Sie sind auf Seite 1von 63

If the network address of a network is 192.168.100.

0, then its broadcast address


must be 192.168.100.255.

√ ×

The IP header is used by network devices for routing and fragmentation of packets.

√ ×

If the PPP protocol and PAP authentication are enabled on interfaces of two routers,
the authentication information in the captured packets is in plain text.

√ ×

Question4 True or False(15.0point.)

An intranet server can be accessed from an external network using the static NAT or NAT
server function.

√ ×

Question5 True or False(15.0point.)

In Easy IP mode, NAT only implements the mapping from private IP addresses to public IP
addresses, and it does not support port mappings.

√ ×

Question6 True or False(15.0point.)

A shared Ethernet hub can isolate collision domains, but not broadcast domains.

√ ×

Question7 True or False(15.0point.)

In OSPF, the BDR priority may be higher than the DR priority.

√ ×
Question8 True or False(15.0point.)

The persistent connection allows for the setting of an extra-long aging time on specific TCP
and UDP data streams to ensure that session information is not aged for a long period of time.

√ ×

Question9 True or False(15.0point.)

The main control panel of the Huawei USG6300 includes a fixed management interface named
GigabitEthernet 0/0/0 that is used for device management.

√ ×

Question10 True or False(15.0point.)

For ease of management, STAs connected to a WLAN can obtain IP addresses only using
DHCP but not by manual configuration.

√ ×

Question4 True or False(15.0point.)

When two devices have the same root bridge priority, the device with a larger MAC
address is selected.

√ ×
Bottom of Form

Question5 True or False(15.0point.)

STP convergence speed is faster than RSTP.

√ ×
Question9 True or False(15.0point.)
SSL is a security protocol that provides secure connections for TCP at the application
layer. SSL runs between the transport and application layers of the TCP/IP stack. It also
provides secure connections for HTTP.

√ ×

Ethernet supports a short transmission distance, which is 150 meters at most.

√ ×
Question9 True or False(15.0point.)
The length of an Ethernet data frame is in the range from 64 bytes to 1518 bytes.

√ ×
Bottom of Form
Which of the following statements about VLAN tag processing on switch's interfaces is
correct?

[A].An access port only receives untagged data frames.

[B].A trunk port only sends untagged data frames.

[C].An access port only sends untagged data frames.

[D].A trunk port only sends tagged data frames.

Question12 Single(15.0point.)

Which of the following radio waves has the shortest wavelength?

[A].Very high frequency

[B].Ultra-high frequency

[C].Ultra-low frequency

[D].High frequency
Question13 Single(15.0point.)

In the WLAN project implementation, which of the following equipment or method can be
used to prevent wired access switches from lightning strikes?

[A].Network port surge protector

[B].Antenna lightning arrester

[C].Network interface lightning protection unit on an AP

[D].Optical fiber connections between APs and wired networks

Question14 Single(15.0point.)

Which VLAN is used for transmitting user data to intranet or internet?

[A].Management VLAN

[B].Service VLAN

[C].User VLAN

[D].Transmit VLAN

Question15 Single(15.0point.)

If packet loss occurs when hosts A and B communicate with each other through TCP, how
does TCP ensure reliability?

[A].Host B sends ICMP packets to host A to notify data loss.

[B].Two hosts use the sliding window mechanism to ensure reliability.

[C].Host B asks host A to resend packets using the ACK field.

[D].Reliability is ensured by the option field in TCP packets.

Question16 Single(15.0point.)
Client A and server B set up a TCP connection. In the three-way handshake, server B sends a
SYN-ACK (seq = b, ack = a+1) to client A. Which of the following statements is correct?

[A].The SYN-ACK is the acknowledgement for the SYN with the sequence number being
a+1.

[B].The SYN-ACK is the acknowledgement for the SYN with the sequence number being
b.

[C].Server B wants to receive an ACK with the sequence number being a+1.

[D].Server B wants to receive an ACK with the sequence number being b.

Question17 Single(15.0point.)

After logging in to a router using Telnet, an administrator finds that IP addresses cannot be
configured for interfaces of the router. Which of the following is a possible cause?

[A].The authentication configuration of Telnet users is incorrect.

[B].The configuration of the Telnet user level is incorrect.

[C].SNMP parameters are incorrectly configured.

[D].The Telnet software used by the administrator forbids corresponding operations.

Question18 Single(15.0point.)

A router is connected to the interface Ethernet1/0/4 of a switch SWA. To disable the STP
function on the interface, which of the following commands can be executed?

[A].[SWA]stp disable

[B].[SWA-Ethernet1/0/4] stp disable

[C].[SWA] undo stp enable

[D].[SWA-Ethernet1/0/4] undo stp enable


Question19 Single(15.0point.)

Among the following routes, whose priority cannot be modified?

[A].Direct route

[B].Static route

[C].OSPF route

[D].RIP route

Question20 Single(15.0point.)

Which type of packets does not exist in IPv6?

[A].Unicast

[B].Broadcast

[C].Multicast

[D].Anycast

Question21 Single(15.0point.)

Which protocol is used by DHCP to transmit packets?

[A].TCP

[B].UDP

[C].RTP

[D].SIP

Question22 Single(15.0point.)

Which command can be used to check whether an OSPF neighbor relationship has been set
up?
[A].display ospf neighbor

[B].display ospf brief

[C].display ospf peer

[D].display ospf routing table

Question23 Single(15.0point.)

In standard STP mode, which of the following ports of a non-root-bridge switch can forward
BPDUs with TC bits set generated by a root switch?

[A].Root port

[B].Designated port

[C].Backup port

[D].Alternate port

Question24 Single(15.0point.)

If you enter the first several letters of a keyword in a command, which shortcut key can be
pressed to complete the command?

[A].Ctrl+c

[B].Tab

[C].Enter

[D].Space

Question25 Single(15.0point.)

Which of the following statements about the access and trunk ports is correct?
[A].A trunk port can forward both tagged and untagged data frames.

[B].An access port cannot process tagged data frames.

[C].A trunk port only sends tagged data frames.

[D].An access port can process data frames from multiple VLANs.

Question26 Single(15.0point.)

Which of the following is the default priority of the Trust zone for USG firewalls?

[A].5

[B].50

[C].85

[D].100

Question27 Single(15.0point.)

