1-100 Flashcards
R&S
Which of the following statements regarding selection of active links in LACP mode are false?
A - In static LACP mode, after joining the Eth-Trunk, the member interfaces send the system priority, system MAC address, interface priority , and interface number to the remote end to negotiate active interfaces
B - A larger LACP system priority indicates a higher priority. The end with a larger LACP system priority
functions as the active side. If the two ends have the same LACP system priority, the end with a larger MAC address functions as the active side
C - The passive side determines active interfaces based on the LACP priority and ID (interface number ) of
an interface on the active side
D - Data can be forwarded normally even if both devices select different interfaces.
A C
Which of the following statements regarding PIM-DM is false?
A - PIM-DM stands for Protocol independent Multicast-Dense Mode. It is a dense-mode multicast routing
protocol.
B - PIM-DM assumes that each subnet on a network has at least one receiver station interested in the
multicast source.
C - PIM-DM uses the graft mechanism to restore multicast packet forwarding proactively
D - PIM-DM does not have periodic flood-prune processes
D
What are the mainly methods of data collection?
A - Collection by physical optical splitter
B - Collection through port mirroring
C - Centralized collection by NMS
D - Automatic collection
A B C
Which of the following statements regarding QoS packet are false?
A - When a router receives data, packet loss may occur because the CPU is busy and cannot process data packets
B - When data packets are scheduled to queues, packet loss may occur because the queue is full
C - When data packets are transmitted on a link, packet loss may occur because of link faults
D - Packet loss is generally caused by the delay, the tail drop packets loss may occur because of the queue is
full
D
MPLS VPN is used to solve some limitations of traditional VPN technology. Which are the major limitation the MPLS VPN solves?
A - Private routes cannot communicate with each other
B - Leased lines are expensive
C - Bandwidth resources cannot be fully used
D - The address space is overlapping
D
Which information of labels is used for simple traffic classification? A - DSCP priority B - IP precedence C - MPLS EXP priority D - 802.Ip priority
C
On a large-scale network, some switches run MSTP and some switches run RSTP. If an MSTP switch detects
that the neighboring switch works in RSTP mode, which mode does the MSTP switch work?
A - STP
B - RSTP
C - MSTP
D - Uncertain
C
How is OPEX defined? A - Maintenance cost B - Total cost of ownership (TCO) C - Operating cost D - O&M cost
C
Congestion means that the service rate is reduced because of insufficient network resources Congestion
avoidance technologies include RED and WRED
A - True
B - False
True
S7700 and S9700 switches are Huawei’ s modular campus switches. Compared with the S7700, what advantages does the S9700 have?
A - The S9700 provides more slots and interface
B - The S9700 supports non-blocking data switching.
C - The S9700 supports the redundancy design for engines, power modules and fans.
D - The S9700 provides data center features such as Transparent Interconnection of Lots of links (TRILL) and Fiber Channel Over Ethernet (FCoE)
B
After the project delivery, the O&M expenses are continuously generated, which of the following items are the expenses generated during the O&M? (MC) A - Energy expenses B - Line construction expenses C - Line lease expenses D - Equipment depreciation expenses E - Staff expenses
A C E
Which of the following procedures are included in IS-IS route calculation? (MC) A - Neighbor relationship establishment B - Route calculation C - Link information exchange D - Router advertisement
A B C
OSPF supports authentication and interface authentication. If both authentication modes are configured, interface authentication takes preference over area authentication.
A - TRUE
B - FALSE
TRUE
Which of the following statements regarding LACP are true ?
A - LACP is based on IEEE802.3au
B - The local device sends LACP PDUs to exchange information with the remote end
C - Devices at both ends determine the Active side based on the LACP system priority and system ID
D - Devices at both ends determine active interfaces based on the LACP priority and ID of the interface on the passive side
B C
Which of the following statements regarding the delay and jitters is true?
A - The jitter is relevant to the delay
B - The jitter occurs because the E2E delays of data packets in the different flow are different
C - A long delay indicates a short jitter and a short delay indicates a large jitter
D - Jitter is independent of delay
A
Which of the following route selection tools can be used by other routing protocols in addition to BGP? A - Route-policy B - IP- prefix C - AS-path-filter D - Community-filter
A B
Which of the following statements regarding PIM-SM hello packets is false?
