Sie sind auf Seite 1von 50

H12-261_192

Number: h12-261
Passing Score: 600
Time Limit: 90 min
File Version: 1.0
QUESTION 1
Which of the following advanced functions
are supported by the BGP-EVPN?
A. ARP broadcast
B. suppression
C. VRRP over VXLAN
D. Multi-active
VXLAN Qos gateway

Correct Answer: ACD


Section: (none)

QUESTION 2
Which of the following statements about
VXLAN packets are correct?
A. The outer destination IP address is the IP address of the remote
VTEP on the VXLAN tunnel.
B.
C. The source UDP
Destination UDP port
port number is 4789.
number
D. 4789
The VNI has 24 bits, which are used to
differentiate VLAN segments.
Correct Answer: ACD
Section: (none)

QUESTION 3
Which of the following packets is required to implement VM migration in the BGP-EVPN
distributed gateway scenario?
A. Type5
B. Type4
C. Type1
D. Type2
E. Type3

Correct Answer: D
Section: (none)

QUESTION 4
Which of the following statements about the
BFD single-arm echo function are correct?
A. The BFD single-arm echo function must be configured with the local discriminator
and the local discriminator.
B. The default destination IP address of the BPD single-arm echo protocol packet is
224.0.0.184.
C. After the BFD one-arm echo function is enabled, the destination IP address in
BFDR
CorrectisAnswer:
the sameCDas the source IP address.
D. The BFD
Section: one-arm echo function applies to the scenario where one device
(none)
supports the BD and the other device does not support the echo function.
QUESTION 5
Which of the following statements
about VRRP are correct?
A. Both VKRPv2 and VRRPv3 support
authentication.
B. The VRRPv3 does not support the authentication function, but the VRRPv2 supports the
authentication function.
C. The VRRPv2 applies only to the IPv4 network. The VRRPv3 is used only for the IPv6 network.
D. The priority of the Master IP address owner VRP is 255. Therefore, the priority range can be set
to 0-254.Answer: BC
Correct
Section: (none)
QUESTION 6
Huawei users are transferring a large number of files through TFTP. Which protocol does TFTP
transmit? (Checked)
A. ICMP and UDP
B. IP and TCP
C. UDP
D. NFS
E. FTP

Correct Answer: C
Section: (none)

QUESTION 7
When LQ is deployed, bandwidth parameters need to be
configured. What is the meaning of bandwidth parameters?
A. Provide a built-in policy controller to limit the maximum available bandwidth of a low-latency queue when congestion
occurs.
B. The value of this parameter should be as small as possible. It indicates that the bandwidth is always reserved. Even
if LLQ is used, this parameter also reduces the available bandwidth of the interface.
D. This parameter is optional because LLQ always takes
C. It indicates
precedence thatother
over the burst size of the token bucket is calculated based on the CIR.
queues.
Correct Answer: A
Section: (none)

QUESTION 8
Assume that the shaping rate of a port is 100Mbps. The input bandwidth and PIR of each service on the port are as
follows: So, after the first round,
What is the bandwidth allocated to the EF queue?

A. 30M
B. 15M
C. 90M
D. 25M

Correct Answer: D
Section: (none)

QUESTION 9
As shown in the figure, two IPv6 networks can access the IPv4 network, and two IPv6 networks need to establish an
IPSec tunnel for communication,
Which of the following encapsulation modes can meet the preceding requirements?
A. ESP+ tunnel mode
B. AH+ transmission
mode
C. AH+ tunnel mode
D. None of the above
Correct Answer: B
Section: (none)

QUESTION 10
Which of the following is not
included in a digital
certificate?
A. digital
envelope
B.
C. Issuers
Digital
signatures
D. Public key
information
Correct Answer: A
Section: (none)

QUESTION 11
The attack method of the LAN port is as follows: The attacker sends a source address and a destination address to the
target host as the target host, source port, and destination port.
When the receiving end waits for the final ACK packet sent by the same SVN packet, the connection is always in the
semi-connected state. As a result, the receive end is full.
Waste of limited
A. True TCP resources
B. False

Correct Answer: B
Section: (none)

QUESTION 12
Which of the following statements about SA in IPSec
is incorrect?
A. The SA is uniquely identified by a triplet, including the security parameter SPI (Security Parameter Inder) and source IP
address.
Address
B. Run and used
the display ipsecsecurity
commandprotocol
to viewnumber (AsESP)
information such as the encryption algorithm used between the and another IPSe
peer.
C.
D. IPSec supports
The IPSec VPN only the symmetric
connection can be encryption
establishedalgorithm
only whentobidirectional
encrypt data.
SAs exist between IPSec peers.
Correct Answer: C
Section: (none)

QUESTION 13
Router HW1 and router HW2 are connected to network A and network B respectively. As shown in the following figure, if
you want to be on the router HW1 and the router
An IPsec VPN is established between HW2s.
A. rule permit ip source 192.168.1.10 destination 192.168.1.2 0
B. rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0
C. rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
D. rule permit ip source 192.168.1.10 destination 10.1.2.0 0.0.0.255
E. rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255

Correct Answer: C
Section: (none)

QUESTION 14
Which of the following statements about the
assertion mechanism is correct?
A. The IP address size is not used as an election condition during the
winner election.
B. In the assertion mechanism, the winner forwards multicast
data to the broadcast network segment.
C.
D. The
In theassertion
assertionmechanism is used
mechanism, for DR
the loser election.
connects the shut down to
the broadcast network.
Correct Answer: B
Section: (none)

QUESTION 15
If multiple receivers exist in a multicast group, the administrator enables the IGMP-Snooping function on the switch
connected to the receiver.
How do multiple receivers respond when a switch receives a general query packet from a querier?
A. The receiver that receives the first response times out and sends a Report
message. Other receivers do not send the Report message.
B. After the ICMPv2 command is run, all receivers respond to Report messages.
C. All receivers can send Report messages only when IGMPvl is running.
D. All receivers respond with Report messages.
Correct Answer: D
Section: (none)

QUESTION 16
If PIM-SM is run on a multicast network, a multicast forwarding tree must be established between the multicast source
and receiver so that the receiver can receive multicast packets.
For example, which of the following options are correct for constructing a tree?
A. The SPT is constructed between the
multicast source and the RP.
B. The RPT is constructed between the RP
and the receiver.
C. The RPT is constructed between the
multicast source AB
Correct Answer: and the RP.
D. The SPT is
Section: (none) constructed between the RP
and the receiver.
QUESTION 17
Which of the following statements
about the BSR mechanism are
correct?
A. The PIM-SM domain can have multiple C-BSRs, but only one BSR can
be elected.
B. The
C. The BSR
BSR collects C-RP
advertises BSRinformation through
information the received
and C-RP C-RP
information to data
all routers in the PIM-SM domain by
packets. Bootstrap packets.
flooding
D. A C-BSR can also collect C-RP information through the received C-RP data packets.
Correct Answer: ABC
Section: (none)

QUESTION 18
Which of the following statements about
LDP reliability is incorrect?
A. The LGP GR (Graceful Restart) uses the high separation between the LS forwarding plane and the control plane to
implement protocol restart or active/standby switchover.
TheLDP
B. The forwarding is not
FRR policy interrupted
is manually during theByswitching.
configured. default, a 32-bit backup route triggers
LDP to establish a backup LSP.
C. The LDP FRR may also generate an LSP for the label mapping from the non-optimal next hop, and use the LSP as the
backup of the primary LSP to establish a forwarding entry.
D. When LDP is associated with IGP, IGP needs to suppress route advertisement to ensure that LDP and LGP paths are
consistent.
Correct Answer: B
Section: (none)

QUESTION 19
Which of the following statements about the LDP session
establishment process are correct? (Multiple choices)
A. After the two ends receive the KeepAlive message from each other, the
LDP session is established successfully.
B. The Hello message discovered by the LDP neighbor uses TCP packets with the destination
address being 224.0.0.2.
C. After the TCP connection is set up, the active party sends an initialization message to negotiate
the parameters related to the establishment of the LDP session.
D. The party
Correct withACD
Answer: the larger transmission address acts as the active party and initiates a TCP
connection setup.
Section: (none)

QUESTION 20
RDS are used to distinguish the same IP addresses in different
VPNs. How many bit?s are contained in RDS?
A. 64
B. 32
C. 16
D. 128

Correct Answer: A
Section: (none)

QUESTION 21
Association between LDP and IGP means that IGP is used to suppress the advertisement of reachable routes to ensure
that LDP and IGP work together to implement network convergence.
LDP maintains the same path, minimizing traffic loss and improving reliability of the entire network.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 22
Which of the following statements about the mode of
processing the TTL by the RLS is correct?
A. In Pipe mode, when an IP packet passes through an MPLS network, the value of IP TTL minus 1 is mapped to the
MPLS TTL field on the ingress node.
B. The TTL in the MPLS label is the same as the TTL field in the IP header. .TTL prevents routing loops on the MPLS
network.
D. In the MPLS VPI, if the structure of the MPLS backbone network needs to be hidden, the Uni form mode can be used
C.
on In
theUnifor mode,
ingress when an
for private IP packet
network passes through an MPLS network, the value of IP TTL is decreased by 1 on
packets.
the Type.
ingress node. The value of MPLS TTL is fixed.
Correct Answer: B
Section: (none)

QUESTION 23
On an MPLS VPN network, different CE devices can use different routing protocols to exchange routing information
with the same PE device.
The routing protocols used between the CE and the same PE are independent of each other.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 24
Which of the following technologies use tunnels to implement
communication between IPv6 addresses?
A. Dual Stack
B. 6to4
C. ISATAP
D. NAT64

Correct Answer: BC
Section: (none)

QUESTION 25
If the router only needs to forward IPv6 packets, no IPv4 protocol and address need to be configured on
the router.
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 26
Is the process of parsing the link-layer address parsed
by NDP correctly?