Which of the following is false about the working principles of a Layer 3 switch?

[A].If the destination MAC address of a received data frame is the MAC address of the
switch, the switch performs Layer 3 forwarding; otherwise, the switch performs Layer 2
forwarding.

[B].A VLANIF interface of a Layer 3 switch is a logical interface inter-VLAN


communication. Only one IP address can be configured for each VLANIF interface.

[C].After transmitting the first data flow based on the routing table, a Layer 3 switch
generates a mapping between the MAC address and IP address. When the same data flow
arrives, the switch directly forwards the data flow at Layer 2 based on the mapping table.

[D].The working principle of a Layer 3 switch can be described as a process of "once


routing and multiple times of switching".

Question28 Single(15.0point.)
An enterprise network has 50 private IP addresses. An administrator wants to use the NAT
technology to access the public network and only one public IP address is available for the
enterprise. Which NAT mode can be used?

[A].Static NAT

[B].Dynamic NAT

[C].NAPT

[D].Easy IP

Question29 Single(15.0point.)

Which of the following commands can be run to set the PPP authentication mode to chap?

[A].ppp authentication-mode pap

[B].ppp authentication-mode chap

[C].ppp pap

[D].ppp chap

Question30 Single(15.0point.)

What is the standard physical media of 100BASE-TX?

[A].Thick coaxial cable

[B].Thin coaxial cable

[C].Cat5 twisted pairs

[D].Optical fiber

Question31 Single(15.0point.)

Which of the following statements about TTL in an IP packet is false?


[A].TTL is the abbreviation of Time To Live.

[B].If a router receives a packet with the TTL value being 0, the router discards this
packet.

[C].The TTL value is reduced by 1 every time the packet is forwarded to a Layer 3 node.

[D].The TTL value of a packet is in a range from 0 to 4095.

Question32 Single(15.0point.)

Which port is used by the Telnet protocol by default?

[A].20

[B].21

[C].22

[D].23

Question33 Single(15.0point.)

Which of the following commands is not commonly used for IPSec troubleshooting?

[A].display ipsec statistics

[B].display ipsec session

[C].display ikesa

[D].display ipsecsa

Question34 Single(15.0point.)

A network administrator runs the tracert command to trace the path to an external website
server, but only * is displayed. Which of the following is a possible cause?
[A].The ICMP function is disabled on a router.

[B].The destination IP address does not exist.

[C].This is normal.

[D].The gateway has no reachable route to the destination network.

Question35 Single(15.0point.)

Which of the following VPNs can be used with L2TP VPN together to improve security?

[A].MPLS VPN

[B].GRE VPN

[C].IPSec VPN

[D].SSL VPN

Question36 Single(15.0point.)

If the network administrator needs to map the private IP address of the server on the intranet to
the public IP address to provide services for Internet users, which of the following NAT
technologies can meet the requirements?

[A].Source NAT

[B].Destination NAT

[C].NAT Server

[D].NAT ALG

Question37 Single(15.0point.)

Which standard organization defines the 802.11 protocols?

[A].FCC
[B].IEEE

[C].IETF

[D].Wi-Fi Alliance

Question39 Single(15.0point.)

Which of the following messages can provide error information and processing of IP data
packets for source nodes?

[A].IGMP

[B].TCP

[C].UDP

[D].ICMP

Question40 Single(15.0point.)

Which of the following commands can be used to configure all ports of a switch as edge ports?

[A].stp edged-port enable

[B].stp edged-port default

[C].stp edged-port default enable

[D].stp edged-port disable

Question11 Single(15.0point.)
An enterprise wants to assign VLANs on its network, and requires that users belong to a fixed
VLAN no matter which access point is used to access the network. So which VLAN
assignment mode is recommended?

[A].Port-based VLAN assignment

[B].MAC address–based VLAN assignment

[C].Protocol-based VLAN assignment

[D].Physical location–based VLAN assignment

Question12 Single(15.0point.)

Two routers are connected through serial ports and the link layer protocol is PPP, but the MRU
values on the two ends of the PPP link are different. Which of the following statements about
PPP LCP negotiation is correct?

[A].LCP negotiation fails.

[B].The smaller MRU value will be used according to the LCP negotiation.

[C].The larger MRU value will be used according to the LCP negotiation.

[D].The standard MRU value of 1500 will be used according to the LCP negotiation.

Question17 Single(15.0point.)

When the radio radiation decreases by 10 dB, how much does power density decrease to?

[A].0.01

[B].0.1

[C].0.5
[D].0.9

Question18 Single(15.0point.)

In standard STP mode, which state performs port role election?

[A].Blocking

[B].Listening

[C].Learning

[D].Forwarding

Question19 Single(15.0point.)

What is the UDP protocol number?

[A].5

[B].6

[C].17

[D].22

Question20 Single(15.0point.)

Which of the following statements about DD packets and LSAs in OSPF is false?

[A].A DD packet contains detailed LSA information.

[B].A DD packet contains only the header of an LSA.

[C].An LSA header uniquely identifies an LSA.


[D].An LSA header is only a part of an LSA.

Question21 Single(15.0point.)

How many IPsec SAs are created for setting up an IPsec tunnel in AH+ESP mode?

[A].1

[B].2

[C].3

[D].4

Question23 Single(15.0point.)

Which of the following is the standard for WLAN encryption?

[A].802.11s

[B].802.11n

[C].802.11i

[D].802.11g

Question24 Single(15.0point.)

After running OSPF, which of the following router roles can establish 2-way neighbors?

[A].DR and BDR

[B].DR and Dother

[C].BDR and Dother

[D].Dothers
Question26 Single(15.0point.)

Which port of UDP is used by RIPng to send and receive routing information?

[A].520

[B].521

[C].89

[D].189

Question27 Single(15.0point.)

When using only one public IP address to provide address translation for multiple users on the
intranet, which of the following NAT technologies can meet the demand?

[A].Source NAT

[B].Destination NAT

[C].NAT Server

[D].PAT

Question29 Single(15.0point.)

Which of the following subnet masks can be configured to make 192.168.0.94 and
192.168.0.116 on the same network segment?

[A].255.255.255.192

[B].255.255.255.224

[C].255.255.255.240

[D].255.255.255.248
Question30 Single(15.0point.)

In which link aggregation mode will Huawei switches implement link backup?

