101-200 Flashcards
Which of the following items on the packing list need to be checked during unpacking and inspection? (MC) A - Part number B - Part model C - Number of parts D - Project name
A B C D
The interface IP address and VRRP virtual IP address can be the same
A - TRUE
B - FALSE
True
If router priority is set to 0 for a router.it is allowed to elect this router as a DR or BDR in an OSPF routing domain, but its priority is the lowest
A - TRUE
B - FALSE
False
Which of the following statements regarding IP address allocation are true?
A - All IP addresses on a network must be unique except when any-cast is used
B - IPv4 addresses are classified into Classes A B and C
C - The mask length of /24 can simplify network design
D - Variable length subnet mask (VLSM) is often used for determining mask lengths to improve IP address
efficiency
A D
Which of the following statements regarding different LSA types is false?
A - DD (Database Description) packets contain only LSA summary information, including LS type, LS ID, Advertising Router, and LS sequence number.
B - LS Request packets contain only LS Type ,LS ID. and
Advertising Router
C - LS Ack packets contain complete LSA information
D - LS Update packets contain complete LSA information
D
The agile controller is an automated control system for network resources. It provides a unified policy engine to
realise unified access control policies within the entire organisation, and implements 5W1H-based (user identity, access time, access location, device type, device source, and access mode) authentication and authorisation.
A - TRUE
B - FALSE
True
Which of the following statements regarding the software and configuration backup is true?
A - Backup is used to restore network function in extreme cases
B - The software version needs to be backed up multiple times for the same product and the same version
C - Licenses do not need to backed up
D - After the device configuration changes the configuration file not need to be backed up
A
A DHCP server may use different address ranges to allocate IP address to clients. Which of the following
statements regarding address allocation are true? (MC)
A - IP address that is statically bound with the MAC address of a client in database of the DHCP sever
B - IP address that has been allocated to the client, that is, the IP address in the Requested IP Addr Option of the DHCP Discover packet sent by the client
C - First available IP address found by the server in the DHCP address pool
D - On the DHCP server query Expired and conflicting IP addresses, if you find an available IP address you can assign
E - IP address that once conflicts with the IP address of another client
A B C D
If the number of checked goods is different from the number of goods on the packing list, you can unpack and inspect goods and then contact the vendor to handle the inconsistency
A - TRUE
B - FALSE
False
To improve Internet egress reliability, an enterprise uses multiple links to connect to different carrier networks.
This mode requires attention to both the links or the quality may be affected
A - TRUE
B - FALSE
True
DHCP snooping is a security feature that can be used to defend against various attacks, including
A - Starvation attacks by changing the CHADDR field value
B - Bogus DHCP server attacks
C - TCP flag attacks
D - Man-in-the-middle attacks and IP/MAC spoofing attacks
A B D
Which are the new requirements on the enterprise network stimulated by the mobility trend
A - Unified wired and wireless management
B - Consistent service experience anytime. anywhere
C - Fast deployment of mobile applications
D - Strict hierarchical networking
A B C
The SDN controller can intelligently adjust traffic paths based on the network status, so that it can improve the entire network throughput.
A - TRUE
B - FALSE
TRUE
On a layer 2 switching network, devices forward data based on MAC addresses. Therefore, data filtering can be performed based on MAC addresses, and a firewall in transparent cannot filter out Layer 3 information in data packets.
A - TRUE
B - FALSE
FALSE
In the ACL configuration command acl [number] acl-number [match-order{auto|config}]
the acl-number parameter specifies an ACL number. Which of the following is the range of basic ACL numbers
A - 1000-3999
B - 2000-2999
C - 3000-3999
D - 0-1000
B
MPLS implements data forwarding based on two different planes. Which of the following statements regarding the forwarding mechanism are correct?
A - After an IP packet enters an MPLS domain, the device receiving the packet queries in the FIB table first
B - The system automatically assigns an ID to the upper -layer application that uses a tunnel. This ID is also called the tunnel ID
C - If the tunnel ID. is 0x0 the MPLS forwarding process starts
D - if the tunnel ID. is not 0x0 the normal IP forwarding process starts
A B
When two routers establish a logical BGP peer relationship over multiple physical links the peer
connect-interface command must be used.