A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 27
Run the BGP4+ command between the two routers. The neighbor relationship is normal. However, the BGP routing
table of the local router does not contain the route entry of the neighbor.
What's the reason for that?
A. The route entries in the peer BGP routing table are
not optimal.
B. The next hop address of the BGP route is
unreachable.
D. active-route-advertise is configured on
C. peer
the peerignore
end. is configured on the peer end.
Correct Answer: ABD
Section: (none)

QUESTION 28
Which of the following may affect the
establishment of an IBGP peer relationship?
A. iBGP-Multi-hop is not
configured.
B.
C. The
The authentication
IGP route is fails.
unreachable.
D. The BGP protocol
versions are inconsistent.
Correct Answer: BCD
Section: (none)

QUESTION 29
Which of the following tools cannot be directly referenced by the If-match clause in
Route-policy? (Confirmed)
A. Regular expression
B. IP-prefix
C. AS-path-filter
D. Community-filt

Correct Answer: A
Section: (none)

QUESTION 30
Which of the following information can be included in a basic network layer data
packet? (Multiple Choice) (Confirmed)
A. Data link layer
header
B.
C. Upper-layer data
Network layer
header
D. Path record
E. Network layer
tail
Correct Answer: BC
Section: (none)

QUESTION 31
Which of the following statements
about configuring the BGP4 is correct?
A. BGP4+ does not support route
reflectors.
B. The next hop of the BGP4 route can be the Link-Local
address.
C. BGP4 When a reflector is configured, the role of the reflector and client must be the same as
that configured on the BCP4.
D. BGP4 When a peer is specified, the Link-Local address must be used.
E. The Router-ID of the BGP4+ is the same as the Router-ID-of the BGP4.
Correct Answer: BE
Section: (none)

QUESTION 32
The OSPF protocol is running on the network of a company. To understand the OSPF mechanism, an engineer
performs the following operations on the network:
Which of the following statements about OSPF packets are correct?
A. After an interface is added to an OSPF area, the
interface immediately
B. LS Update packetssends Hello
are sent onlypackets.
when the adjacency
relationship is established.
C. After receiving the LsUpdate packet, the router must send LsAck to confirm
the packet.
D. LS Update packets are synchronized to the LSDB by sending detailed LSA
information.
Correct Answer: ACD
Section: (none)

QUESTION 33
Which of the following statements about the stub area in
OSPF are correct?
A. The ASBR cannot exist in the stub area.
B. The virtual link cannot traverse the stub
area.
C. TypeT LSA cannot be injected in a stub
area.
D. The backbone
Correct Answer: ABCDarea cannot be configured
as a stub(none)
Section: area.

QUESTION 34
There is no type of LSA in the OSPF Stub area.

A. Type7
B. Type5
C. Type4
D. Type3

Correct Answer: ABC


Section: (none)

QUESTION 35
An OSPF router is connected to area 0 and area 1. Area 1 is configured as a stub area and is operated only in area 1.
What are the types of LSAs? (Confirmed)

A. 7 Type of
B. LSA
1 Type 2 LSAs and
C. Type
1 22
Type LSAs
LSAs, Type 2 LSAs, and
D. Type 5 LSAs
E. 3 Type-4 LSAs and Type-4 LSAs
1 Type LSAs, Type 2 LSAs, and
TypeE3 LSAs
Correct Answer:
Section: (none)

QUESTION 36
An engineer performs the import operation on an OSPF router on a network. Which of the following statements about
importing route LSAs are correct?
A. Advertising Router is set to the Router ID of the ASBR.
B. Net Mask is set to all 0s.
C. Link State ID is set to the destination
D. network
Link segment
State ID andaddress.
Advertising Router can uniquely identify an LSA.

Correct Answer: AC
Section: (none)

QUESTION 37
On a broadcast network, the DIS election starts only after the
neighbor relationship is established.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 38
Which of the following statements about IS-IS
route summarization are correct?
A. Route aggregation can be configured and takes effect on all
types of routers.
B. Route aggregation can take effect only on the level-1 router.
C. Route aggregation can take effect only on the level-2
router.
D. RouteAnswer:
Correct aggregation
D can take effect only on the level-1-2
router.
Section: (none)

QUESTION 39
During IS-IS neighbor relationship establishment, CSNP packets are not sent
on the P2P network.
A. True
B. False

Correct Answer: B
Section: (none)
QUESTION 40
Router-LSA is generated on each router in the OSPFv3. It describes the interface address and cost of each link on the
router, as well as the neighbor relationship.
Indicates the RouterID of a router.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 41
Which of the following statements about IS-IS GR are
correct? (Confirmed)
A. IS-IS GR is enabled by default.
B. IS-IS GR has four timers.
C. IS-IS GR uses CSNP packets to notify events and maintain
neighbor relationships.
D. IS-IS GR defines a new TLV structure to support this feature.
Correct Answer: D
Section: (none)

QUESTION 42
As shown in the figure, R1, R2, and R3 run OSPF at the same time and advertise their loopback
interfaces. Which of the following statements is false?

A. Run the filter-policy export command on the R2 to check the loopback


B. interface route of the R3.
C. On the R2, run the filter export command in the Area 1 to filter the loopback
interface routes of the R3.
D.
On the R2, run the filter import command in the Area 0 to filter the loopback
interface
Correct Answer: A routes of the R3.
On
Section: (none) R1, you can use filter-poliey import to filter the loopback interface routes
of R3.
QUESTION 43
Is-is CSNP packets and OSPF DD packets are transmitted on the MA network. This section describes the functions of the
link status database summary and compares the two types of reports.
Which of the following statements are correct?
A. Two types of packets need to be confirmed by the peer router after
being sent. Otherwise, retransmission is required.
B. After the adjacency is established, the CSRP and D packets are
stopped.
D. The master/slave relationship in the OSPF DD packet exchange is not bound to the DR/BDR. The CSN
C. Two istypes
packet of packets
generated only do
by not
the need
DIS. to be confirmed by the peer router.
Correct Answer: D
Section: (none)

QUESTION 44
Which of the following statements about
route import is incorrect?
A. When BGP routes are generated, the import and Network 2 modes are supported. The network mode is more accurate.
B. The default metric of external routes imported by OSPF is 1, and the type of imported external routes is Type2.
C. After the IS-IS level-2 network route is imported to the level-1, if the import policy is not manually configured, a routing
loop occurs.
D. Importing IBGP routes in OSPF may cause routing loops.
Correct Answer: C
Section: (none)

QUESTION 45
The following figure shows the data result of the existing
router. Which of the following statements is incorrect?

A. The R3 router is an Level-1-2


router.
B. R3 must be the DIS of an Level-1 link.
C. R3 must be the DIS of an Level-2 link.
D. The system ID of the R3 router is
0003.0000.0000.0000.
Correct Answer: B
Section: (none)

QUESTION 46
Which of the following statements about the RD filter of
BGP are correct?
A. If RD-filter is not configured, if the RD-filter is used for filtering, the matching result is deny.
B. If RD-filter is configured but the RD of the route does not match any RD defined in the rule, the default matching
result is
Permit. rules are matched according to the
C. Multiple
configuration sequence. on the RD-filter are always in
D. The rules configured
the OR relationship.
Correct Answer: D
Section: (none)

QUESTION 47
An existing AS-path-filter: ip as-path-filter 1 permit 100(_100)*(_400)*$, which AS-does not match the As-path-filter
Path attribute?
A. 100 200 900
B. 100
C. 100 400
D. 100 400 400 400

Correct Answer: A
Section: (none)

QUESTION 48
Which of the following statements about IS-IS LSP
fragment extension are correct?
A. Enable the IS-IS router to generate more LSP fragments to carry more IS-IS
information.
B.
C. IS-IS
IS-IS fragment
fragment extension
extension isis also valid for Hello
implemented packets.
by adding virtual systems. A maximum of 1000 virtual
systems can be extended.
D. The maximum number of fragments that an IS-IS router can generate is 1024.
Correct Answer: A
Section: (none)

QUESTION 49
The existing Route-policy is as
follows:
ip community-filter 1 permit 100:1
ip as-path-filter 2 permit ^100$
route-policy test permit node 10
if-match community-filter 1
apply
if-matchas-path 200
as-path-filter 2
Which of the following statements about the
preceding configurations are correct?
(Confirmed)
A. When the BGP route carries the community attribute 100:1 or the AS_PATH is 100, the BGP route matches the route-.
Policy. The AS-PATH attribute of the matched route is changed to 200.
B. When the BGP route carries the community attribute 100:1 and the AS-PATH is 100, the BGP route matches the
preceding route.
C. IfPolicy. The AS_PATH
the AS-PATH of the
of a BGP matched
route is 100, route is changed
the BGP to 200. the route-policy. AS_PATH matching the route
route matches
The attribute is changed to 200.
D. If the BGP route carries the community attribute 100:1, the BGP route matches the route-policy. Route matching
The AS_PATH attribute is changed to 200.