[A].Manual mode

[B].Static LACP mode

[C].Dynamic LACP mode

[D].Automatic mode

Question31 Single(15.0point.)

Which of the following default route configurations is correct?

[A].ip route-static 0.0.0.0 255.255.255.255 12.1.1.1

[B].ip route-static 0.0.0.0 0.0.0.0 0.0.0.0

[C].ip route-static 0.0.0.0 0.0.0.0 12.1.1.1

[D].ip route-static 0.0.0.0 0.0.0.0 Ethernet 0/0

Question32 Single(15.0point.)

Which type of address is indicated by the IP address 10.0.10.63 and subnet mask
255.255.255.224?

[A].Host address

[B].Network address

[C].Broadcast address

[D].Multicast address

Question34 Single(15.0point.)
Using the Tracert command on the host to detect the path to the destination device. During the
detection process, which of the following ICMP messages will be sent back to the source
device?

[A].Time Exceeded

[B].Echo Request

[C].Echo Reply

[D].Port Unreachable

Question11 Single(15.0point.)

In the port transition mechanism of STP, to which state will the root ports and designated ports
be transited finally?

[A].Blocking

[B].Listening

[C].Learning

[D].Forwarding

Question12 Single(15.0point.)

Which of the following technologies can be used by USG series firewalls to provide well-
known application services through ephemeral ports?

[A].IP-MAC address binding

[B].Port mapping

[C].Persistent connection
[D].Application specific packet filter (ASPF)

Question17 Single(15.0point.)

How many 5 GHz frequency bands are available in China?

[A].5

[B].11

[C].13

[D].21

Question18 Single(15.0point.)

Which of the following is the Encapsulating Security Payload (ESP) protocol number?

[A].49

[B].50

[C].51

[D].52

Question20 Single(15.0point.)

What do we generally use to connect APs and antennas during WLAN network deployment?

[A].Power splitter

[B].Combiner

[C].Arrester
[D].Feeder

Question24 Single(15.0point.)

Which port is used by the SSH protocol by default?

[A].20

[B].21

[C].22

[D].23

Question29 Single(15.0point.)

When you view configurations, if there are a lot of configuration commands that cannot be
displayed in one screen, which shortcut key can be pressed to display the next screen?

[A].Ctrl+C

[B].Tab

[C].Enter

[D].Space

uestion30 Single(15.0point.)

If two routers have set up an OSPF adjacency relationship, which packet must be sent to each
other within one minute?

[A].Hello

[B].DD

[C].LSR
[D].LSU

[E].LSACK

Question31 Single(15.0point.)

After a DHCP server is deployed on a network, an administrator finds that some hosts obtain
IP addresses that are not specified on the DHCP server. Which of the following is not a
possible cause?

[A].Another DHCP server with higher working efficiency exists on the network.

[B].These hosts cannot communicate with the DHCP server, so clients on these hosts
automatically obtain IP addresses on the 169.254.0.0 network segment.

[C].These hosts cannot communicate with the DHCP server, so clients on these hosts
automatically obtain IP addresses on the 127.254.0.0 network segment.

[D].The address pool on the DHCP server has no available IP address.

Question32 Single(15.0point.)

When the silent-interface command is configured on an interface of a RIPv2 router, which of


the following is correct?

[A].The interface no longer receives RIP packets.

[B].The interface no longer sends RIP packets in broadcast or unicast mode.

[C].Routes to the network segment where the interface resides cannot be learnt by other
routers.

[D].The interface will be shut down.

Question33 Single(15.0point.)
Which of the following tables is used by a firewall in transparent mode to forward data?

[A].FIB table

[B].MAC address table

[C].Routing table

[D].Hash table

Question35 Single(15.0point.)

Which of the following powerful SSL VPN functions can enable mobile users on business trips
to access an enterprise internal file server?

[A].Web proxy

[B].File sharing

[C].Port forwarding

[D].Network extension

Question36 Single(15.0point.)

What’s the default management IP address of the AC?

[A].192.168.0.1

[B].169.254.1.1

[C].127.0.0.1

[D].10.1.10.1
uestion39 Single(15.0point.)

If the broadcast address of a network is 172.16.1.255, which of the following addresses may be
its network address?

[A].172.16.1.253

[B].172.16.1.128

[C].172.16.2.0

[D].172.168.1.1

Question40 Single(15.0point.)

What is the best way to avoid interference in IEEE 802.11 WLAN ( )?

[A].Channel Selection

[B].Antenna Selection

[C].Data rate selection

[D].SSID Selection

Question11 Single(15.0point.)
Which of the following statements about the process of establishing a PPP link is false?

[A].The physical layer is unavailable during the Dead phase. When two
communicating devices detect that the physical link between them is activated, PPP
enters the Establish phase from the Dead phase.

[B].In the Establish phase, the two devices perform LCP negotiation to negotiate the
maximum receive unit (MRU), authentication mode, and magic number.
[C].In the Network phase, the two devices perform NCP negotiation to select and
configure a network layer protocol and to negotiate network-layer parameters.

[D].After NCP negotiation is successful, the PPP link maintains the communication
state and enters the Terminate phase.

Question12 Single(15.0point.)
Which of the following statements about VLAN is false?

[A].A VLAN partitions a broadcast domain into subdomains.

[B].VLANs ensure network security.

[C].A VLAN partitions a collision domain into subdomains.

[D].VLAN is a Layer 2 technology.

Question13 Single(15.0point.)
What are the common non-overlapping channels working at the 2.4 GHz frequency
band?

[A].1/6/11

[B].1/5/9/13

[C].1/7/12

[D].2/7/11

Question16 Single(15.0point.)
Which of the following is an outdoor high-power AP?

[A].AP4050DN

[B].AP7010DN
[C].AP9131DN

[D].AP8150DN

Question18 Single(15.0point.)
Which of the following Huawei switches supports PoE?

[A].S3700-28TP-EI-MC-AC

[B].S5710-28C-PWR-EI-AC

[C]. S5700-26X-SI-12S-AC

[D]. S6720-26Q-LI-24S-AC
Question19 Single(15.0point.)
In order to prevent the edge port from receiving the BPDU loss edge port feature, what
protection measures should be taken?

[A].BPDU-protection

[B].BPDU-filter

[C].Root-protection

[D].Root-filter
Question20 Single(15.0point.)
Which of the following is another expression of the IPv6 address
2001:0DB8:0000:0000:0000:0000:3460:8D58?

