101-200 Flashcards

1
Q
Which of the following items on the packing list need to be checked during unpacking and inspection? (MC)
A - Part number
B - Part model
C - Number of parts
D - Project name
A

A B C D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The interface IP address and VRRP virtual IP address can be the same
A - TRUE
B - FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If router priority is set to 0 for a router.it is allowed to elect this router as a DR or BDR in an OSPF routing domain, but its priority is the lowest
A - TRUE
B - FALSE

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements regarding IP address allocation are true?
A - All IP addresses on a network must be unique except when any-cast is used
B - IPv4 addresses are classified into Classes A B and C
C - The mask length of /24 can simplify network design
D - Variable length subnet mask (VLSM) is often used for determining mask lengths to improve IP address
efficiency

A

A D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statements regarding different LSA types is false?
A - DD (Database Description) packets contain only LSA summary information, including LS type, LS ID, Advertising Router, and LS sequence number.
B - LS Request packets contain only LS Type ,LS ID. and
Advertising Router
C - LS Ack packets contain complete LSA information
D - LS Update packets contain complete LSA information

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The agile controller is an automated control system for network resources. It provides a unified policy engine to
realise unified access control policies within the entire organisation, and implements 5W1H-based (user identity, access time, access location, device type, device source, and access mode) authentication and authorisation.
A - TRUE
B - FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements regarding the software and configuration backup is true?
A - Backup is used to restore network function in extreme cases
B - The software version needs to be backed up multiple times for the same product and the same version
C - Licenses do not need to backed up
D - After the device configuration changes the configuration file not need to be backed up

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A DHCP server may use different address ranges to allocate IP address to clients. Which of the following
statements regarding address allocation are true? (MC)
A - IP address that is statically bound with the MAC address of a client in database of the DHCP sever
B - IP address that has been allocated to the client, that is, the IP address in the Requested IP Addr Option of the DHCP Discover packet sent by the client
C - First available IP address found by the server in the DHCP address pool
D - On the DHCP server query Expired and conflicting IP addresses, if you find an available IP address you can assign
E - IP address that once conflicts with the IP address of another client

A

A B C D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If the number of checked goods is different from the number of goods on the packing list, you can unpack and inspect goods and then contact the vendor to handle the inconsistency
A - TRUE
B - FALSE

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To improve Internet egress reliability, an enterprise uses multiple links to connect to different carrier networks.
This mode requires attention to both the links or the quality may be affected
A - TRUE
B - FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP snooping is a security feature that can be used to defend against various attacks, including
A - Starvation attacks by changing the CHADDR field value
B - Bogus DHCP server attacks
C - TCP flag attacks
D - Man-in-the-middle attacks and IP/MAC spoofing attacks

A

A B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which are the new requirements on the enterprise network stimulated by the mobility trend
A - Unified wired and wireless management
B - Consistent service experience anytime. anywhere
C - Fast deployment of mobile applications
D - Strict hierarchical networking

A

A B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The SDN controller can intelligently adjust traffic paths based on the network status, so that it can improve the entire network throughput.
A - TRUE
B - FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On a layer 2 switching network, devices forward data based on MAC addresses. Therefore, data filtering can be performed based on MAC addresses, and a firewall in transparent cannot filter out Layer 3 information in data packets.
A - TRUE
B - FALSE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the ACL configuration command acl [number] acl-number [match-order{auto|config}]
the acl-number parameter specifies an ACL number. Which of the following is the range of basic ACL numbers
A - 1000-3999
B - 2000-2999
C - 3000-3999
D - 0-1000

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?
A - After an IP packet enters an MPLS domain, the device receiving the packet queries in the FIB table first
B - The system automatically assigns an ID to the upper -layer application that uses a tunnel. This ID is also called the tunnel ID
C - If the tunnel ID. is 0x0 the MPLS forwarding process starts
D - if the tunnel ID. is not 0x0 the normal IP forwarding process starts

A

A B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When two routers establish a logical BGP peer relationship over multiple physical links the peer
connect-interface command must be used.
A - TRUE
B - FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In a complex network environment containing finance, OA, production and more service systems, which of the
following items is the first concern for troubleshooting
A - IP address assignment
B - Network device model
C - Data flow direction of each service system
D - Equipment room environment

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Which command is used to enable association between BFD and OSPF on all interfaces
A - bfd enable
B - bfd all-interface enable
C - all-interface bfd enable
D - Undo bfd all-interface disable
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following are migration difficulties?
A - Minimizing on services outage
B - Achieving optimal risk prevention
C - Formulating a complete migration solution
D - Carrying out the migration smoothly