Correct Answer: B
Section: (none)

QUESTION 50
Which of the following statements about IS-IS broadcast network database
synchronization are correct? (Single Choice)

A. When the R2 functions as the DIS, it


periodically
B. sends CSNPs.
The R2 functions as a DIS, and the Hello time is three times that of a
common router.
C. The R2 functions as the DIS and does not receive PSNP requests from
other routes.
D. The R1
Correct and R3
Answer: A periodically send PSNP requests to maintain database
consistency.
Section: (none)

QUESTION 51
The following figure shows the Layer 2 network architecture of a company. After the configuration is complete, services
between departments cannot communicate with each other. Run the following command to check the device status:
Are you sure you want to locate the fault? (Multiple choices)
A. The Revision Level configurations of switches are
inconsistent.
B. The BPDU interval configured on the switch is different
from that configured on the switch.
C. The Region Name configurations of switches are
inconsistent.
Correct Answer: CD
D. The Instance
Section: (none) VLAN mappings between switches are
inconsistent.
QUESTION 52
The two routers are connected through serial ports. However, the two routers cannot be pinged. The
port status is as follows:

Can the preceding information be used to


determine the cause? (Single Choice)
A. The link
bandwidth is
B. The IP addresses of the two ends
insufficient.
are on different network segments.
C. The link layer protocols at both
ends are inconsistent.
D. The subnet
Correct Answer:mask
C does not match.
Section: (none)

QUESTION 53
When DLDP detects a unidirectional link in a fiber, Huawei devices perform the following operations by default: The DLDP
state machine is switched to the Disable state.
When a trap is generated, the interface is automatically blocked.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 54
What is the main reason why RSTP is faster than
STP?
A. RSTP adds the type of port status.
B. RSTP has a smaller
overhead.
C. RSTP does not converge
based on timers.
D. RSTPAnswer:
Correct has a smaller
C timer.
Section: (none)

QUESTION 55
Which of the following statements about Inter-AS VN-
Optiorc are true?
A. A maximum of two labels can be used during
packet
B. The forwarding.
ASBR does not save VPMV4 routes and does not advertise VPNv routes to each other.
C. VPN routes are directly exchanged between the ingress PE and egress PE. Intermediate devices do
not need to store or advertise VPN routes.
D. Inter-AS VPN-Optionc is not applicable to multiple ASs.
Correct Answer: BC
Section: (none)

QUESTION 56
Which of the following statements
about MPLS is incorrect?
A. The MPLS label is 20 bits long and is used for packet
forwarding.
B. The label space of dynamic signaling protocols such as LDP and MP-
BGP is 16-1023.
C. When the TTL processing mode in Pipe mode is used, IP packets are transmitted on the IPLS network. The TTL values
of IP packets are transmitted only on the ingress node and egress node of the MPLS network.
The number
D. MPLS of multi-layer
supports nodes is decreased by 1.
label nesting. The S bit of the inner
label is 1.
Correct Answer: B
Section: (none)

QUESTION 57
Which of the following operations can implement fast fault detection
on a multicast network? (Multiple choices)
A. Shorten the Holdtime of the Join/Prune
message.
B. Reduce the interval at which Hello
messages are sent.
D. Reduce the interval for sending Join/Prune
C. Establish a PIM BFD session between
messages.
neighboring cells.BC
Correct Answer:
Section: (none)

QUESTION 58
If the PIM-SM protocol is running on the multicast network, you need to configure the RP. The RP can be configured in
the following modes:
Which of the following statements about the RP configuration are correct?
A. When configuring a dynamic RP, you need to configure the BSR as the
backup of the RP.
B. When configuring a static RP, you need to configure the BSR to
advertise RP information.
C. When configuring a static RP, you need to specify the RP information
on all PIM
Correct routers.
Answer: C
D. When configuring
Section: (none) a dynamic RP, you do not need to configure a BSR.

QUESTION 59
Which of the following statements about the process of registering the
source DR on the PIM-SM with the RP is correct?
A. The registration packet encapsulates the
multicast service data.
B. After receiving the registration message, the RP
sends a registration stop packet.
C. The registration packet is used to construct the RPT
between the source DR and the RP.
D. Register packets are multicast packets.
Correct Answer: A
Section: (none)

QUESTION 60
In a multicast network, what causes multicast traffic to fail to be
forwarded? (Multiple choices)
A. The router does not have
thePIM
B. RPFisroute.
not enabled on the RPF
interface.
C. The upstream router discards the received PIM
Join message.
D. The router is not a DR.
Correct Answer: ABC
Section: (none)

QUESTION 61
IPSG statically configures a binding table or works with the DHCP-Snooping to form a
binding table.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 62
As shown in the figure, routers work in load balancing mode between branch network 1 and branch network 2. In this
case, configure the router on the physical interface of the router.
To configure the URPP to defend against source IP address spoofing attacks, you must use the loose mode.

A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 63
Which of the following are
single-packet attacks?
A. Special control packet
attacks
B. Scanning detection
attacks
D. Malformed
C. DDoS
packet attack
attack
Correct Answer: ABD
Section: (none)

QUESTION 64
Which of the following statements about
digital certificates is incorrect?
A. Digital signatures ensure the integrity of
digital certificates.
B. The digital certificate contains
public
C. Thekey information.fails if the received peer certificate is within the validity period but the device time is
authentication
incorrect and is not within the validity period of the certificate.
D. Two PRI entities can be authenticated even if they are not in the same CA system.
Correct Answer: D
Section: (none)

QUESTION 65
What is the relationship between CIR, BC, and TC?
(Confirmed)
A. CIR=TC/BC
B. CIR=BE/TC
C. TC=CIR/BC
D. TC=BC/CIR

Correct Answer: D
Section: (none)

QUESTION 66
Wred is configured on the newly deployed router HW. Which of the following statements about the
wred feature are correct? (Multiple choices)
A. Wred can set different drop thresholds and packet loss rates for packets with
different priorities.
B. When the traffic exceeds the minimum threshold, wred starts to discard all
incoming traffic (tail drop).
D. Low bandwidth traffic is more likely to be
C. Selectively
discarded thandiscard multiple
traffic with high TCP flows to avoid global synchronization.
bandwidth.
Correct Answer: AC
Section: (none)

QUESTION 67
Which of the following statements about the FTP
protocol is correct?
A. In FTP Passive mode, the client completes the initialization of the control and data TCP sessions.
B. In FTP Active mode, the server uses the PORT command to tell the client which port it expects to send
data.
C. FTP
D. FTP always
always uses
uses TCP
a TCP session
port to transmita control
20 to establish information
data session and TCP
and uses data port
information.
21 to establish a
control session.
E. FTP always uses TCP port 21 to establish a data session and uses TCP port 20 to establish a
control
Correctsession.
Answer: A
Section: (none)

QUESTION 68
In the topology shown in the following figure, all interfaces on the router are enabled with IS-
IS. Which of the following statements are true? (Multiple choices)
A. If the Ethernet0/0/0 interface of R1 is Down, R2 becomes the master device.
B. If the Ethernet0/0/1 interface of R1 is Down, R2 becomes the master device.
C. If the GE0/0/0 interface of R3 is Down, R2 becomes the master device.
D. If the Ethernet0/0/0 interface of R3 is Down, R2 becomes the master device.

Correct Answer: AC
Section: (none)

QUESTION 69
As shown in the following figure, R1 and R2 establish eBGP peer relationships and enable the
detection function. Which of the following statements are true? (Single answer)
A. The BFD packet detection time of R2 is 800
ms.
B. The BFD packet detection time of R1 is 1280
ms.
C. The BFD packet detection time of R1 is 660
ms.
Correct Answer: C
D. The detection
Section: (none) time of BFD packets on R2 is
600 ms.
QUESTION 70
A BD in a VXLAN can correspond to multiple
VNIs.
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 71
Which of the following packets is required to implement VM migration in the BGP-EVPN
distributed gateway scenario?
A. Tуpe5
B. Type1
C. Tуpe2
D. Tуe3
E. Type4

Correct Answer: C
Section: (none)

QUESTION 72
If a Huawei switch runs RSTP, what is the aging time of BPDUs on a port of the switch?

A. RSTP does not age BPDUs on an


interface.
B. After
C. After 6MaxAge
secondsexpires
D. After Hello time expires
E. After Forward Delay expires

Correct Answer: B
Section: (none)

QUESTION 73
Which of the following statements about the LACP protocol are
correct? (Multiple choices)
A. Run the following command to prevent frequent flapping of the Eth-Trunk
interface due to physical link faults:
lacp preempt
interface enable
eth-trunk 1
lacp preempt delay delay-time
B. Run the following command to configure load balancing for source IP addresses in an
interface
enabled LAG:eth-trunk 1
load-balance src-dst-ip
C. Run the following command to delete a member interface from an
enabled LAG:
interface GigabitEthernet0/0/1
interface GigabitEthernet0/0/1
Shutdown
undo eth-trunk 1
interface GigabitEthernet0/0/1
undo shutdown
D. Add member interfaces to the LAG that is enabled by running
the following command:
interface GigabitEthernet0/0/1
interface GigabitEthernet0/0/1
Shutdown
trunkport GigabitEthernet0/0/1
interface GigabitEthernet0/0/1
undo shutdown

Correct Answer: AC
Section: (none)

QUESTION 74
In the lab network, set up the network as shown in the following figure. The SW1 is the default configuration, and the
STP function of the switch is disabled on the SW2. In this scenario, the description is correct.
Is it true? (Single Choice)

A. The G0/0/2 of SW1 enters the Discarding


state.
B. The G0/0/1 of SW2 enters the Discarding
state.
C. The G0/0/2 of SW2 enters the Discarding
E. The G0/0/1 of SW1 enters the Discarding
state.
state.
D. No interface
Correct Answer:isDblocked.
Section: (none)

QUESTION 75
When DLDP detects a unidirectional link in a fiber, Huawei devices perform the following operations by default: The
DLDP state machine changes to the Di sable state. Output
Trap information; The interface is automatically blocked.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 76
Which of the following are used in Ethernet?
(Multiple choices)
A. MAC address in non-standard
format
B. CSMA/CD in multi-channel
access
C. The MAC address in the
E. 802.3 encapsulated
standard format
frame
D. 802.5Answer:
Correct encapsulated
BCE frame
Section: (none)

QUESTION 77
In RSTP, which port can provide the backup path to the root node? of the spanning tree? What is the
status of the port?
A. Root port and Listening
B. status
Alternate port and forwarding status
C. Alternate port and Learning status
D. Designated port and Listening status
E. Alternate port and Discarding status

Correct Answer: E
Section: (none)

QUESTION 78
Which of the following statements about the sequence number and age parameters are used when
the LSA is new and old?
A. When the router receives an LSA with the age set to 3600s, it indicates that
the LSAsequence
B. The is unavailable.
number and age parameters can be used to determine the old and new LSAs. The
router preferentially compares the sequence parameters. The larger the value, the better.
C. When the router receives two LSAs with the same sequence number and the same checksum, the
smaller the age, the better.
D. If the Answer:
Correct sequence B number of the LSA reaches the end value 0TFFF, the router advertises the LSA
with the age
Section: (none)of 3600S.

