1-100 Flashcards

R&S

1
Q

Which of the following statements regarding selection of active links in LACP mode are false?
A - In static LACP mode, after joining the Eth-Trunk, the member interfaces send the system priority, system MAC address, interface priority , and interface number to the remote end to negotiate active interfaces
B - A larger LACP system priority indicates a higher priority. The end with a larger LACP system priority
functions as the active side. If the two ends have the same LACP system priority, the end with a larger MAC address functions as the active side
C - The passive side determines active interfaces based on the LACP priority and ID (interface number ) of
an interface on the active side
D - Data can be forwarded normally even if both devices select different interfaces.

A

A C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements regarding PIM-DM is false?
A - PIM-DM stands for Protocol independent Multicast-Dense Mode. It is a dense-mode multicast routing
protocol.
B - PIM-DM assumes that each subnet on a network has at least one receiver station interested in the
multicast source.
C - PIM-DM uses the graft mechanism to restore multicast packet forwarding proactively
D - PIM-DM does not have periodic flood-prune processes

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the mainly methods of data collection?
A - Collection by physical optical splitter
B - Collection through port mirroring
C - Centralized collection by NMS
D - Automatic collection

A

A B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements regarding QoS packet are false?
A - When a router receives data, packet loss may occur because the CPU is busy and cannot process data packets
B - When data packets are scheduled to queues, packet loss may occur because the queue is full
C - When data packets are transmitted on a link, packet loss may occur because of link faults
D - Packet loss is generally caused by the delay, the tail drop packets loss may occur because of the queue is
full

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MPLS VPN is used to solve some limitations of traditional VPN technology. Which are the major limitation the MPLS VPN solves?
A - Private routes cannot communicate with each other
B - Leased lines are expensive
C - Bandwidth resources cannot be fully used
D - The address space is overlapping

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which information of labels is used for simple traffic classification?
A - DSCP priority
B - IP precedence
C - MPLS EXP priority
D - 802.Ip priority
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

On a large-scale network, some switches run MSTP and some switches run RSTP. If an MSTP switch detects
that the neighboring switch works in RSTP mode, which mode does the MSTP switch work?
A - STP
B - RSTP
C - MSTP
D - Uncertain

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
How is OPEX defined?
A - Maintenance cost
B - Total cost of ownership (TCO)
C - Operating cost
D - O&M cost
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Congestion means that the service rate is reduced because of insufficient network resources Congestion
avoidance technologies include RED and WRED
A - True
B - False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

S7700 and S9700 switches are Huawei’ s modular campus switches. Compared with the S7700, what advantages does the S9700 have?
A - The S9700 provides more slots and interface
B - The S9700 supports non-blocking data switching.
C - The S9700 supports the redundancy design for engines, power modules and fans.
D - The S9700 provides data center features such as Transparent Interconnection of Lots of links (TRILL) and Fiber Channel Over Ethernet (FCoE)

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
After the project delivery, the O&M expenses are continuously generated, which of the following items are the expenses generated during the O&M? (MC)
A - Energy expenses
B - Line construction expenses
C - Line lease expenses
D - Equipment depreciation expenses
E - Staff expenses
A

A C E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following procedures are included in IS-IS route calculation? (MC)
A - Neighbor relationship establishment
B - Route calculation
C - Link information exchange
D - Router advertisement
A

A B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSPF supports authentication and interface authentication. If both authentication modes are configured, interface authentication takes preference over area authentication.
A - TRUE
B - FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements regarding LACP are true ?
A - LACP is based on IEEE802.3au
B - The local device sends LACP PDUs to exchange information with the remote end
C - Devices at both ends determine the Active side based on the LACP system priority and system ID
D - Devices at both ends determine active interfaces based on the LACP priority and ID of the interface on the passive side

A

B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following statements regarding the delay and jitters is true?
A - The jitter is relevant to the delay
B - The jitter occurs because the E2E delays of data packets in the different flow are different
C - A long delay indicates a short jitter and a short delay indicates a large jitter
D - Jitter is independent of delay

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following route selection tools can be used by other routing protocols in addition to BGP?
A - Route-policy
B - IP- prefix
C - AS-path-filter
D - Community-filter
A