[A].2001:DB8::346:8D58

[B].2001:DB8::3460:8D58

[C].2001:0DB8:::3460:8D58
[D].2001:0DB8::346:8D58

Question21 Single(15.0point.)
If an interface of a router uses HDLC as the data link layer protocol, which is the default
network type determined by OSPF?

[A].Broadcast

[B].Point-to-point

[C].Point-to-multipoint

[D].NBMA

Question22 Single(15.0point.)
Which of the following statements about VTY is correct?

[A].Each device supports access of multiple VTY users simultaneously.

[B].Each VTY user corresponds to a physical interface.

[C].Non-password authentication is not supported.

[D].The maximum number of VTY interfaces that can be used is the same for
different devices or VRP systems in different versions.

Question28 Single(15.0point.)
Since the signal strength is too weak during wireless communication, the wireless
client switches to the channel of other wireless APs. This process is called?

[A].Association

[B].Roaming

[C].Reassociation
[D].Load balancing

Question29 Single(15.0point.)
Which of the following is correct about route selection rules based on the routing
table?

[A].Preferentially match the route with a smaller preference value.

[B].Preferentially match the route with a smaller cost.

[C].Preferentially match the route with a shorter subnet mask length.

[D].Preferentially match the route with a longer subnet mask length.

Question32 Single(15.0point.)
Which of the following statements about gratuitous ARP is correct?

[A].Gratuitous ARP packets are sent periodically.

[B].A device sends gratuitous ARP packets only after obtaining an IP address
through DHCP.

[C].Generally, gratuitous ARP packets are sent automatically when the IP address of
a host changes.

[D].Gratuitous ARP must be enabled by management personnel.


Question33 Single(15.0point.)
Which of the following VPN technologies is a Layer 2 VPN technology?

[A].L2TP VPN

[B].GRE VPN

[C].IPSec VPN

[D].SSL VPN
Question34 Single(15.0point.)
Which of the following statements about RADIUS is incorrect?

[A].RADIUS uses the UDP protocol, with the authentication and authorization port
numbers as 1812 and 1813, or 1645 and 1646, respectively.

[B].RADIUS encrypts only the password field in the packet.

[C].Authentication and authorization are implemented together.

[D].Configuration commands can be authorized.


Question35 Single(15.0point.)
In STP mode, if the root port of a non-root bridge is shut down, which of the following is
correct?

[A].The switch will immediately delete the entire MAC address table.

[B].The switch will immediately send updated configuration BPDUs from a specified
port.

[C].The switch will immediately send TCN packets.

[D].The switch will immediately send TC packets.

Question37 Single(15.0point.)
Which of the following VPNs is more secure?

[A].L2TP VPN

[B].GRE VPN

[C].IPSec VPN

[D].MPLS VPN
Question39 Single(15.0point.)
Which packet is used to terminate a PPPoE session?
[A].PADI

[B].PADO

[C].PADR

[D].PADT

Question11 Single(15.0point.)
Which command is run in the interface view to encapsulate the serial interface with
HDLC on a router?

[A].link-protocol hdlc

[B].encapsulation hdlc

[C].enable hdlc

[D].address hdlc
Question13 Single(15.0point.)
In the VRP system, which of the following functions does the Ctrl+Z key combination
have?

[A].Return to the user view from the system view.

[B].Exit the current view.

[C].Exit the interface view.

[D].Exit the console interface view.


Question14 Single(15.0point.)
Which of the following is correct when switches are used on the Ethernet?

[A].Increase broadcast domains and reduce broadcasts.

[B].Increase broadcast domains and broadcasts.


[C].Increase collision domains and reduce collisions.

[D].Increase collision domains and collisions.

Question23 Single(15.0point.)
How many PVCs are required for a full mesh topology on a frame relay network (FRN)
that is composed of 10 routers?

[A].6

[B].66

[C].45

[D].12

Question25 Single(15.0point.)
Which of the following is not included in the VRP system login method?

[A].Telnet

[B].SSH

[C].Web

[D].Netstream

Question26 Single(15.0point.)
Which of the following options is used to indicate the unit of antenna gain

[A].dB
[B].dBm

[C].dBi

[D].mW

Question28 Single(15.0point.)
In the GRE configuration environment, which IP address does the destination IP
address in the tunnel interface mode refer to?

[A].IP address of the local tunnel interface

[B].IP address of the peer tunnel interface

[C].IP address of the local outbound interface

[D].IP address of the peer outbound interface

Question29 Single(15.0point.)
When a router is configured using the console port, which of the following
configurations is correct for the terminal-emulation program?

[A].4,800 bit/s, 8 data bits, 1 stop bit, odd parity check, and no flow control

[B].9,600 bit/s, 8 data bits, 1 stop bit, even parity check, and hardware-based flow
control

[C].9,600 bit/s, 8 data bits, 1 stop bit, no parity check, and no flow control

[D].19,200 bit/s, 8 data bits, 1 stop bit, no parity check, and no flow control

Question30 Single(15.0point.)
Which of the following statements about ARP packet sending is correct?

[A].The destination MAC address of ARP Request packets sent from a host is a
unicast MAC address.

[B].The destination IP address of ARP Request packets sent from a host is a


broadcast IP address.

[C].The destination MAC address of ARP Reply packets sent from a host is a unicast
MAC address.

[D].The destination MAC address of ARP Reply packets sent from a host is a
broadcast MAC address.

Question32 Single(15.0point.)
RSTP reduces the number of port states (five in STP) to three. Which of the following
port states is not included?

[A].Blocking

[B].Discarding

[C].Learning

[D].Forwarding

Question34 Single(15.0point.)
About VRRP packets, which of the following statements is true?

[A].VRRP uses TCP packets.

[B].VRRP uses UDP packets.

[C].The destination address of VRRP packets is 224.0.0.18.

[D].VRRP packets are unicast.

/////////////////////////////////////////////////////////////////////////////
Question11 Single(15.0point.)
Huawei Redundancy Protocol (HRP) is used to synchronize data on the active firewall,
such as key configuration, connection status, routing table, and interface address, to the
standby firewall. Which of the following is not covered in synchronization?