A

A B C D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

MSTP has different port roles. Which statement are false?
A - Other ports except the edge port participate in MSTP calculation
B - A port can function as different roles in different MSTP’s
C - A regional edge port is located at the edge of an MST region and connected to ports of the other MST regions or SST’s
D - The backup port functions as the backup of the root port and provides a path from the designated bridge
to the root bridge

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Multiple BGP processes cannot be configured on the same router.
A - TRUE
B - FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BGP routers establish peer relationships using UDP
A - TRUE
B - FALSE

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which of the following LSA packets carries master/slave relationship information
A - Hello packet
B - DD packet
C - LSA Update packet
D - LSA Request packet
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

To prevent inter-area routing loops OSPF does not allow advertising routing information between two non-backbone areas and allows advertising routing information between backbone area and a non-backbone area therefore each ABR must be connected to the backbone area
A - True
B - False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following statements regarding the characteristic of HA network are true? (MC)
A - Faults cannot occur frequently
B - Faults can be recovered rapidly
C - No faults occur
D - When faults occur, services can be only restored manually

A

A B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which of the following traffic can be mirrored through port mirroring? (MC)
A - Packets received by a port
B - Packets sent by a port
C - Packets received and sent by a port
D - Packets discarded on a port
A

A B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which configuration modes are supported by VXLAN?
A - Virtualization software configuration
B - SDN controller configuration
C - SNMP configuration
D - Automatic configuration

A

A B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In most cases, a risky operation solution can be reviewed and finalized one day before implementation
A - TRUE
B - FALSE

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

For interzone packet filtering, which of following traffic is not transmitted in the outbound direction?
A - Traffic from the DMZ to the untrusted zone
B - Traffic form the trusted zone to the DMZ
C - Traffic form the trusted zone to the untrusted zone
D - Traffic form the trusted zone to the local zone

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following items is not a disadvantage of the traditional congestion avoidance mechanism (tail drop)?
A - GIobal TCP synchronization
B - High jitter and long delay
C - High cost
D - Packets are discarded without differentiating the priority

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
Which of the following tools cannot be used for route filtering?
A - policy-based-route
B - IP-prefix
C - Route-policy
D - IP community-filter
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

During follow-up operation of the structured network troubleshooting process, which of the following documents need to be transferred? (MC)
A - Troubleshooting intermediate documents
B - Troubleshooting summary report
C - Change, backup and maintenance suggestions
D - User communication plan

A

A B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
Which command is used to configure the VRRP preemption delay?
A - vrrp vrid 1 preempt-timer 20
B - vrrp vrid 1 preempt-timer delay 20
C - vrrp vrid 1 timer delay 20
D - vrrp vrid 1 preempt-delay 20
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Preferences of routing protocols determine the sequence in which a router selects a route among many routes to the same destination learned through different routing protocols
A - TRUE
B - FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

NFV and SDN depend on each other and must be used together
A - TRUE
B - FALSE

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Huawei enterprise network NMS eSight has three editions: simplified, standard and professional. Unlike the standard edition, which of the following features is provided by the professional edition?
A - Provide a database backup tool
B - Support multi-user management
C - Support management of the VLAN and MPLS VPN
D - Support hierarchical management model

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

VPN models are classified into two types. Overlay VPN and Peer-to-Peer VPN
A - TRUE
B - FALSE

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Which of the following tests is not performed in the joint software commissioning?
A - Connectivity test
B - Standalone device test
C - HA capability test
D - Service performance test sip
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
How is CAPEX defined?
A - Cost expenditure
B - Capital expenditure
C - One-time expenditure
D - Daily expenditure
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following statements regarding the device running check is true.
A - You can run the display memory-usage command to check the memory usage of the device. If the value
of Memory Using Percentage exceeds 80%, pay attention to the memory.
B - You can run the display device command to check the running status of a board. If the board is online the
value of Online should be Present
C - You can run the display fan command to check the fan status. If the value of Present is NO, the fan is in normal state
D - You can run the display ftp-server command to check FTP ports. FTP ports not in use should be recorded

A

B

42
Q

Which of the following is the purpose of access security optimization?
A - To ensure that sensitive management information will not be intercepted
B - To prevent or reduce external network attacks and harm
C - To ensure secure access to key services
D - To achieve secure user access control

A

D

43
Q
During BFD session establishment between devices, which state is not involved?
A - 2-way
B - down
C - in it
D - up
A

