HWE-SA Flashcards
*SA
1. Refer to the following AAA configuration on a device. Which of the following statements is true?
[R1-aaa]display this
[V200R003C00]
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user huawei password cipher %$%$m]GrHmJ1mL[7&zCh^XQBUII]%$%$
local-user huawei privilege level 0
local-user huawei service-type telnet
A. The authorization scheme is default and the authorization mode is non-authorization.
B. The huawei user can run the display current-configuration command.
C. The huawei user can log in to the device through SSH.
D. The authentication mode is local authentication.
D. The authentication mode is local authentication.
*SA
2. As shown in the following networking, the interfaces connecting R1, R2, R3, and R4 are running OSPF, and are all in area 0. On R1, a static route to the network segment 10.1.34.0/24 is configured using the ip route-static 10.1.34.0 24 10.1.13.32 command. Which of the following statements is true?
A. The routing table of R1 contains only the static route to the network segment 10.1.34.0/24.
B. The routing table of R1 contains both the static route and OSPF route to the network segment 10.1.34.0/24.
C. The routing table of R1 contains the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.12.21.
D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.
D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.
*SA
3. Which of the following is not a valid port role in RSTP?
A. Designated port
B. Backup port
C. Forwarding port
D. Root port
C. Forwarding port
*SA
4. The Network Configuration Protocol (NETCONF) provides a mechanism for managing network devices. Which of the following statements about NETCONF is false?
A. NETCONF supports trial runs and rollback in case of errors.
B. If YANG files are not integrated into a device, the device does not support NETCONF.
C. Yet Another Next Generation (YANG) is a data modeling language that standardizes NETCONF data content.
D. NETCONF messages are formatted using either JSON or XML.
D. NETCONF messages are formatted using either JSON or XML.
*SA
5. Which of the following statements about Fit AP+AC networking is true?
A. The tunnel forwarding mode can reduce the forwarding pressure on the AC.
B. The AP version can be upgraded through HTTP.
C. After a CAPWAP tunnel is established between the AC and Fit AP, keepalive packets are used to detect the status of the CAPWAP tunnel.
D. data tunnel and a control tunnel will be established between the AC and Fit AP.
D. data tunnel and a control tunnel will be established between the AC and Fit AP.
*SA
6. When a ping command is run on a network device to check the network connectivity, which type of packet will be sent by the network device?
A. UDP
B. TCP
C. IGMP
D. ICMP
D. ICMP
*SA
7. Which of the following statements about edge ports is false?
A. If an edge port receives a configuration BPDU, it becomes a common STP port.
B. In normal situations, an edge port cannot receive configuration BPDUs.
C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.
D. In most cases, edge ports are directly connected to user terminals.
C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.
*SA
8. The Versatile Routing Platform (VRP) uses the file system to manage files and directories on a device. Which of the following commands can be used to check the current directory of a device?
A. display dir
B. dir
C. pwd
D. Is
C. pwd
*SA
9. Which of the following is not a method for an AP to discover an AC address?
A. Broadcast
B. DHCP
C. Static configuration
D. OSPF
E. DNS
D. OSPF
*SA
10. OSPF is configured on RTA, RTB, and RTC. GigabitEthernet 0/0/0 interfaces of these routers belong to area 0 and the network types of these interfaces are broadcast. The router ID of RTA is 1.1.1.1, and the DR priority of GigabitEthernet 0/0/0 on RTA is set to 0. The router ID of RTB is 2.2.2.2, and the DR priority of GigabitEthernet 0/0/0 on RTB is set to 255. The router ID of RTC is 3.3.3.3, and the DR priority of GigabitEthernet 0/0/0 on RTC is the default value. Which of the following statements is true about the DR and BDR on the network?
A. RTB functions as the DR, and RTC as the BDR.
B. RTC functions as the DR, and RTB as the BDR.
C. RTA functions as the DR, and RTB as the BDR.
D. RTB functions as the DR, and RTA as the BDR.
A. RTB functions as the DR, and RTC as the BDR.
SA
11, SNMP is used to manage network devices. Refer to the following SNMP configuration on a Huawei device. Which of the following statements is false?
[-HUAWEI] display current-configuration | include snmp
snmp-agent
snmp-agent local-engineid 800007DB03001974593301 snmp-agent sys-info version v3
snmp-agent mib-view included iso-view iso
snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view iso-view
snmp-agent usm-user v3 v3user
snmp-agent usm-user v3 v3user group v3group
snmp-agent usm-user v3 v3user authentication-mode sha cipher %^%#&Ygn:NzQw;d>f=2+aJ;;=B\M^”P1Hf/{L$F9UW@%^%# snmp-agent usm-user v3 v3user privacy-mode aes256 cipher %^%#Gc!FAB;vL5_[a#9q9i7:lj;q#<P8MOf8@PJMJ0%^% #
A. SNMPv3 is configured.
B. The v3user user can access nodes in the subtree with iso as the root node.
C. The encryption mode of the v3user user is SHA.
D. SNMP packets will be encrypted using AES256.
C. The encryption mode of the v3user user is SHA.
*SA
12. Mastering the basic operations of the file system is crucial for network engineers to efficiently manage the configuration files and VRP system files of devices. Which of the following statements is true about these files?