QUESTION 79
Is-is is deployed on a broadcast network or a P2P network. When a router receives an LSP, it needs to use the PSNP to
confirm the LSP. This ensures the LSDB.
Synchronization
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 80
Which of the following statements about the tail of the
ISISt LSP are correct?
A. The LSP fast flooding feature expands the LSDB synchronization process by spreading the LSPs smaller
than the specified number of LSPs.
B. Configure the intelligent timer generated by the LSP. The timer can automatically adjust the delay according
to the change frequency of the route information.
C. When the link state information increases, the packet length of the LSP may be increased, so that each LSP
may carry more information.
D. Reducing the minimum interval for sending LSPs on an interface can
speed up LSP flooding.
Correct Answer: AB
Section: (none)

QUESTION 81
Router R1 and router R2 run BGP. The two routers are in AS65234. The route of router R2 exists on router R1.
The BGP routing table is not in the IP routing table of router R1. What causes the problem?

A. The
synchronization
B. The BGP peerisrelationship is Down.
disabled.
C. BGP Multi-hop is not enabled on the
router R1.
D. The route is not optimal.
Correct Answer: D
Section: (none)

QUESTION 82
As shown in the following figure, the Level2 neighbor relationship is established between R1 and R2. The key
configurations are as follows:
Yes, it is.
A. The 2020::/64 router is displayed in the IP routing
table.
B. The 2022::/64 router is displayed in the IP routing
table.
C. The 2019::/64 router is displayed in the IP
routing
Correct table.
Answer: ABC
D. The 2021::/64
Section: (none) router is displayed in the IP
routing table.
QUESTION 83
Which of the following statements about the
OSPPv3 protocol is incorrect?
A. When a router is shared, each OSPFv3 process runs independently.
B. Multiple instances can run in the same OSPFv3 process on the same
interface.
C. The
D. Multiple instances
OSPFv3 can
packet be runcontains
header on a single
the link.
Instance ID
field.
Correct Answer: B
Section: (none)

QUESTION 84
Which of the following statements about
OSPFv3 LSAs are correct?
A. Link State ID of the Inter-AreaPrefix-SA, which contains the
B. prefix information.
Router-LSA and Network-LSA do not contain
C. routing information.
When Referenced Link State Type-2 of Intra-AreaPrefixLSA, Referenced Link State ID contains
Indicates the interface ID of the DR.
D. Inter-AreaPrefix LSA also contains LinkLocal
information.
Correct Answer: BC
Section: (none)

QUESTION 85
If the router HW is enabled with OSPF and the router HW role is ABR and abr-summary is configured, which of the
following types of LSAs will be used?
Summary? (Multiple choices)
A. 1 Type of
B. LSA
C. 2 Type of
LSA
D.
3 Type of
E.
LSA
4 Type
Correct Answer: ABof
LSA
Section: (none)
5 Type of
QUESTIONLSA 86
As shown in the figure, a company sets up an OSPF network. All the links in the figure form an OSPF adjacency. All
OSPF devices advertise the OSPF neighbor relationship.
Indicates the loopback interface address. One day S1-R2. The two links of the S2-R1 are faulty. To check whether the
network is running properly, engineers perform the following operations:
Which of the following statements about device status check are correct?

A. The R5 can learn the route to the loopback


interface of the R2.
B. The R3 cannot learn the route to the
loopback interface of the R2.
C. The R1 can learn the route to the loopback
interface of the R2.
Correct Answer: AB
D. The R3 can learn the route to the loopback
interface of the R2.
Section: (none)

QUESTION 87
On a Huawei device, when IS-IS imports external routes and sets the external route tag for routing information, the
Metric type of IS-IS does not need to be modified.
Retain the default value.
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 88
The interface Serial 0 of a router is in OSPF area 1, and the interface Serial 0 is set to the Silent interface. In this case,
the setting takes effect.
What kind of influence?
A. OSPF uses this interface to establish an available adjacency.
B. OSPF does not add the routes learned from the interface to the
local routing table.
C. OSPF does not establish any adjacency on the interface.
D. OSPF updates routes from neighbors.
Correct Answer: C
Section: (none)

QUESTION 89
The Option field in OSPF3 is displayed in all
LSAs.
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 90
Which of the following statements about BGP4+ are
correct?
A. BGP4 Run the dampening command to suppress flapping of IBGP routes.
B. After the BGP Router ID is modified, the BGP connection between routers is re-established.
C. The Next Hop attribute in BCP4+ is represented by the IPv6 address, which can be the link-
local address of the next hop.
D. BGP4+ does not support automatic route aggregation.
Correct Answer: ABD
Section: (none)

QUESTION 91
As shown in the following figure, eBGP runs between AS100, AS200, AS300, and AS400. The neighbor relationship has
When a BGP route
been established in the
and 1.1.1.1/32
.AS400 segment is sent, theWhich of the following
networkAS100.
has received
ASPath attribute records the following information: is the correct path
sequence?
A. 10, 200, 3
B. 400, 300, 200, and 100
C. 100, 200, 300, and 400
D. 300, 200, 100

Correct Answer: D
Section: (none)

QUESTION 92
Which of the following statements about
OSPF virtual links are correct?
A. The virtual link can be established in any area. After being established,
the virtual link belongs to the virtual link.
B. The
C. The virtual
virtual link
link uses theused
can be outbound interface
to solve IP address as the link
the problem
address.
that area 0 is divided.
D. The cost of the virtual link is 0, which is the
optimal link.
Correct Answer: C
Section: (none)

QUESTION 93
Which of the following scenarios can
be used in AS-path-filter?
A. Filters routes received from BGP peers based on the AS PATH attribute carried in routes. For example, run
the peer x.X.x.x as path-command.
B. filter import
Apply clause in Routepolicy
C. Filters routes to be sent to BGP peers based on the AS PATH attribute carried in the routes. For example,
run the peer x.X.x.x as path-command.
D. filter export
if-natch clause in Route-policy

Correct Answer: ACD


Section: (none)

QUESTION 94
Which of the following statements about the link state routing protocol are
correct when no area is divided?
A. Each router establishes a topology of the entire flood
domain.
B. Each router learns route entries from route updates and adds them to the
routing table.
C. The router in the flood domain may receive the same link status
information repeatedly.
E. The router sends all the link status information from a neighbor to all other neighbors to ensure the
D. The routers inofthe
synchronization theentire flood domain have the same error state
database.
database.
Correct Answer: ACD
Section: (none)
QUESTION 95
As shown in the figure, R1, R2, and R3 run OSPP at the same time and advertise their
respective loopback interfaces. Which of the following statements is incorrect?

A. On the R2, you can run the filter-policy export command to filter the loopback
B. interface routes of the R3.
C. On the R2, you can run the filter import command in the Area 0 to filter the
loopback interface routes of the R3.
D. On the R2, run the filter export command in the Area 1 to filter the loopback
On R1, you
interface can of
routes use filter-policy
the R3. import to filter the loopback interface routes of
R3.
Correct Answer: A
Section: (none)

QUESTION 96
If the OSPP protocol is running on the network and the non-backbone area in the OSPP area is configured as the
Totally Stub area, the ABR forwards the packets to the
In the Totally Stub area, an LSA with the LS ID being 0.0.0.0 is delivered. Which type of LSA is the LSA?
A. LSA5
B. LSA2
C. LSA1
D. LSA3

Correct Answer: D
Section: (none)

QUESTION 97
When an administrator wants to manage certain routes on a router during O M, which of the following tools can be used
to mark these routes for management?
What is the configuration policy of the administrator?
A. If BGP is running, use the community attribute to mark routes.
B. Use an ACL to mark routes on the router.
C. Use the tag value to mark the route on
theUse
D. router.
ipprefix to mark routes on the router.

Correct Answer: AC
Section: (none)

QUESTION 98
In the following topology, R1 can access the Internet through R2 and R3, and EGP connections are established
between RI and R2, R1 and R3, and R2 and R3.
In the same AS, BGP advertises default routes. The R1 accesses the Internet by using R2. Which of the following
methods can be implemented?
Yes, I do.

A. R1 Set the MED attribute of the peer R3 to 150 in the import


direction.
B. R2 Set the local priority of the peer R3 to 150 in the export
direction.
C. R2 Set the MED attribute of the peer R1 to 150 in the export
direction.
D. R1 Set the local priority of the peer R3 to 150 in the import
direction.
Correct Answer: AB
Section: (none)

QUESTION 99
HW1, which runs BGP, is configured with both IBGP peers and eBGP peers. The following describes IBGP neighbor
relationships.
Which of the following statements about residential and eBGP neighbor relationships are correct?
A. The router sends BGP updates learned from its BGP peers to other IBGP peers and eBGP peers.
B. The router sends BGP updates learned from its eBGP peers to other IBGP peers and eBGP peers. Multi-
thop must be configured.
C. IBGP peers must be directly connected. Otherwise, IBGP-Multi-
D. hop must be configured.
E. eBGP peers must be directly connected. Otherwise, EBGP-
Multi-hop must be configured.
F. The eBGP neighbor relationship establishes a neighbor
relationship IBGP peers
through can establish
the directly neighbor
connected relationships
physical interface through
address. loopback
Correct Answer: BDE interfaces.
Section: (none)

QUESTION 100
As shown in the figure, in the IPv4 and IPv6 environments, the SEL field in the IS-IS NET
address is always set to 00.

A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 101
After BGP imports routes of other protocols, the next hop in the BGP routing table is the same as the next hop
of the imported routing protocol. ()
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 102
The following figure shows whether the process of
parsing the link-layer address by NDP is correct.

