of following is correct?
A. In the routing table, the routing table entry identified by "OSPF" identifier indicates that the entry is learned
through Type 1 LSA or Type 2 LSA
B. In the routing table, the routing table entry identified by "O_ASE" identifier indicates that the entry can only be
learned by routing incoming (Right Answers)
C. In the routing table, the routing table entry identified by "O_ASE" identifier indicates that are intra-regional
routes
D. In the routing table, the routing table entry identified by "O_ASE" identifier is learned from Type 7 LSA which
introduced other processes to OSPF
E. In the routing table, all types of LSA corresponds to a unique destination address
Answer: B
184. On some HW network equipment plans to use DSCP information to deploy QoS. In the comparison of different
options, which of the following options is correct?
A. IP precedence and DSCP have no overlap
B. DSCP is only used for TCP, IP precedence is only used for the UDP
C. DSCP and IP precedence are fully the same, name changed is only the marketing practice of commands
D. DSCP last two and IP precedence overlap
E. CS of DSCP backward compatible with IP precedence (Right Answers >
Answer: E
185. ISIS during the establishment of a neighbor, under the P2P network type CSNP message not sent.
A. True
B. False (Right Answers >
Answer: E
186. AS100 and AS200 are enabled for multicast, within their respective autonomous systems are independent setting
BSR and RP, the RP USES MSDP protocol interaction between SA information ;ln order to prevent the BSR
message across AS boundary, the simplest way is to use ACL on ASL interconnection interface of BSR message
filtering.
A. True
B. False (Right Answers >
Answer: B
187. Which of the following description about ISIS in Ethernet environment operation is correct?
A. ISIS using multicast in Ethernet environment interaction control information.
B. ISIS election DIS in Ethernet environment, comparative priority rules for interface is preferred, if the same
priority are System - ID.
C. ISIS is sent by DIS periodic PSNP in Ethernet environment to maintain the integrity of the database.
D. ISIS in Ethernet environment using a three-way handshake to establish a safe and reliable neighbor
relationship. (Right Answers >
Answer: D
188. HW1 running OSPF router and router HW2 in the same LAN network.
Which multicast address will the router HW1 and HW2 send each other routing updates through? (Multiple choice)
A. [Link]
B. [Link]
C. [Link]
D. 224.0 .0.5 (Right Answers)
E. [Link]
F. 224.0 .0.6 (Right Answers)
Answer: D, F
189. When deploying LLQ bandwidth parameters need to be configured . What's the meaning of the bandwidth parameter?
A. providing a built- in strategies to limit LLQ priority traffic when congestion (Right Answers >
B. The parameter is an option, because LLQ always take precedence over other queues
C. The parameters should be as small as possible. It represents the bandwidth is always received. Even no use
LLQ, this parameter will reduce the bandwidth of the interface
D. It represents reference CIR to calculate internal strategy implement token bucket burst size
Answer: A
190. A workstation connected to an Ethernet switch of the workgroup via over Category 5 cable. Workstations can
access the whole network through the switch ( e, fully connected), but much lower access rates than desired.
When viewing the switch interface statistics, we can detect a lot of "ultra-small frame." When software reading the
statistics information of the workstation network card, we found many FCS and frame alignment error.
What reason is likely to lead to the generation of these errors?
A. network interface card on the workstation has been corrupted
B. Line between the workstation and the switch has been damaged (Right Answers)
C. Interface mismatched to be 802.1q trunk interfaces (Right Answers)
192. If a switch of gigabit Ethernet interface of the receive buffer is full, so what the switches use protocol notification
interface delay for a period of time to send data on the far side of the frame?