A. patch file is a type of software compatible with the system software. The common file name extension is .zip.
B. configuration file stores configuration commands. The common file name extension is .cc.
C. PAF file effectively controls product features and resources. The common file name extension is .bin.
D. System software is mandatory for device startup and running. The common file name extension is .cfg.
C. PAF file effectively controls product features and resources. The common file name extension is .bin.
*SA
13. What is the valid VLAN ID range?
A. 1 to 4095
B. 0 to 4094
C. 1 to 4094
D. 0 to 4095
C. 1 to 4094
*SA
14. Refer to the following ACL configuration on a device. Which of the following statements is true?
time-range satime 08:00 to 17:30 working-day
acl number 3002
rule 5 permit ip source 10.164.2.0 0.0.0.255 destination 10.164.9.9 0.0.0.255 time-range satime
A. This ACL is a user ACL according to the ACL classification rules.
B. The ACL rule takes effect only on working days.
C. This ACL is a basic ACL according to the ACL classification rules.
D. All packets with the source IP addresses on the network segment 10.164.2.0/24 will be permitted by the device.
B. The ACL rule takes effect only on working days.
*SA
15. Which of the following states indicates that the neighbor relationship is stable between OSPF-enabled DR-other routers on a broadcast network?
A. Full
B. Loading
C. Down
D. Two-way
D. Two-way
*SA
16. A WLAN is constructed using wireless technologies. Which of the following statements about the WLAN networking is false?
A. basic service set (BSS) indicates an area covered by an AP.
B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.
C. The basic service set identifier (BSSID) identifies a wireless network and is represented using the MAC address of an AP.
D. The service set identifier (SSID) identifies a wireless network and is represented using a character string.
B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.
*SA
17. In the same Ethernet network segment, five routers are running OSPF for interconnection. When the protocol status of all routers is stable, which of the following statements is true?
A. The neighbor status of all routers is Full.
B. The neighbor status of a router on the network can only be Full or 2-way.
C. There are routers of which all neighbor relationships are in 2-way state on the network.
D. The neighbor relationship between a DR router and another router can be Full or 2-way.
B. The neighbor status of a router on the network can only be Full or 2-way.
*SA
18. What is the network ID for the IP address 192.168.1.1/29?
A. 192.168.1.0
B. 192.168.1.255
C. 192.168.1.4
D. 192.168.1.7
A. 192.168.1.0
*SA
19. Python can be used to implement automatic network deployment, operation, and maintenance, reducing the dependence on human resources. This resolves the problems with traditional network O&M. Which of the following statements about Python is false?
A. Two forward slashes (//) can be used to mark a single-line comment.
B. When a method is defined in a class, the method must carry a self keyword.
C. class is a collection of objects with the same attributes and methods.
D. module is a saved Python file and usually does not have a main function.
A. Two forward slashes (//) can be used to mark a single-line comment.
*SA
20. Refer to the following configuration on a Huawei router.
<huawei>system-view
[huawei]user-interface maximum-vty 7
Which of the following statements is true?
A. The router allows a maximum of seven users to log in concurrently through the console port.
B. The router allows a maximum of seven users to log in concurrently through Telnet.
C. The router allows a maximum of seven users to log in concurrently through the asynchronous serial port.
D. If a user forgets the system login password, the user will be locked out after seven consecutive failed login attempts.
</huawei>
B. The router allows a maximum of seven users to log in concurrently through Telnet.
*SA
21. Which is the most widely used VLAN assignment method?
A. Interface-based VLAN assignment
B. Protocol-based VLAN assignment
C. MAC address-based VLAN assignment
D. IP subnet-based VLAN assignment
A. Interface-based VLAN assignment
*SA
22. A router has the following four specific routes:
ip route-static 10.1.20.0 24 12.1.1.2 ip route-static 10.1.21.0 24 12.1.1.2 ip route-static 10.1.22.0 24 12.11.2
ip route-static 10.1.23.0 24 12.1.1.2
To summarize these specific routes, which of the following commands should be run?
A. ip route-static 10.1.20.0 22 12.1.1.2
B. ip route-static 10.1.0.0 16 12.1.1.2
C. ip route-static 10.1.20.0 23 12.1.1.2
D. ip route-static 10.1.16.0 21 12.1.1.2
A. ip route-static 10.1.20.0 22 12.1.1.2
*SA
23. An AC manages and controls APs in a centralized manner through CAPWAP tunnels. An AP sends a Discovery Request packet to find an available AC. Which of the following methods cannot be used by an AP to discover an AC?
A. DHCP
B. DNS
C. Multicast
D. Static configuration (manually specifying an AC)
C. Multicast
- In which of the following modes are DHCP Discover messages sent?
A. Broadcast
B. Unicast
C. Anycast
D. Multicast
A. Broadcast
*SA
25. The following shows partial OSPF neighbor information for a specific router: OSPF Process 1 with Router ID 10.1.1.3
Neighbors
Area 0.0.0.0 interface 10.1.1.3(GigabitEthernet0/0/0)’s neighbors
Router ID: 10.1.1.1 Address: 10.1.1.1
State: Full Mode:Nbr is Slave Priority: 1
DR: 10.1.1.5 BDR: 10.1.1.1 MTU: 0
Dead timer due in 35 sec
Retrans timer interval: 5
Neighbor is up for 00:02:01
Authentication Sequence: [0]
Which of the following statements is false?
A. The router is a DR-other router.
B. The router is the slave router in the master-slave relationship.
O C. The router ID of the OSPF process on the router is 10.1.1.3.
D. The preceding information is about the neighbor relationship of the router and BDR router.
B. The router is the slave router in the master-slave relationship.
*SA
26. Which of the following statements is false about Control and Provisioning of Wireless Access Points (CAPWAP)?
A. CAPWAP is used to maintain the connectivity between APs and an AC.
B. CAPWAP transmits two types of messages at the transport layer: service data traffic and management traffic.
C. When tunnel forwarding is used, an AP exchanges data with an AC through a CAPWAP tunnel.
D. CAPWAP is an application layer protocol based on TCP.
D. CAPWAP is an application layer protocol based on TCP.
*SA
27, Dynamic routing protocols can be classified into Interior Gateway Protocol (IGP) and Exterior Gateway Protocol (EGP) according to their working area. Which of the following protocols is an EGP?