A B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following statements regarding PIM-SM hello packets is false?
A - On a PIM-SM network, multicast routers, that have just started need to send Hello messages to discover
neighbors and maintain neighbor relationships
B - Multicast routers periodically send Hello Messages to each other to maintain communication
C - DR is selected on a network segment based on Hello messages exchanged between routers
D - Hello messages are sent to multicast group address 224.0.0.5

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following statements regarding VRRP fast switch-over are false?
A - When association between VRRP and the BFD or EEM session is enabled and the BFD or EEM session status changes, the change is notified to the VRRP module, implementing VRRP fast switchover
B - A VRRP group cannot monitor the peer BFD session, link BFD session, and normal BFD. session
simultaneously
C - When the VRRP group is associated with a normal BFD and the BFD session status changes, the priority of VRRP group is changed to trigger the switchover. When the status of monitored BFD session recovers, the priority of the router in the VRRP group is restored
D - If VRRP is configured to monitor multiple BFD sessions the associations may affect services

A

B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which of the following BGP attributes can define a set of destination addresses with the public characteristics?
A - Origin
B - Community
C - AS Path
D - MED
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following statements regarding IBGP and EBGP peers is false?
A - Two BGP-running routers must have IP connectivity if they need to establish a TCP connection
B - If two BGP peers exchanging BGP messages belong to the same AS the two peers are IBGP peers
C - If two BGP peers exchanging BGP messages belong to different AS, the two peers are EBGP peers
D - IBGP peers must be physically directly connected

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following causes for a VRRP group two-master fault is the most impossible?
A - The configurations of the devices in the VRRP group are different
B - The link where VRRP Advertisement packets are transmitted is faulty.
C - The VRRP Advertisement packets received by the VRRP backup with a lower priority are taken as invalid packets and are discarded
D - The master device sends a VRRP Advertisement packet every 1 second

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following statements regarding virtual link is false?
A - If a virtual link exists in a network, network design problems often exist, and need to be optimised.
B - The existence of virtual link increases network complexity
C - Virtual link may lead to loops
D - The interval for sending Hello packets on a virtual link is 10 seconds

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
According to BGP route selection rules, which is the correct origin attribute priority order?
A - EGP>Incomplete>IGP
B - IGP>Incomplete>EGP
C - IGP>EGP>Incomplete
D - Incomplete> EGP > IGP
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TWO LEVEL-1 routers in different areas can establish a neighbour relationship.
A - TRUE
B - FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following statements regarding OSPF authentication commands are true?
A - A ciphertext password can be entered , the effect is equivalent
B - The “ospf authentication-mode md5 1 huawei” command has the same function as the
“ospf authentication-mode md5 1 plain huawei” command
C - When an authentication password is configured for area authentication and interface authentication
separately , the password is configured for area authentication takes effect
D - The “ospf authentication-mode simple huawei” command has the same function as the
“ospf authentication-mode simple plain huawei” command.

A

A D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following statements regarding the operation window time for a software upgrade is false?
A - It is determined by the accepted service interruption duration
B - It must be longer than the upgrade execution time
C- Troubleshooting time must be reserved
D - Only network maintenance personnel need to notified of the operation window time while the customer does not

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The SDN architecture mainly includes NBIs and SBIs.
A - True
B - False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The project scope can be determined from three aspects, which of the following is not included?
A - Functions and modules to be realised by the project
B - Geographic range of the network
C - Investment budget of the project
D - Responsibility division between the project and other matching systems

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following statements regarding network maintenance work are true?
A - For device software maintenance onsite operations are allowed but only remote operations are
recommended
B - The device software running is closely related to services running on the device
C - The external environment where hardware runs does not need special attention
D - For device environment maintenance, maintenance personnel need to go the site or even use some professional tools for observation and measurement

A

B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are differences between the DiffServ and IntServ models? (MC)
A - The DiffServ model provides different services destined for different destinations.
B - The DiffServ model provides different services destined for different sources.
C - The DiffServ model does not need to maintain the status of each flow.
D - The DiffServ model applies to large-scale backbone network.