[A].Routing table

[B].Security policy

[C].Blacklist

[D].NAT policy
Question13 Single(15.0point.)
Which of the following protocols is used to
implement the backup group switchover in
the firewall hot standby networking?

[A].VRRP

[B].VGMP

[C].HRP

[D].IGMP

Question15 Single(15.0point.)
On a broadcast network, which address is
used by the DR and BDR to receive Link
State Update (LSU) packets?

[A].224.0.0.1

[B].224.0.0.2
[C].224.0.0.5

[D].224.0.0.6

Question17 Single(15.0point.)
Which of the following user systems can be
used to modify information such as user
accounts or passwords directly in the USG
product system?

[A].VPNDB user

[B].LDAP user

[C].All user systems

[D].RADIUS user

Question12 Single(15.0point.)
Which of the following IP addresses is a private IP address?

[A].192.200.1.1

[B].172.32.1.1

[C].192.1.1.1

[D].172.20.2.1

Question13 Single(15.0point.)
How many concurrent login users through the console port are supported by Huawei
network devices?

[A].1

[B].2

[C].5
[D].15

Question19 Single(15.0point.)
Which of the following is true about the order of starting AP?

[A].DHCP Address->CAPWAP discoveries AC->Download configuration->Upgrade


software

[B].DHCP Address ->CAPWAP discoveries AC ->Upgrade software ->Download


configuration

[C].CAPWAP discoveries AC->DHCP Address ->Download configuration ->


Upgrade software

[D].CAPWAP discoveries AC->DHCP Address ->Upgrade software -> Download


configuration

Question20 Single(15.0point.)
Two routers are running on a PPP link. An administrator configures the same OSPF
area and router ID on these routers. Which of the following is correct?

[A].Two routers will set up a neighbor relationship normally.

[B].VRP will display a message indicating that router IDs of the two routers conflict.

[C].Two routers will set up an adjacency relationship normally.

[D].Two routers will not send Hello messages to each other.


Question21 Single(15.0point.)
Which of the following statements about MAC address spoofing attacks is incorrect?

[A].MAC address spoofing attacks take advantages of the MAC address learning
mechanism employed by switches.
[B].An attacker can forge source MAC address data frames and send them to
switches to implement MAC address spoofing attacks.

[C].MAC address spoofing attacks may cause packets, which should be sent by
switches to correct destinations, to be incorrectly sent to attackers.

[D].MAC address spoofing attacks can cause switches to learn incorrect mapping
relationships between MAC addresses and IP addresses.

Question24 Single(15.0point.)
Fragmentation can be performed on both the original packet sending host and
intermediate router. After an IP data packet is fragmented, where can the fragments be
reassembled?

[A].Packet loopback

[B].Next router

[C].Intermediate router

[D].Packet destination

Question27 Single(15.0point.)
Which of the following statements about OSPF area division is correct?

[A].OSPF must have a backbone area.

[B].Two backbone areas that are not physically adjacent can be connected by a
virtual link.

[C].On an OSPF network, the non-backbone areas cannot be divided physically.

[D].A router supports 65,535 OSPF areas at most.


Question34 Single(15.0point.)
What is the maximum rate of 802.11b?

[A].11Mbps

[B].54Mbps

[C].10Mbps

[D].100Mbps

Question35 Single(15.0point.)
After running OSPF, how many states does the router need to go through during the
process of establishing a neighbor relationship?

[A].4

[B].5

[C].6

[D].7

Question37 Single(15.0point.)
Which of the following is correct when RIPv1 or RIPv2 runs on an AR router?

[A].Destination network segments in the routes learnt by a RIPv1 router must be


classful networks.

[B].Destination network segments in the routes learnt by a RIPv2 router must be


network segments with variable-length subnet masks.

[C].Destination network segments in the routes sent from a RIPv1 router must be
classful networks.
[D].Destination network segments in the routes sent from a RIPv2 router must be
network segments with variable-length subnet masks.

Question12 Single(15.0point.)
Which of the following statements about IP spoofing attacks is correct?

[A].An intruder generates a packet with a forged source IP address to obtain the
access permission.

[B].IP spoofing attacks send a large number of IP packets to the destination host to
make it break down.

[C].An attacker sends an ICMP echo request, and the destination IP address is
specified to the broadcast address of the victim network.

[D].Attackers forge SYN packets with fake or non-existent source addresses to


initiate connections to the server. Upon receiving the SYN packets, the server replies with
SYN-ACK packets. However, these SYN-ACK packets will never be acknowledged
because the source addresses of the SYN packets are fake or non-existent, causing half-
open connections.

Question20 Single(15.0point.)
Which of the following statements about the Routing Information Protocol (RIP) is
correct?

[A].A router cannot send a routing entry with the hop count of 16 to its directly
connected neighbors.

[B].A router may receive a routing entry with the hop count of 16 from its directly
connected neighbors, but it will discard the entry immediately.

[C].A router may receive a routing entry with the hop count of 16 from its directly
connected neighbors, and it will use the entry to update its routing table.

[D].A router may send a routing entry with the hop count of 16 to its directly
connected neighbors, but the neighbors will not use the entry to update their routing
tables.

Question21 Single(15.0point.)
Which of the following statements about ACL application scenarios is false?

[A].An ACL can be applied to address translation.

[B].An ACL can be applied to packet filtering.

[C].An ACL can be applied to QoS.

[D].An ACL can be applied to GVRP.

Question22 Single(15.0point.)
Which of the following IP addresses is a Class D address?

[A].192.1.1.1

[B].223.1.1.1

[C].224.1.1.1

[D].240.1.1.1
Question24 Single(15.0point.)
Which of the following statements about the Proposal/Agreement (P/A) mechanism of
RSTP is correct?

[A].RSTP uses Hello packets to exchange P/A information.

[B].Non-P2P links can implement P/A fast convergence.

[C].Only P2P links support P/A fast convergence.

[D].The P/A mechanism of RSTP can still be used in interconnection with the STP.

Question31 Single(15.0point.)
In the seven-layer OSI model, which layer provides logical addresses for a router to
determine packet forwarding paths?
[A].Data link layer

[B].Network layer

[C].Transport layer

[D].Application layer
Question34 Single(15.0point.)
Which of the following states indicates that a BFD session has been established?