A. 802.1u
B. 802.3z (Right Answers >
C. 802.10
D. 802.3
E. 802.3af
Answer: B
B. Local_Pref
C. Multi_Exit_Disc
D. Community (Right Answers >
Answer: A, D
194. What a host configuration information can be obtained from the DHCP server?
A. IP address, subnet mask, MAC address and DNS server
B. IP address, DNS, default gateway and MAC address (Right Answers)
C. IP address, subnet mask, default gateway and host name
D. IP address, subnet mask, default gateway and MAC address
Answer: B
195. Which of the following tools cannot be directly referenced by if-match clause in the route-policy?
A. Regular expression (Right Answers >
B. IP-prefix
C. AS-path-filter
D. Community-filter
Answer: A
197. Which of the following about Huawei Device Eth-trunk link aggregation characterizati on is correct?
A. link aggregation can only be applied to the device on the second layer.
B. Link aggregation can be applied to the second and third layer of the equipment. (Right Answers >
C. link aggregation cannot across the equipment deployment.
D. link aggregation can be implemented based on the data of TCP or UDP port load balancing method .
Answer: B
198. Routers HW enabled OSPF routers and HW role for ABR, and configure the abr-summary, which will be aggregated
LSA class? (Multiple choice)
A. Class 1 LSA (Right Answers >
B. Class 2 LSA (Right Answers >
C. Class 3 LSA (Right Answers >
D. Class 4 LSA
E. Class 5 LSA
Answer: A, B, C
199. Configure AAA authentication on Huawei VRP, we can follow the user domain to distinguish between access users
can carry the domain name in the user to specify the authentication domain.
A. True (Right Answers >
B. False
Answer: B
200. About TCP sliding window, which of the descriptions are wrong? (Multiple choice)
A. the sender declared initial window size (Right Answers >
B. the sender does not need to transfer the full window size of packets
C. TCP sliding window allows a plurality of frames sent before receipt of acknowledgment
D. receiving end need to wait before sending ACK window to fill
E. receiving end need to periodically send a confirmation
F. sliding window size can only increase or remain unchanged (Right Answers >
Answer: A, F
Answer: C
202. Which of the following IEEE standard is formulated to gigabit Ethernet? (Multiple choice)
A. 802.3z (Right Answers >
B. 802 .3ab (Right Answers >
C. 802 .3ad
D. 802 .3af
Answer: A, B
203. Router R1 and router R2 run BGP. Both routers are in AS [Link] route of router R2 exist in the BGP routing
table of router R1, but not in the IP routing table of router R1. So what reason causes this problem?
A. Synchronization is closed
B. BGP neighbor relationship is down
C. router R1 is not enabled BGP multi-hop
D. routing is not optimal (Right Answers >
Answer: D
204. Which of the description about the WRR (Weight Round Robin) is wrong? (Multiple choice)
A. WRR is A congestion management technology.
B. WRR can ensure that various queues are assigned to a certain amount of bandwidth.
C. WRR can ensure key business is sent first . (Right Answers >
D. WRR can avoid the network congestion. (Right Answers >
E. WRR cannot be used on the GE interface.
Answer: C, D
205. You expect to deploy multicast video applications in your private, internal network. To achieve this goal, you need
to use a private multicast IP address on your network. So what range of IP addresses can be used?
A. [Link] - 224 .255.255.255
B. [Link] - [Link]
C. [Link] - [Link]
D. [Link] - [Link] (Right Answers >
207. Network HW now installed a new Syslog server to receive network management information. What characteristics
does Syslog information have? (Multiple choice)
A. Syslog message transmission is reliable
B. Syslog message transmission is safe
C. Syslog message Transmission is confirmable
D. Syslog message transmission is not reliable (Right Answers)
E. Syslog message Transmission is not confirmable (Right Answers)
F. Syslog transmission is unsafe (Right Answers>
Answer: D, E, F
208. Which of the following description is correct? (Please select two correct answers)
A. SNMPv1 has no privac y, and use community as validation (Right Answers>
B. SNMPv2c has privacy, and use community as validation
C. SNMpv2c has privacy, and use user name as verification
D. SNMpv3 has privacy, and use community as validation
E. SNMpv3 has privacy, and use user name as verification (Right Answers>
Answer: A, E
B. Root cost
C. Forward delay
D. Hold time (Right Answers )
E. Hello time
Answer: D
Answer: A, C, D
212. Two routers connected through a firewall cannot establish BGP neighbor relations . What's the reason?
A. BGP neighbor must form a two-layer adjacency
B. EBGP mult1hop has no configurate on (Right Answers >
C. firewall does not release theprotocol number 89
D. firewall does not open UDP port 179
Answer: B
213. Network administrators prepared to use automatic 6to4 tunnel is 1Pv6 data in 1Pv4 network, the router interface's 1Pv4
address is 138 .14.85.210, so the corresponding tunnel address is [Link] :1:230:65ff fe2:9a6.