A

C D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In the multicast network environment, how do an IGMPv1 host and an IGMPv2 router on the same LAN interact with each other? (MC)
A - If any host on a LAN is running IGMPv1, all hosts on the LAN must also use IGMPv1.
B - Membership Report message sent from the IGMPv1 host will be received by the IGMPv2 router.
C - If the IGMPv1 is in a specific group the IGMPv2 router must ignore all Leave messages received from this group.
D - The version 2 router must set a countdown timer associated with the group that takes into account the
presence of the version 1 host

A

B C D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
On a network running RSTP, some devices use STP. When SRTP-enabled switches detect a topology change, which method is used by the RSTP-enabled switches to notify STP-enabled switches of the topology change?
A - RSTP BPDUs with the TC are used
B - STP BPDUs with the TC are used
C - RSTP BPDUs with the TCA are used
D - STP BPDUs with the TCA are used
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

RSTP provides different functions in different scenarios. Which of the following statements are false?
A - If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the
edge port as a non-edge-port and triggers STP calculation
B - The role of the designated port that is enabled with root protection cannot be changed.
C - When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the discarding state and does not forward packets. If the port does not receive RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state.
D - After TC protection is enabled, you can set the number of times the switch processes TC BPDUs with a
certain period

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In the multicast network environment, how do an IGMPv2 host and an IGMPv1 router on the same LAN
interact with each other? (MC)
A - The IGMPv1 router considers IGMPv2 Report messages invalid and ignores them.
B - When the IGMPv1 router acts as an effective IGMP queried the IGMPv2 host must send IGMPv1 Report messages to the router.
C - When the IGMPv2 host detects that the IGMP queried is running IGMPv1 it must always respond to the
queried with IGMPv1 Report messages
D - When the IGMPv2 host leaves the group it still sends an IGMP leave message and this message cannot be
suppressed

A

A B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the following statements regarding IS-IS characteristics are true?
A - IS-IS supports various area features
B - IS-IS packet format is simple
C - IS-IS is suitable for large-capacity route transmission
D - IS-IS has good scalability

A

B C D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
Which of the following BGP attributes is Huawei' s unique attribute?
A - PrefVal
B - MED
C - AS_Path
D - Origin
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DHCP uses different types of packets to implement different functions. Which of the following is the function
of the DHCP Offer packet?
A - The DHCP offer packets are broadcast by the DHCP client to detect available servers
B - The DHCP server sends DHCP Offer packets to respond to the DHCP Discover packets send by the
DHCP client, providing requested configuration parameters
C - The DHCP client sends a DHCP Offer packet to the DHCP server to request configuration parameters,
configuration acknowledgement or extension of the IP address lease
D - The DHCP server sends a DHCP Offer packet to the client carrying configuration parameters, such as the IP address

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following statements regarding the any-source multicast (ASM) and source-specific multicast
(SSM) models are true? (MC)
A - In the SSM model, the receiver hosts have obtained the specific location of the multicast source in
advance by other methods.
B - In the ASM model, receiver hosts cannot obtain locations of multicast sources in advance.
C - The SSM model and ASM model use the same multicast group address range.
D - In the SSM model, a multicast distribution tree is established directly between a multicast source and its
receiver host.

A

A B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
In a route-policy, which of the following BGP attributes can be used in if-match clauses?
A - Local-Preference
B - AS_Path
C - TAG
D - Community
A

B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following statements regarding the STP configuration is true?
A - STP automatically runs by default and therefore does not require configuration
B - The STP convergence speed is slow which may cause network interruption. Therefore, disabling STP is
a preferred solution
C - Similar to the implementation for routing Protocols data flows between switches can be adjusted by
modifying link costs
D - For routine STP configuration, the position of the STP blocked port is controlled to ensure that the
blocked port is not located on a backbone link or device
E - The RSTP algorithm is simple and reliable and supports fast convergence. Therefore, all switches on the network are configured to work in RSTP mode.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
Which of the following operations are performed during migration acceptance?
A - Documentation transfer
B - Transfer-to-maintenance training
C - Accept an meeting
D - Business expense accounting
A

A B C

42
Q

Which of the following statement is false?
A - A device with a higher router priority has a higher election priority
B - If two devices have the same router priority, the device with a larger router ID has a higher election
priority
C - If the current DR fails, the current BDR automatically becomes a new DR and a BDR will be elected again
D - When a router with the highest router priority joins an OSPF network this router will become the new
DR

