HWE-SA Flashcards

1
Q

*SA
1. Refer to the following AAA configuration on a device. Which of the following statements is true?

[R1-aaa]display this
[V200R003C00]

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user huawei password cipher %$%$m]GrHmJ1mL[7&zCh^XQBUII]%$%$
local-user huawei privilege level 0
local-user huawei service-type telnet

A. The authorization scheme is default and the authorization mode is non-authorization.
B. The huawei user can run the display current-configuration command.
C. The huawei user can log in to the device through SSH.
D. The authentication mode is local authentication.

A

D. The authentication mode is local authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

*SA
2. As shown in the following networking, the interfaces connecting R1, R2, R3, and R4 are running OSPF, and are all in area 0. On R1, a static route to the network segment 10.1.34.0/24 is configured using the ip route-static 10.1.34.0 24 10.1.13.32 command. Which of the following statements is true?

A. The routing table of R1 contains only the static route to the network segment 10.1.34.0/24.
B. The routing table of R1 contains both the static route and OSPF route to the network segment 10.1.34.0/24.
C. The routing table of R1 contains the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.12.21.
D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.

A

D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

*SA
3. Which of the following is not a valid port role in RSTP?

A. Designated port
B. Backup port
C. Forwarding port
D. Root port

A

C. Forwarding port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

*SA
4. The Network Configuration Protocol (NETCONF) provides a mechanism for managing network devices. Which of the following statements about NETCONF is false?

A. NETCONF supports trial runs and rollback in case of errors.
B. If YANG files are not integrated into a device, the device does not support NETCONF.
C. Yet Another Next Generation (YANG) is a data modeling language that standardizes NETCONF data content.
D. NETCONF messages are formatted using either JSON or XML.

A

D. NETCONF messages are formatted using either JSON or XML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

*SA
5. Which of the following statements about Fit AP+AC networking is true?

A. The tunnel forwarding mode can reduce the forwarding pressure on the AC.
B. The AP version can be upgraded through HTTP.
C. After a CAPWAP tunnel is established between the AC and Fit AP, keepalive packets are used to detect the status of the CAPWAP tunnel.
D. data tunnel and a control tunnel will be established between the AC and Fit AP.

A

D. data tunnel and a control tunnel will be established between the AC and Fit AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

*SA
6. When a ping command is run on a network device to check the network connectivity, which type of packet will be sent by the network device?

A. UDP
B. TCP
C. IGMP
D. ICMP

A

D. ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

*SA
7. Which of the following statements about edge ports is false?

A. If an edge port receives a configuration BPDU, it becomes a common STP port.
B. In normal situations, an edge port cannot receive configuration BPDUs.
C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.
D. In most cases, edge ports are directly connected to user terminals.

A

C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

*SA
8. The Versatile Routing Platform (VRP) uses the file system to manage files and directories on a device. Which of the following commands can be used to check the current directory of a device?

A. display dir
B. dir
C. pwd
D. Is

A

C. pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*SA
9. Which of the following is not a method for an AP to discover an AC address?

A. Broadcast
B. DHCP
C. Static configuration
D. OSPF
E. DNS

A

D. OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

*SA
10. OSPF is configured on RTA, RTB, and RTC. GigabitEthernet 0/0/0 interfaces of these routers belong to area 0 and the network types of these interfaces are broadcast. The router ID of RTA is 1.1.1.1, and the DR priority of GigabitEthernet 0/0/0 on RTA is set to 0. The router ID of RTB is 2.2.2.2, and the DR priority of GigabitEthernet 0/0/0 on RTB is set to 255. The router ID of RTC is 3.3.3.3, and the DR priority of GigabitEthernet 0/0/0 on RTC is the default value. Which of the following statements is true about the DR and BDR on the network?

A. RTB functions as the DR, and RTC as the BDR.
B. RTC functions as the DR, and RTB as the BDR.
C. RTA functions as the DR, and RTB as the BDR.
D. RTB functions as the DR, and RTA as the BDR.

A

A. RTB functions as the DR, and RTC as the BDR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SA

11, SNMP is used to manage network devices. Refer to the following SNMP configuration on a Huawei device. Which of the following statements is false?
[-HUAWEI] display current-configuration | include snmp
snmp-agent
snmp-agent local-engineid 800007DB03001974593301 snmp-agent sys-info version v3
snmp-agent mib-view included iso-view iso
snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view iso-view
snmp-agent usm-user v3 v3user
snmp-agent usm-user v3 v3user group v3group
snmp-agent usm-user v3 v3user authentication-mode sha cipher %^%#&Ygn:NzQw;d>f=2+aJ;;=B\M^”P1Hf/{L$F9UW@%^%# snmp-agent usm-user v3 v3user privacy-mode aes256 cipher %^%#Gc!FAB;vL5_[a#9q9i7:lj;q#<P8MOf8@PJMJ0%^% #

A. SNMPv3 is configured.
B. The v3user user can access nodes in the subtree with iso as the root node.
C. The encryption mode of the v3user user is SHA.
D. SNMP packets will be encrypted using AES256.

A

C. The encryption mode of the v3user user is SHA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

*SA
12. Mastering the basic operations of the file system is crucial for network engineers to efficiently manage the configuration files and VRP system files of devices. Which of the following statements is true about these files?

A. patch file is a type of software compatible with the system software. The common file name extension is .zip.
B. configuration file stores configuration commands. The common file name extension is .cc.
C. PAF file effectively controls product features and resources. The common file name extension is .bin.
D. System software is mandatory for device startup and running. The common file name extension is .cfg.

A

C. PAF file effectively controls product features and resources. The common file name extension is .bin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

*SA
13. What is the valid VLAN ID range?

A. 1 to 4095
B. 0 to 4094
C. 1 to 4094
D. 0 to 4095

A

C. 1 to 4094

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

*SA
14. Refer to the following ACL configuration on a device. Which of the following statements is true?

time-range satime 08:00 to 17:30 working-day
acl number 3002
rule 5 permit ip source 10.164.2.0 0.0.0.255 destination 10.164.9.9 0.0.0.255 time-range satime

A. This ACL is a user ACL according to the ACL classification rules.
B. The ACL rule takes effect only on working days.
C. This ACL is a basic ACL according to the ACL classification rules.
D. All packets with the source IP addresses on the network segment 10.164.2.0/24 will be permitted by the device.

A

B. The ACL rule takes effect only on working days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

*SA
15. Which of the following states indicates that the neighbor relationship is stable between OSPF-enabled DR-other routers on a broadcast network?

A. Full
B. Loading
C. Down
D. Two-way

A

D. Two-way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

*SA
16. A WLAN is constructed using wireless technologies. Which of the following statements about the WLAN networking is false?

A. basic service set (BSS) indicates an area covered by an AP.
B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.
C. The basic service set identifier (BSSID) identifies a wireless network and is represented using the MAC address of an AP.
D. The service set identifier (SSID) identifies a wireless network and is represented using a character string.

A

B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

*SA
17. In the same Ethernet network segment, five routers are running OSPF for interconnection. When the protocol status of all routers is stable, which of the following statements is true?

A. The neighbor status of all routers is Full.
B. The neighbor status of a router on the network can only be Full or 2-way.
C. There are routers of which all neighbor relationships are in 2-way state on the network.
D. The neighbor relationship between a DR router and another router can be Full or 2-way.

A

B. The neighbor status of a router on the network can only be Full or 2-way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

*SA
18. What is the network ID for the IP address 192.168.1.1/29?

A. 192.168.1.0
B. 192.168.1.255
C. 192.168.1.4
D. 192.168.1.7

A

A. 192.168.1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

*SA
19. Python can be used to implement automatic network deployment, operation, and maintenance, reducing the dependence on human resources. This resolves the problems with traditional network O&M. Which of the following statements about Python is false?

A. Two forward slashes (//) can be used to mark a single-line comment.
B. When a method is defined in a class, the method must carry a self keyword.
C. class is a collection of objects with the same attributes and methods.
D. module is a saved Python file and usually does not have a main function.

A

A. Two forward slashes (//) can be used to mark a single-line comment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

*SA
20. Refer to the following configuration on a Huawei router.

<huawei>system-view
[huawei]user-interface maximum-vty 7
Which of the following statements is true?

A. The router allows a maximum of seven users to log in concurrently through the console port.
B. The router allows a maximum of seven users to log in concurrently through Telnet.
C. The router allows a maximum of seven users to log in concurrently through the asynchronous serial port.
D. If a user forgets the system login password, the user will be locked out after seven consecutive failed login attempts.
</huawei>

A

B. The router allows a maximum of seven users to log in concurrently through Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

*SA
21. Which is the most widely used VLAN assignment method?