A. RIP
B. IS-IS
C. OSPF
D. BGP
D. BGP
*SA
28. An IPv6 address is 128 bits long. Typically, an IPv6 address is represented by eight groups of 16-bit hexadecimal values separated by colons (:). Which of the following statements about IPv6 addresses is false?
A. The IPv6 address with the prefix FE80::/10 is a link-local address (LLA).
B. There may be ULA conflicts in a global scope.
C. global unicast address (GUA) is globally unique.
D. Each IPv6 interface must have a unique local address (ULA).
D. Each IPv6 interface must have a unique local address (ULA).
*SA
29, IPv6 addresses can be classified into three types based on IPv6 address prefixes. Which of the following is not an IPv6 address type?
A. Anycast address
B. Multicast address
C. Unicast address
D. Broadcast address
D. Broadcast address
*SA
30, OSPF authentication enables a device to encrypt OSPF packets by adding an authentication field to the packets, ensuring network security. Which of the following statements about OSPF authentication is false?
A. Area authentication applies to the packets received on all the interfaces in a specific area.
B. OSPF authentication is classified into area authentication and interface authentication.
C. The authentication modes of two OSPF neighbors must be the same, that is, both of them either use interface authentication or use area authentication.
D. Interface authentication is configured in the interface view and applies to all the packets received on the interface.
C. The authentication modes of two OSPF neighbors must be the same, that is, both of them either use interface authentication or use area authentication.
*SA-B
1. Refer to the following AAA configuration on a device. Which of the following statements is true?
[R1-aaa]display this
[V200R003C00]
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user huawei password cipher %$%$m]GrHmJ1mL[7&zCh^XQBUII]%$%$
local-user huawei privilege level 0
local-user huawei service-type telnet
A. The authorization scheme is default and the authorization mode is non-authorization.
B. The huawei user can run the display current-configuration command.
C. The huawei user can log in to the device through SSH.
D. The authentication mode is local authentication.
D. The authentication mode is local authentication.
*SA-B
2. As shown in the following networking, the interfaces connecting R1, R2, R3, and R4 are running OSPF, and are all in area 0. On R1, a static route to the network segment 10.1.34.0/24 is configured using the ip route-static 10.1.34.0 24 10.1.13.32 command. Which of the following statements is true?
A. The routing table of R1 contains only the static route to the network segment 10.1.34.0/24.
B. The routing table of R1 contains both the static route and OSPF route to the network segment 10.1.34.0/24.
C. The routing table of R1 contains the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.12.21.
D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.
D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.
*SA-B
3. Which of the following is not a valid port role in RSTP?
A. Designated port
B. Backup port
C. Forwarding port
D. Root port
C. Forwarding port
*SA-B
4. The Network Configuration Protocol (NETCONF) provides a mechanism for managing network devices. Which of the following statements about NETCONF is false?
A. NETCONF supports trial runs and rollback in case of errors.
B. If YANG files are not integrated into a device, the device does not support NETCONF.
C. Yet Another Next Generation (YANG) is a data modeling language that standardizes NETCONF data content.
D. NETCONF messages are formatted using either JSON or XML.
D. NETCONF messages are formatted using either JSON or XML.
*SA-B
5. Which of the following statements about Fit AP+AC networking is true?
A. The tunnel forwarding mode can reduce the forwarding pressure on the AC.
B. The AP version can be upgraded through HTTP.
C. After a CAPWAP tunnel is established between the AC and Fit AP, keepalive packets are used to detect the status of the CAPWAP tunnel.
D. data tunnel and a control tunnel will be established between the AC and Fit AP.
D. data tunnel and a control tunnel will be established between the AC and Fit AP.
*SA-B
6. When a ping command is run on a network device to check the network connectivity, which type of packet will be sent by the network device?
A. UDP
B. TCP
C. IGMP
D. ICMP
D. ICMP
*SA-B
7. Which of the following statements about edge ports is false?
A. If an edge port receives a configuration BPDU, it becomes a common STP port.
B. In normal situations, an edge port cannot receive configuration BPDUs.
C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.
D. In most cases, edge ports are directly connected to user terminals.
C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.
*SA-B
8. The Versatile Routing Platform (VRP) uses the file system to manage files and directories on a device. Which of the following commands can be used to check the current directory of a device?
A. display dir
B. dir
C. pwd
D. Is
C. pwd
*SA-B
9. Which of the following is not a method for an AP to discover an AC address?
A. Broadcast
B. DHCP
C. Static configuration
D. OSPF
E. DNS
D. OSPF
*SA-B
10, OSPF is configured on RTA, RTB, and RTC. GigabitEthernet 0/0/0 interfaces of these routers belong to area 0 and the network types of these interfaces are broadcast. The router ID of RTA is 1.1.1.1, and the DR priority of GigabitEthernet 0/0/0 on RTA is set to 0. The router ID of RTB is 2.2.2.2, and the DR priority of GigabitEthernet 0/0/0 on RTB is set to 255. The router ID of RTC is 3.3.3.3, and the DR priority of GigabitEthernet 0/0/0 on RTC is the default value. Which of the following statements is true about the DR and BDR on the network?