A

D

43
Q

When the virtual router responds to ARP Request packets, the actual MAC address of the master router is
used.
A - TRUE
B - FALSE

A

False

44
Q

Which of the following statements regarding route selection tools is false?
A - An access control list (ACL) matches routing information or addresses in data packets
to filter out routes or data packets that do not meet matching conditions
B - An IP prefix matches destination addresses of routes or directly applies to a router object (gateway)
C - An AS-Path filter matches the AS-Path attribute in BGP routes, so it can only filter BGP routes
D - A community-filter matches community attributes in BGP routes, so it can only filter BGP routes
E - A route-policy can only match routes and data packets, but cannot change route attributes or forwarding behaviours for data packets

A

E

45
Q

Which of the following statements regarding BGP are false? (MC)
A - TCP provides an acknowledgement and re-transmission mechanism for BGP
B - Before establishing a TCP connection, BGP devices need to exchange Update messages
C - BGP uses Notification and Update messages to establish and maintain peer relationships
D - BGP uses the TCP port 179 for communication

A

B C

46
Q

To improve STP running stability, a network administrator wants to configure some STP features or protection mechanism on switches. Which of the following configuration road-maps is correct?
A - Configure the user access port as an edge to prevent the user from connecting to the switch on this port.
B - Configure root protection on the user access port to ensure that the user does not connect to a switch
with a higher priority
C - Configure loop protection on positions where loops have occurred so that loops are always blocked
D - Configure BPDU protection so that the switch checks the validity of each received BPDU to prevent attacks of forged BPDU’s

A

B

47
Q

The greatest difference between a Fat AP and a Fit AP is that the FAT AP provides access to more users, has higher performance, and is more applicable to large networks.
A - TRUE
B - FALSE

A

FALSE

48
Q

Which of the following statements regarding OSPF neighbor relationship and adjacency is true?
A - OSPF routers must establish an adjacency before exchanging information.
B - Not all neighbors can establish adjacencies.
C - Adjacencies are maintained using OSPF Hello Protocol
D - Neighbor relationships are selected from adjacencies to exchange routing information

A

B

49
Q

Port isolation provides secure and flexible networking solutions for users. Which of the following statements
regarding port is false?
A - Port isolation can be used for configuring Layer 2 isolation.
B - By default interfaces are isolated at Layer 2 but can communicate at Layer 3
C - Before the port isolation function takes effect on an interface, the port isolation function must be enabled.
D - The port-isolate enable command can run in the system view.

A

D

50
Q

When the Hold Time parameter negotiated between two BGP peers is 0, no keepalive messages will be sent
A - True
B - False

A

True

51
Q

Which of the following statements regarding the network command in BGP is false?
A - The routes injected using the network command must exist in the IP routing table
B - The routes injected using the network command must accurately match the mask length in the IP routing
table
C - The network command cannot be used together with corresponding policies
D - By default, BGP does not advertise any local route.

A

C

52
Q

Compared with traffic policing, traffic shaping uses queues to cache the traffic that exceeds the limit. which of the following statements regarding traffic shaping is false?
A - Compared with traffic policing, traffic shaping has good anti-burst capability
B - Traffic shaping enables packets to be transmitted at an even rate
C - Because queues are used the delay is added when congestion occurs.
D - Compared with traffic policing, traffic shaping is more suitable for voice service

A

D

53
Q
Which of the following authorization items is not required for risky operations?
A - Management authorization
B - Technology authorization
C - Customer authorization
D - Administrative authorization
A

D

54
Q

Which of the following statements regarding MAC address spoofing attacks is false?
A - Attackers initiate MAC address spoofing attacks using the MAC address learning mechanism
B - Attackers send data frames with forged MAC address to the switch to initiate MAC address spoofing
attacks
C - When MAC address spoofing attacks occur, the switch may learn incorrect mapping between MAC
address and IP addresses
D - When MAC address spoofing attacks occur the switch may sent packets to the attacker

A

C

55
Q

The firewall and router can both implement security defence functions and replace each other.
A - TRUE
B - FALSE