A. True
B. False (Right Answers >
Answer: B
214. Which of the following description about SSM functional is the most accurate?
A. SSM is the extension of DVMP protocol, to efficiently transmit one-to-multiple traffic
B. SSM needs MSDP to find active source in other PIM domain
C. In the SSM, route multicast traffic is done based on source tree. RP is used for a recipient to the corresponding
source tree
D. use of SSM, the recipient can use the INCLUDE in IGMPv3 to indicate that it wants to join the source (Right
Answers)
Answer: D
215. What types of prefixes to its EBGP neighbor does Router running BGP will send ?
A. prefix is learned through other BGP neighbor, or prefix is locally by introducing the BGP routing and
network (Right Answers >
B. exists in the routing table prefix
C. prefix only learned through EBGP neighbor, or a local network or through the introduction into the
BGP routing
D. prefix only learned through EBGP neighbor, or prefix from RR learned
E. exists in the routing table prefixes (apart from EBGP learned)
F. exists in the routing table prefixes (apart from IBGP learned)
Answer: A
216. Which description of the legal performance of 1Pv6 prefix 12ab00000000cd30 inthe following is correct? (Multiple choice)
A. [Link] :CD30:0000:0000:0000:0000/64 (Right Answers >
B. [Link] £° CD3/64
C. 12AB::CD30/64 (Right Answers >
D. [Link]/64
E. 12AB::CD3::/64
Answer: A, C
C. policy-based-route
D. as-path-filter
Answer: B
218. VPN instance is also known as the VPN Routing published VPF (VPN Routing and Forwarding table).There are
multiple routing turn published on PE, including one public network routing, one or more of the VPN routing to turn
and turn VPNv4 route.
A. True (Right Answers >
B. False
Answer: A
219. Router connected via two parallel cable Serial two EBGP neighbors, you will use any way to achieve two-way load
balancing two EBGP neighbors connected by two parallel cables between the Serial?
A. rule 10permit tcp source any destination any
B. rule 10 permit icmp source any destination any icmp-type ttl-exceeded rule 15 permit icmp source
any destination any icmp-type port-unreacha ble (Right Answers >
C. rule 10 permit icmp source any destination any icmp-type !ti-exceeded rule 15 permit icmp source
any destination any icmp-type echo-reply
D. rule 10 permit icmp source any destination any icmp-type echo rule 15 permit icmp source any
destination any icmp-type net-unreacha ble
E. rule 10 permit udp source any destination any rule 15 permit icmp source any destination any
icmp-type protocol-unreacha ble
Answer: B
220. Which of Huawei switches on Mux VLAN description is correct?
A. In the same VLAN, Mux VLAN and Super VLAN can be used in combination.
B. Principal Port can communicate all ports and Mux VLAN. (Right Answers >
C. Mux VLAN divided into Principal VLAN and Subordinate VLAN, Subordinate VLAN is divided into
Separate vlans and Isolate VLAN.
D. Each Separate VLAN can bind multiple Principal VLAN.
Answer: B
221. Routers work in three layers, can use uRPF such technique to calibrate the source address of the packet,
although switcher work on the second floor, but as long as the corresponding function is enabled, may also be the
source IP address of the packet checksum.
A. True (Right Answers)
B. False
Answer: A
222. Existing address block "200 .10.10.0/24" needs to be allocated to the three loopback interface, two point-to-point
link, an Ethernet has 50 sites and one Ethernet has 96 sites. Which of the following statements about address
planning is more effective (from the perspective of saving IP address)?
A. [Link]/32 £, 200 .10.10.2/32 £, [Link]/32 £, 200 .10.10.4/30 £, 200 .10.10.8/30 £, 200 .10.10.64/26 £,
200 .10.10.128/25 (Right Answers >
223. Which of the following ways does 1Pv6 multicast introduces the concept of multicast scope, multicast range concept
through?
A. have special field in 1Pv6 multicast address specified multicast transmission range . (Right Answers)
B. When the multicast source sends 1Pv6 multicast data packet TIL value will be set to define a multicast
transmission range .
C. when the network configuration, administrator at the edge of the network using multicast configuration commands to
define a range .
D. multicast range is just a concept spread wide no specific technical implementation.
Answer: A
224. Running command "bandwidth-reference 5000" on the VRP platform of the router [Link] configured, what is the
OSPF cost value of a Gigabit Ethernet of router HW1?