A. RTB functions as the DR, and RTC as the BDR.
B. RTC functions as the DR, and RTB as the BDR.
C. RTA functions as the DR, and RTB as the BDR.
D. RTB functions as the DR, and RTA as the BDR.
A. RTB functions as the DR, and RTC as the BDR.
SA-B
11, SNMP is used to manage network devices. Refer to the following SNMP configuration on a Huawei device. Which of the following statements is false? [-HUAWEI] display current-configuration | include snmp
snmp-agent
snmp-agent local-engineid 800007DB03001974593301 snmp-agent sys-info version v3
snmp-agent mib-view included iso-view iso
snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view iso-view
snmp-agent usm-user v3 v3user
snmp-agent usm-user v3 v3user group v3group
snmp-agent usm-user v3 v3user authentication-mode sha cipher %^%#&Ygn:NzQw;d>f=2+aJ;;=B\M^”P1Hf/{L$F9UW@%^%# snmp-agent usm-user v3 v3user privacy-mode aes256 cipher %^%#Gc!FAB;vL5_[a#9q9i7:*lj;q#<P8MOf8@PJMJ0%^% #
A. SNMPv3 is configured.
B. The v3user user can access nodes in the subtree with iso as the root node.
C. The encryption mode of the v3user user is SHA.
D. SNMP packets will be encrypted using AES256.
C. The encryption mode of the v3user user is SHA.
*SA-B
12. Mastering the basic operations of the file system is crucial for network engineers to efficiently manage the configuration files and VRP system files of devices. Which of the following statements is true about these files?
A. patch file is a type of software compatible with the system software. The common file name extension is .zip.
B. configuration file stores configuration commands. The common file name extension is .cc.
C. PAF file effectively controls product features and resources. The common file name extension is .bin.
D. System software is mandatory for device startup and running. The common file name extension is .cfg.
C. PAF file effectively controls product features and resources. The common file name extension is .bin.
*SA-B
13. What is the valid VLAN ID range?
A. 1 to 4095
B. 0 to 4094
C. 1 to 4094
D. 0 to 4095
C. 1 to 4094
*SA-B
14. Refer to the following ACL configuration on a device. Which of the following statements is true?
time-range satime 08:00 to 17:30 working-day
acl number 3002
rule 5 permit ip source 10.164.2.0 0.0.0.255 destination 10.164.9.9 0.0.0.255 time-range satime
A. This ACL is a user ACL according to the ACL classification rules.
B. The ACL rule takes effect only on working days.
C. This ACL is a basic ACL according to the ACL classification rules.
D. All packets with the source IP addresses on the network segment 10.164.2.0/24 will be permitted by the device.
B. The ACL rule takes effect only on working days.
*SA-B
15. Which of the following states indicates that the neighbor relationship is stable between OSPF-enabled DR-other routers on a broadcast network?
A. Full
B. Loading
C. Down
D. Two-way
D. Two-way
*SA-B
16. A WLAN is constructed using wireless technologies. Which of the following statements about the WLAN networking is false?
A. basic service set (BSS) indicates an area covered by an AP.
B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.
C. The basic service set identifier (BSSID) identifies a wireless network and is represented using the MAC address of an AP.
D. The service set identifier (SSID) identifies a wireless network and is represented using a character string.
B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.
*SA-B
17. In the same Ethernet network segment, five routers are running OSPF for interconnection. When the protocol status of all routers is stable, which of the following statements is true?
A. The neighbor status of all routers is Full.
B. The neighbor status of a router on the network can only be Full or 2-way.
C. There are routers of which all neighbor relationships are in 2-way state on the network.
D. The neighbor relationship between a DR router and another router can be Full or 2-way.
B. The neighbor status of a router on the network can only be Full or 2-way.
*SA-B
18. What is the network ID for the IP address 192.168.1.1/29?
A. 192.168.1.0
B. 192.168.1.255
C. 192.168.1.4
D. 192.168.1.7
A. 192.168.1.0
*SA-B
19. Python can be used to implement automatic network deployment, operation, and maintenance, reducing the dependence on human resources. This resolves the problems with traditional network O&M. Which of the following statements about Python is false?
A. Two forward slashes (//) can be used to mark a single-line comment.
B. When a method is defined in a class, the method must carry a self keyword.
C. class is a collection of objects with the same attributes and methods.
D. module is a saved Python file and usually does not have a main function.
A. Two forward slashes (//) can be used to mark a single-line comment.
*SA-B
20. Refer to the following configuration on a Huawei router.
<huawei>system-view
[huawei]user-interface maximum-vty 7
Which of the following statements is true?
A. The router allows a maximum of seven users to log in concurrently through the console port.
B. The router allows a maximum of seven users to log in concurrently through Telnet.
C. The router allows a maximum of seven users to log in concurrently through the asynchronous serial port.
D. If a user forgets the system login password, the user will be locked out after seven consecutive failed login attempts.
</huawei>
B. The router allows a maximum of seven users to log in concurrently through Telnet.
*SA-B
21. Which is the most widely used VLAN assignment method?
A. Interface-based VLAN assignment
B. Protocol-based VLAN assignment
C. MAC address-based VLAN assignment
D. IP subnet-based VLAN assignment
A. Interface-based VLAN assignment
*SA-B
22. A router has the following four specific routes:
ip route-static 10.1.20.0 24 12.1.1.2 ip route-static 10.1.21.0 24 12.1.1.2 ip route-static 10.1.22.0 24 12.11.2
ip route-static 10.1.23.0 24 12.1.1.2
To summarize these specific routes, which of the following commands should be run?
A. ip route-static 10.1.20.0 22 12.1.1.2
B. ip route-static 10.1.0.0 16 12.1.1.2
C. ip route-static 10.1.20.0 23 12.1.1.2
OD. ip route-static 10.1.16.0 21 12.1.1.2
A. ip route-static 10.1.20.0 22 12.1.1.2
*SA-B
23. An AC manages and controls APs in a centralized manner through CAPWAP tunnels. An AP sends a Discovery Request packet to find an available AC. Which of the following methods cannot be used by an AP to discover an AC?