A - On a PIM-SM network, multicast routers, that have just started need to send Hello messages to discover
neighbors and maintain neighbor relationships
B - Multicast routers periodically send Hello Messages to each other to maintain communication
C - DR is selected on a network segment based on Hello messages exchanged between routers
D - Hello messages are sent to multicast group address 224.0.0.5
D
Which of the following statements regarding VRRP fast switch-over are false?
A - When association between VRRP and the BFD or EEM session is enabled and the BFD or EEM session status changes, the change is notified to the VRRP module, implementing VRRP fast switchover
B - A VRRP group cannot monitor the peer BFD session, link BFD session, and normal BFD. session
simultaneously
C - When the VRRP group is associated with a normal BFD and the BFD session status changes, the priority of VRRP group is changed to trigger the switchover. When the status of monitored BFD session recovers, the priority of the router in the VRRP group is restored
D - If VRRP is configured to monitor multiple BFD sessions the associations may affect services
B D
Which of the following BGP attributes can define a set of destination addresses with the public characteristics? A - Origin B - Community C - AS Path D - MED
B
Which of the following statements regarding IBGP and EBGP peers is false?
A - Two BGP-running routers must have IP connectivity if they need to establish a TCP connection
B - If two BGP peers exchanging BGP messages belong to the same AS the two peers are IBGP peers
C - If two BGP peers exchanging BGP messages belong to different AS, the two peers are EBGP peers
D - IBGP peers must be physically directly connected
D
Which of the following causes for a VRRP group two-master fault is the most impossible?
A - The configurations of the devices in the VRRP group are different
B - The link where VRRP Advertisement packets are transmitted is faulty.
C - The VRRP Advertisement packets received by the VRRP backup with a lower priority are taken as invalid packets and are discarded
D - The master device sends a VRRP Advertisement packet every 1 second
D
Which of the following statements regarding virtual link is false?
A - If a virtual link exists in a network, network design problems often exist, and need to be optimised.
B - The existence of virtual link increases network complexity
C - Virtual link may lead to loops
D - The interval for sending Hello packets on a virtual link is 10 seconds
D
According to BGP route selection rules, which is the correct origin attribute priority order? A - EGP>Incomplete>IGP B - IGP>Incomplete>EGP C - IGP>EGP>Incomplete D - Incomplete> EGP > IGP
C
TWO LEVEL-1 routers in different areas can establish a neighbour relationship.
A - TRUE
B - FALSE
FALSE
Which of the following statements regarding OSPF authentication commands are true?
A - A ciphertext password can be entered , the effect is equivalent
B - The “ospf authentication-mode md5 1 huawei” command has the same function as the
“ospf authentication-mode md5 1 plain huawei” command
C - When an authentication password is configured for area authentication and interface authentication
separately , the password is configured for area authentication takes effect
D - The “ospf authentication-mode simple huawei” command has the same function as the
“ospf authentication-mode simple plain huawei” command.
A D
Which of the following statements regarding the operation window time for a software upgrade is false?
A - It is determined by the accepted service interruption duration
B - It must be longer than the upgrade execution time
C- Troubleshooting time must be reserved
D - Only network maintenance personnel need to notified of the operation window time while the customer does not
D
The SDN architecture mainly includes NBIs and SBIs.
A - True
B - False
False
The project scope can be determined from three aspects, which of the following is not included?
A - Functions and modules to be realised by the project
B - Geographic range of the network
C - Investment budget of the project
D - Responsibility division between the project and other matching systems
C
Which of the following statements regarding network maintenance work are true?
A - For device software maintenance onsite operations are allowed but only remote operations are
recommended
B - The device software running is closely related to services running on the device
C - The external environment where hardware runs does not need special attention
D - For device environment maintenance, maintenance personnel need to go the site or even use some professional tools for observation and measurement
B D
What are differences between the DiffServ and IntServ models? (MC)
A - The DiffServ model provides different services destined for different destinations.