A. Interface-based VLAN assignment
B. Protocol-based VLAN assignment
C. MAC address-based VLAN assignment
D. IP subnet-based VLAN assignment

A

A. Interface-based VLAN assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

*SA
22. A router has the following four specific routes:
ip route-static 10.1.20.0 24 12.1.1.2 ip route-static 10.1.21.0 24 12.1.1.2 ip route-static 10.1.22.0 24 12.11.2
ip route-static 10.1.23.0 24 12.1.1.2
To summarize these specific routes, which of the following commands should be run?

A. ip route-static 10.1.20.0 22 12.1.1.2
B. ip route-static 10.1.0.0 16 12.1.1.2
C. ip route-static 10.1.20.0 23 12.1.1.2
D. ip route-static 10.1.16.0 21 12.1.1.2

A

A. ip route-static 10.1.20.0 22 12.1.1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

*SA
23. An AC manages and controls APs in a centralized manner through CAPWAP tunnels. An AP sends a Discovery Request packet to find an available AC. Which of the following methods cannot be used by an AP to discover an AC?

A. DHCP
B. DNS
C. Multicast
D. Static configuration (manually specifying an AC)

A

C. Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. In which of the following modes are DHCP Discover messages sent?

A. Broadcast
B. Unicast
C. Anycast
D. Multicast

A

A. Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

*SA
25. The following shows partial OSPF neighbor information for a specific router: OSPF Process 1 with Router ID 10.1.1.3
Neighbors
Area 0.0.0.0 interface 10.1.1.3(GigabitEthernet0/0/0)’s neighbors
Router ID: 10.1.1.1 Address: 10.1.1.1
State: Full Mode:Nbr is Slave Priority: 1
DR: 10.1.1.5 BDR: 10.1.1.1 MTU: 0
Dead timer due in 35 sec
Retrans timer interval: 5
Neighbor is up for 00:02:01
Authentication Sequence: [0]
Which of the following statements is false?

A. The router is a DR-other router.
B. The router is the slave router in the master-slave relationship.
O C. The router ID of the OSPF process on the router is 10.1.1.3.
D. The preceding information is about the neighbor relationship of the router and BDR router.

A

B. The router is the slave router in the master-slave relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

*SA
26. Which of the following statements is false about Control and Provisioning of Wireless Access Points (CAPWAP)?

A. CAPWAP is used to maintain the connectivity between APs and an AC.
B. CAPWAP transmits two types of messages at the transport layer: service data traffic and management traffic.
C. When tunnel forwarding is used, an AP exchanges data with an AC through a CAPWAP tunnel.
D. CAPWAP is an application layer protocol based on TCP.

A

D. CAPWAP is an application layer protocol based on TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

*SA
27, Dynamic routing protocols can be classified into Interior Gateway Protocol (IGP) and Exterior Gateway Protocol (EGP) according to their working area. Which of the following protocols is an EGP?

A. RIP
B. IS-IS
C. OSPF
D. BGP

A

D. BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

*SA
28. An IPv6 address is 128 bits long. Typically, an IPv6 address is represented by eight groups of 16-bit hexadecimal values separated by colons (:). Which of the following statements about IPv6 addresses is false?

A. The IPv6 address with the prefix FE80::/10 is a link-local address (LLA).
B. There may be ULA conflicts in a global scope.
C. global unicast address (GUA) is globally unique.
D. Each IPv6 interface must have a unique local address (ULA).

A

D. Each IPv6 interface must have a unique local address (ULA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

*SA
29, IPv6 addresses can be classified into three types based on IPv6 address prefixes. Which of the following is not an IPv6 address type?

A. Anycast address
B. Multicast address
C. Unicast address
D. Broadcast address

A

D. Broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

*SA
30, OSPF authentication enables a device to encrypt OSPF packets by adding an authentication field to the packets, ensuring network security. Which of the following statements about OSPF authentication is false?

A. Area authentication applies to the packets received on all the interfaces in a specific area.
B. OSPF authentication is classified into area authentication and interface authentication.
C. The authentication modes of two OSPF neighbors must be the same, that is, both of them either use interface authentication or use area authentication.
D. Interface authentication is configured in the interface view and applies to all the packets received on the interface.

A

C. The authentication modes of two OSPF neighbors must be the same, that is, both of them either use interface authentication or use area authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

*SA-B
1. Refer to the following AAA configuration on a device. Which of the following statements is true?
[R1-aaa]display this
[V200R003C00]

aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user huawei password cipher %$%$m]GrHmJ1mL[7&zCh^XQBUII]%$%$
local-user huawei privilege level 0
local-user huawei service-type telnet

A. The authorization scheme is default and the authorization mode is non-authorization.
B. The huawei user can run the display current-configuration command.
C. The huawei user can log in to the device through SSH.
D. The authentication mode is local authentication.

A

D. The authentication mode is local authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

*SA-B
2. As shown in the following networking, the interfaces connecting R1, R2, R3, and R4 are running OSPF, and are all in area 0. On R1, a static route to the network segment 10.1.34.0/24 is configured using the ip route-static 10.1.34.0 24 10.1.13.32 command. Which of the following statements is true?

A. The routing table of R1 contains only the static route to the network segment 10.1.34.0/24.
B. The routing table of R1 contains both the static route and OSPF route to the network segment 10.1.34.0/24.
C. The routing table of R1 contains the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.12.21.
D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.

A

D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

*SA-B
3. Which of the following is not a valid port role in RSTP?

A. Designated port
B. Backup port
C. Forwarding port
D. Root port

A

C. Forwarding port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

*SA-B
4. The Network Configuration Protocol (NETCONF) provides a mechanism for managing network devices. Which of the following statements about NETCONF is false?

A. NETCONF supports trial runs and rollback in case of errors.
B. If YANG files are not integrated into a device, the device does not support NETCONF.
C. Yet Another Next Generation (YANG) is a data modeling language that standardizes NETCONF data content.
D. NETCONF messages are formatted using either JSON or XML.

A

D. NETCONF messages are formatted using either JSON or XML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

*SA-B
5. Which of the following statements about Fit AP+AC networking is true?

A. The tunnel forwarding mode can reduce the forwarding pressure on the AC.
B. The AP version can be upgraded through HTTP.
C. After a CAPWAP tunnel is established between the AC and Fit AP, keepalive packets are used to detect the status of the CAPWAP tunnel.
D. data tunnel and a control tunnel will be established between the AC and Fit AP.

A

D. data tunnel and a control tunnel will be established between the AC and Fit AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

*SA-B
6. When a ping command is run on a network device to check the network connectivity, which type of packet will be sent by the network device?

A. UDP
B. TCP
C. IGMP
D. ICMP

A

D. ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

*SA-B
7. Which of the following statements about edge ports is false?

A. If an edge port receives a configuration BPDU, it becomes a common STP port.
B. In normal situations, an edge port cannot receive configuration BPDUs.
C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.
D. In most cases, edge ports are directly connected to user terminals.

A

C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

*SA-B
8. The Versatile Routing Platform (VRP) uses the file system to manage files and directories on a device. Which of the following commands can be used to check the current directory of a device?

A. display dir
B. dir
C. pwd
D. Is

A

C. pwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

*SA-B
9. Which of the following is not a method for an AP to discover an AC address?
A. Broadcast
B. DHCP
C. Static configuration
D. OSPF
E. DNS

A

D. OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

*SA-B
10, OSPF is configured on RTA, RTB, and RTC. GigabitEthernet 0/0/0 interfaces of these routers belong to area 0 and the network types of these interfaces are broadcast. The router ID of RTA is 1.1.1.1, and the DR priority of GigabitEthernet 0/0/0 on RTA is set to 0. The router ID of RTB is 2.2.2.2, and the DR priority of GigabitEthernet 0/0/0 on RTB is set to 255. The router ID of RTC is 3.3.3.3, and the DR priority of GigabitEthernet 0/0/0 on RTC is the default value. Which of the following statements is true about the DR and BDR on the network?

A. RTB functions as the DR, and RTC as the BDR.
B. RTC functions as the DR, and RTB as the BDR.
C. RTA functions as the DR, and RTB as the BDR.
D. RTB functions as the DR, and RTA as the BDR.

A

A. RTB functions as the DR, and RTC as the BDR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

SA-B
11, SNMP is used to manage network devices. Refer to the following SNMP configuration on a Huawei device. Which of the following statements is false? [-HUAWEI] display current-configuration | include snmp
snmp-agent
snmp-agent local-engineid 800007DB03001974593301 snmp-agent sys-info version v3
snmp-agent mib-view included iso-view iso
snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view iso-view
snmp-agent usm-user v3 v3user
snmp-agent usm-user v3 v3user group v3group
snmp-agent usm-user v3 v3user authentication-mode sha cipher %^%#&Ygn:NzQw;d>f=2+aJ;;=B\M^”P1Hf/{L$F9UW@%^%# snmp-agent usm-user v3 v3user privacy-mode aes256 cipher %^%#Gc!
FAB;vL5_[a#9q9i7:*lj;q#<P8MOf8@PJMJ0%^% #

A. SNMPv3 is configured.
B. The v3user user can access nodes in the subtree with iso as the root node.
C. The encryption mode of the v3user user is SHA.
D. SNMP packets will be encrypted using AES256.