A

False

56
Q
What is the broadcast domain of VXLAN called?
A - Broadcast domain
B - Switching domain
C - Bridge domain
D - VLAN domain
A

C

57
Q

During MSTP troubleshooting, the display current-configuration command is executed to obtain the configuration file of the device, which of the following statements is false?
A - Check the port configuration to verify that the MSTP-enabled port is configured (for example using the
bpdu enable command) to send protocol packets
B - The port connected to a user device has MSTP disabled or is configured as the edge port
C - The BPDU tunnel configuration has no impact on MSTP
D - Check whether the interface is added to the correct VLAN

A

C

58
Q
On the USG series firewall, what is the security level of the DMZ?
A - 5
B - 50
C - 85
D - 100
A

B

59
Q
Which of the following command is used to apply the traffic policy to an interface on an AR router?
A - traffic-policy pi inbound
B - traffic classifier pi inbound
C - traffic behavior pi inbound
D - services-policy pi inbound
A

A

60
Q
Which three steps does a migration include? (MC)
A - Snapshot before the migration
B - Delivery during the migration
C - Check after the migration
D - Attendance after the migration
A

A B C

61
Q

Which of the following is the purpose of management security optimization?
A - To ensure that sensitive management information will not be intercepted
B - To prevent or reduce external network attacks and harm
C - To ensure secure access to key services
D - To achieve secure user access control

A

A

62
Q

Which of the following causes may result in a BGP peer relationship fault? (MC)
A - An ACL is configured to disable TCP port 179
B - The peer router ID conflicts with the local router ID.
C - The peer ebgp-max-hop command is not configured when loopback interfaces are used to establish the
EBGP peer relationship
D - The peer connect-interface command is not configured when loopback interfaces are used to establish the BGP peer relationship

A

A B C D

63
Q

Which of the following statements regarding MUX VLAN is true?
A - The MUX VLAN contains a principal VLAN and subordinate VLAN’s. The principal VLAN and subordinate VLAN’s cannot communicate.
B - The MUX VLAN contains a principal VLAN and subordinate VLANs. The subordinate VLAN’s are classified into subordinate separate VLAN’s and subordinate group VLAN’s. The interfaces in the subordinate group VLAN can communicate with each other.
C - The interfaces between subordinate separate VLAN’s can communicate with each other, but cannot communicate with the interfaces in principle VLAN
D - The principal VLAN and subordinate VLANs cannot communicate

A

B

64
Q

Software upgrade operations are similar for Huawei datacom products. therefore, before a software upgrade, you only need to briefly read the upgrade guide.
A - TRUE
B - FALSE

A

False

65
Q
AR series routers provide various slots, which of the following is not included?
A - SIC
B - SWIC
C - HSIC
D - XSIC
A

C

66
Q
How many bits does an MPLS label field have?
A - 8
B - 3
C - 1
D - 20
A

D

67
Q

During network design, VLANs are assigned in many ways. Which of the following ways is seldom adopted?
A - VLAN assignment based on the access device type
B - VLAN assignment based on the access location
C - VLAN assignment based on security system requirements
D - VLAN assignment based on service design

A

A

68
Q

BFD is a universal fast detection technology that can implement fast switchover, so BFD does not need to be
used with other fast switching technologies.
A - TRUE
B - FALSE

A

True

69
Q

Which of the following statements regarding a route-policy are true? (MC)
A - A route-policy consists of multiple nodes, and each node can contain multiple if-match and apply clauses
B - An if-match clause defines the matching condition of the node, and an apply clause define the routing
behavior for the packets meeting the matching condition
C - The operator between if-match clauses under a node is AND. That is, packets match the node only when they match all the if-match clauses under the node
D - The operator between nodes of a route-policy is OR. That is , packets pass through the route-policy as
long as they match one node.