A. DHCP
B. DNS
C. Multicast
D. Static configuration (manually specifying an AC)
C. Multicast
*SA-B
24. In which of the following modes are DHCP Discover messages sent?
A. Broadcast
B. Unicast
C. Anycast
D. Multicast
A. Broadcast
*SA-B
25. The following shows partial OSPF neighbor information for a specific router:
OSPF Process 1 with Router ID 10.1.1.3
Neighbors
Area 0.0.0.0 interface 10.1.1.3(GigabitEthernet0/0/0)’s neighbors
Router ID: 10.1.1.1 Address: 10.1.1.1
State: Full Mode:Nbr is Slave Priority: 1
DR: 10.1.1.5 BDR: 10.1.1.1 MTU: 0
Dead timer due in 35 sec
Retrans timer interval: 5
Neighbor is up for 00:02:01
Authentication Sequence: [0]
Which of the following statements is false?
A. The router is a DR-other router.
B. The router is the slave router in the master-slave relationship.
C. The router ID of the OSPF process on the router is 10.1.1.3.
D. The preceding information is about the neighbor relationship of the router and BDR router.
B. The router is the slave router in the master-slave relationship.
*SA-B
26. Which of the following statements is false about Control and Provisioning of Wireless Access Points (CAPWAP)?
A. CAPWAP is used to maintain the connectivity between APs and an AC.
B. CAPWAP transmits two types of messages at the transport layer: service data traffic and management traffic.
C. When tunnel forwarding is used, an AP exchanges data with an AC through a CAPWAP tunnel.
D. CAPWAP is an application layer protocol based on TCP.
D. CAPWAP is an application layer protocol based on TCP.
*SA-B
27, Dynamic routing protocols can be classified into Interior Gateway Protocol (IGP) and Exterior Gateway Protocol (EGP) according to their working area. Which of the following protocols is an EGP?
A. RIP
B. IS-IS
C. OSPF
D. BGP
D. BGP
*SA-B
28. An IPv6 address is 128 bits long. Typically, an IPv6 address is represented by eight groups of 16-bit hexadecimal values separated by colons (:). Which of the following statements about IPv6 addresses is false?
A. The IPv6 address with the prefix FE80::/10 is a link-local address (LLA).
B. There may be ULA conflicts in a global scope.
C. global unicast address (GUA) is globally unique.
D. Each IPv6 interface must have a unique local address (ULA).
D. Each IPv6 interface must have a unique local address (ULA).
*SA-B
29, IPv6 addresses can be classified into three types based on IPv6 address prefixes. Which of the following is not an IPv6 address type?
A. Anycast address
B. Multicast address
C. Unicast address
D. Broadcast address
D. Broadcast address
*SA-B
30, OSPF authentication enables a device to encrypt OSPF packets by adding an authentication field to the packets, ensuring network security. Which of the following statements about OSPF authentication is false?
A. Area authentication applies to the packets received on all the interfaces in a specific area.
B. OSPF authentication is classified into area authentication and interface authentication.
C. The authentication modes of two OSPF neighbors must be the same, that is, both of them either use interface authentication or use area authentication.
D. Interface authentication is configured in the interface view and applies to all the packets received on the interface.
C. The authentication modes of two OSPF neighbors must be the same, that is, both of them either use interface authentication or use area authentication.
*SA-C
1. Two authentication domains “Area1” and “Area 2” are configured on a router acting as an
authentication server. If the user authenticates with the correct user name “huawei” and
password “hello”, this user will be assigned In which authentication domain?
A. Authentication domain “Area 1”
B. Authentication domain “default domain”
C. Authentication domain “default_admin domain”
D. Authentication domain “Area2”
B. Authentication domain “default domain”
*SA-C
2. A company has 50 private IP addresses. The administrator uses NAT technology to connect
the company’s network to the public network, but the company has only one public network
address and is not fixed. Which of the following NAT conversion methods meets the needs?
A. easy-ip
B. NAPT
C. Static NAT
D.Basic NAT
A. easy-ip
*SA-C
4. <huawei>system-view
[huawei]command-privilege level 3 view user save
The correct statement about the above configuration command is:</huawei>
A. Modify the user’s authority level to 3, and save the configuration
B. Modify the permission level of the user view command to 3, and save the configuration
C. Modify the authority level of the save command used by a user to 3
D. Modify the permission level of the save command in the user view to 3
D. Modify the permission level of the save command in the user view to 3
*SA-C
5. By default, what is the STP Forward Delay time in seconds?
A.5
B.10
C.15
D.20
C.15
*SA-C
QUESTION NO: 6
Which field of the ipv6 packet header can be used for QoS?
A.Traffic Class
B.Payload Length
C.Version
D.Next Header
A.Traffic Class
*SA-C
QUESTION NO: 7
Complete the ACL configuration shown in the figure on the router RTA, which of the following
description is correct?
A. The VRP system will not adjust the sequence number, but will first match the rule permit
source 20.1.1.0 0.0.0.255
B. Configuration error, the sequence number of the rules must be configured from small to
large
C. The VRP system will adjust the sequence number of the first rule to 5 according to the
configuration sequence
D. The VRP system will first match the rule by numbering in sequence deny source 20.1.1.0
0.0.0.255
D. The VRP system will first match the rule by numbering in sequence deny source 20.1.1.0
0.0.0.255
*SA-C
QUESTION NO: 12
The network shown in the figure below. The administrator hopes that RTA uses static routing,
and preferentially sends data packets to RTB ‘s Loopback0 interface through G0/0/1 por,
while G0/0/2 serves as a backup. So how to configure on RTA to achieve this requirement?
A.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 ip route-static 10.0.2.2 255.255.255.255
10.0.21.2 preference 40
B.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 preference 70 ip route-static 10.0.2.2
255.255.255.25510.0.21.2
C.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 ip route-static 10.0.2.2 255.255.255.255
10.0.21.2
D.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 ip route-static 10.0.2.2 255.255.255.255
10.0.21.2 preference 70
D.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 ip route-static 10.0.2.2 255.255.255.255
10.0.21.2 preference 70
*SA-C
As shown in the figure, the switch runs STP with default parameters, which of the following
ports will be elected as the designated port?