[A].Down

[B].Init

[C].Up

[D].AdminUp
Question37 Single(15.0point.)
When running in the system view on a USG, which of the following will delete the
sslconfig.cfg file located in the hda1:/ directory?

[A].cd: hda1:/ remove sslconfig.cfg

[B].cd: hda1:/ delete sslconfig.cfg

[C].cd: hda1:/ rmdir sslconfig.cfg

[D].cd: hda1:/ mkdir sslconfig.cfg

///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

Question41 Multiple Choice(20.0point.)

After OSPF is running, how many types of packets need to be exchanged to establish Full
state?

[A].4
[B].5

[C].6

[D].7

Question43 Multiple Choice(20.0point.)

Which of the following statements about IP address classification are correct?

[A].IEEE divides IPv4 addresses into five classes.

[B].The host ID of a Class A IP address is 24 bits.

[C].Class C IP addresses are in the range from 192.0.0.0 to 223.255.255.255.

[D].Class D IP addresses are reserved for future use.

Question44 Multiple Choice(20.0point.)

Which loop prevention mechanism is provided by RIP?

[A].Split horizon

[B].Poison reverse

[C].Triggered update

[D].Path attribute

Question46 Multiple Choice(20.0point.)

Which of the following IP addresses can be allocated to hosts?

[A].192.168.100.255/22

[B].192.168.100.64/26
[C].192.168.100.100/30

[D].192.168.100.100/25

Question47 Multiple Choice(20.0point.)

Which of the following statements about PPP authentication are false?

[A].Challenge Handshake Authentication Protocol (CHAP) authentication occupies fewer


resources than Password Authentication Protocol (PAP) authentication.

[B].PAP authentication is not as secure as CHAP authentication.

[C].PAP authentication and CHAP authentication are both based on MD5 technology.

[D].PAP authentication is unidirectional, while CHAP authentication is bidirectional.

Question48 Multiple Choice(20.0point.)

Which of the following elements does IPsec SA consist of?

[A].SPI

[B].Source IP address

[C].Destination IP address

[D].Security protocol ID

Question50 Multiple Choice(20.0point.)

Which of the following authentication modes are supported for APs to go online?

[A].MAC address authentication

[B].SN authentication

[C].IP address authentication


[D].MAC address + IP address authentication

Question51 Multiple Choice(20.0point.)

Which of the following is another expression of the IPv6 address


2001:0410:0000:0001:0000:0000:0000:45FF?

[A].2001:410:0:1:0:0:0:45FF

[B].2001:41:0:1:0:0:0:45FF

[C].2001:410:0:1::45FF

[D].2001:410::1::45FF

Question52 Multiple Choice(20.0point.)

Which ports of servers are used by default for the FTP service?

[A].20

[B].21

[C].22

[D].23

Question55 Multiple Choice(20.0point.)

Which of the following statements about WLAN Layer 2 and Layer 3 networking modes are
correct?

[A].The Layer 2 networking is applicable to large-sized networks.

[B].The Layer 2 networking is easy to deploy.

[C].The Layer 3 networking is applicable to small- to medium-sized networks.


[D].The Layer 3 networking is complex to deploy.

Question56 Multiple Choice(20.0point.)

A link-group has three physical interfaces. If any of the interfaces fails, which of the following
statements are correct?

[A].The system changes the status of all other interfaces to Down.

[B].The status of the other interfaces does not change.

[C].After some interfaces in the group recover, the system changes the status of all
interfaces to Up.

[D].After all interfaces in the group recover, the system changes the status of all interfaces
to Up.

Question57 Multiple Choice(20.0point.)

When using Source NAT for address translation on the firewall to implement intranet access to
the Internet, which of the following configurations are required?

[A].Configuring an address pool.

[B].Configuring security policies.

[C].Configuring the NAT server.

[D].Configure the destination IP address.

Question58 Multiple Choice(20.0point.)

Which layers are included in a three-layer architecture of an enterprise network?

[A].Access layer
[B].Aggregation layer

[C].Core layer

[D].Network layer

[E].Physical layer

Question59 Multiple Choice(20.0point.)

Which of the following are the three elements in 802.1x authentication?

[A].Client

[B].Authenticator

[C].Authentication server

[D].Thin client

Question60 Multiple Choice(20.0point.)

If the PVID of a trunk link is 5, and the port trunk allow-pass vlan 2 3 command is run on the
interface, traffic from which VLAN can pass through the trunk link?

[A].VLAN 1

[B].VLAN 2

[C].VLAN 3

[D].VLAN 5

/////////////////////////////////////////////////////44444444///////////////////////////////////////////////////////////////////////

Question41 Multiple Choice(20.0point.)


Which of the following are typical gateway antivirus technologies?

[A].File identification

[B].Decompression

[C].Unpacking

[D].Decryptio

uestion42 Multiple Choice(20.0point.)

What are the functions of gratuitous ARP?

[A].Checks duplicate IP addresses: Normally, a device does not receive an ARP Reply
packet. If the device receives an ARP Reply packet, another device is using the same IP
address.

[B].Advertises a new MAC address: If the MAC address of a device changes because its
network adapter is replaced, the device sends a gratuitous ARP packet to notify all devices of
the change before the ARP entry is aged out.

[C].Detects connectivity with the gateway when a host communicates with the gateway.

[D].Notifies other devices of an active/standby switchover in a VRRP group.

uestion43 Multiple Choice(20.0point.)

In the following port states of STP, which are unstable intermediate states?

[A].Blocking

[B].Listening

[C].Learning

[D].Forwarding

uestion45 Multiple Choice(20.0point.)


What are the functions of Hello packets in OSPF?

[A].OSPF selects the DR and BDR based on Hello packets.

[B].Hello packets are sent periodically to discover and maintain OSPF neighbor
relationships.

[C].Hello packets are transmitted in the entire area.

[D].If a device does not receive Hello packets from its neighbor for a period of time, it will
disconnect the neighbor relationship.

uestion47 Multiple Choice(20.0point.)

Which of the following are common network topologies?

[A].Bus topology

[B].Tree topology

[C].Star topology

[D].Full mesh topology

[E].Ring topology

Question41 Multiple Choice(20.0point.)


A terminal checks the destination MAC address in the header of a received data frame.
Which type of destination MAC address is allowed by terminal?