A

44
Q

Which of the following statements regarding the MPLS forwarding process is false?
A - If a LSP fails to forward data, the MPLS control plane responsible for ISP setup can detect this error
B - The main function of MPLS forwarding plane is to add labels or delete labels from an IP packet, and forward the received packets based on the label forwarding table. The forwarding plane is connection oriented.
C - After an IP packet enters the MPLS network, the ingress LER will analyze IP packet and add proper labels to the packet
D - MPLS can use Ping or Trace route to detect LSP errors and locate faulty nodes

A

A

45
Q

Employees in an enterprise often need to connect to the enterprise intra net for remote access when going on
business. Which of the following technologies can meet this Demand.
A - MPLS VPN
B - IPSec VPN
C - SSL VPN
D - ISDN Dial-in

A

C

46
Q

Which of the following statements regarding well-known discretionary attributes are true? (MC)
A - AII BGP routers must identify these attributes
B - These attributes must be transmitted between BGP peers
C - These attributes are not necessary to be carried in Update messages, and BGP routers can determine whether to carry them in Update messages
D - These attributes are not necessary to be transmitted between BGP peers

A

A C D

47
Q

RSTP provides multiple protection functions. For example when an edge port is configured to work in protection state, how does the edge port process the received BPDU’s
A - The edge port forwards BPDUs
B - The edge port discards BPDUS
C - The edge port is shut down
D - The edge port parses BPDUs to obtain corresponding information

A

C

48
Q

Which of the following information can be learned based on the industry background of the project?
A - Common solutions in the industry
B - Problems to resolve by the project
C - Organisational structure of customers
D - Implementation scope of the project

A

A

49
Q

Which of the following statements regarding border security optimization are true?
A - Border security optimization aims to prevent or reduce external network attacks and harms
B - The optimization position is usually located at the network edge
C - Optimization measures include attack defence technologies, packet filtering and hardware firewalls
D - Border security optimization aims to achieve secure user access control

A

A B C

50
Q

According to BGP route selection rules, the manually summarized routes generated using the aggregate command are preferred over the automatically summarised routes generated using the summary automatic command
A - TRUE
B - FALSE

A

True

51
Q
Which of the following networks are involved during construction of a large enterprise network?
A - Backbone network
B - Transport network
C - Data center network
D - Wireless network
E - Storage network
A

A C D

52
Q
Enterprise services have strict requirements for QoS in networks. Which of the following counters can be used
to indicate network QoS? (MC)
A - Stability
B - Bandwidth
C - Delay
D - Filter
E - Security
A

B C D

53
Q

Which of the following training’s are transfer-to-maintenance training’s after project delivery?
A - Networking and configuration training
B - Routine maintenance training
C - Emergency troubleshooting training
D - Management and security production training

A

A B C

54
Q

Which of the following statements regarding MPLS label encapsulation format are true? (MC)
A - The total length of an MPLS label is 4 bytes (32 bits)
B - The TTL field in an MPLS label has the same meaning as that in an IP packet and can prevent loops
C - The S field in an MPLS label has 1 bit and is used to identify whether the label is the bottom-of-stack
label. If the value is 1, the label is a penultimate-layer label.
D - For Ethernet and PPP packets, a label stack is located between the layer 2 packet header and data. If a VLAN tag is available, the label stack is placed before the VLAN tag.

A

A B

55
Q
Which of the following events represent the end of the
network planning stage?
A - Project initiation
B - Bid release
C - Contract signing
D - Preliminary project acceptance
A

B

56
Q
In a broadcast network which mechanism is used in IS-IS to ensure neighbor relationship establishment reliability?
A - Status synchronization
B - Checksum
C - Aging timer
D - Three-way handshake
A

D

57
Q

Compared with a three-layer network architecture, a two-layer network architecture has simple topology and
high data forwarding efficiency. The network architecture will transform to the two-layer architecture, and the three-layer network architecture will be gradually phased out
A - TRUE
B - FALSE

A

False

58
Q

Which of the following causes will lead a failure to establish BGP peer relationships?
A - An ACL is configured to prohibit all TCP connections between two BGP neighbor
B - Two IBGP peers are not physically directly connected
C - BGP synchronization is enabled on fully-meshed IBGP peers
D - Two BGP peers are configured with different routing Update intervals

A

A

59
Q

Which of the following causes may result in an IS-IS neighbor relationship fault
A - The devices on two ends of a link have the same system ID
B - The devices on two ends of a link have inconsistent IS-IS levels
C - When an IS-IS level-1 neighbor relationship is established, the devices on two ends of a link have
inconsistent area addresses
D - The IP addresses of interfaces on two ends of a link are on different network segments