A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 103
In addition to stateless address autoconfiguration, the IPV6 can obtain information such as the address,
gateway, and DNS through the DHCPv6.
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 104
On the IPv6 network, two nodes A and B are neighbors. If the node A sends an NS message to the node B, if the node B
receives the message,
If the NA message is returned, check the neighbor status on the A node.
A. Reachable
B. Incomplete
C. Stale
D. Probe

Correct Answer: A
Section: (none)

QUESTION 105
In the MPLS IBGP VPN environment, if only BGP and LDP are used to distribute labels, the MPLS label of packets can be
a maximum of two labels.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 106
Which of the following statements about the Inter-AS
VPN-OptionB solution is incorrect?
A. During packet forwarding, two ASBRs need to exchange VPN LSPs.
B. The IP-EBGP neighbor relationship needs to be established between the two
ASBRs.
C. The Inter-AS VPN-OptionB solution is not limited by the number of links
between ASBRs.
D. Two ASBRs exchange outer labels for VPNv4 routes.
Correct Answer: D
Section: (none)

QUESTION 107
Two Huawei switches SWA and SWB are connected through seven Ethernet ports, and static link aggregation is
configured. The switch SWA is connected to the corresponding end.
The ports are Ethernet1/0/1, Ethernet 1/0/2, Ethernet 1/0/3, Ethernet 1/0/4, Ethernet 1/0/5, and Ethernet 1/0/6.
Ethernet 1/0/7. The configuration mode is configured according to the port sequence. If the switch SWA or SWB supports
only
A. six ports,
If the each aggregation
configuration of each portgroup supportsthe
is consistent, onlyEthernet1/0/7
six ports. port is the Unselected port of the aggregation
group.
B. If the configuration of each port is consistent, the Ethernet1/0/6 port is the Unselected port of the aggregation
group.
C. When the configuration of each port is the same, the SWA randomly selects one of the seven ports as the
Unselected port of
Correct Answer: A the aggregation group.
D. If the configuration
Section: (none) of each port is consistent, the Ethernet1/0/1 port is the Unselected port of the aggregation
group.
QUESTION 108
Which AS_PATH? can be matched by the ip as-path-filter 1 permit
^12.*74$ command?
A. AS_PATH (321 12 2374)
B. AS_PATH (123 621 743 2374)
C. AS_PATH (125 328 74 23)
D. AS_PATH (32 1274 23)

Correct Answer: B
Section: (none)

QUESTION 109
You need to configure policy-based routing on the router so that specific traffic can be forwarded through an interface.
When policy-based routing is used, which two are used?
The most typical information of a class can be used to enable traffic to be forwarded along a specific path?
A. TTL and source IP address of
the data packet
B. Source IP address and Layer
2
C. Sourceaddress
source IP address and specific protocol (such as FTP
and HTTP)
D. Service type header and packet length
Correct Answer: C
Section: (none)

QUESTION 110
As shown in the figure, the IS-IS neighbor relationship between R1 and R2 has just been established. Which of the
following statements about the database synchronization between R1 and R2 is correct?

A. The R1 sends a PSNP packet to the R2.


B. The R1 sends a CSNP packet to the R2.
C. The R1 sends an LSP packet to the R2.
D. The R1 sends Hello packets to the R2.

Correct Answer: B
Section: (none)

QUESTION 111
Inter-device link aggregation implements reliable transmission of data traffic and mutual backup of stack member
switches. However, stack cables are used between stack devices.
Which of the following methods can be used to improve the forwarding efficiency? (Single Choice)
A. Enable local preferential
forwarding of traffic.
B. Connect the stack device through
a stack card.
C. Configure MAC address switching
for the stack
Correct system.
Answer: B
D. Enable(none)
Section: the stack multi-master
check function.
QUESTION 112
As shown in the preceding figure, a PPP link is established between R1 and R2, and the directly connected interfaces
are not on the same network segment. However, R1 and R2 can communicate with each other.
In the case of the same IP address planning, Ethernet links cannot communicate with each other. Why? (Multiple
choices)
A. The POS interface connected to R1 and R2 learns the 24-bit subnet route of the directly
connected
B. The POSinterface
interfacethrough IPCP.R1 and R2 learns the 32-bit host route of the directly
connecting
connected
C. The POS interface through
interface IPCP.R1 and R2 learns the MAC address of the peer interface through LCP and does not
connecting
need to use ARP to request the MAC address.
D. The data packets of the POS interface between R1 and R2 do not need to be encapsulated with the Ethernet
header. Answer:
Correct Therefore,BDthe MAC address is not required.
Section: (none)

QUESTION 113
Which of the following statements about the MUX VLAN of Huawei
switches are correct? (Single Choice)
A. MUX VLAN is classified into Principal VLAN and Subordinate VLAN, which are classified into Separate VLAN
B. and Isolate VLAN.
C. Each
In theSeparate VLAN
same VLAN, MUXcanVLAN
be bound to multiple
can be Principal
used together VLANs.
with Super
D. VLAN.
The Principal Port can communicate with all ports in the MUX VLAN.
Correct Answer: D
Section: (none)

QUESTION 114
Which of the following commands can be used to prevent users from connecting to multiple
devices through a hub on the access port of the switch? (Single Choice)
A. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernet0/0/1]port link type trunk
[Huawei-GigabitEthernet0/0/1]port trunk allow pass vlan 10
B. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernetO/0/1]port link type access
[Huawei GigabitEthernet0/0/l]ipsg enable
C. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernet0/0l]port link-type access
[Huawei-GigabitEthernet0/0/1]port-security enable
D. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernet0/0/1]port link type access
[Huawei-GigabitEthernetO/0/1]port isolate enable

Correct Answer: C
Section: (none)

QUESTION 115
In the VLAN (802.1Q) data encapsulation, the priority field consists of
six digits.
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 116
Duplicate
question.
A. R3 must be the DIS of an level-1 link.
B. The R3 router is an level-1-2 router.
C. R3 must be the DIS of an level-2 link.
D. The system ID of the R3 router is 0003.0000.0000.

Correct Answer: A
Section: (none)

QUESTION 117
Run the 0SPF command on router R1. Run the display ip routing-table command to view the routing table of the router
R1. The following table describes the routing table.
Which of the following statements about the 0SPF information of the is correct?
A. In the routing table, the routing entries marked with "0SPF" can be learned only
through Type 3 LSAs.
B. In
C. In the
the routing
routing table,
table, only type-1 LSAs
the routing entriescan be usedbyfor
identified routing
the OSPFentries identified
identifier can beby the
learned
0SPF
through identifier.
1/2/3/5 LSAs.
D. In the routing table, the routing entries marked with "0_ASE" can only be learned through
route
Correctimport.
Answer: D
Section: (none)

QUESTION 118
In OSPF, five types of 1SAs are used to transmit external routes. Which of the following
statements about the five types of 1SAs is incorrect? (Single answer)
A. Type 5 LSAs are advertised by ASBRs and flooded on OSPF networks in non-Stub/NSSA areas.
B. The router that is in the same area as the ASBR can calculate the external route through the intra-
area LSA and class 5 1SA.
C. Type 5 LSAs contain FA addresses. The FA address is 0.0.0.0., which is reserved and has no
actual effect.
D. Type Answer:
Correct 5 LSAs can
C be filtered on the ABR or ASBR.
Section: (none)

QUESTION 119
Which of the following statements about IS-IS
authentication are correct? (Multiple choices)
A. Interface authentication can authenticate Hello packets of Level-1 and
Level-2.
B.
C. After
After the
the interface authentication
area authentication is configured,
is configured, the the
IIH,IIH sentand
SNP, by LSP
the router
sent by the router must carry the
must carry the TLV.
authentication authentication TLV.
D. The two routers are configured with regional authentication and interface authentication. The
passwords
Correct of theAB
Answer: two routers are the same. Therefore, the two routers can establish a residential
relationship.
Section: (none)

QUESTION 120
If the Option field in the 0SPFv3 Hello packet sent by the GigabitEthermet0/0/0 interface of the router is 0x000013, the
following information is displayed:
Which of the following statements are true? (Multiple choices)
A. The Gigabit/thernet0/0/0 interface of router A participates in IPv6
B. route calculation.
C. The GigabitEthernct0/0/0 interface of router A belongs to the
NSSA area.
D. The router is an OSPFv3 device that has the
Router A supports AS-external-LSA flooding.
forwarding capability.
Correct Answer: ACD
Section: (none)

QUESTION 121
Which of the following statements about the
BGP loop prevention mechanism are correct?
A. The AS_PATH attribute is used between ASs to prevent
theThe
B. ringCluster
modem. List attribute is used to prevent loops in the reflector cluster. The router finds that the Cluster List of the route
entry contains its own cluster ID.
The route
C. Routes is rejected.
learned from IBGP are not advertised to IBGP peers to prevent routing loops in
the AS.
D. The AS_CONFED_SET attribute can be used to prevent loops in the alliance.
Correct Answer: ACD
Section: (none)

QUESTION 122
Which of the following statements about Route
Policy are correct? (Multiple choices)
A. Advanced ACLs can be applied to route-policy to filter routes.
B. Entry permit::0 less-equal 128 indicates that all IPv6 routes are allowed to pass.
C. If more than one node is defined in Route-policy, the matching mode of at least one node must be permit.
D. Route-Policy can filter only default routes.