A - TRUE
B - FALSE
True
In a complex network environment containing finance, OA, production and more service systems, which of the
following items is the first concern for troubleshooting
A - IP address assignment
B - Network device model
C - Data flow direction of each service system
D - Equipment room environment
C
Which command is used to enable association between BFD and OSPF on all interfaces A - bfd enable B - bfd all-interface enable C - all-interface bfd enable D - Undo bfd all-interface disable
B
Which of the following are migration difficulties?
A - Minimizing on services outage
B - Achieving optimal risk prevention
C - Formulating a complete migration solution
D - Carrying out the migration smoothly
A B C D
MSTP has different port roles. Which statement are false?
A - Other ports except the edge port participate in MSTP calculation
B - A port can function as different roles in different MSTP’s
C - A regional edge port is located at the edge of an MST region and connected to ports of the other MST regions or SST’s
D - The backup port functions as the backup of the root port and provides a path from the designated bridge
to the root bridge
D
Multiple BGP processes cannot be configured on the same router.
A - TRUE
B - FALSE
True
BGP routers establish peer relationships using UDP
A - TRUE
B - FALSE
False
Which of the following LSA packets carries master/slave relationship information A - Hello packet B - DD packet C - LSA Update packet D - LSA Request packet
B
To prevent inter-area routing loops OSPF does not allow advertising routing information between two non-backbone areas and allows advertising routing information between backbone area and a non-backbone area therefore each ABR must be connected to the backbone area
A - True
B - False
True
Which of the following statements regarding the characteristic of HA network are true? (MC)
A - Faults cannot occur frequently
B - Faults can be recovered rapidly
C - No faults occur
D - When faults occur, services can be only restored manually
A B
Which of the following traffic can be mirrored through port mirroring? (MC) A - Packets received by a port B - Packets sent by a port C - Packets received and sent by a port D - Packets discarded on a port
A B C
Which configuration modes are supported by VXLAN?
A - Virtualization software configuration
B - SDN controller configuration
C - SNMP configuration
D - Automatic configuration
A B
In most cases, a risky operation solution can be reviewed and finalized one day before implementation
A - TRUE
B - FALSE
False
For interzone packet filtering, which of following traffic is not transmitted in the outbound direction?
A - Traffic from the DMZ to the untrusted zone
B - Traffic form the trusted zone to the DMZ
C - Traffic form the trusted zone to the untrusted zone
D - Traffic form the trusted zone to the local zone
D
Which of the following items is not a disadvantage of the traditional congestion avoidance mechanism (tail drop)?
A - GIobal TCP synchronization
B - High jitter and long delay
C - High cost
D - Packets are discarded without differentiating the priority
C
Which of the following tools cannot be used for route filtering? A - policy-based-route B - IP-prefix C - Route-policy D - IP community-filter
A
During follow-up operation of the structured network troubleshooting process, which of the following documents need to be transferred? (MC)
A - Troubleshooting intermediate documents
B - Troubleshooting summary report
C - Change, backup and maintenance suggestions
D - User communication plan
A B C
Which command is used to configure the VRRP preemption delay? A - vrrp vrid 1 preempt-timer 20 B - vrrp vrid 1 preempt-timer delay 20 C - vrrp vrid 1 timer delay 20 D - vrrp vrid 1 preempt-delay 20
B
Preferences of routing protocols determine the sequence in which a router selects a route among many routes to the same destination learned through different routing protocols
A - TRUE
B - FALSE
True
NFV and SDN depend on each other and must be used together
A - TRUE
B - FALSE
False
Huawei enterprise network NMS eSight has three editions: simplified, standard and professional. Unlike the standard edition, which of the following features is provided by the professional edition?
A - Provide a database backup tool
B - Support multi-user management
C - Support management of the VLAN and MPLS VPN
D - Support hierarchical management model
D
VPN models are classified into two types. Overlay VPN and Peer-to-Peer VPN
A - TRUE
B - FALSE
True
Which of the following tests is not performed in the joint software commissioning? A - Connectivity test B - Standalone device test C - HA capability test D - Service performance test sip
B
How is CAPEX defined? A - Cost expenditure B - Capital expenditure C - One-time expenditure D - Daily expenditure
B