A

C. The encryption mode of the v3user user is SHA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

*SA-B
12. Mastering the basic operations of the file system is crucial for network engineers to efficiently manage the configuration files and VRP system files of devices. Which of the following statements is true about these files?

A. patch file is a type of software compatible with the system software. The common file name extension is .zip.
B. configuration file stores configuration commands. The common file name extension is .cc.
C. PAF file effectively controls product features and resources. The common file name extension is .bin.
D. System software is mandatory for device startup and running. The common file name extension is .cfg.

A

C. PAF file effectively controls product features and resources. The common file name extension is .bin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

*SA-B
13. What is the valid VLAN ID range?

A. 1 to 4095
B. 0 to 4094
C. 1 to 4094
D. 0 to 4095

A

C. 1 to 4094

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

*SA-B
14. Refer to the following ACL configuration on a device. Which of the following statements is true?

time-range satime 08:00 to 17:30 working-day
acl number 3002
rule 5 permit ip source 10.164.2.0 0.0.0.255 destination 10.164.9.9 0.0.0.255 time-range satime

A. This ACL is a user ACL according to the ACL classification rules.
B. The ACL rule takes effect only on working days.
C. This ACL is a basic ACL according to the ACL classification rules.
D. All packets with the source IP addresses on the network segment 10.164.2.0/24 will be permitted by the device.

A

B. The ACL rule takes effect only on working days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

*SA-B
15. Which of the following states indicates that the neighbor relationship is stable between OSPF-enabled DR-other routers on a broadcast network?

A. Full
B. Loading
C. Down
D. Two-way

A

D. Two-way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

*SA-B
16. A WLAN is constructed using wireless technologies. Which of the following statements about the WLAN networking is false?

A. basic service set (BSS) indicates an area covered by an AP.
B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.
C. The basic service set identifier (BSSID) identifies a wireless network and is represented using the MAC address of an AP.
D. The service set identifier (SSID) identifies a wireless network and is represented using a character string.

A

B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

*SA-B
17. In the same Ethernet network segment, five routers are running OSPF for interconnection. When the protocol status of all routers is stable, which of the following statements is true?

A. The neighbor status of all routers is Full.
B. The neighbor status of a router on the network can only be Full or 2-way.
C. There are routers of which all neighbor relationships are in 2-way state on the network.
D. The neighbor relationship between a DR router and another router can be Full or 2-way.

A

B. The neighbor status of a router on the network can only be Full or 2-way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

*SA-B
18. What is the network ID for the IP address 192.168.1.1/29?

A. 192.168.1.0
B. 192.168.1.255
C. 192.168.1.4
D. 192.168.1.7

A

A. 192.168.1.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

*SA-B
19. Python can be used to implement automatic network deployment, operation, and maintenance, reducing the dependence on human resources. This resolves the problems with traditional network O&M. Which of the following statements about Python is false?

A. Two forward slashes (//) can be used to mark a single-line comment.
B. When a method is defined in a class, the method must carry a self keyword.
C. class is a collection of objects with the same attributes and methods.
D. module is a saved Python file and usually does not have a main function.

A

A. Two forward slashes (//) can be used to mark a single-line comment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

*SA-B
20. Refer to the following configuration on a Huawei router.

<huawei>system-view
[huawei]user-interface maximum-vty 7
Which of the following statements is true?

A. The router allows a maximum of seven users to log in concurrently through the console port.
B. The router allows a maximum of seven users to log in concurrently through Telnet.
C. The router allows a maximum of seven users to log in concurrently through the asynchronous serial port.
D. If a user forgets the system login password, the user will be locked out after seven consecutive failed login attempts.
</huawei>

A

B. The router allows a maximum of seven users to log in concurrently through Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

*SA-B
21. Which is the most widely used VLAN assignment method?

A. Interface-based VLAN assignment
B. Protocol-based VLAN assignment
C. MAC address-based VLAN assignment
D. IP subnet-based VLAN assignment

A

A. Interface-based VLAN assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

*SA-B
22. A router has the following four specific routes:
ip route-static 10.1.20.0 24 12.1.1.2 ip route-static 10.1.21.0 24 12.1.1.2 ip route-static 10.1.22.0 24 12.11.2
ip route-static 10.1.23.0 24 12.1.1.2
To summarize these specific routes, which of the following commands should be run?

A. ip route-static 10.1.20.0 22 12.1.1.2
B. ip route-static 10.1.0.0 16 12.1.1.2
C. ip route-static 10.1.20.0 23 12.1.1.2
OD. ip route-static 10.1.16.0 21 12.1.1.2

A

A. ip route-static 10.1.20.0 22 12.1.1.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

*SA-B
23. An AC manages and controls APs in a centralized manner through CAPWAP tunnels. An AP sends a Discovery Request packet to find an available AC. Which of the following methods cannot be used by an AP to discover an AC?

A. DHCP
B. DNS
C. Multicast
D. Static configuration (manually specifying an AC)

A

C. Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

*SA-B
24. In which of the following modes are DHCP Discover messages sent?

A. Broadcast
B. Unicast
C. Anycast
D. Multicast

A

A. Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

*SA-B
25. The following shows partial OSPF neighbor information for a specific router:
OSPF Process 1 with Router ID 10.1.1.3
Neighbors
Area 0.0.0.0 interface 10.1.1.3(GigabitEthernet0/0/0)’s neighbors
Router ID: 10.1.1.1 Address: 10.1.1.1
State: Full Mode:Nbr is Slave Priority: 1
DR: 10.1.1.5 BDR: 10.1.1.1 MTU: 0
Dead timer due in 35 sec
Retrans timer interval: 5
Neighbor is up for 00:02:01
Authentication Sequence: [0]
Which of the following statements is false?

A. The router is a DR-other router.
B. The router is the slave router in the master-slave relationship.
C. The router ID of the OSPF process on the router is 10.1.1.3.
D. The preceding information is about the neighbor relationship of the router and BDR router.

A

B. The router is the slave router in the master-slave relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

*SA-B
26. Which of the following statements is false about Control and Provisioning of Wireless Access Points (CAPWAP)?

A. CAPWAP is used to maintain the connectivity between APs and an AC.
B. CAPWAP transmits two types of messages at the transport layer: service data traffic and management traffic.
C. When tunnel forwarding is used, an AP exchanges data with an AC through a CAPWAP tunnel.
D. CAPWAP is an application layer protocol based on TCP.

A

D. CAPWAP is an application layer protocol based on TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

*SA-B
27, Dynamic routing protocols can be classified into Interior Gateway Protocol (IGP) and Exterior Gateway Protocol (EGP) according to their working area. Which of the following protocols is an EGP?

A. RIP
B. IS-IS
C. OSPF
D. BGP

A

D. BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

*SA-B
28. An IPv6 address is 128 bits long. Typically, an IPv6 address is represented by eight groups of 16-bit hexadecimal values separated by colons (:). Which of the following statements about IPv6 addresses is false?

A. The IPv6 address with the prefix FE80::/10 is a link-local address (LLA).
B. There may be ULA conflicts in a global scope.
C. global unicast address (GUA) is globally unique.
D. Each IPv6 interface must have a unique local address (ULA).

A

D. Each IPv6 interface must have a unique local address (ULA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

*SA-B
29, IPv6 addresses can be classified into three types based on IPv6 address prefixes. Which of the following is not an IPv6 address type?

A. Anycast address
B. Multicast address
C. Unicast address
D. Broadcast address

A

D. Broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

*SA-B
30, OSPF authentication enables a device to encrypt OSPF packets by adding an authentication field to the packets, ensuring network security. Which of the following statements about OSPF authentication is false?

A. Area authentication applies to the packets received on all the interfaces in a specific area.
B. OSPF authentication is classified into area authentication and interface authentication.
C. The authentication modes of two OSPF neighbors must be the same, that is, both of them either use interface authentication or use area authentication.
D. Interface authentication is configured in the interface view and applies to all the packets received on the interface.

A

C. The authentication modes of two OSPF neighbors must be the same, that is, both of them either use interface authentication or use area authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

*SA-C
1. Two authentication domains “Area1” and “Area 2” are configured on a router acting as an
authentication server. If the user authenticates with the correct user name “huawei” and
password “hello”, this user will be assigned In which authentication domain?

A. Authentication domain “Area 1”
B. Authentication domain “default domain”
C. Authentication domain “default_admin domain”
D. Authentication domain “Area2”

A

B. Authentication domain “default domain”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

*SA-C
2. A company has 50 private IP addresses. The administrator uses NAT technology to connect
the company’s network to the public network, but the company has only one public network
address and is not fixed. Which of the following NAT conversion methods meets the needs?