Correct Answer: BCD


Section: (none)

QUESTION 123
Which of the following route selection tools is unique to
B6P? (Single Choice)
A. Route-policy
B. ACL
C. IP-prefix
D. AS-path-filter

Correct Answer: D
Section: (none)

QUESTION 124
As shown in the following figure, the correct
description is as follows: (Multiple choices)
A. R1 The LSDBs of Level-1 and Level-2 coexist.
B. The R1 can ping the IP address of the R2
C. R1 There1oopback0 interface.
is a route to R2 1oopback0 10.0.2.2/32.
D. The neighbor relationship cannot be established
between R1 and R2.
Correct Answer: AC
Section: (none)

QUESTION 125
The configuration of two routers in a company is as follows. Which of the following
statements about the R1 routing table are correct? (Single answer)
A. If the priority of the R2 ISIS protocol is changed to 5, the IP route entries whose destination network segment is
10.0.0.2/32 on the R1 are generated by OSPF.
B. If the priority of the R1 ISIS protocol is changed to 5, the IP route entries whose destination network segment is
10.0.2.2/32 on R1 are generated by OSPF.
C. If the priority of the R1 ISIS protocol is changed to 5, the IP route entries whose destination network segment is
10.0.2.2/32 on the
Correct Answer: C R1 are generated by IS-IS.
D. If the priority
Section: (none) of the R2 ISIS protocol is changed to 5, the IP route entries whose destination network segment is
10.0.2.2/32 on the R1 are generated by IS-IS.
QUESTION 126
Which of the following statements about BGP
aggregation are correct? (Single Choice)
A. After Aggregate ipv4-address mask is configured, only aggregated routes are advertised
and detailed routes are not advertised.
B. For IPv6 routes, BGP supports manual aggregation and automatic aggregation.
C.
D. Automatic aggregation
You can manually is enabled
aggregate when
routes BGP
in the is BGP
local disabled.
routing table.
Correct Answer: D
Section: (none)

QUESTION 127
Which of the following statements about BGP route
selection is incorrect? (Single Choice)
A. Non-aggregated routes take
precedence over aggregated routes.
B. If the values of PrefVal and Local_Preference are the same, if the routes, IBGP routes, and eBGP routes are generated
locally,
Preference:
C. The followingIndicates that
entries are the effective
displayed in theindex
BGP of the local
routing generation
table: is preferred.
* 172.16.1.11/32 0.0.0.0 10 0? Indicates that the
route is available and not optimal.
D. The route whose next_hop is unreachable is invalid.
Correct Answer: A
Section: (none)

QUESTION 128
Which of the following statements about Filter-Policy
are correct? (Single Choice)
A. Using Filter-Policy, you can filter the generation of type5 LSA and type7LSA on the ASBR in OSPF.
B. The prefix list can filter routes or filter data packets.
C. Filter-policy can filter the received or advertised link status information and modify the attributes of the route
entries.
D. When the prefix list is used to filter routes, ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 indicates that only the default
route
Correctis matched.
Answer: A
Section: (none)

QUESTION 129
Which of the following statements about the IS-IS protocol deployment
in the IPv6 environment are correct? (Single answer)
A. The DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.
B. On a broadcast network, the DIS priorities of IPv4 and IPv6 can be set
separately.
C. On the same broadcast network. If each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6 must be the
same.
D. IfStandby
the ISIS silent command is run on the IS-IS interface, the interface does not send IS-IS
packets but receives IS-IS packets.
Correct Answer: D
Section: (none)

QUESTION 130
Many transition technologies emerge in the process of replacing the IP4 address used in the network with the IPv6
address. These techniques are divided into two categories:
IPv4/IPv6 coexistence technology. One type is IPv4/IPv6 interworking technology. Which of the following options are
IPv4/IPv6 coexistence technologies? (Many)
Selected)
A. NAT64
B. IPv6 over IPv4
C. Dual Stack
D. ISATAP

Correct Answer: BCD


Section: (none)

QUESTION 131
In Inter-AS VPN-OptionB packet forwarding, two ASBRs need to exchange LSP labels.

A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 132
In an intra-domain (MPLS BGP VPN) network, packets are encapsulated with two MPLS labels when they are forwarde
to the public network. The following table lists two layers of MPLS labels.
Which of the following statements about labels is incorrect? (Single Choice)
A. The private network label is delivered by the MP-BGP when the route is transmitted.
The public
B. Two network
layers labelare
of labels is used
distributed by the
in MPLS BGPLDP protocol.
VPN: Public network labels (also called outer labels) and private network
labels (also called inner labels)
C. The router allocates the same label value to all VPNv4 routes destined for the
peer end.
D. The egress PE uses the inner label to determine the egress CE to which the
packet isAnswer:
Correct sent. C
Section: (none)

QUESTION 133
Which of the following statements about the LDP LSP
establishment process are correct?
A. By default, the label mapping received by an LSR for the same FEC can only come from the optimal next hop and
cannot
B. When bethe
from the non-optimal
network next hop.the next hop neighbor changes. In this mode, the LSR can directly use the original
topology changes,
non-optimal next hop.
The
C. In theneighbor sends a label
label advertisement DoDto mode,
quicklythe
reestablish the LSP.
LSR allocates Liberal requires
and distributes labels more memoryFEC
for a specific and without
label space.
obtaining the
label request message from the upstream.
D. The LSP establishment process is to bind the FEC and the label and advertise the binding to the upstream LSR of the
LSP.
Correct Answer: BD
Section: (none)

QUESTION 134
As shown in the figure, in the MPLS BGP VPN HUB&Spoke networking mode, branches can communicate only with th
headquarters.
Which of the following solutions can be used for communication and RT? (Single Choice)

A. Headquarters: Import Target: 12:3; Export Target: 12:3


Part 1: Import Target: 12:3; Export Target: 12:3
Part 2: Import Target: 12: 3; Export Target: 12:3
B. Headquarters: Import Target: 1:1; Export Target: 3:3
Branch 1: Import Target: 3:3; Export Target: 1:1
Branch 2: Import Target: 3:3; Export Target: 2:2
C. Headquarters: Import Target: 2:2; Export Target: 3:3
Branch 1: Import Target: 3:3; Export Target: 1:1
Branch 2: Import Target: 3:3; Export Target: 2:2
D. Headquarters: Import Target: 12:3; Export Target: 3:12
Branch 1: Import Target: 3:12; Export Target: 12:3
Branch 2: Import Target: 3:12; Export Target: 12:3

Correct Answer: D
Section: (none)

QUESTION 135
What improvements have been made to the IGMPv2 protocol
compared with IGMPv1? (Multiple choices)
A. The maximum response time
field is added.
B. The
C. The outgoing packetquery
group-specific is added.
packet is added.
D. Add a Group-and-Source-
Specific Query message.
Correct Answer: ABC
Section: (none)

QUESTION 136
If the PIM-SM protocol runs on the multicast network, you need to configure the RP. The RP can be configured in
dynamic RP or static RP mode. The following pairs
Which of the following statements about RP configuration is correct? (Single Choice)
A. When configuring a dynamic RP, you need to configure the BSR as the
backup of the RP.
B. When configuring a static RP, you need to specify the RP information on all
PIM routers.
C. When configuring a static RP, you need to configure the BSR to advertise
RP information.
Correct Answer: B
D. When configuring a dynamic RP, you do not need to configure a BSR.
Section: (none)

QUESTION 137
Which of the following attacks are DoS (Denial of service)
attacks?
A. Single packet
attack
B. Source IP address
spoofing attack
C. Man-in-the-middle
attacks
D. FloodAnswer:
Correct attack AD
Section: (none)

QUESTION 138
Which of the following statements about IPSec
VPN are correct? (Multiple choices)
A. The aggressive mode supports NAT traversal while the master mode
does
B. Twonotrouters
support NAT traversal.
establish IPSec VPNs in master mode. The payload data is encrypted from the fifth packet (including).
C. Two routers establish the IPSec VPN in aggressive mode. Then, the two devices exchange at least four packets
to establish a tunnel.
D. The two routers can establish the OSPF neighbor relationship through the IPSec VPN tunnel and exchange the
internal
Correct network
Answer: device.
BC
Section: (none)

QUESTION 139
Configure queue-based traffic shaping. If the queue length exceeds the buffer size, tail
drop is performed by default.
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 140
Which of the following
statements is correct?
A. If the R2 Ethernet0/0/1 interface goes Down, the R1 BFD session can quickly detect the fault and notify the R1 to enable
the Down
OSPF neighbor relationship.
B. The BFD session is Up only when the OSPF status
changes
C. to FULL.
If the R2 Ethernet0/0/0 interface goes Down, the next hop of the route from R1 to 10.0.2.2
10.0.21.2
is changed to
D. If the BFD function is disabled on the R2, the BFD session of the R1 goes Down. As a result, the
OSPF neighbor relationship becomes Down.
E. If the R2 Ethernet0/0/1 interface goes Down, the next hop of the route from R1 to 10.0.2.2 is changed to
10.0.12.2.
Correct Answer: ABE
Section: (none)

QUESTION 141
Which of the following statements about Layer
2 VPN are true?
A. VPLS is a widely used technology on the live network. It can transparently transmit Layer 3
packets and implement multi-point access.
B.
C. The VPLS configuration
BGP-EVPN is complex,
supports tenant and
isolation, the Layer 2 network
Multi-homing, transparently
and broadcast transmits BUM
suppression.
packets.
D. BGP-EVPN solves the problem that VPLS cannot support MAC address flapping
and multi-tenant.
Correct Answer: BCD
Section: (none)

QUESTION 142
The MSTP switch regards the RSTP switch as an STP-domain consisting of a switch. The MSTP switch parses the RSTP
BPDU into
MST BPDU, where IRPC is 0.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 143
How do 802.1W and 802.1D process
BPDUs?
A. 802.1w The bridge does not
forward BPDUs.bridge does not forward
B. The 802.1D
BPDUs.
C. The 802.1w bridge forwards only the BPDUs received
from the root bridge.
D. The 802.1D bridge forwards only the BPDUs received
from theAnswer:
Correct root bridge.
Section: (none)

QUESTION 144
Which of the following statements about CHAP
authentication in PPP are correct?
A. Three times of packet exchange authentication are required. Only
B. the user name is transmitted on the network and the password is not
transmitted.
C. Use the MD5 algorithm to calculate a hash value using the authentication
The user name must be configured on the authenticated interface of
D. sequence ID, random number, and key.
CHAP authentication.
If the authentication party is not configured with a user name, no
password
Correct Answer: ABC can be configured on the interface of the authenticated party.
Section: (none)