A. G0/0/1 port of switch A
B. Port G0/0/2 of switch A
C. HUB’s G0/0/1 port
D. HUB’s G0/0/2 port
A. G0/0/1 port of switch A
*SA-C
QUESTION NO: 16
In order to distinguish different users and provide different network services on the AP. Which
of the following can be configured?
A.VT
B.VAP
C.VAC
D. WAP
A.VT
*SA-C
QUESTION NO: 19
Which statement about OSPF protocol DR is correct?
A. DR must be the highest priority device in the network
B. Router ID, the larger the value, the more preferred to be elected as DR
C. DR election is preemptive
D. An interface priority is 0, then the interface cannot be a DR
D. An interface priority is 0, then the interface cannot be a DR
*SA-C
QUESTION NO: 22
On the VRP platform, which of the following methods can be used to access the previous
history commands?
A. Ctr1+U
B. Ctr1+P
C. Left cursor
D. Up cursor
D. Up cursor
*SA-C
QUESTION NO: 23
The information shown in the figure is the port status information displayed on a switch
running STP. According to this information, which of the following description is wrong?
A. The priority of this switch is 0
B. This network may only contain this switch
C. This switch may be connected to six other switches
D. This switch is the root switch in the network
A. The priority of this switch is 0
*SA-C
QUESTION NO: 24
Which of the following description about the Layer 2 Ethernet switch is incorrect?
A. It is necessary to make certain modifications to the layer 3 header of the forwarded
message, and then forward it
B. Able to learn MAC address
C. Forward according to the Layer 2 header information of the Ethernet frame
D. Layer 2 Ethernet switches work at the data link layer
A. It is necessary to make certain modifications to the layer 3 header of the forwarded
*SA-C
QUESTION NO: 25
In which view can the administrator modify the device name for the router?
A.User-view
B.Protocol-view
C.System-view
D.Interface-view
C.System-view
*SA-C
QUESTION NO: 26
The Layer 2 Ethernet switch generates entries in the MAC address table according to the ( )
of the Ethernet frame received by the port.
A. Source IP address
B. Source MAC address
C. Destination MAC address
D. Destination IP address
B. Source MAC address
*SA-C
QUESTION NO: 27
What kind of message does the OSPF protocol use to confirm the received LSU message?
A.LSU
B.LSR
C.LSACK
D.LSA
C.LSACK
*SA-C
QUESTION NO: 30
When the IPv4 protocol is used as the network layer protocol, which field is not included in
the network layer header?
A. Source IPv4 address
B. Sequence number
C. Destination IPv4 address
D. TTL
B. Sequence number
*SA-C
QUESTION NO: 31
On the VRP platform, what is the role of the command “interface vlanit <vlan-id>" ?</vlan-id>
A. Create a VLAN
B. No such command
C. Create or enter VLAN virtual interface view
D. Configure VLAN for a port
C. Create or enter VLAN virtual interface view
*SA-C
QUESTION NO: 38
Which of the following statement about the TTL field in the IP packet header is correct?
A. TTL defines the time interval at which the source host can send data packets
B. TTL defines the number of packets that the source host can send
C. Every time an IP packet passes through a router, its TTL value will be reduced by 1
D. Each time an IP packet passes through a router, its TTL value will be increased by 1
C. Every time an IP packet passes through a router, its TTL value will be reduced by 1
*SA-C
QUESTION NO: 39
How many types of data flows with different service levels can be marked based on MPLS
labels?
A.4
B.2
C.16
D.8
D.8
*SA-C
QUESTION NO: 40
Which of the following statements about the edge port in the RSTP protocol is correct?
A. The edge port discards the received configuration BPDU packet
B. The edge port can be directly transferred from Disable to Forwarding state
C. Edge port participates in RSTP operation
D. The interconnection ports between switches need to be set as edge ports
B. The edge port can be directly transferred from Disable to Forwarding state
*SA-C
QUESTION NO: 42
Which of the following statement about static routing in Huawei equipment is wrong?
A. The cost value (Cost) of the static route cannot be modified.
B. The default value of the static route priority is 60
C. The range of the static route priority value is 1-255
D. When the priority of the static route is 0, the route will definitely be preferred.
C. The range of the static route priority value is 1-255
*SA-C
QUESTION NO: 43
By default, network devices running SNMPv2c protocol use which of the following port
numbers to send trap messages to the network management system?
A.6
B.161
C.17
D.162
D.162
*SA-C
QUESTION NO: 44
As shown in the figure below, which of the following statement is correct?
A. Host A can ping host B
B. Only when the masks of host A and host B are set to always, host A and host B can
communicate
C. The broadcast address of host A and host B are the same
D. The IP address masks of host A and host B are different, so host A and host B cannot communicate
D. The IP address masks of host A and host B are different, so host A and host B cannot communicate
*SA-C
QUESTION NO: 47
As shown in the figure, if host A and host B want to achieve inter-VLAN communication
through single-arm routing, which configuration should be done under the G0/0/1.1 interface
of RTA?
IT Certification Guaranteed, The Easy Way!
13
A.dot1q termination vid 30
B.dot1q termination vid 20
C.dot1q termination vid 10
D.dot1q termination vid 40
C.dot1q termination vid 10
*SA-C
QUESTION NO: 48
What is the number range of the Layer 2 ACL?
A.2000-2999
B.3000-3999
C.4000 ~ 4999
D.6000 ~ 6031
C.4000 ~ 4999
*SA-C
QUESTION NO: 49
What is the coverage area of an AP in WLAN?
A. BSS
B. SSID
C. BSSID
D.ESS
B. SSID
*SA-C
QUESTION NO: 50
What is the first operation performed by the FIT AP after obtaining the AC’s IP address?