B - The DiffServ model provides different services destined for different sources.
C - The DiffServ model does not need to maintain the status of each flow.
D - The DiffServ model applies to large-scale backbone network.
C D
In the multicast network environment, how do an IGMPv1 host and an IGMPv2 router on the same LAN interact with each other? (MC)
A - If any host on a LAN is running IGMPv1, all hosts on the LAN must also use IGMPv1.
B - Membership Report message sent from the IGMPv1 host will be received by the IGMPv2 router.
C - If the IGMPv1 is in a specific group the IGMPv2 router must ignore all Leave messages received from this group.
D - The version 2 router must set a countdown timer associated with the group that takes into account the
presence of the version 1 host
B C D
On a network running RSTP, some devices use STP. When SRTP-enabled switches detect a topology change, which method is used by the RSTP-enabled switches to notify STP-enabled switches of the topology change? A - RSTP BPDUs with the TC are used B - STP BPDUs with the TC are used C - RSTP BPDUs with the TCA are used D - STP BPDUs with the TCA are used
B
RSTP provides different functions in different scenarios. Which of the following statements are false?
A - If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the
edge port as a non-edge-port and triggers STP calculation
B - The role of the designated port that is enabled with root protection cannot be changed.
C - When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the discarding state and does not forward packets. If the port does not receive RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state.
D - After TC protection is enabled, you can set the number of times the switch processes TC BPDUs with a
certain period
A
In the multicast network environment, how do an IGMPv2 host and an IGMPv1 router on the same LAN
interact with each other? (MC)
A - The IGMPv1 router considers IGMPv2 Report messages invalid and ignores them.
B - When the IGMPv1 router acts as an effective IGMP queried the IGMPv2 host must send IGMPv1 Report messages to the router.
C - When the IGMPv2 host detects that the IGMP queried is running IGMPv1 it must always respond to the
queried with IGMPv1 Report messages
D - When the IGMPv2 host leaves the group it still sends an IGMP leave message and this message cannot be
suppressed
A B C
Which of the following statements regarding IS-IS characteristics are true?
A - IS-IS supports various area features
B - IS-IS packet format is simple
C - IS-IS is suitable for large-capacity route transmission
D - IS-IS has good scalability
B C D
Which of the following BGP attributes is Huawei' s unique attribute? A - PrefVal B - MED C - AS_Path D - Origin
A
DHCP uses different types of packets to implement different functions. Which of the following is the function
of the DHCP Offer packet?
A - The DHCP offer packets are broadcast by the DHCP client to detect available servers
B - The DHCP server sends DHCP Offer packets to respond to the DHCP Discover packets send by the
DHCP client, providing requested configuration parameters
C - The DHCP client sends a DHCP Offer packet to the DHCP server to request configuration parameters,
configuration acknowledgement or extension of the IP address lease
D - The DHCP server sends a DHCP Offer packet to the client carrying configuration parameters, such as the IP address
B
Which of the following statements regarding the any-source multicast (ASM) and source-specific multicast
(SSM) models are true? (MC)
A - In the SSM model, the receiver hosts have obtained the specific location of the multicast source in
advance by other methods.
B - In the ASM model, receiver hosts cannot obtain locations of multicast sources in advance.
C - The SSM model and ASM model use the same multicast group address range.
D - In the SSM model, a multicast distribution tree is established directly between a multicast source and its
receiver host.
A B D
In a route-policy, which of the following BGP attributes can be used in if-match clauses? A - Local-Preference B - AS_Path C - TAG D - Community
B D
Which of the following statements regarding the STP configuration is true?
A - STP automatically runs by default and therefore does not require configuration
B - The STP convergence speed is slow which may cause network interruption. Therefore, disabling STP is
a preferred solution
C - Similar to the implementation for routing Protocols data flows between switches can be adjusted by
modifying link costs
D - For routine STP configuration, the position of the STP blocked port is controlled to ensure that the
blocked port is not located on a backbone link or device
E - The RSTP algorithm is simple and reliable and supports fast convergence. Therefore, all switches on the network are configured to work in RSTP mode.
D