A. easy-ip
B. NAPT
C. Static NAT
D.Basic NAT

A

A. easy-ip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

*SA-C
4. <huawei>system-view
[huawei]command-privilege level 3 view user save
The correct statement about the above configuration command is:</huawei>

A. Modify the user’s authority level to 3, and save the configuration
B. Modify the permission level of the user view command to 3, and save the configuration
C. Modify the authority level of the save command used by a user to 3
D. Modify the permission level of the save command in the user view to 3

A

D. Modify the permission level of the save command in the user view to 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

*SA-C
5. By default, what is the STP Forward Delay time in seconds?
A.5
B.10
C.15
D.20

A

C.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

*SA-C
QUESTION NO: 6
Which field of the ipv6 packet header can be used for QoS?

A.Traffic Class
B.Payload Length
C.Version
D.Next Header

A

A.Traffic Class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

*SA-C
QUESTION NO: 7
Complete the ACL configuration shown in the figure on the router RTA, which of the following
description is correct?

A. The VRP system will not adjust the sequence number, but will first match the rule permit
source 20.1.1.0 0.0.0.255
B. Configuration error, the sequence number of the rules must be configured from small to
large
C. The VRP system will adjust the sequence number of the first rule to 5 according to the
configuration sequence
D. The VRP system will first match the rule by numbering in sequence deny source 20.1.1.0
0.0.0.255

A

D. The VRP system will first match the rule by numbering in sequence deny source 20.1.1.0
0.0.0.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

*SA-C
QUESTION NO: 12
The network shown in the figure below. The administrator hopes that RTA uses static routing,
and preferentially sends data packets to RTB ‘s Loopback0 interface through G0/0/1 por,
while G0/0/2 serves as a backup. So how to configure on RTA to achieve this requirement?

A.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 ip route-static 10.0.2.2 255.255.255.255
10.0.21.2 preference 40
B.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 preference 70 ip route-static 10.0.2.2
255.255.255.25510.0.21.2
C.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 ip route-static 10.0.2.2 255.255.255.255
10.0.21.2
D.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 ip route-static 10.0.2.2 255.255.255.255
10.0.21.2 preference 70

A

D.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 ip route-static 10.0.2.2 255.255.255.255
10.0.21.2 preference 70

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

*SA-C
As shown in the figure, the switch runs STP with default parameters, which of the following
ports will be elected as the designated port?

A. G0/0/1 port of switch A
B. Port G0/0/2 of switch A
C. HUB’s G0/0/1 port
D. HUB’s G0/0/2 port

A

A. G0/0/1 port of switch A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

*SA-C
QUESTION NO: 16
In order to distinguish different users and provide different network services on the AP. Which
of the following can be configured?

A.VT
B.VAP
C.VAC
D. WAP

A

A.VT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

*SA-C
QUESTION NO: 19
Which statement about OSPF protocol DR is correct?

A. DR must be the highest priority device in the network
B. Router ID, the larger the value, the more preferred to be elected as DR
C. DR election is preemptive
D. An interface priority is 0, then the interface cannot be a DR

A

D. An interface priority is 0, then the interface cannot be a DR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

*SA-C
QUESTION NO: 22
On the VRP platform, which of the following methods can be used to access the previous
history commands?

A. Ctr1+U
B. Ctr1+P
C. Left cursor
D. Up cursor

A

D. Up cursor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

*SA-C
QUESTION NO: 23
The information shown in the figure is the port status information displayed on a switch
running STP. According to this information, which of the following description is wrong?

A. The priority of this switch is 0
B. This network may only contain this switch
C. This switch may be connected to six other switches
D. This switch is the root switch in the network

A

A. The priority of this switch is 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

*SA-C
QUESTION NO: 24
Which of the following description about the Layer 2 Ethernet switch is incorrect?

A. It is necessary to make certain modifications to the layer 3 header of the forwarded
message, and then forward it
B. Able to learn MAC address
C. Forward according to the Layer 2 header information of the Ethernet frame
D. Layer 2 Ethernet switches work at the data link layer

A

A. It is necessary to make certain modifications to the layer 3 header of the forwarded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

*SA-C
QUESTION NO: 25
In which view can the administrator modify the device name for the router?

A.User-view
B.Protocol-view
C.System-view
D.Interface-view

A

C.System-view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

*SA-C
QUESTION NO: 26
The Layer 2 Ethernet switch generates entries in the MAC address table according to the ( )
of the Ethernet frame received by the port.

A. Source IP address
B. Source MAC address
C. Destination MAC address
D. Destination IP address

A

B. Source MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

*SA-C
QUESTION NO: 27
What kind of message does the OSPF protocol use to confirm the received LSU message?

A.LSU
B.LSR
C.LSACK
D.LSA

A

C.LSACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

*SA-C
QUESTION NO: 30
When the IPv4 protocol is used as the network layer protocol, which field is not included in
the network layer header?

A. Source IPv4 address
B. Sequence number
C. Destination IPv4 address
D. TTL

A

B. Sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

*SA-C
QUESTION NO: 31
On the VRP platform, what is the role of the command “interface vlanit <vlan-id>" ?</vlan-id>

A. Create a VLAN
B. No such command
C. Create or enter VLAN virtual interface view
D. Configure VLAN for a port

A

C. Create or enter VLAN virtual interface view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

*SA-C
QUESTION NO: 38
Which of the following statement about the TTL field in the IP packet header is correct?

A. TTL defines the time interval at which the source host can send data packets
B. TTL defines the number of packets that the source host can send
C. Every time an IP packet passes through a router, its TTL value will be reduced by 1
D. Each time an IP packet passes through a router, its TTL value will be increased by 1

A

C. Every time an IP packet passes through a router, its TTL value will be reduced by 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

*SA-C
QUESTION NO: 39
How many types of data flows with different service levels can be marked based on MPLS
labels?

A.4
B.2
C.16
D.8

A

D.8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

*SA-C
QUESTION NO: 40
Which of the following statements about the edge port in the RSTP protocol is correct?

A. The edge port discards the received configuration BPDU packet
B. The edge port can be directly transferred from Disable to Forwarding state
C. Edge port participates in RSTP operation
D. The interconnection ports between switches need to be set as edge ports

A

B. The edge port can be directly transferred from Disable to Forwarding state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

*SA-C
QUESTION NO: 42
Which of the following statement about static routing in Huawei equipment is wrong?

A. The cost value (Cost) of the static route cannot be modified.
B. The default value of the static route priority is 60
C. The range of the static route priority value is 1-255
D. When the priority of the static route is 0, the route will definitely be preferred.

A

C. The range of the static route priority value is 1-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

*SA-C
QUESTION NO: 43
By default, network devices running SNMPv2c protocol use which of the following port
numbers to send trap messages to the network management system?

A.6
B.161
C.17
D.162

A

D.162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

*SA-C
QUESTION NO: 44
As shown in the figure below, which of the following statement is correct?

A. Host A can ping host B
B. Only when the masks of host A and host B are set to always, host A and host B can
communicate
C. The broadcast address of host A and host B are the same
D. The IP address masks of host A and host B are different, so host A and host B cannot communicate

A

D. The IP address masks of host A and host B are different, so host A and host B cannot communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

*SA-C
QUESTION NO: 47
As shown in the figure, if host A and host B want to achieve inter-VLAN communication
through single-arm routing, which configuration should be done under the G0/0/1.1 interface
of RTA?
IT Certification Guaranteed, The Easy Way!
13

A.dot1q termination vid 30
B.dot1q termination vid 20
C.dot1q termination vid 10
D.dot1q termination vid 40

A

C.dot1q termination vid 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

*SA-C
QUESTION NO: 48
What is the number range of the Layer 2 ACL?

A.2000-2999
B.3000-3999
C.4000 ~ 4999
D.6000 ~ 6031

A

C.4000 ~ 4999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

*SA-C
QUESTION NO: 49
What is the coverage area of an AP in WLAN?

A. BSS
B. SSID
C. BSSID
D.ESS

A

B. SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

*SA-C
QUESTION NO: 50
What is the first operation performed by the FIT AP after obtaining the AC’s IP address?

A. Upgrade software version
B. Download the configuration file
C. Establish CAPWAP tunnel
D. Request configuration file

A

C. Establish CAPWAP tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

*SA-C
QUESTION NO: 51
Which of the following statements about direct routing is correct?

A. Direct routing requires the administrator to manually configure the destination network and
the next-hop address
B. Direct route has lower priority than static route
C. Direct route priority is lower than dynamic route
D. Direct routing has the highest priority

A

D. Direct routing has the highest priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

*SA-C
QUESTION NO: 52
Which field is added to the IPv6 packet header than the IPv4 packet header?