A. Upgrade software version
B. Download the configuration file
C. Establish CAPWAP tunnel
D. Request configuration file
C. Establish CAPWAP tunnel
*SA-C
QUESTION NO: 51
Which of the following statements about direct routing is correct?
A. Direct routing requires the administrator to manually configure the destination network and
the next-hop address
B. Direct route has lower priority than static route
C. Direct route priority is lower than dynamic route
D. Direct routing has the highest priority
D. Direct routing has the highest priority
*SA-C
QUESTION NO: 52
Which field is added to the IPv6 packet header than the IPv4 packet header?
A.Destination Address
B.Flow Label
C.Version
D.Source Address
B.Flow Label
*SA-C
QUESTION NO: 54
What is the destination IP address of the DHCP DISCOER message?
A.127.0.0.1
B.224.0.0.1
C.224.0.0.2
D.255.255.255.255
D.255.255.255.255
*SA-C
QUESTION NO: 55
What is the port number used by the FTP protocol control plane?
A.23
B.24
C.21
D.22
C.21
*SA-C
QUESTION NO: 56
The administrator plans to implement route backup by configuring static floating routes, what
is the correct way to achieve this?
A. The administrator needs to configure different metric values for the main static route and the standby static route
B. The administrator needs to configure different TAGs for the main static route and the standby static route
C. The administrator only needs to configure two static routes
D. The administrator needs to configure different protocol priority values for the main static route and the standby static route
D. The administrator needs to configure different protocol priority values for the main static route and the standby static route
*SA-C
QUESTION NO: 57
What are the characteristics of VLAN based on port?
A. Add VLAN tags to the data frame according to the IP address carried in the message
B. Assign VLAN ID according to the protocol type and encapsulation format of the data frame
C. No need to reconfigure VLAN when the host moves
D. The host mobile location needs to be reconfigured VLAN
D. The host mobile location needs to be reconfigured VLAN
*SA-C
QUESTION NO: 60
What is the main function of the dynamic routing protocol?
A. Manage routers
B. Generate IP address
C. Dynamically generate routing entries
D. Control router interface status
C. Dynamically generate routing entries
*SA-C
QUESTION NO: 61
In which working state of the STP protocol can the port be changed to the Forwarding state
without going through other states?
A. Blocking
B. Learning
C. Listening
D. Disabled
B. Learning
*SA-C
QUESTION NO: 63
Which type of message is used by network devices running SNMPv 1 protocol to actively
send alarm information?
A. Trap
B. Response
C.Get Request
D. Get-Next Request
A. Trap
*SA-C
QUESTION NO: 64
The MAC address table of a certain switch is shown in the figure. If the switch receives a
data frame with a destination MIAC of 5489-9885-18a8 from port Eth0/0/2, which of the
following statements is correct?
A. Forward this data frame from Eth0/0/1 port
B. Flood this data frame
C. Discard this data frame
D. Forward this data frame from the Eth0/0/2 port
D. Forward this data frame from the Eth0/0/2 port
*SA-C
QUESTION NO: 65
As shown in the information in the figure, when learning this switch needs to forward the
frame with the destination MAC address of 5489-98ec-f011, which of the following description
is correct?
A. The switch will flood the frame on all ports except the port that received the frame
B. The switch will send a message that the destination is unreachable to the source device
C. The switch does not find a matching entry in the MAC address table, so it will discard the
frame
D. The switch needs to send a request to discover the device with the MAC address of 5489
98ec-f011
A. The switch will flood the frame on all ports except the port that received the frame
*SA-C
QUESTION NO: 67
In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?
A.8192 00-01-02-03-04-CC
B.4096 00-01-02-03-04-CC
C.0 00-01-02-03-04-CC
D.2048 00-01-02-03-04-CC
D.2048 00-01-02-03-04-CC
*SA-C
QUESTION NO: 68
Which of the following OSPF protocol packets can ensure the reliability of LSA updates?
A.LSACK
B.DD
C.LSU
D.LSR
A.LSACK
*SA-C
QUESTION NO: 69
By default, in the SNMP protocol, which port number does the agent process use to send
alarm messages to NS?
A.164
B.163
C.162
D.161
C.162
*SA-C
QUESTION NO: 70
On Huawei AR G3 routers, what is the -i parameter of the Ping command in VRP used to
set?
A. The destination IP address of the Echo Reply message
B. The source IP address of the Echo Request message
C. Interface for receiving Echo Reply messages
D. Interface for sending Echo Request messages
D. Interface for sending Echo Request messages
Which of the following statements about Adjacency Segment is wrong?
A. Adjacency Segment is identified by Adjacency Segment ID (SID)
B. Adjacency Segment spreads to other network elements through IGP protocol, which is
visible globally and effective locally
C. Adjacency Segment must be configured manually
D. Adjacency Segment is used to identify an adjacency of a node in the network
C. Adjacency Segment must be configured manually
*SA-C
QUESTION NO: 74
In the network shown in the figure, the administrator hopes that all hosts cannot access the
web service (the port number is 80), and other services are normally accessed, so in the
interface configuration of G0/0/1, traffic-filtar outbound needs to define which ACL rule?
A. acl number 3000 rule 5 deny tcp destination-port eq www rule 10 permit ip #
B. acl number 3001 rule 5 deny udp destination-port eq www rule 10 permit ip #
C. acl number 3003 rule 5 permit ip rule 10 deny udp destination-port eq www #
D. acl number 3002 rule 5 permit ip rule 10 deny tcp destination-port eq www #
A. acl number 3000 rule 5 deny tcp destination-port eq www rule 10 permit ip #
*SA-C
QUESTION NO: 77
VRP operating system commands are divided into 4 levels: access level, Monitoring level,
Configuration level, and Management level. Which level can run various business
configuration commands but cannot operate the file system?