A

A B C D

70
Q

On the border between an enterprise network and its external network, which of the following devices is
deployed at the outermost side of the enterprise network?
A - IDS
B - PS
C - FW
D - VPN

A

C

71
Q

To inject IGP routes into BGP routes, you can only use the network command.
A - TRUE
B - FALSE

A

True

72
Q
Which of the following operation is performed in the risky operation process?
A - Solution formulation
B - Authorisation obtaining
C - Technical review
D - Implementation and result feedback
A

C

73
Q
Which of the following LSA's are advertised only within a single area? (MC)
A - Router LSA
B - Network LSA
C - Summary LSA
D - AS External LSA
A

A B

74
Q

Switches run the MSTP protocol by default. Which of the following statements regarding the default status is true?
A - All switches run in the same region by default
B - The STP calculation speed is faster than that when multiple instances are configured
C - Due to lack of configuration all switches switch the running mode to RSTP.
D - Each switch runs in an independent region

A

D

75
Q

By default, the OSPF interface cost depends on the interface bandwidth and is calculated using the following
formula; Bandwidth-Reference/Bandwidth. The interface cost can only be calculated by OSPF and cannot be manually modified.
A - TRUE
B - FALSE

A

False

76
Q
RSTP defines different ports compared with STP. Which of the following ports cannot work in forwarding
state?
A - Root port
B - Designated port
C - Backup port
D - Alternate port
A

C D

77
Q

In the VRP, by default, after the export route policy of a BGP peer is changed, an Update message can be sent to this neighbor again only through a manual operation.
A - True
B - FALSE

A

False

78
Q

In a MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are true?
A - The penultimate hop removes the outer label before forwarding the data packet to a peer PE
B - The IP data packet received by the peer PE does not carry labels.
C - The penultimate hope removes the outer label if the outer label in the data packet is explicit null label 3
D - The peer PE sends the data packet to the correct VPN based in the inner label.

A

A D

79
Q

Single-packet attacks indicate that an attacker controls botnet hosts to send a send a large number of attack
packets, causing link congestion on the attacked network and system resource exhaustion
A - True
B - False

A

False

80
Q

The SDN architecture mainly includes NBIs and SBIs.
A - True
B - False

A

False

81
Q

Which of the following is the function of MPLS forwarding equivalence class (FEC)?
A - The FEC determines forwarding of IP data packets on the MPLS LSP’s
B - The FEC determines establishment of LSP’s
C - The FEC determines the mapping between LSP’s and IP data packets
The FEC determines how label addition on LSP’s

A

C

82
Q

Which of the following statements regarding OSPF intra-area or inter-area router roles are true? (MC)
A - An internal router is a router of which all the interfaces belong to the same area
B - An Area Border Router (ABR) is a router connected to one or more areas , one of which is the backbone area. ABR’s function as gateways for inter-area communication
C - A backbone router is a router with at least two interfaces belonging to the backbone area.
D - An Autonomous System Boundary Router ( ASBR ) can be an internal router , a backbone router , or an
ABR

A

A B D

83
Q

In the OSPF protocol, the not-advertise parameter can be specified in the ASBR-SUMMART command to indicate that summarized routes that not be advertised.
A - TRUE
B - FALSE

A

True

84
Q

Which of the following statements regarding the static LACP mode are false?
A - If a high bandwidth of the link between two directly connected devices is required but the remote device does not support LACP, you can use the manual load balancing mode
B - In static LACP mode, a larger LACP priority of an interface indicates a higher priority of the interface and a high probability of becoming the active interface
C - The interface that forwards data is called the active interface, whereas the interface that does that does not forward data is called the inactive interface. The backup interface changes from inactive to active only when the active interface fails.
D - When preemption is enabled and an active interface fails, the backup interface with a larger priority
becomes the active interface after a delay. If preemption is disabled, the faulty interface cannot automatically become the active interface.

A

B

85
Q

When a huawei router serves as an SSH client and attempts to log into another Huawei router, the login fails, It is suspected that the SSH server configuration is incorrect. Which of the following causes is the most impossible for the server fault?
A - The SSH protocol is not bound in the VTY user interface view.
B - The user service type, authentication type and user service type are not configured.
C - The SSH server and client have inconsistent versions.
D - The SSH first-time authentication function is disabled.