A.Destination Address
B.Flow Label
C.Version
D.Source Address

A

B.Flow Label

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

*SA-C
QUESTION NO: 54
What is the destination IP address of the DHCP DISCOER message?

A.127.0.0.1
B.224.0.0.1
C.224.0.0.2
D.255.255.255.255

A

D.255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

*SA-C
QUESTION NO: 55
What is the port number used by the FTP protocol control plane?

A.23
B.24
C.21
D.22

A

C.21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

*SA-C
QUESTION NO: 56
The administrator plans to implement route backup by configuring static floating routes, what
is the correct way to achieve this?

A. The administrator needs to configure different metric values for the main static route and the standby static route
B. The administrator needs to configure different TAGs for the main static route and the standby static route
C. The administrator only needs to configure two static routes
D. The administrator needs to configure different protocol priority values for the main static route and the standby static route

A

D. The administrator needs to configure different protocol priority values for the main static route and the standby static route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

*SA-C
QUESTION NO: 57
What are the characteristics of VLAN based on port?

A. Add VLAN tags to the data frame according to the IP address carried in the message
B. Assign VLAN ID according to the protocol type and encapsulation format of the data frame
C. No need to reconfigure VLAN when the host moves
D. The host mobile location needs to be reconfigured VLAN

A

D. The host mobile location needs to be reconfigured VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

*SA-C
QUESTION NO: 60
What is the main function of the dynamic routing protocol?

A. Manage routers
B. Generate IP address
C. Dynamically generate routing entries
D. Control router interface status

A

C. Dynamically generate routing entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

*SA-C
QUESTION NO: 61
In which working state of the STP protocol can the port be changed to the Forwarding state
without going through other states?

A. Blocking
B. Learning
C. Listening
D. Disabled

A

B. Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

*SA-C
QUESTION NO: 63
Which type of message is used by network devices running SNMPv 1 protocol to actively
send alarm information?

A. Trap
B. Response
C.Get Request
D. Get-Next Request

A

A. Trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

*SA-C
QUESTION NO: 64
The MAC address table of a certain switch is shown in the figure. If the switch receives a
data frame with a destination MIAC of 5489-9885-18a8 from port Eth0/0/2, which of the
following statements is correct?

A. Forward this data frame from Eth0/0/1 port
B. Flood this data frame
C. Discard this data frame
D. Forward this data frame from the Eth0/0/2 port

A

D. Forward this data frame from the Eth0/0/2 port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

*SA-C
QUESTION NO: 65
As shown in the information in the figure, when learning this switch needs to forward the
frame with the destination MAC address of 5489-98ec-f011, which of the following description
is correct?

A. The switch will flood the frame on all ports except the port that received the frame
B. The switch will send a message that the destination is unreachable to the source device
C. The switch does not find a matching entry in the MAC address table, so it will discard the
frame
D. The switch needs to send a request to discover the device with the MAC address of 5489
98ec-f011

A

A. The switch will flood the frame on all ports except the port that received the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

*SA-C
QUESTION NO: 67
In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?

A.8192 00-01-02-03-04-CC
B.4096 00-01-02-03-04-CC
C.0 00-01-02-03-04-CC
D.2048 00-01-02-03-04-CC

A

D.2048 00-01-02-03-04-CC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

*SA-C
QUESTION NO: 68
Which of the following OSPF protocol packets can ensure the reliability of LSA updates?

A.LSACK
B.DD
C.LSU
D.LSR

A

A.LSACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

*SA-C
QUESTION NO: 69
By default, in the SNMP protocol, which port number does the agent process use to send
alarm messages to NS?

A.164
B.163
C.162
D.161

A

C.162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

*SA-C
QUESTION NO: 70
On Huawei AR G3 routers, what is the -i parameter of the Ping command in VRP used to
set?

A. The destination IP address of the Echo Reply message
B. The source IP address of the Echo Request message
C. Interface for receiving Echo Reply messages
D. Interface for sending Echo Request messages

A

D. Interface for sending Echo Request messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Which of the following statements about Adjacency Segment is wrong?

A. Adjacency Segment is identified by Adjacency Segment ID (SID)
B. Adjacency Segment spreads to other network elements through IGP protocol, which is
visible globally and effective locally
C. Adjacency Segment must be configured manually
D. Adjacency Segment is used to identify an adjacency of a node in the network

A

C. Adjacency Segment must be configured manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

*SA-C
QUESTION NO: 74
In the network shown in the figure, the administrator hopes that all hosts cannot access the
web service (the port number is 80), and other services are normally accessed, so in the
interface configuration of G0/0/1, traffic-filtar outbound needs to define which ACL rule?

A. acl number 3000 rule 5 deny tcp destination-port eq www rule 10 permit ip #
B. acl number 3001 rule 5 deny udp destination-port eq www rule 10 permit ip #
C. acl number 3003 rule 5 permit ip rule 10 deny udp destination-port eq www #
D. acl number 3002 rule 5 permit ip rule 10 deny tcp destination-port eq www #

A

A. acl number 3000 rule 5 deny tcp destination-port eq www rule 10 permit ip #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

*SA-C
QUESTION NO: 77
VRP operating system commands are divided into 4 levels: access level, Monitoring level,
Configuration level, and Management level. Which level can run various business
configuration commands but cannot operate the file system?

A. Configuration level
B. Monitoring level
C. Access level
D. Management level

A

A. Configuration level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

*SA-C
QUESTION NO: 79
Which of the following commands can be used to view the router’s CPU usage?

A.display cpu-state
B.display interface
C.display memory
D.display cpu-usage

A

D.display cpu-usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

*SA-C
QUESTION NO: 82
The Priority field in the VLAN tag can identify the priority of the data frame. What is the range
of this priority?

A.0-15
B.0-63
C.0-3
D.0-7

A

D.0-7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

*SA-C
QUESTION NO: 83
Which of the following statements about VLANIF interfaces are correct?

A. VANIF interface does not need to learn MAC address
B. VLANTF interface has no MAC address
C. Different VLANIF interfaces can use the same IP address
D. VLANIF interface is a three-layer interface

A

D. VLANIF interface is a three-layer interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

*SA-C
QUESTION NO: 84
In a Layer 2 network with redundant links, which of the following protocols can be used to
avoid loops?

A. VRRP
B.ARP
C.UDP
D. STP

A

D. STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

*SA-C
QUESTION NO: 86
There are multiple route entries to the same destination network in the routing table. These
routes are called:

A. Sub-optimal routing
B. Multi-path routing
C. Default route
D. Equal cost routing

A

D. Equal cost routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

*SA-C
QUESTION NO: 87
For the description of the PPP link establishment process, which of the following statement is wrong?

A. In the Establish phase, the PPP link performs LCP parameter negotiation. The negotiation
content includes the maximum receiving unit MRU, authentication method, magic word and
other options.
B. After the NCP negotiation is successful, the PPP link will maintain the communication state and enter the Terminate phase.
C. The Dead phase is also called the physical layer unavailable phase. When the two ends of
the communication detect that the physical line is activated, they will migrate from the Dead
phase to the Establish phase, which is the link establishment phase.
D. In the Network phase, the PPP link performs NCP negotiation. Select and configure a
network layer protocol through NCP negotiation, and negotiate network layer parameters
E. PPP link supports half-duplex and full-duplex modes

A

B. After the NCP negotiation is successful, the PPP link will maintain the communication state and enter the Terminate phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

*SA-C
QUESTION NO: 89
Which of the following methods can read data non-blocking in Python’s telnetlib?

A.telnet_Read_all
B.telnet_read_very_lazy
C.telnet._read_eager
D.telnet_read _very_eager

A

C.telnet._read_eager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

*SA-C
QUESTION NO: 90
Which parameter is used in the spanning tree protocol for root bridge election?

A. Port ID
B. Bridge priority
C. Root path cost
D. Bridge ID

A

B. Bridge priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

*SA-C
QUESTION NO: 91
What elements can NAPT convert?

A. MAC address + port number
B. Only IP address
C. IP address + port number
D. Only MAC address

A

C. IP address + port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

*SA-C
QUESTION NO: 92
On Huawei routers, what is the default value of the OSPF protocol internal routing priority?