A. Configuration level
B. Monitoring level
C. Access level
D. Management level
A. Configuration level
*SA-C
QUESTION NO: 79
Which of the following commands can be used to view the router’s CPU usage?
A.display cpu-state
B.display interface
C.display memory
D.display cpu-usage
D.display cpu-usage
*SA-C
QUESTION NO: 82
The Priority field in the VLAN tag can identify the priority of the data frame. What is the range
of this priority?
A.0-15
B.0-63
C.0-3
D.0-7
D.0-7
*SA-C
QUESTION NO: 83
Which of the following statements about VLANIF interfaces are correct?
A. VANIF interface does not need to learn MAC address
B. VLANTF interface has no MAC address
C. Different VLANIF interfaces can use the same IP address
D. VLANIF interface is a three-layer interface
D. VLANIF interface is a three-layer interface
*SA-C
QUESTION NO: 84
In a Layer 2 network with redundant links, which of the following protocols can be used to
avoid loops?
A. VRRP
B.ARP
C.UDP
D. STP
D. STP
*SA-C
QUESTION NO: 86
There are multiple route entries to the same destination network in the routing table. These
routes are called:
A. Sub-optimal routing
B. Multi-path routing
C. Default route
D. Equal cost routing
D. Equal cost routing
*SA-C
QUESTION NO: 87
For the description of the PPP link establishment process, which of the following statement is wrong?
A. In the Establish phase, the PPP link performs LCP parameter negotiation. The negotiation
content includes the maximum receiving unit MRU, authentication method, magic word and
other options.
B. After the NCP negotiation is successful, the PPP link will maintain the communication state and enter the Terminate phase.
C. The Dead phase is also called the physical layer unavailable phase. When the two ends of
the communication detect that the physical line is activated, they will migrate from the Dead
phase to the Establish phase, which is the link establishment phase.
D. In the Network phase, the PPP link performs NCP negotiation. Select and configure a
network layer protocol through NCP negotiation, and negotiate network layer parameters
E. PPP link supports half-duplex and full-duplex modes
B. After the NCP negotiation is successful, the PPP link will maintain the communication state and enter the Terminate phase.
*SA-C
QUESTION NO: 89
Which of the following methods can read data non-blocking in Python’s telnetlib?
A.telnet_Read_all
B.telnet_read_very_lazy
C.telnet._read_eager
D.telnet_read _very_eager
C.telnet._read_eager
*SA-C
QUESTION NO: 90
Which parameter is used in the spanning tree protocol for root bridge election?
A. Port ID
B. Bridge priority
C. Root path cost
D. Bridge ID
B. Bridge priority
*SA-C
QUESTION NO: 91
What elements can NAPT convert?
A. MAC address + port number
B. Only IP address
C. IP address + port number
D. Only MAC address
C. IP address + port number
*SA-C
QUESTION NO: 92
On Huawei routers, what is the default value of the OSPF protocol internal routing priority?
A.20
B.10
C.30
D.0
B.10
*SA-C
QUESTION NO: 97
The correct description of the information as shown in the figure is ().
[R1]display interface go/0/o
GigabitEthernet0/0/0 current state: Administratively DOWN Line protocol current state:
DOWN
A. The GigabitEthernet 0/0/0 interface was manually closed by the administrator
B. GigabitEthernet 0/0/0 interface does not enable dynamic routing protocol
C. The GigabitEthernet 0/0/0 interface is not configured with an IP address
D. GigabitEthernet 0/0/0 interface is connected to a wrong cable
A. The GigabitEthernet 0/0/0 interface was manually closed by the administrator
QUESTION NO: 99
The configuration information of a interface of the router is shown in the figure, then which VILAN data packet can this port receive?
interface Gigabit Ethernet 0/0/2.30
dot1q terainat1on vid 100
ip address 1o.o.21.1 255.255.255.0
arp broadcast enable
A.1
B.100
C.30
D.20
B.100
*SA-C
QUESTION NO: 103
In the network shown in the figure below, all links are Ethernet links, and all interfaces of all routers run OSPF protocol, how many DRs are elected in the entire network?
A.4
B.1
C.3
D.2
A.4
*SA-C
QUESTION NO: 105
What is the number range of advanced ACL?
A.3000-3999
B.2000-2999
C.4000~ ~ 4999
D.6000~6031
A.3000-3999
*SA-C
QUESTION NO: 108
As shown in the figure below, the MAC address table of SWA is as follows. The switch can’t
learn the MAC address of HOST A all the time. Which of the following is impossible?
A. The G0/0/1 port of the switch has disabled MAC address learning
B. SWA turns off the MAC address learning function of the VLAN to which host A belongs
C. HOST A did not send any data frames
D. The G0/0/1 port of the switch is set to ACCESS mode
D. The G0/0/1 port of the switch is set to ACCESS mode
*SA-C
QUESTION NO: 111
The following rules exist in a certain ACL of the router. rule deny tcp source 192.168.1.0
0.0.0.255 destination 172.16.10.1 0.0.0.0 destination-port eq 21 Which statement is correct?
A. The source IP is 192.168.1.1, the destination IP is 172.16.10.1, and all TCP packets
whose destination port number is 21 match this rule
B. The source IP is 192.168.1.1, the destination IP is 172.16.10.2, and all 1CP packets
whose destination port number is 21 match this one
C. The source IP of the rule is 192.168.1.1, the destination IP is 72.16.10.3. All TCP packets
with the destination port number of 21 match this rule
D. The type of ACL is a basic ACL
A. The source IP is 192.168.1.1, the destination IP is 172.16.10.1, and all TCP packets
*SA-C
QUESTION NO: 112
When the LACP mode is used for link aggregation, what is the default system interference level of Huawei switches?
A.36864
B.4096
C.24576
D.32768
C.24576