A. 1
B. 5 (Right Answers >
C. 50
D. 500
E. 5000
F. 50000
Answer: B
225. Refer to the following configuration output, which device is DIS?
Total LSP(s): 6
B.R4 with R1 and R3 interconnected network segment and the segment are interconnected DIS. (Right Answers >
C. DIS pseudo node numbers can be reused on the same device at the same Level.
D. Pseudo-node number is used to indicate DIS priority.
Answer: B
226. What is the significance of received multicast address [Link] - 224.0 .0.255?
A. The multicast address range is received for the management group address, and the local effective
B. The multicast address range is received for the management group address, and the address's multicast traffic
cannot be transferred to the Internet
C. The multicast address range is a link-local multicast traffic , including network control messages aside, and the
address range is only valid locally (Right Answers)
D. Any valid multicast data stream and multicast applications will be using this address
E. The address indicates Global Internet, the address range of the whole network effectively
Answer: c
227. Router connected via two parallel cable Serial two EBGP neighbors, you will use any way to achieve two-way load
balancing two EBGP neighbors connected by two parallel cables between the Serial?
A. do not use any method, BGP will automatically flow between different autonomous systems on the available link load
balancing
B. Use the loopback interface to establish the EBGP peer relationship, and configure EBGP multihop, loopback interface
is configured as the update source, then use IGP to achieve the equivalent path load balancing between loopback
address (Right Answers)
C. configured to loopback interface as the source of updates EBGP neighbor relationship, every AS IGP should be
introduced in two equal-cost paths to reach the EBGP neighbor loop back port address; and the need to use the
command "next-hop-local"
D. at both ends using the command "ebgp-load-balance
E. configured to loopback interface as the source of updates EBGP neighbor relationship, every AS IGP should be
introduced in two equal-cost paths to reach the EBGP neighbor loop back port address; and the need to use the
command "ebgp-max-hop" and "next -hop-local "
Answer: B
229. HW companies need to deploy a multicast application. Require the multicast application traffic can be transmitted
only in HW company intranet. So which multicast address should be allocated for multicast applications?
A. can assign a multicast address for the multicast applications within the range ([Link]-[Link])
B. should allocate a multicast address for multicast applications in this range (239.0.0 .0-[Link]) (Right
Answers >
C. should allocate a multicast address for multicast applications from [Link] - 232 .255.255.255
D. HW company should apply to the IANA for a multicast address for the multicast applications
Answer: B
230. In the multicast network running PIM-SM mode, how the routers select an upstream interface?
A. Find corresponding outgoing interface of map proxy in unicast routing table.
B. interfaces directly connected to multicast group members.
C. Find corresponding outgoing interface of RP address in the unicast routing table. (Right Answers)
D. interface of receiving PIM Join message
E. interface of sending PIM Hello message
Answer: C
231. Which of the following description about the link-state protocol is the most reasonable?
A. fast convergence and low CPU utilization
B. CPU utilization is high and prone to loop
C. slow convergence and average CPU utilization is low
D. fast convergence and high CPU utilization (Right Answers)
Answer: D
232. When 1Pv6 routing transmitted in BGP4+ protocol, it is similar to 1Pv4,MP_REACH_NLRI,Next_Hop,AS_Path the
like will be accepted as compliance attributes carried in the route update message.
A. True
B. False (Right Answers >
Answer: B
233. When a huawei router in the network make forwarding decisions, huawei router based on the principles of will
optimal routing entry is forwarded to the data packet.
A. the priority
B. the Router ID
C. longest matching mask (Right Answers >
236. Which type of message report event sent to the NMS SNMP is reliable?
A. Get
B. Response
C. Inform (Right Answers )
D. Trap
E. Get Bulk
Answer: C
237. To configure the check function for the source address of the IP packet on the switch, which of the following configuration
is complete and correct?