A

A B C D

60
Q
If the dhcp client ip address is not extended after 87.5% of the lease is reached. Which packet is used by the
client to extend the ip address lease
A - DHCP Discover broadcast packet
B - DHCP Release unicast packet
C - DHCP Request broadcast packet
D - DHCP Request unicast packet
A

C

61
Q

To provide differentiated services for different users, users or services are classified based on packet
information such as the packet priority, source ip address and port number. Which QOS technologies are often used to implement classification
A - Traffic policing
B - Complex traffic classification
C - Congestion avoidance
D - Congestion management

A

B

62
Q
On the network running STP , when the network topology changes , multiple topology change notifications are sent. How many types of RSTP TC BPDU's are defined?
A- One
B - Two
C - Three
D - Four
A

A

63
Q
Multiprotocol label switching (MPLS) defined in IETF is a layer 3 switching technology and consists of different devices. Which of the following devices is responsible for adding labels or deleting labels from packets
A - Label distribution router
B - Label edge router(LER)
C - Label switching router(LSR)
D - Label transmission router
A

B

64
Q

Which of the following statements regarding router-LSA connection type is false?
A - Point-to-Point describes about the Point-to-Point connection from the local router to a neighboring router
B - TransNet describes a connection form the local router to a transit network segment
C - StubNet describes a connection form the local router to a stub network segment
D - P2MP describes connections from the local router to multiple neighboring routers

A

D

65
Q
When two BGP peers establish a TCP connection normal but their AS number and BGP versions are inconsistent, a BGP peer often sends a notification message to disconnect the TCP connection after they establish a TCP connection and exchange some information. Which message will be identified as incorrect during negotiation in the error code of the notification message?
A - Route-refresh
B - Open
C - Keepalive
D - Update
A

B

66
Q

BGP is an inter domain routing protocol, which of the following statements regarding BGP are true?
A - BGP uses a reliable transport protocol
B - BGP supports automatic neighbor discovery
C - BGP supports plaintext authentication
D - BGP supports rich routing policies

A

A D

67
Q

Which of the following statements regarding traffic policing is true? (MC)
A - Packets cannot be coloured
B - Packets can be coloured
C - The packets of which the rate is exceeded can be buffered
D - The packets of which the rate is exceeded cannot be buffered

A

B D

68
Q

Link aggregation bundles a group of physical interfaces to from a logical interface to increase the bandwidth. Link aggregation can work in manual load balancing mode and static LACP mode.
TRUE
FALSE

A

TRUE

69
Q

Which of the following statements regarding VRRP is false?
A - The Virtual Router Redundancy Protocol (VRRP) is designed for networks with multicast and broadcast
capabilities, such as Ethernet networks. VRRP ensures that the next hop router can be replaced by another router, if it fails so that uninterrupted and reliable communication is guaranteed
B - When VRRP is used, the virtual router ID and virtual IP address need to be configured on the router, the
MAC address of the master router is used, so a virtual router is added on the network
C - Hosts on the network communicate with the virtual router. There is no need to learn all information of
physical routers
D - A virtual router consists of one master router and several backup routers. The master router provides
forwarding function. When the master router fails, a backup router becomes the new master router and takes overs its work

A

B

70
Q

Which of the following causes for VRRP group flapping is the most impossible.
A - The link where VRRP advertisement packets are transmitted changes form Up to Down frequently
B - The interval for sending VRRP Advertisement packets is small
C - Association between VRRP and BFD is configured to implement a rapid master/backup switchover
D - VRRP packets are discarded randomly because congestion occurs

A

C

71
Q

Which of the following statements regarding DR/BDR are false?
A - All DR others establish neighbor relationships with DR and BDR only
B - In a broadcast network DR and BDR must be elected A broadcast network without a DR or BDR cannot operate normally
C - DR others listen on the multicast address 224.0.5.5
D - DR others listen on the network address 224.0.0.6

A

A B D

72
Q

Which of the following statements regarding the OSPF protocol is false?
A - An ABR is connected to multiple areas and maintains the same LSDB for all areas.
B - The metric of an AS-external-LSA can be specified during the import of external ROUTES and defaults to 1.
C - External ROUTING information can carry a tag, the tag information is contained in a Type 5 or Type 7 LSA.
D - The Link State ID in an ASBR-Summary-LSA is set as the ROUTER ID of this ASBR.