A.20
B.10
C.30
D.0

A

B.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

*SA-C
QUESTION NO: 97
The correct description of the information as shown in the figure is ().
[R1]display interface go/0/o
GigabitEthernet0/0/0 current state: Administratively DOWN Line protocol current state:
DOWN

A. The GigabitEthernet 0/0/0 interface was manually closed by the administrator
B. GigabitEthernet 0/0/0 interface does not enable dynamic routing protocol
C. The GigabitEthernet 0/0/0 interface is not configured with an IP address
D. GigabitEthernet 0/0/0 interface is connected to a wrong cable

A

A. The GigabitEthernet 0/0/0 interface was manually closed by the administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

QUESTION NO: 99
The configuration information of a interface of the router is shown in the figure, then which VILAN data packet can this port receive?
interface Gigabit Ethernet 0/0/2.30
dot1q terainat1on vid 100
ip address 1o.o.21.1 255.255.255.0
arp broadcast enable

A.1
B.100
C.30
D.20

A

B.100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

*SA-C
QUESTION NO: 103
In the network shown in the figure below, all links are Ethernet links, and all interfaces of all routers run OSPF protocol, how many DRs are elected in the entire network?

A.4
B.1
C.3
D.2

A

A.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

*SA-C
QUESTION NO: 105
What is the number range of advanced ACL?

A.3000-3999
B.2000-2999
C.4000~ ~ 4999
D.6000~6031

A

A.3000-3999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

*SA-C
QUESTION NO: 108
As shown in the figure below, the MAC address table of SWA is as follows. The switch can’t
learn the MAC address of HOST A all the time. Which of the following is impossible?

A. The G0/0/1 port of the switch has disabled MAC address learning
B. SWA turns off the MAC address learning function of the VLAN to which host A belongs
C. HOST A did not send any data frames
D. The G0/0/1 port of the switch is set to ACCESS mode

A

D. The G0/0/1 port of the switch is set to ACCESS mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

*SA-C
QUESTION NO: 111
The following rules exist in a certain ACL of the router. rule deny tcp source 192.168.1.0
0.0.0.255 destination 172.16.10.1 0.0.0.0 destination-port eq 21 Which statement is correct?

A. The source IP is 192.168.1.1, the destination IP is 172.16.10.1, and all TCP packets
whose destination port number is 21 match this rule
B. The source IP is 192.168.1.1, the destination IP is 172.16.10.2, and all 1CP packets
whose destination port number is 21 match this one
C. The source IP of the rule is 192.168.1.1, the destination IP is 72.16.10.3. All TCP packets
with the destination port number of 21 match this rule
D. The type of ACL is a basic ACL

A

A. The source IP is 192.168.1.1, the destination IP is 172.16.10.1, and all TCP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

*SA-C
QUESTION NO: 112
When the LACP mode is used for link aggregation, what is the default system interference level of Huawei switches?

A.36864
B.4096
C.24576
D.32768

A

C.24576

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

*SA-C
QUESTION NO: 113
Which of the following statements about the division of OSPF protocol area is wrong?

A. Area 0 is the backbone area, and other areas must be connected to this area
B. The LSDBs in the routers in the same OSPF area are completely consistent
C. Dividing OSPF areas can reduce the LSDB scale of some routers
D. Only ABR can be used as ASBR

A

D. Only ABR can be used as ASBR

125
Q

*SA-C
QUESTION NO: 114
Which of the following IPv6 addresses is a multicast address?

A.FE80 :: 2E0 : FCFF : FEEF : FEC
B.FC00 :: 2E0 : FCFF : FEEF : FEC
C.FF02 :: 2E0 : FCFF : FEEF : FEC
D.2000 :: 2E0 : FCFF : FEEF : FEC

A

C.FF02 :: 2E0 : FCFF : FEEF : FEC

126
Q

*SA-C
QUESTION NO: 117
As shown in the figure below, the wrong statement is:
acl number 2000]
rule 5 deny source 200.0.12.00.0.0.7 rule 10permit source200.0.12.00.0.0.15 #
interface GigabitEthernetO/0/1 traffic-filteroutbound acl2000

A. The host whose source IP address is 200.0.12.4 cannot access the Internet
B. The host whose source IP address is 200.0.12.2 cannot access the Internet
C. The host whose source IP address is 200.0.12.8 cannot access the Internet
D. The host whose source IP address is 200.0.12.6 cannot access the Internet

A

C. The host whose source IP address is 200.0.12.8 cannot access the Internet

127
Q

*SA-C
QUESTION NO: 118
What is the protocol number corresponding to the ospf protocol at the network layer?

A.89
B.6
C.0
D.1

A

A.89

128
Q

*SA-C
QUESTION NO: 120
What is the total length of the VLAN frame format defined by IEEE802.1Q?

A. 1
B. 2
C. 3
D. 4

A

D. 4

129
Q

*SA-C
QUESTION NO: 121
The RSTP protocol uses the P/A mechanism to speed up the speed of the upstream port to
the Forwarding state, but what is the reason why there is no temporary loop?

A. Speed up port role election
B. Through the synchronization mechanism to ensure that no temporary loop occurs
C. Edge ports are introduced
D. Shorten the time of Forward Delay

A

B. Through the synchronization mechanism to ensure that no temporary loop occurs

130
Q

*SA-C
QUESTION NO: 122
Which state does the OSPF protocol use to indicate that the adjacency relationship has been
established?

A.Full
B.2-way
C.Attempt
D.Down

A

A.Full

131
Q

*SA-C
QUESTION NO: 123
A certain ACL of the router is in the following rules, rule deny source 192.168.2.0 0.0.0.255 destination 172.16.10.2 0.0.0.0 Which statement is correct?

A. All TCP packets whose source IP is 172.16.10.2. Destination IP is 192.168.2.1 match this rule
B. All TCP packets whose source IP is 192.168.2.1 and destination IP is 172.16.10.1 match this rule
C. All TCP packets whose source IP is 172.16.10.2 and destination IP 192.168.2.0 match this rule
D. All TCP packets whose source IP is 192.168.2.1 and destination IP is 172.16.10.2 are configured with this rule.

A

D. All TCP packets whose source IP is 192.168.2.1 and destination IP is 172.16.10.2 are configured with this rule.

132
Q

*SA-C
QUESTION NO: 125
Which of the following descriptions about the switch is wrong?

A. The switch can complete the exchange of data frames
B. The switch can provide network access services for terminal equipment (PC. Server)
C. Switches generally work at the data link layer
D. Switches are generally used as network export equipment

A

D. Switches are generally used as network export equipment

133
Q

*SA-C
QUESTION NO: 126
What is the main function of the DHCP DISCOVER message?
A. The server’s confirmation response to the REQUEST message
B. The client is used to find the DHCP server
C. The client requests configuration confirmation, or renews the lease
D. The DHCP server is used to respond to the DHCP DISCOVER message, which carries various configuration information

A

B. The client is used to find the DHCP server

134
Q

*SA-C
QUESTION NO: 128
ip route-static 10.0.12.0 255.255.255.0 192.168.1.1, which description about this command is correct?

A. This command configures a route to the 10.0.12.0 network
B. The priority of this route is 100
C. If the router learns a router with the same destination network as this route through other
protocols, the router will prefer this route
D. This command configures a route to the 192.168.1.1 network

A

A. This command configures a route to the 10.0.12.0 network

135
Q

*SA-C
QUESTION NO: 129
Which layer of the OSI reference model does the router work at?

A. Data link layer
B. Transport layer
C. Application layer
D. Network layer

A

D. Network layer

136
Q

*SA-C
QUESTION NO: 133
The administrator wants all hosts to be unable to access the Internet between 8:00-17:00 every day, so which ACL rule needs to be bound to the traffic-filter outbound in the GO/0/1 interface allocation?

A.time-range am9topm5 08:00 to working-day Acl number 2003 rule 5 deny time-range am9topjni5
B.time-range am9topm5 08:00 to 17:00 off-day # acl number 2004 rule 5 permit time-range
C. time-range am9topm5 08:00 to 17:00 daily acl number 2001 rule 5 deny time-range am9topm5
D.time-range am9topm5 07:00 to 18:00 daily Acl number 2002

A

C. time-range am9topm5 08:00 to 17:00 daily acl number 2001 rule 5 deny time-range am9topm5

137
Q

*SA-C
QUESTION NO: 135
The configuration information of a certain port of the switch is shown in the figure, then this port carries VLAN TAG when sending data frames carrying which VLAN?
interface GigabitEtherneto/0/1
port hybrid tagged vlan 2 to 3 100
port hybrid untagged vlan 4 6

A.1,2.3,100
B.2.3.100
C.1,2.3.4.6,100
D.2.3.4.6,100

A

B.2.3.100

138
Q

*SA-C
QUESTION NO: 138
In the network shown in the figure below, if Router A and Router B’s loopback 0 communicate through static routing, which command needs to be entered on Router A?

A.ip route-static 10.0.2.2 0 GigabitEthernet 0/0/0
B.ip route-static 10.0.2.2 32 GigabitEthernet 0/0/0
C.ip route-static 10.0.2.2 255.255.255.255 10.0.12.1
D.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2

A

D.ip route-static 10.0.2.2 255.255.255.255 10.0.12.2

139
Q

*SA-C
QUESTION NO: 139
Which of the following does not include the advantages of Wi-Fi 6 compared to Wi-Fi 5?