QUESTION 145
Which of the following statements about
PPPoE data frames are correct?
A. When the PPPoE session data is transmitted, the
B. code
Oncemust be setsession
a PPPoE to 0x0. is established, all Ethernet data packets are unicast.
C. The Session_ID of a PPP session cannot be changed. It must be specified in the
D. Discovery phase.
The value of Ethernet_Type is fixed at 0x8863.
Correct Answer: ABC
Section: (none)

QUESTION 146
As shown in, R1, R2, and R3 both run OSPF and advertise their loopback interfaces. Which of
the following statements is false?
A. Run the filter-policy export command on the R2 to filter the routes of the
loopback interface of the R3.
B. On the R2, run the filter import command in the Area 0 to filter the routes
of the loopback interface of the R3.
D. On the R2, run the filter export command in the Area 1 to filter the routes
C. the
of On loopback
the R1, filter-policy import
interface of can be used to filter the routes of the
the R3.
loopback interface
Correct Answer: A of the R3.
Section: (none)

QUESTION 147
When an ABR is an 5/7 LSA translator in an NSSA, the ABR can aggregate Type 5 LSAs converted from Type 7
LSAs.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 148
Which of the following statements about OSPF, stub areas, and NSSA areas
are incorrect? (_______)
A. Type3 LSA can be injected in both stub areas and
B. NSSA
Type4 areas.
LSA cannot be injected into a stub area or an
C. NSSA.
Type5 LSA cannot be injected into a stub area, but Type5 LSA can be injected into
D. an NSSA.
Type7 LSA cannot be injected into a stub area, but Type7 LSA can be injected into
an NSSA.
Correct Answer: C
Section: (none)

QUESTION 149
If the attributes meet the following conditions, the A of the (1) BGP router can select whether to carry the attribute in the
Update packet. (2) If the router
After the B receives an Update packet that contains the attribute, the router B cannot identify the attribute but also advertise
the Update packet that contains the attribute.
This command
A. is used to send the C to the router. The router C may identify and apply this attribute.
Aggregator
B. Local_Pref
C. Community
D. Multi_Exit_Disc

Correct Answer: AC
Section: (none)

QUESTION 150
Is-is is deployed on the broadcast network and P2P network. When a router receives an LSP, it needs to use PSNP for
confirmation. Ensure that the LSDB is the same.
Step.
A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 151
Which of the following statements about BGP
load balancing is incorrect?
A. The IBGP and eBGP routes to the same destination on the public network can
be Ifused
B. BGPfor load
load balancing.
balancing is implemented, the peer next-hop-local command must be configured when the local device
advertises routes to IBGP peer groups.
Change
C. BGP thewith
routes nextthe
hop address
same to its own
destination address.
network segment and
different sources can form load balancing.
D. The AS_Path attributes of equal-cost routes for load balancing
must beAnswer:
Correct different.ACD
Section: (none)

QUESTION 152
Which of the following statements about the Link-
LSA of the OSPFv3 are correct?
A. The Option field exists in the header of the LSA rather than the
B. data
Both area of the Link-LSA.
the link-local address of the local interface and the IPv6 prefix of the same area on the local
C. router
D. If the PrefixOptions field of a prefix in the Link-LSA is 0x00, the prefix is not included in the IPv6
unicast calculation.
Both D
Correct Answer: the link-local address of the interface and all IPv6 prefixes on the interface are included.
Section: (none)
QUESTION 153
BGP can automatically aggregate only the routes whose
source is Incomplete.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 154
There are two types of Community-filter: Basic community filter and advanced community filter. Which of the following
filtering tools makes the advanced community?
Is the attribute filter more flexible than the basic community attribute filter to match community attributes?
A. IP-prefix
B. Regular-expression
C. AS-path-filter
D. ACL

Correct Answer: B
Section: (none)

QUESTION 155
Which of the following statements about
BGP confederations is incorrect?
A. Indicates the sub-AS number of the confederation. By
B. default,
The the BGP
alliance peer
divides anisAS
notified of the unexpected
into several BGP
sub-ASs, and the external ASs of the confederation still consider
peer
that relationship.
the alliance is an AS.
C.
D. The association can easily detect routing loops in an AS because eBGP runs between sub-ASs.
System.The sub-ASs in the confederation can use private AS numbers. Huawei NE/AR router. A maximum of 32
sub-ASs can be configured for an alliance.
Correct Answer: A
Section: (none)

QUESTION 156
In an existing OSPF network, which types of LSAs cause the ISPF
operation?
A. Type 2
B. LSA
C. Type-5
LSA
D.
Type-3
E.
LSA
Type-1
Correct Answer: AD
LSA
Section: (none)
Type-4
QUESTIONLSA 157
Which of the following statements are
correct about the existing topology?
A. The route whose destination network segment
B. is 10.0.2.2/32 exists on R1.
C. The route whose destination network segment
is 10.0.3.3/32 does not exist on R1.
D.
The route whose destination network segment
is 10.0.2.2/32
Correct Answer: AB does not exist on R1.
The route whose destination network segment
Section: (none)
is 10.0.3.3/32 exists on R1.
QUESTION 158
On Huawei devices, when IS-IS imports external routes and sets the external route tag for routing information, the
Metric type of IS-IS does not need to be modified. The default value is retained.
You know what?
A. True
B. False

Correct Answer:
Section: (none)

QUESTION 159
On an OSPF broadcast network, there are four routers RTA, RTB, RTC, and RTD on the same network segment. The
DR priorities of RTA, RTB, RTC, and RTD are 2, 1, and 1 respectively.
0 and Router ID are 192.168.1.1, 192.168.2.1, 192.168.3.1, and 192.168.4.1, respectively. If this function is enabled on
the four routers at the same time,
OSPF:
A. RTCThe BDR elected by OSPF is ____.
B. RTA
C. RTB
D. RTD

Correct Answer: A
Section: (none)

QUESTION 160
Which of the following statements
about configuring the BGP4+ is
correct?
A. BGP4+ does not support route
reflectors.
B. BGP4+ When a peer is specified, the Link-Local address
must be used.
C.
D. The nextWhen
BGP4+ hop of
a the BGP4+
reflector route can be
is configured, thethe Link-Local
role of the reflector and client must be the same as
address.
that configured on the BGP4.
E. The Router-ID of the BGP4+ is the same as the Router-ID of the BGP4.
Correct Answer: CE
Section: (none)

QUESTION 161
The following figure shows the data result of the existing
router. Which of the following statements are incorrect?
A. The R3 router is an level-1-2
router.
B. R3 must be the DIS of an level-1 link.
C. R3 must be the DIS of an level-2 link.
D. The system ID of the R3 router is
0003.0000.0000.
Correct Answer: B
Section: (none)

QUESTION 162
Which of the following statements about IS-IS is
deployed in the IPv6 environment? ()
A. On the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6 must be the
same device.
B. On
C. TheaDIS
broadcast
prioritynetwork, the DIS priorities
of the broadcast of IPv4 and
network interface on IPv6 canand
Level-1 be set separately.
Level-2
is 1.
D. If the ISIS silent command is run on the IS-IS interface, the interface does not send IS-IS
packets but receives IS-IS packets.
Correct Answer: A
Section: (none)

QUESTION 163
The following figure shows the data result of a router.
Which of the following statements are correct?

A. The GE0/0/0 port of the R3 is in a different area


from
B. R3the neighbor.
is the DIS of Level-1 and Level-2 on the link where Eth0/0/0
resides.
C. The circuit-level of the Eth0/0/1 of the R3 router is Level-1-
2.
D. The IS-IS of IPv4 and IPv6 is enabled on the Eth0/0/1 of
the R3 router.
Correct Answer: C
Section: (none)

QUESTION 164
To study the working mechanism of the OSPFv3 protocol, an engineer sets up the network topology as follows. The
configuration of R1 and R2 is as follows, which is between R1 and R2.
What types of LSAs are exchanged?

A. Network-LSA
B. Link-LSA
C. Router-LSA
D. Inter-Area-Prefix-LSA

Correct Answer: ABC


Section: (none)

QUESTION 165
Regular expressions can be used to define attribute types for Community-filter and AS-path-
filter to filter routes.
A. True
B. False

Correct Answer:
Section: (none)

QUESTION 166
Which of the following statements about the Router-
LSA of the OSPFv3 are correct?
A. Similar to OSPFv2, the Option field exists in the header of the LSA rather than the
B. data area of the Router-LSA.
C. The data
When thearea of Router-LSA
header of the LSA contains the link-localitaddress.
is LS type=0x0001, indicates that the data
D. area of the LSA is Router-LSA.
The data area of the Router-LSA contains the local and neighbor Interface
IDs. D
Correct Answer:
Section: (none)

QUESTION 167
Which of the following statements
about BGP RRs are correct?
A. IBGP peer relationships need to be fully meshed when no RR is available. The introduction of route
Begg reflectors can reduce the need for full interconnection.
B. ing The RR can advertise the routes learned from IBGP peers to all clients and
C. non-clients.
D. The RR can advertise the routes learned from a client to other clients and non-
clients.
The RR can advertise the routes learned from the non-client to all clients.
Correct Answer: ACD
Section: (none)

QUESTION 168
If no default route exists in the local IP routing table, run the default-route imported command.
(Group) Advertise the default route.

A. True
B. False

Correct Answer: B
Section: (none)

QUESTION 169
HW1, which runs BGP, is configured with both IBGP peers and eBGP peers. The following describes IBGP neighbor
relationships and
Which of the following statements about eBGP neighbor relationships are correct?
A. IBGP peers can establish neighbor relationships through
loopback interfaces.
B. The router sends BGP updates learned from its IBGP peers to other IBGP peers and eBGP peers.
C. eBGP peers must be directly connected. Otherwise, EBGP-Multi-hop must be configured.
D. The router sends BGP updates learned from its eBGP peers to other IBGP peers and eBGP peers.
E. IBGP peers must be directly connected. Otherwise, IBGP-Multi-hop must be configured.