A

A

73
Q

Which of the following statements regarding BGP Update messages is false?
A - Generally Update messages are sent after Keepalive messages
B - Update messages are used to exchange routing information between BGP peers
C - Update messages can be used to advertise multiple reachable mutes
D - Update messages are sent in multicast mode

A

D

74
Q

Which command is used to configure association between VRRP and a physical interface?
A - vrrp vrid 1 track interface Gigabit EthernetO/O/O
B - Track vrrp vrid 1 interface Gigabit EthernetO/O/O
C - vrrp vrid 1 interface Gigabit EthernetO/O/O track
D - vrrp vrid 1 interface Gigabit EthernetO/O/O

A

A

75
Q

BGP is an enhanced distance-vector routing protocol. Which is the major reason for this?
A - BGP does not accept the routes whose AS_Path attribute contains the local AS number
B - Next hop is a well-known mandatory attribute of BGP routes
C - The AS_Path attribute records all the AS’s that a BGP route passes through on the transmission path. In route selection rules, a route with a shorter AS path is selected
D - The AS_Path attribute records all the AS’s that a BGP route passes through on the transmission path. In
route selection rules, a route with a shorter AS_Path is checked in IBGP

A

C

76
Q

Which of the following statements regarding multicast protocols is false?
A - IGMP runs between receiver hosts and multicast routers, and defines the mechanism for creating and maintaining group membership between them.
B - Distance Vector Multicast Routing Protocol (DVMRP) is a dense mode protocol it defines a route hop
count limit of 32
C - EM is a typical intra-domain multicast routing protocol and can operate in the dense mode(DM) or
sparse mode(AM)
D - MSDP can spread multicast routes across AS’s

A

D

77
Q
Which of the following command is used to configure the listening address of the SDN controller?
A - openflow listening-ip 1.1.1.1
B - sdn controller souce-address 1.1.1.1
C - controller-ip 1.1.1.1
D - sdn listening-ip 1.1.1.1
A

A

78
Q

The jitter occurs because the E2E delays of data packets in the same flow are different.
A - TRUE
B - FALSE

A

True

79
Q
Which of the following packets are transmitted in unicast mode during IP address application by the DHCP client and IP address allocation by DHCP server? (MC)
A - DHCP Offer
B - DHCP Request
C - DHCP Discover
D - DHCP ACK
A

A D

80
Q
During the structured network troubleshooting process, in which of the following phases is the fault reported or
advertised to other departments?
A - Fault identification
B - Information collection
C - Cause list
D - Troubleshooting assessment
A

A B C D

81
Q

Which are the two subfields in the port identifier of the uplink port on a non-root switch in RSTP?
A - 1-byte port priority and 1-byte port number
B - 1-byte port priority and 2-byte port number
C - 2-byte port priority and 1-byte port number
D - 2-byte port priority and 2-byte port number

A

A

82
Q

In OSPF, DR and BDR elected in a broadcast network listen on both 224.0.0.5 and 224.0.0.6.
A - TRUE
B - FALSE

A

True

83
Q

Which of the following statements regarding OSPF external route types is false?
A - OSPF includes type 1 and type 2 external routes
B - The cost of a Type 1 external route is the addition of the AS external cost and the AS internal cost (the
cost form a router to an ASBR)
C - The cost of a Type 2 external route is the AS external cost
D - A Type 2 external route is always preferred over a Type 1 external route when other when other
conditions are the same

A

D

84
Q

Which of the following statements regarding authentication in BGP configuration is true?
A - All the routers in the same AS must use the same password
B - A pair of BGP peers must use the same plaintext password
C - All BGP peers of a router must use the same password
D - A pair of BGP peers must use the same MD5 password

A

D

85
Q
For inter zone packet filtering, which traffic is belong to transmitted to outbound direction?
A - Trusted zone —> Untrusted zone
B - Untrusted zone --> Trusted zone
C - Untrusted zone --> DMZ
D - Trusted zone —> Local zone
A

A

86
Q

Which of the following statements regarding the basic concept of link aggregation is false?
A - Link aggregation bundles a group of physical interfaces together into a logical interface
to increase bandwidth and improve reliability
B - Link aggregation complies with IEEE 802.3ad
C - Link Aggregation Group (LAG), also called trunk, refers to the logical link that is formed by bundling
several physical links together
D - Link aggregation involves only the active interface

A

D

87
Q
On the USC series firewall, which zone can be deleted by the administrator?
A - Security zone
B - Trusted zone
C - Untrusted zone
D - DMZ
A