A. Higher bandwidth
B. Lower transmission delay
C. Higher power consumption
D. Higher number of access terminals per AP

A

C. Higher power consumption

140
Q

*SA-C
QUESTION NO: 141
As shown in the figure below, which port of the following switches will be blocked?

A.SWC G0/0/1
B.SWC G0/0/2
C.SWB G0/0/3
D.SWA G0/0/3

A

A.SWC G0/0/1

141
Q

*SA-C
QUESTION NO: 142
If the network address of a network is 10.1.1.0/30, what is its broadcast address?

A.10.1.1.2
B.10.1.1.3
C.10.1.1.4
D.10.1.1.1

A

A.10.1.1.2

142
Q

*SA-C
QUESTION NO: 143
The configuration information of a certain port of the switch is shown in the figure. Which of the following statements is wrong?

A. The port type is Hybrid
B. If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG 100
C. If the VLAN TAG carried in the data frame is 200, the switch strips off the VLAN TAG
D. If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it out

A

D. If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it out

143
Q

*SA-C
QUESTION NO: 145
In the network shown in the figure below, host A logs in to router A through Telnet, and then
obtains the configuration file of router B through FTP on the remote interface. How many TCP connections exist on router A at this time?

A.1
B.2
C.3
D.4

A

C.3

144
Q

*SA-C
QUESTION NO: 150
When the router is powered on, it will read the configuration file from the default storage path to initialize the router. If there is no configuration file in the default storage path, what will the router use for initialization?

A. Initial configuration
B. Current configuration
C. New configuration
D. Default parameters

A

D. Default parameters

145
Q

*SA-C
QUESTION NO: 151
If the MAC address of an interface is 0OEO-FCEF-OFEC, what is its corresponding EUI-64 address?

A.00EO-FCEF-FFFE-OFEC
B.02EO-FCFF-FEEF-0FEC
C.00EO-FCFF-FEEF-0FEC
D.02EO-FCEF-FFFE-0FEC

A

B.02EO-FCFF-FEEF-0FEC

146
Q

*SA-C
QUESTION NO: 152
What is the value of TPID defined by IEEE802.1Q?

A.0x8200
B.0x7200
C.0x8100
D.0x9100

A

C.0x8100

147
Q

*SA-C
QUESTION NO: 154
When using the FTP protocol to upgrade the router software, which of the following
transmission mode should be selected?

A. Binary mode
B. Byte mode
C. Text mode
D. Stream byte mode

A

A. Binary mode

148
Q

*SA-C
QUESTION NO: 157
What is the role of the command port trunk allow pass vlan all?

A. If the port default vlan 3 command is configured for the connected remote device, VLAN 3
cannot communicate between the two devices
B. All VLAN data frames are allowed to pass through this port
C. The connected peer device can dynamically determine which VLAN IDs are allowed to pass
D. The opposite port connected to the port must be configured with port trunk permit vlan all

A

B. All VLAN data frames are allowed to pass through this port

149
Q

*SA-C
QUESTION NO: 158
The MAC address table of existing switches is shown in the figure. Which of the following statement is correct?

A. The MAC address 5489-9885-18a8 is manually configured by the administrator
B. The MAC address 5489-9811-0b49 is manually configured by the administrator
C. The MAC address 5489-989d-1d30 is manually configured by the administrator
D. After the switch restarts, all MAC addresses need to be relearned

A

B. The MAC address 5489-9811-0b49 is manually configured by the administrator

150
Q

*SA-C
QUESTION NO: 161
Which of the following advantages does the router-on-a-stick approach achieve routing
intercommunication between VLANs?

A. Reduce the number of equipment
B. Reduce routing table entries
C. Reduce the use of IP addresses
D. Reduce the number of chain connections

A

D. Reduce the number of chain connections

151
Q

*SA-C
QUESTION NO: 162
In the switch MAC address table, which of the following entries will not age?

A. Dynamic MAC address table entry
B. Static MAC address table entry
C. Port MAC address table entry
D. Device MAC address table entry

A

B. Static MAC address table entry

152
Q

*SA-C
QUESTION NO: 164
On the VRP platform, the default protocol priority of routes in the direct routing, static routing, RIP, OSPF area is:

A. Direct routing,OSPF,Static routing,RIP
B. Direct routing,Static routing,RIP,OSPF
C. Direct routing,RIP,Static routing,OSPF
D. Direct routing,OSPF,RIP,Static routing

A

A. Direct routing,OSPF,Static routing,RIP

153
Q

*SA-C
QUESTION NO: 165
Which of the following statement about MPLS Labe1 statement label is wrong?

A. The label is encapsulated between the network layer and the transport layer
B. The tags are carried by the head of the packet, does not contain topology Information.
C. The label is used to uniquely identify the forwarding equivalence class FEC to which a packet belongs
D. The label is a short identifier with a fixed length. It has only local meaning.

A

A. The label is encapsulated between the network layer and the transport layer

154
Q

*SA-C
QUESTION NO: 166
Which of the following IEEE802.11 standards only supports 2.4GHz frequency band for communication?

A.802.11a
B.802.11g
C.802.11ax
D.802.11n

A

B.802.11g

155
Q

*SA-C
QUESTION NO: 167
Which of the following information prompts will the VRP operating platform use for incomplete input commands?

A.Error :Ambiguous command found at’ position
B.Error :Incomplete command found at’ position
C.Error: Too many parameters found at’ position
D.Error: Wrong parameter found at ‘position

A

B.Error :Incomplete command found at’ position

156
Q

*SA-C
QUESTION NO: 172
The network administrator configures the Huawei router RTA as shown in the figure. If a user needs to be authenticated in the authentication domain “huawei”, the correct description below is ().
[RTA]aaa
[RTA-aaa]domain Huawei
RTA-aaa-domain-huawei]authentication-s cheme aul
[RTA-aaa-domain-huawei]authentication-scheme au2

A. “authentication-scheme aul” authentication will be used, if “au1” is deleted, “au2”
authentication will be used
B. Will use “au2” authentication and will use “authentication-scheme au1” authentication
C. Will use “authentication-scheme au2” authentication
D. “authentication-scheme au2” authentication will be used, if “au2” is registered, “aul”
authentication will be used

A

A. “authentication-scheme aul” authentication will be used, if “au1” is deleted, “au2”

157
Q

*SA-C
QUESTION NO: 174
Which information of the data frame does the VLANIF interface use to determine whether to perform Layer 2 or Layer 3 forwarding?

A. Destination MAC
B. Source MAC
C. Destination port
D. Source IP

A

A. Destination MAC

158
Q

*SA-C
QUESTION NO: 176
What is the IEEE802.11 standard corresponding to Wi-F16?

A.802.11au
B.802.11ax
C.802.11at
D.802.11ac

A

B.802.11ax

159
Q

*SA-C
QUESTION NO: 179
If a windows host is started for the first time, if the IP address is obtained by DHCP, then what is the source IP address of the first packet sent by this host?

A.127.0.0.1
B.169.254.2.33
C.0.0.0.0
D.255.255.255.255

A

C.0.0.0.0

160
Q

*SA-C
QUESTION NO: 183
If the Length/Type of an Ethernet data frame is 0X8100, which of the following is correct?

A. This data frame must carry VLAN TAG
B. There must be a UDP header in the upper layer of this data frame
C. There must be an IP header in the upper layer of this data frame
D. There must be a TCP header in the upper layer of this data frame

A

C. There must be an IP header in the upper layer of this data frame

161
Q

*SA-C
QUESTION NO: 184
In the WLAN architecture, the FIT AP cannot work independently and needs to be managed by the AC. Which of the following protocols are used to communicate between FIT AP and AC?

A. IPsec
B.WEP
C.CAPWAP
D.WAP

A

C.CAPWAP

162
Q

*SA-C
QUESTION NO: 185
In the network shown in the figure below, the bridge ID of the switch has been marked. Enter the command stp root secondary on the SWD switch, and which of the following switch will become the root bridge of this network?

A.SWC
B.SWA
C.SWB
D.SWD

A

B.SWA

163
Q

*SA-C
QUESTION NO: 186
CAPWAP protocol stipulates the communication standard between AC and Ap. Which of the following statements about CAPWAP protocol is correct?

A. CAPWAP is an application layer protocol based on TCP transmission
B. In order to establish a CAPWAP tunnel, FIT Ap can only discover AC through broadcast messages
C.CAPWAP In order to reduce the burden on the AP, a tunnel is used to transmit control messages and data messages at the same time
D. AP can encapsulate the user’s data message in CAPWAP and forward it by AC

A

B. In order to establish a CAPWAP tunnel, FIT Ap can only discover AC through broadcast messages

164
Q

*SA-C
QUESTION NO: 190
When Huawei switches allow STP, the priority of the switch is by default:

A.32768
B.8192
C.16384
D.4096

A

A.32768

165
Q

*SA-C
QUESTION NO: 191
In the network shown in the figure below, host A is not configured with a gateway, and host B has the ARP cache of the gateway. Use the command ping 11.0.12.1 on host A. Which of the following statements are correct?