A. (Quidway] inteface gigabit ethernet 0/0/1 (Quidway-GigabitEthernet0/0/1] ip source check user-bind enable (Quidway-
GigabitEthernet0/0/1] quit
B. (Quidway] dhcp enable (Quidway] dhcp snooping enable (Quidway] vlan 10 (Quidway-vlan10] dhcp snooping enable
(Quidway-vlan10] dhcp snooping trusted interface gigabit ethernet 0/0/1 (Quidway-vlan10] ip source check user-bind
enable (Quidway-vlan10] quit (Right Answers )
C. (Quidway] dhcp enable (Quidway] dhcp snooping enable (Quidway] arp learning strict (Quidway ip source check user-bind
enable
D. (Quidway] user-bind static ip-address [Link] mac-address 0001-0001-0001 (Quidway] user-bind static ip-address [Link]
mac-address 0002-0002-0002 (Quidway] vlan 10 (Quidway-vlan10] ip source check user-bind enable
E. (Quidway] anti-attack abnormal enable (Quidway] arp learning strict (Quidway] vlan 10 (Quidway-vlan10] urpf strict
(Quidway-vlan10] quit
Answer: B
238. In order to reduce Delay and Jitter of the significant traffic , Frame Relay and PPP is the same, the packet may be
fragmented, and a plurality of PVC can be bundled.
A. True (Right Answers >
B. False
Answer: A
240. Which design in Router can improve the reliabilit y of the router? (Multiple choice)
A. twin-engine design (Right Answers >
241. The switch can be suppressed to the traffic to control the impact of loops and other problems on operations, the following
traffic suppression configuration, which is the wrong configuration?
A. [Quidway) interface gigabit ethernet 0/0/1 [Quidway-GigabitEthernet0/0/1Ibroadcast-suppression 80 [Quidway-
GigabitEthernet0/0/1Iquit
B. [Quidway) vlan 10 [Quidway-vlanlO) broadcast-suppression 1000 [Quidway-vlan10) quit
C. [Quidway) icmp rate-limit enable [Quidway) icmp rate-limit total threshol d 20
D. [Quidway) interface gigabit ethernet 0/0/1[Quidway-GigabitEthernet0/0/1) multicast-suppression 80 [Quidway-
GigabitEthernet0/0/1] quit
E. [Quidway] vlan 10 [Quidway-vlan10) multicast-suppression 1000 [Quidway-•Aan10] quit (Right Answers )
Answer: E
242. Router HW1 and Router HW2 connect respectively network A and network [Link] shown, if you want to establish
IPsec VPN between the router HW1 and the router HW2 .
Which ACL should Router HW1 configure to make the sent traffic from LAN to LAN to go through an encrypted VPN
tunnel?
A. rule permit ip source [Link] destination [Link] 0
B. rule permit ip source [Link] [Link] destination [Link] 0
C. rule permit 1p source 10 110 0 0 0 255 destination [Link] [Link] (Right Answers >
D. rule permit ip source [Link] destination [Link] 0.0.0255
E. rule permit ip source [Link] [Link] destination [Link] [Link]
Answer: C
243. HW company now has a frame relay network composed by two sites, a headquarters site, a remote site. Use a
PVC connecting the two sites. Network runs RIPv2. HW company extends for Frame Relay network and adds a
remote site, while between headquarters and remote sites adds a new PVC link. All frame relay interface IP
addresses are in the same subnet. The company HW already on the frame relay network configured DLCI mapping,
and can from the new remote site ping through headquarters site ,from another remote site can also ping through the
headquarters [Link], the routing table of the new site is not a route to other remote site LAN network cannot
ping the LAN interface and LAN address of the host address. What is the most likely cause of the problem?
A. On the two remote sites, without pointing to other sites neighbor configuration
B. Frame Relay interface of headquarters site opens split horizon features (Right Answers )
C. IP-to-DLCI mapping in frame relay configuration is not configured correctly
D. RIP routing updates cannot be part of the Internet in the Frame Relay network, it needs to be
replaced with other routing protocols RIP
E. headquarters site needs to be configured to trigger updates to forward two remote sites in routing
update
Answer: B
244. Which would you ping 1Pv6 address to confirm OSPFv3 can send and receive unicast packet via the link?
A. Link Local Address (Right Answers >
B. Site local Multicast
C. Unique Local Add
D. Anycast Address
E. Global Address of the link
Answer: A
245. A router runs multiple routing protocols.
So when forwarding data, if there are multiple routing entries that match the destination address of the packet,
which route entry will the router choose?