A

88
Q
Which of the following formulas is used to calculate availability?
A - MTBF/MTTR x 100%
B - MTTR/MTBF x 100%
C - (MTBF+MTTR)/MTBF x 100%
D - MTBF/(MTBF+MTTR) x 100%
A

D

89
Q

Huawei switches provide port isolation. Which of the following statements regarding port isolation is false?
A - You can configure Layer 2 and layer 3 isolation or Layer 2 isolation and Layer 3 interworking
B - Huawei switches support 64 isolation groups numbered 0 to 63
C - If interface A is isolated form interface B, packets sent from interface A cannot reach interface B but
packets sent from interface B can reach interface A.
D - FE interfaces, GE interfaces, XGE interfaces, and Eth-Trunks can be isolated from one another, but an interface cannot be isolated from itself or the management interface unidirectionally. In addition, an Eth-Trunk cannot be isolated unidirectionally from its
member interfaces

A

B

90
Q

which of the following is not the limitation of traditional networks?
A - The network protocol implementation is complex, and the O&M is difficult.
B - The traffic path cannot be adjusted flexibly
C - The upgrade of new network services is slow
D - Different vendors devices provide similar implementation, there is less difference in a operation commands, and operations are easy.

A

D

91
Q

The migration kick-off meeting is held to communicate with the customer about the project. Communication
with other involved parties is not important.
A - TRUE
B - FALSE

A

False

92
Q

Which of the following statements regarding the physical topology monitoring function of eSight are true?
A - eSight displays the layout and status of NE’s, subnets , and links on the GUI
B - eSinght supports visualized monitoring of the network-wide running status
C - eSight display the architecture of the entire network and relationship between network entities
D - The physical topology monitoring provides an entry for unified network monitoring, improving O&M
efficiency

A

A B C D

93
Q

Which of the following statements regarding ASBR Summary-LSA is false?
A - Link State ID indicates the router ID of an ASBR
B - Advertising Router indicates the router ID of an ABR
C - The Advertising Router fields in ASBR-Summary-LSAs of all areas are the same
D - Metric indicates the cost of routes form an ABR to an ASBR

A

C

94
Q

Which of the following statements regarding isolation is false?
A - Port isolation controls access between interfaces of switches
B - Port isolation prevents the computers connected to different interfaces from accessing each other
C - Port isolation can be configured based on VLANs
D - Port isolation is an isolation mechanism at the physical layer

A

C

95
Q

Which of the following statements regarding AS_Path is false?
A - AS_Path is a list of AS’s that a BGP route passes through
B - AS_Path is a very important well-known mandatory attribute in BGP
C - BGP does not accept the routes whose AS_Path attribute contains the local AS number
D - When a router has two or more routes to the same destination, the router compares the AS_Path attributes of these routes and prefer the route with the longer AS_Path attribute

A

D

96
Q
Which of the following subsystems are involved in building's cabling? (MC)
A - Horizontal subsystem
B - Access subsystem
C - Backbone subsystem
D - Vertical subsystem 
E - Switching subsystem
A

A D

97
Q

Ethernet supports broadcast. Once a network loop occurs, this simple broadcast mechanism will cause
catastrophic consequences. Which of the following symptoms may be caused by a loop? (MC)
A - Users cannot log in to the device remotely
B - The display interface coming output shows a large number of broadcast packets received on an interface
C - The CPU usage exceeds 70%
D - A lot of ICMP packets are lost in ping tests

A

A B C D

98
Q
Which of the following commands can enable IS-IS on an interface?
A - ip router isis 100
B - router isis 100
C - isis enable 100
D - route isis enable 100
A

C

99
Q

About the mentioned alarm, “OSPF/2/IFAUTFAIL(OID) [1.3.6.1.2.1.14.16.2.6]: A packet is received on a non-virtual interface from a router whose authentication key or authentication type conflicts with the local authentication key or authentication type.
(IfIpAddress=[ip-address], AddressLessIf=[interface-index], ProcessId=[process-id], RouterId=[muter-id], PacketSrc=[source-ip-address],ConfigErrorType=[error-type], PacketType=[packet-type], InstanceName=[instance-name] )” which description is wrong?
A - Incorrect interface authentication configuration
B - Inconsistent Hello intervals
C - Unmatched subnet masks
D - Inconsistent area IDs

A

A

100
Q

When two routers establish a logical BGP peer relationship over multiple physical links, the peer
connect-interface command must be used.
A - TRUE
B - FALSE

A

True