A

D

86
Q
Which of the following items are used to remind customers of information security? (MC)
A - Account soft-out reminder
B - Password updated reminder
C - Log protection reminder
D - Data backup reminder
A

A B C D

87
Q
What features must a risky operation solution have?
A - Accuracy
B - Good portability
C - Verification
D - Rollback
A

A B C D

88
Q

Which command is used to enable association between BFD and VRRP?
A - vrrp vrid 1 track bfd-session session-name 1 reduced 100
B - bfd-session vrrp vrid 1 track session-name 1 reduced 100
C - track vrrp vrid 1 bfd-session session-name 1 reduced 100
D - vrrp vrid 1 track bfd- session-name 1 reduced 100

A

A

89
Q

Which of the following commands can leak routes of Level-2 areas into Level-1 areas?
A - import is-is level-2 into level-1
B - import-route isis level-2 into level-1
C - advertise isis level- 2 into level-1
D - export isis level- 2 into level-1

A

B

90
Q

Man-in-the-middle attacks or IP/MAC spoofing attacks are common on intra nets and will cause information
leakage. Which configuration method can prevent these attacks?
A - Configure the trusted or untrusted interface.
B - Limit maximum number of MAC addresses that can be learned on a switch interface.
C - Configure DHCP snooping to check the CHADDR field carried in a DHCP Request packet.
D - Configure association between DHCP snooping and IPSG or DAI on the switch.

A

D

91
Q

In most cases, an IP address that is dynamically assigned by a DHCP server has a lease. Which of the following statements regarding the IP address lease is false?
A - The lease renewal timer is 50% of the total lease. When the lease renewal timer expires, the DHCP server must renew the IP address lease
B - The rebinding timer is 87.5 % of the total lease.
C - If the rebinding timer expires but the DHCP client does note receive any responses from the DHCP
server, the DHCP client keeps sending DHCP request packets to the DHCP server which assigned an IP address to it before until to total lease expires.
D - If the DHCP client receives a DHCP NAK packet within the lease, the client stops using the current IP
address immediately and returns to the initialisation state. The DHCP client then applies for a new IP address

A

C

92
Q

MPLS performs different actions on labels. What is the meaning of the pop action?
A - The top label removed from the MPLS label stack.
B - The top label is added to the MPLS label stack.
C - The top label is replaced with another value.
D - The top label is replaced with the label of another group.

A

A

93
Q

What happens when the topology of a network running RSTP changes?
A - Packets are flooded on the entire network
B - The aging time of MAC address entries is changed.
C - Some MAC address entries are deleted.
D - The entire MAC address table is deleted.

A

C

94
Q

In the Agile Controller’s access control scenario, which of the following statements regarding the roles of the
RADIUS server and client is true?
A - The Agile Controller integrates all functions of the RADIUS server and client
B - The Agile Controller as the RADIUS server, while the user terminal as the RADIUS client
C - The authentication device (such as a 802.1X switch) as the RADIUS server, while the user terminal as
the RADIUS client
D - The Agile Controller as the RADIUS server, while the authentication device (such as a 802.1x switch)
as the RADIUS clients.

A

D

95
Q

VXLAN users can access the Internet through VXLAN interfaces.
A - TRUE
B - FALSE

A

True

96
Q
At which layer does a packet filtering firewall check data packets?
A - Application layer
B - Physical layer
C - Network layer
D - Link Layer
A

C

97
Q

On a carrier’s MPLS VPN network, PEI and PE2 transmit data packets between VPNs. After PEI receives VPN
route 172.16.1.0/24 from a client, it converts the route into a VPNV4. When a client on PE2 accesses this route, what are the outer and inner labels in the packet transmitted over the carrier network?
A - Outer label: 1027; inner label: 1025
B - Outer label: 1025; inner label: 1025
C - Outer label: 1027; inner label: 1027
D - Outer label :1025; inner label: 1027

A

D

98
Q

Which of the flowing statements regarding Huawei eSight network management software is false?
A - Multiple users can be created for network management
B - Users may be asked to log in to eSight from specified IP addresses in specific time ranges
C - The administrator can force unauthorised login users to log out.
D - The login time of the administrator role also can be limited.

A

D

99
Q

Which of the following statements regarding the firewall zone security level is false?
A - The default security level of the new zone is 1.
B - Only the security level of the user-defined zone can be configured.
C - The configured security level cannot be changed.
D - Two zones cannot be configured with the same security level.

A

A

100
Q

In the port mirroring, real and reliable data must be collected in real time.
A - TRUE
B - FALSE

A

True