A. routing entry has the longest subnet mask. (Right Answers)
B. Preference value of the routing entry is the lowest.
C. routing entry with the least cost
D. First, preferably straight, followed by a static route is preferred, and finally select from the dynamic routing.
Answer: A
246. When configured ISIS area authentication which ISIS packets will carry the authentication information?
A. ISIS SNP and LSP of the Level-1. (Right Answers)
B. ISIS SNP and LSP of the Level-2
C. ISIS Hello packets of the Level-1
D. ISIS Hello packets of the Level-2 .
Answer: A
247. In these cases as following, RSTP will refresh the MAC address table? (Multiple Choice)
A. when A port state change
B. when receiving topology change notice (Right Answers >
C. when by discarding port state transition to forwarding (Right Answers >
D. when port state by forwarding to discarding the transition
E. only when the port state transition from listening to discarding
Answer: B, C
248. As shown, the following options, which can meet to establish ISIS neighbors between the two routers?
250. After 1Pv6 device an address for FCOO::1 is connected to a network, in the network, crawl the following packages,
what is the role of this packet?
251. In the PIM-SM, which of the following description about the PIM join message is correct ?
A. the PIM join message once every 60 seconds to send for multicast tree refresh the upstream router mroute state
(Right Answers)
B. routing to send the PIM join confirmation in response to each PIM join messages received from the downstream
router
C. PIM join messages are sent only when the multicast distribution tree for the first time established
D. PIM join messages are sent every three minutes once a multicast tree that the upstream router to refresh the status
mroute
Answer: A
252. Which of the following explanation about command domain-authentication-mode md5 hello in the process of ISIS is
correct?
A. This command is mainly used to make ISIS Hello packets carry the authentication information in the transfer
process.
B. All routers domain authentication modes in the same routing domain are MD5, passwords are hello, IS-IS packets
can be normally spread. (Right Answers>
C. Routing domain authentication is mainly used to make LSP and SNP packets of Level-1 and Level-2 carry the
authentication information in the process of transfer.
D. ISIS certification could not be applied in the 1Pv6 environment
Answer: B
253. Check LSP on a router, see the following results :
Please carefully study the topology, router R4 (in the Area 1) lead routes which learned through BGP into OSPF
process. Then which category LSA will R3 produce to advertise to area Q? (Multiple choice)
A. category 4 LSA (Right Answers >
B. category 5 LSA (Right Answers)
C. category 1 LSA
D. category 7 LSA
E. category 2 LSA
Answer: A, B
255. Which of the following description of ISIS route penetration is correct? (Multiple choice)
A. ISIS routing penetration can be used in an 1Pv6 environment. (Right Answers)
256. Which of the following statement about ISIS routing disclosure is correct ?
A. ISIS routing disclosure only applies to 1Pv4 environment.
B. ISIS routing disclosure avoid suboptimal path. (Right Answers)
C. ISIS routing disclosure must be deployed on the Level-1 router.
D. ISIS routing disclosure is enabled by default.
Answer: B
258. You are considering using one of RIP and OSPF routing protocols to deploy network. Which of the following is the
correct ?
A. Use RIPv2 to deploy network, you cannot see the routing entries which's measurement is 16 in the routing table
(Right Answers)
B. RIPv2 sent routing update information periodically, so in the event of changes in the topology, RIPv2 can quickly
calculate a new route
C. RIPv1 is a distance vector routing protocol. RIPv2 and OSPF is a link-state routing protocol
D. RIP does not support authentication, OSPF supports authentication
Answer: A
259. Which of the following description about 1Pv6 address legitimate type is correct ? (Multiple Choice)
A. Broadcast
B. Multicast (Right Answers >
C. Anycast (Right Answers >
D. Unicast (Right Answers >
Answer: B, C, D
260. Which of the following description of the transparent bridge is wrong? (Multiple Choice)
A. reducing the address entries aging time of transparent bridge can reduce flooding (Right Answers)
B. increasing the address entries aging time of transparent bridge can reduce flooding
C. the forwarding entry of transparent bridge is formed by learning to check the source MAC address of each frame
D. the forwarding entry of transparent bridge is formed by learning to check the destination MAC address of each frame
(Right Answers)
Answer: A, D
261. What is the difference between PIM-SM and PIM-OM? (Multiple Choice)
A. PIM-SM is suitable for less recipient network; The PIM-OM is suitable for more recipient network (Right Answers)
B. BSR/RP only exists in PIM-SM, BSR/RP do not exist in PIM-OM (Right Answers)
C. PIM-SM support forward as needed , ensure that no excess flow in the network: PIM-OM use cycle forward, network
will produce excess flow (Right Answers)
D. PIM-SM exist in RPT and SPT and PIM-OM only exist in the RPT
Answer: A, B, C