[A].Terminal's MAC address

[B].Multicast MAC address


[C].Multicast MAC address listened by the terminal

[D].Broadcast MAC address


Question42 Multiple Choice(20.0point.)
Which of the following routes are the sources of a routing table?

[A].Routes discovered by link layer protocols, which are also called interface routes
or direct routes.

[B].Direct routes discovered by network layer protocols.

[C].Static routes that are manually configured by the network administrator.

[D].Routes discovered by dynamic routing protocols.


Question43 Multiple Choice(20.0point.)
Which of the following rules are correct for configuring a security level for a firewall
security zone?

[A].The level of a security zone cannot be changed once it is configured.

[B].Two security zones in a system cannot have the same security level.

[C].The default security level of a new security zone is 100.

[D].A security level can be set only for a user-defined security zone.
Question44 Multiple Choice(20.0point.)
Which of the following formulas about power are incorrect?

mw 1 = dBm [A].0

mw 0 = dBm [B].0

mw 1 = dBm [C].1

0 mw = dBm [D].1

Question45 Multiple Choice(20.0point.)


Which fields in packets are not changed when a router forwards packets?

[A].Source MAC address

[B].Destination MAC address

[C].Source IP address

[D].Destination IP address
Question46 Multiple Choice(20.0point.)
Network administrators use Ping to test network connectivity. Which of the following
protocols might be used in the process?

[A].ICMP

[B].TCP

[C].ARP

[D].UDP
Question47 Multiple Choice(20.0point.)
Which methods are supported in the VRP system to configure the router?

[A].Configure the router through the console port.

[B].Configuring the router through Telnet.

[C].Configure the router through the mini USB port.

[D].Configuring the router through FTP.


Question49 Multiple Choice(20.0point.)
Which of the following statements about gateway are false?

[A].When an IP address and subnet mask are configured for a host, but no gateway is
configured, the host cannot communicate with any device.

[B].A gateway is the next hop address.


[C].Generally, a gateway does not need to be configured for communication in the
same network segment.

[D].The gateway address of a host must be configured manually.

Question50 Multiple Choice(20.0point.)


Which of the following are correct regarding the MAC address learning mechanism of a
switch?

[A].The MAC address learning function is enabled on a switch by default.

[B].A switch automatically learns the source MAC addresses of packets received on
interfaces, and generates MAC address entries.

[C].The MAC address learning function can be disabled on a switch.

[D].The MAC address learning mechanism of a switch can be based on destination


MAC addresses.

Question51 Multiple Choice(20.0point.)


In 802.11 WLAN, which of the following are included in the CSMA/CA mechanism?

[A].Carrier sense

[B].Multiple access

[C].Collision detection

[D].Collision avoidance
Question52 Multiple Choice(20.0point.)
Which conditions does an advanced ACL define rules based on?

[A].Source or destination IP address

[B].Source or destination port number

[C].Source or destination MAC address


[D].Protocol type
Question53 Multiple Choice(20.0point.)
RSTP reduces the number of port states (five in STP) to three. Which of the following
port states are included in RSTP?

[A].Blocking

[B].Discarding

[C].Learning

[D].Forwarding

Question54 Multiple Choice(20.0point.)


How can communication between different VLANs be achieved?

[A].Use a router, and configure VLANs on different interfaces of the router.

[B].Use a router as a router-on-a-stick.

[C].Use a Layer 3 switch.

[D].Different VLANs cannot communicate with each other.


Question55 Multiple Choice(20.0point.)
If the number of an ACL is 2999, which of the following are correct?

[A].It is a basic ACL.

[B].It is an advanced ACL.

[C].Policies can be configured based on the time segment.

[D].Policies can be configured based on the packet type.

Question56 Multiple Choice(20.0point.)


Which of the following formats can the binary number 10111101 be converted to?

[A].AC in hexadecimal notation

[B].219 in dotted decimal notation

[C].BD in hexadecimal notation

[D].215 in dotted decimal notation

Question57 Multiple Choice(20.0point.)


Which of the following types of VPN are suitable to connect to the enterprise intranet
over the public network?

[A].L2TP VPN

[B].GRE VPN

[C].L2TP over IPsec

[D].SSL VPN

Question59 Multiple Choice(20.0point.)


Which of the following modes can be used for upgrading WLAN APs?

[A].AC-mode

[B].AP-mode

[C].FTP-mode

[D].SFTP-mode
Question44 Multiple Choice(20.0point.)
Which of the following statements about ARP packet sending are correct?

[A].A gratuitous ARP Request packet uses a broadcast IP address.

[B].A gratuitous ARP Request packet uses a unicast IP address.

[C].An ARP Reply packet is a broadcast packet.

[D].An ARP Reply packet is a unicast packet.

Question45 Multiple Choice(20.0point.)


Which SNMP versions do not support encryption?

[A].SNMPv1

[B].SNMPv2

[C].SNMPv2c

[D].SNMPv3
Question46 Multiple Choice(20.0point.)
Which of the following statements about OSPF area are correct?

[A].If only one area exists on the network, the area ID must be 0.

[B].If a router belongs to multiple areas on the network, one of these areas must be
the backbone area.

[C].Only OSPF routers in the same area can establish neighbor and adjacency
relationships.

[D].In the same AS, routers in multiple OSPF areas share the same LSDB.

Question49 Multiple Choice(20.0point.)


In the case of turning on/off state detection, which of the following situations will the
firewall create a session?

[A].Enable status detection: Receive TCP SYN packets.

[B].Enable status detection: Receive TCP SYN+ACK message

[C].Enable status detection: Receive UDP packets.

[D].Disable status detection: Receive UDP packets.

Question52 Multiple Choice(20.0point.)


Which of the following statements about an edge port are correct?

[A].An edge port does not participate in STP or RSTP calculation.

[B].An edge port is in either Disabled or Forwarding state.

[C].An edge port can transit from the Disable to Forwarding state without any delay.

[D].All ports of a switch are defined as non-edge ports by default.

Question54 Multiple Choice(20.0point.)


Which of the following are common WAN protocols or technologies?

[A].Ethernet

[B].Frame relay
[C].PPP

[D].HDLC

Question57 Multiple Choice(20.0point.)


Which of the following scenarios is the IP-Link function of USG series firewalls mainly
applied in?

[A].Hot standby

[B].Link aggregation

[C].Persistent connection

[D].Static route

Question58 Multiple Choice(20.0point.)