Correct Answer: ACD


Section: (none)

QUESTION 170
On the IPv6 network, two nodes A and B are neighbors. If the node A sends an NS message to the node B, if the node
B receives the message, it returns an NA message.
On the node A, check whether the neighbor status is marked.
A. Incomplete
B. Probe
C. Reachable
D. Stale

Correct Answer: C
Section: (none)

QUESTION 171
In the process of replacing the IPv4 address used in the network with the IPv6 address, many transition technologies
are present. These technologies are classified into two types:
IPv4/IPv6 coexistence technology. One type is IPv4/IPv6 interworking technology. Which of the following technologies
belong to IPv4/IPv6 coexistence technology?
A. ISATAP
B. Dual Stack
C. IPv6 over IPv4
D. NAT64

Correct Answer: ABC


Section: (none)

QUESTION 172
Which of the following statements about Inter-AS VPN-
OptionC are true?
A. Inter-AS VPN-OptionC is not applicable to multiple ASs.
B. A maximum of two labels can be used during
packet
C. VPNforwarding.
routes are directly exchanged between the ingress PE and egress PE. Intermediate
devices do not need to store and advertise VPN routes.
D. The ASBR does not save VPNv4 routes and does not advertise VPNv4 routes to each other.
Correct Answer: CD
Section: (none)

QUESTION 173
In the MPLS IBGP VPN environment, if only BGP and LDP are used to distribute labels, the MPLS label of packets
can be a maximum of two labels.
A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 174
Which of the following statements about the MPLS TTL
processing mode is correct?
A. In the MPLS VPN, if the structure of the MPLS backbone network needs to be hidden, private
network packets can be used on the ingress.
B. Uniform Inmode
uniform mode, when an IP packet passes through an MPLS network, the value of IP TTL is decreased
C. by 1 on the ingress node and the value of the MPLS TTL field is fixed.
D. In Pipe mode, when an IP packet passes through an MPLS network, the value of IP TTL minus 1 is
mapped to the MPLS TTL field on the ingress node.
The TTL
Correct Answer: D in the MPLS label is the same as the TTL field in the IP header. TTL prevents routing loops on the
MPLS network.
Section: (none)

QUESTION 175
The router HW1, as the MPLS LSR router, exists on the network of the carrier HW. The router receives a packet
carrying a label, but
The label entry does not exist in its LFIB. How does the router process the packet?
A. Router HW1 uses the default label to
B. forward theHW1
The router packet.
removes the label and searches for the destination address of the private IP
C. address of the FIB.
D. Router HW1 uses LDP to create an LSP and creates a new path for the label carried in the
packet in LFIB.
Router
Correct Answer: D HW1 discards the packet.
Section: (none)

QUESTION 176
Which of the following statements about cross-domain
MPLS VPN is incorrect?
A. In Inter-AS VPN-OptionB mode, two ASBR-PEs are interconnected through multiple interfaces (including sub-
interfaces). Each interface is associated with one interface.
B. InVPN. EachVPN-OptionB
Inter-AS ASBR-PE considers theASBRs
mode, two peer asneed
a CE.to establish MP-EBGP neighbor relationships.
C. In Inter-AS VPN-OptionA mode, the routes between two ASBRs are common IPv4 routes.
D. When only LDP is used as the public network label, Layer 3 labels are required for packet forwarding in
Inter-AS VPN-OptionC solution 2.
Correct Answer: AD
Section: (none)

QUESTION 177
Which of the following statements about CE
dual-homing is incorrect?
A. The CE is connected to the backbone network through two links. The two links can be used for load
balancing or active/standby links.
B. In the CE dual-homing networking, loops may occur. You can run the route-tag command to solve the
loop problem.
D. VRFs of two PES connected to the same CE can belong to
C. The CE
different and PE form a CE dual-homing network to ensure high network availability.
VPNs.
Correct Answer: BD
Section: (none)
QUESTION 178
Which of the following operations can implement fast fault
detection on a multicast network?
A. Establish a PIM BFD
B. session between
The Holdtime neighbors.
of the Join/Prune
C. message is shortened.
D. Reduce the interval for sending
Join/Prune messages.
The interval
Correct Answer: AD at which Hello messages
are
Section: (none) sent is reduced.

QUESTION 179
In a multicast network, which of the following situations causes
multicast traffic to fail to be forwarded?
A. The router does not
B. have the RPF route.
The upstream router discards the received
C. PIM Join message.
D. Egress network of multiple routers. The
local router is not a DR.
PIM is
Correct Answer: not enabled on the RPF interface.
ABD
Section: (none)

QUESTION 180
What improvements have been made to the
IGMPv2 protocol compared with IGMPv1?
A. Adding a Group-and-
B. Source-Specific Query
Message
C.
The group-specific query
D. packet is added.
The maximum response
Correct Answer:
time BCD
field is added.
Section: (none)
This command is used to
add a group of outgoing
QUESTIONpackets.
181
If multiple candidate RPS are configured in a multicast group, which of the following parameters need to be
compared to elect the RP from multiple candidate RPS?
A. Mask length of the group range of the C-RP service that matches the
multicast address to which the user joins
B.
C. Number
IP addressof the C-RP
of the interface
C-RP
interface
D. Priority of C-RP

Correct Answer: ACD


Section: (none)

QUESTION 182
As shown in the figure, routers work in load balancing mode between branch network 1 and branch network 2. In this
case, configure the router on the physical interface of the router.
URPF must work in loose mode to defend against source IP address spoofing attacks.

A. True
B. False

Correct Answer:
Section: (none)
QUESTION 183
A bookstore provides a wired network for customers to learn online. However, some users cannot access the network
one day. After the check, IP resources in the DHCP address pool are found.
Which of the following is the best way to solve current problems?
A. Configuring
B. IPSG
Configure a static ARP
C. binding
Limit thetable.
maximum number of DHCP Snooping binding
D. entries that can be learned by an interface.
Configuring DAI
Correct Answer: C
Section: (none)

QUESTION 184
Which of the following are
single-packet attacks?
A. DDoS attacks
B. Special control packet
attacks
C. Scanning detection
attacks
D. Malformed
Correct packet
Answer: BCD
attack (none)
Section:

QUESTION 185
As shown in the figure, the A department of branch 1 can access the Internet. However, the B department can use only
the encrypted VPN to access the headquarters resources.
Configure the NAT policy on the to enable the department A to access the Internet. In addition, configure the IPSec VP
(ESP) + tunnel mode for the department B.
It can visit the headquarters.

A. True
B. False

Correct Answer: A
Section: (none)

QUESTION 186
Network administrators can use the CAR technology in traffic policing. Which of the following
technologies can be applied in CAR?
A. Dual-bucket
B. dual-speed
C. Dual-bucket
single rate
D.
Single
bucket
Correct Answer:
singleABC
rate
Section: (none)
Three
buckets at a
QUESTIONsingle
187
speed
A family user has subscribed to a 10Mb/s broadband service. To improve user experience, a user can be stable at
12Mb/s when performing a speed test, as shown in.
If the token bucket technology is used to meet this requirement, which of the following methods is optimal?
A. cir 10000 pir 12000
B. cir 10000 cbs 10000 pbs 12000
C. cir 8000 pir 12000
D. cir 10000 cbs 12000 pbs 12000
Correct Answer: A
Section: (none)

QUESTION 188
Huawei users are transferring a large number of files through TFTP. Which
protocol does TFTP transmit?
A. FTP
B. IP and TCP
C. UDP
D. ICMP and UDP
E. NFS

Correct Answer: C
Section: (none)

QUESTION 189
As shown in the following figure, R1 and R2 establish eBGP peer relationships and enable
BFD. Which of the following statements are true? ()

A. The BFD packet detection time of R2 is


600 ms.
B. The BFD packet detection time of R1 is
1280 ms.
C. The BFD packet detection time of R1 is
660 ms.Answer: C
Correct
D. The BFD
Section: packet detection time of R2 is
(none)
800 ms.
QUESTION 190
Which of the following statements about
VRRP load balancing are correct?
A. Multiple VRRP backup groups can be created on an interface of a router. The router can function as a VRRP
backup group.
Master,
B. When which
load can be
balancing is used as the
deployed, backup
the of otherofVRRP
IP addresses backup
different virtualgroups.
routers must be configured as default
gateway addresses for hosts on the same LAN.
C. When configuring the priority, ensure that the same router functions as the master in three VRRP backup
groups.
D. VRRP
Correct load balancing
Answer: ABD requires at least two virtual routers to provide forwarding services at the same time.
Section: (none)

QUESTION 191
Subnets in different VPNs of VXLAN need to be accessed. The information about one subnet is as follows: RT
10:10 both and RT 1000:1000 in EVPN.
Export: RT 100:100 in the VPN. The configuration of the other subnet can be?
A. Configure 1000:1000 export in
B. EVPN.
C. 10:10 both1000:1000
Configure is configured in in
both theEVPN.
VPN.
D. 1000:1000 both evpn is configured in
the VPN.
Correct Answer: CD
Section: (none)

QUESTION 192
Which of the following statements about
Layer 2 VPN are true?
A. VPLS is a widely used technology on the live network and can transparently transmit Layer
B. 3 packets.
The VPLS Supports multi-point
configuration access.
is complex, and the Layer 2
C. network transparently transmits BUM
BGP-EVPN solves the problem that VPLS packets.
cannot support MAC address
D. flapping and multi-tenant.
BGP-EVPN supports tenant isolation, Multi-homing, and broadcast
suppression.
Correct Answer: BCD
Section: (none)

Das könnte Ihnen auch gefallen