Which of the following are Layer 3 VPNs?

[A].L2TP VPN

[B].GRE VPN

[C].IPSec VPN

[D].SSL VPN
Question59 Multiple Choice(20.0point.)
What types can APs be categorized into by
environment?

[A].Indoor AP

[B].Building AP

[C].Outdoor AP
[D].Indoor distributed AP

Question41 Multiple Choice(20.0point.)


Which of the following statements about
link aggregation are correct?

[A].Link aggregation prevents routing


loops.

[B].Link aggregation increases the


bandwidth between connected devices.

[C].Link aggregation improves the


reliability between connected devices.

[D].Link aggregation is only performed


on the physical layer.

Question42 Multiple Choice(20.0point.)


Which of the following are characteristics of
packet filtering firewalls?

[A].With the increase of the complexity


and length of ACLs, filtering performance
of firewalls decreases exponentially.

[B].Static ACL rules can hardly meet


dynamic security filtering requirements.

[C].Network information exchange and


session processes are fully controlled,
featuring high security.

[D].Packet filtering does not check the


status of sessions or analyze data, which is
vulnerable to attacks.
Question43 Multiple Choice(20.0point.)
Which of the following statements about
decapsulation of data packets in the TCP/IP
protocol stack are correct?

[A].Data packets are sent to the data


link layer first. After the packets are parsed,
link layer information is removed and
network layer information (such as IP) is
obtained.

[B].After the network layer receives and


parses data packets, network layer
information is removed, and the upper-layer
protocol (such as HTTP) is obtained.

[C].After the transport layer (TCP)


receives and parses data packets, transport
layer information is removed, and the
upper-layer protocol (such as Telnet) is
obtained.

[D].After the application layer receives


and parses data packets, application layer
information is removed, and the user data
obtained is the same as that sent from the
host.

Question45 Multiple Choice(20.0point.)


Which protocols in the TCP/IP stack are
used on the application layer?

[A].HTTP

[B].IGMP

[C].Telnet

[D].TCP
Question46 Multiple Choice(20.0point.)
Which of the following statements about the
preference of static routes on a Huawei
device are correct?
[A].The preference value of a static
route is in the range from 0 to 255.

[B].The default preference value of a


static route is 60.

[C].The preference value of a static


route can be modified at random.

[D].Preference values of static routes


can only be centrally modified, instead of
one by one.

Question48 Multiple Choice(20.0point.)


Which of the following statements about
creating a radio profile are incorrect?

[A].The profile name and ID must be


specified.

[B].Only the profile ID needs to be


specified.

[C].Only the profile name needs to be


specified.

[D].The profile name and ID can be


unspecified. In this case, the profile name
and ID value are both 0.

Question50 Multiple Choice(20.0point.)


Which field can a receiver reassemble
fragments based on?

[A].Identification

[B].Protocol
[C].Flags

[D].Fragment offset

Question53 Multiple Choice(20.0point.)


What are characteristics of the default
VLAN of a Layer 2 Ethernet switch?

[A].The default VLAN cannot be deleted


manually.

[B].By default, all interfaces of the


switch are member interfaces in the default
VLAN.

[C].A default VLAN must be created


first to which interfaces can be added.

[D].IP addresses configured on the


switch will be applied only to member
interfaces in the default VLAN.
Question54 Multiple Choice(20.0point.)
Which of the following MAC addresses are
effective?

[A].19-22-01-63-23

[B].68-F7-23-8B-33-A2

[C].00-3C-1G-A1-23-B2

[D].00-00-11-11-11-AA

Question56 Multiple Choice(20.0point.)


The firewall uses the "display diagnostic-
information" command to collect system
diagnostic information in the diagnostic
view. Which of the following commands can
be obtained?

[A].display version

[B].debugging ip packet

[C].display current-configuration

[D].display history-command

Question57 Multiple Choice(20.0point.)


Which of the following are included in
AAA?

[A].Authentication

[B].Authorization

[C].Audit

[D].Accounting

Question59 Multiple Choice(20.0point.)


To classify wireless networks by coverage, which of the following are wireless networks?

[A].WPAN

[B].WLAN

[C].WMAN

[D].WWAN

Question41 Multiple Choice(20.0point.)


Which of the following statements about the
NAT technology are correct?
[A].NAT saves a large number of public
IP addresses.

[B].NAT implements the mapping


between private and public IP addresses.

[C].NAT is mainly applied to egress


devices of enterprise networks.

[D].NAT is generally applied to the


access layer.
Question42 Multiple Choice(20.0point.)
The commands for configuring NAT Server
are as follows: Nat server global X.X.X.X
inside X.X.X.X no-reverse X.X.X.X stands
for IP address. Which of the following
options is correct?

[A].The IP address following the global


keyword is the public IP address.

[B].The IP address following the global


keyword is the private IP address.

[C].The IP address following the inside


keyword is the public IP address.

[D].The IP address behind the inside key


is the private IP address.
Which of the following are not the PoE
power cable?

[A].Feeder

[B].Optical Fiber

[C].Twisted pair

[D].Coaxial cable
Question57 Multiple Choice(20.0point.)
Which flag bits in the TCP header
participate in the TCP three-way
handshake?

[A].SYN

[B].URG

[C].ACK

[D].FIN
Question58 Multiple Choice(20.0point.)
Which of the following statements about a
broadcast domain are correct?

[A].Each port of a switch is a broadcast


domain.

[B].Each port of a router is a broadcast


domain.

[C].Each port of a hub is a broadcast


domain.

[D].A broadcast domain is the flooding


scope of a broadcast packet.

examination ends!
Test paper code: XQIGNE2XOEOWBV12Z5
Test paper name: Huawei ICT Competition North Africa 2018
Ethiopia Preliminary exam
manager: 王东/wwx298448
Total test paper score:1000.0
Login account:fitwi.h/Fitwi.H
Score:280.0
Test paper hand-in status: Normal test paper hand-in

Question20 Single(15.0point.)

examination ends!
Test paper code: XQIGNE2XOEOWBV12Z5
Test paper name: Huawei ICT Competition
North Africa 2018 Ethiopia Preliminary
exam
manager: 王东/wwx298448
Total test paper score:1000.0
Login account:fit.h/Fit.H
Score:430.0
Test paper hand-in status: Normal test paper
hand-in