A. No data packets will be sent from host A
B. The IP address of the data packet sent by host A is 11.0.12.1
C. The destination MAC address of the data frame sent by host A is MAC-C
D. The destination MAC address of the data frame sent by host A is MAC-B

A

A. No data packets will be sent from host A

166
Q

*SA-C
QUESTION NO: 192
Which of the following packet types is used by RADIUS to indicate authentication rejection?

A.Access-Accept
B.Access-Request
C.Access-Challenge
D.Access-Reject

A

D.Access-Reject

167
Q

*SA-C
QUESTION NO: 193
Which of the following parameters is not included in the configuration BPDU of the STP
protocol?

A. Port ID
B. VLAN ID
C.Bridge ID
D.Root ID

A

B. VLAN ID

168
Q

*SA-C
QUESTION NO: 194
The number of VLANs that can be created using the commands “vlan batch 10 20” and “vlan batch 10 to 20” respectively is

A.11 and 11
B.11 and 2
C.2 and 2
D. 2 and 11

A

D. 2 and 11

169
Q

*SA-C
QUESTION NO: 196
Which of the following types of addresses is not included in IPv6 addresses?

A. Anycast address
B. Broadcast address
C. Unicast address
D. Multicast address

A

B. Broadcast address

170
Q

*SA-C
QUESTION NO: 197
Which of the following advantages does router-on-a-stick achieve inter-VLAN routing intercommunication?

A. Reduce the number of equipment
B. Reduce the use of IP addresses
C. Reduce the number of link connections
D. Reduce routing table entries

A

C. Reduce the number of link connections

171
Q

*SA-C
QUESTION NO: 202
When the host frequently moves, which VLAN division method is most appropriate?

A. Based on AC address division
B. Based on strategy division
C. Based on IP subnet division
D. Based on port division

A

C. Based on IP subnet division

172
Q

*SA-C
QUESTION NO: 203
Now it is necessary to implement a Python automation script Te1net to the device to view the device running configuration. Which of the following statements is wrong?

A. Telnetlib can achieve this function.
B. Use telnet.Telnet (host) to connect to the Telnet server.
C. can use telnet.write(b”display current-configuration \n”) to input the command to view the
current configuration of the device.
D. telnet.c1ose() is used after a command entered every time, the function is that the user
waits for the switch to return information.

A

D. telnet.c1ose() is used after a command entered every time, the function is that the user
waits for the switch to return information.

173
Q

*SA-C
QUESTION NO: 206
When configuring the router through the Console, what is the correct setting of the terminal emulation program?

A.19200bps, 8 data bits, 1 stop bit, no checksum and no flow control
B. 9600bps, 8 data bits, 1 stop bit, even parity and hardware flow control
C.9600bps, 8 data bits, 1 stop bit, no checksum and no flow control
D. 4800bps, 8 data bits, 1 stop bit, odd checksum and no flow control

A

C.9600bps, 8 data bits, 1 stop bit, no checksum and no flow control

174
Q

*SA-C
QUESTION NO: 207
The output information of the link aggregation port of a certain switch is as follows. If you want to delete Eth-Trunk 1, which of the following commands is correct?

A.undo interface Eth-trunk 1
B.inte GigabitEthernet 0./0/2 Undo eth-trunk Quit Undo interface eth-trunk 1
C.inte GigabitEthernet 0./0/1 Undo eth-trunk Quit inte GigabitEthernet 0./0/2 Undo eth-trunk
Quit
D.inte GigabitEthernet 0./0/1 Undo eth-trunk Quit Undo interface eth-trunk 1

A

A.undo interface Eth-trunk 1

175
Q

*SA-C
QUESTION NO: 209
In the network shown in the figure below, the host has an ARP cache, and host A sends a packet to host B. What are the destination MAC and destination IP of this packet?

A. MAC-B,11.0.12.1
B. MAC-D,11.0.12.1
C. MAC-C,10.0.12.2
D. MAC-A,11.0.12.1

A

A. MAC-B,11.0.12.1

176
Q

*SA-C
QUESTION NO: 212
By default, how long is the lease period of the IP address assigned by the DHCP server?

A.12h
B.1h
C.24h
D.18h

A

C.24h

177
Q

*SA-C
QUESTION NO: 217
When planning the campus network, which of the following mask lengths is recommended for device interconnection IP addresses?

A.16
B.32
C.24
D.30

A

D.30

178
Q

*SA-C
QUESTION NO: 218
As shown in the figure, the two switches use the default parameters to run STP, the configuration command STP root primary is used on switch A, and the configuration command STP priority 0 is used on switch B. Then which port will be blocked?

A. G0/0/1 of switch B
B. G0/0/1 of switch A
C. HUB’s G0/0/3
D. G0/0/2 of switch A

A

D. G0/0/2 of switch A

179
Q

*SA-C
QUESTION NO: 220
Which of the following statements about Trunk port and Access port are correct?

A. Trunk ports can only send untagged frames
B. Access port can only send tagged frames
C. Trunk ports can only send tagged frames
D. Access port can only send untagged frames

A

D. Access port can only send untagged frames

180
Q

*SA-C
QUESTION NO: 221
In the network shown in the figure below, assuming that all routers enable the OSPF protocol at the same time, which router is the BDR in this network?

A.Router D
B.Router B
C.Router C
D.Router A

A

D.Router A

181
Q

*SA-C
QUESTION NO: 222
What is the main function of the DNS protocol?

A. Domain name resolution
B. File transfer
C. Remote access
D. Mail transmission

A

A. Domain name resolution

182
Q

*SA-C
QUESTION NO: 233
In the campus network planning, which of the following ways can business VLAN be divided?

A. Divide vlan by access member structure
B. Divide VLAN by business
C. Divide VLAN by logical area
D. Divide VLAN by geographical area

A

B. Divide VLAN by business

183
Q

*SA-C
QUESTION NO: 234
In standard STP mode, which of the following non-root switches will forward the TC set BPDU generated by the root switch?

A. Designated port
B. Root port
C. Backup port
D. Preparation port

A

B. Root port

184
Q

*SA-C
QUESTION NO: 236
The following statements about the election of active ports in link aggregation LACP mode. Which is correct?

A. Compare the priority of the interface first, and it is impossible to determine the better one to continue to compare the interface number, the smaller the better.
B. Only compare interface priority
C. Compare device priority
D. Only compare interface numbers

A

A. Compare the priority of the interface first, and it is impossible to determine the better one to continue to compare the interface number, the smaller the better.

185
Q

*SA-C
QUESTION NO: 238
Which statement is wrong about the ARP message?

A. ARP reply packets are sent unicast
B. Any link layer protocol requires ARP messages to assist in obtaining data link layer identification
C. ARP packets cannot be forwarded to other broadcast domains
D. ARP request message is sent by broadcast

A

B. Any link layer protocol requires ARP messages to assist in obtaining data link layer identification

186
Q

*SA-C
QUESTION NO: 241
A network engineer prompts the following information when entering the command line: Error: Unrecognized command found at ‘ ^ ‘ position. Which of the prompt information is correct?

A. The input command is incomplete
B. Wrong parameter type
C. No keyword found
D. Input command is not clear

A

C. No keyword found

187
Q

*SA-C
QUESTION NO: 242
Which statement about the Hybrid port is correct?

A. When the Hybrid port sends data frames, it must carry VLAN TAG
B. Hybrid port only receives data frames with VLAN TAG
C. Hybrid port can strip TAG of VLAN in the direction of the interface
D. Hybrid port does not require PVID

A

C. Hybrid port can strip TAG of VLAN in the direction of the interface

188
Q

*SA-C
QUESTION NO: 244
A device has been configured to complete the Telnet configuration. The device login address is 10.1.1.10. The Telnet user name is admin and the password is Huawei@123. Which of the following is the correct way to log in to this device using telnetlib?

A.telnetlib.Telnet ( 10.1.1.0,23,admin,Huawei@123 )
B.telnetlib.Telnet ( 10.1.1.0 )
C.telnetlib.Telnet ( 10.1.1.0,23, Huawei@123 )
D.telnetlib.Telnet ( 10.1.1.0,admin )

A

A.telnetlib.Telnet ( 10.1.1.0,23,admin,Huawei@123 )

189
Q

*SA-C
QUESTION NO: 247
VRP supports OSPF multi-process. If the process number is not specified when 0SPF is enabled, the process number used by default is ().

A.10
B.100
C.0
D.1

A

C.0

190
Q

*SA-C
QUESTION NO: 248

Which of the following statements is correct?
A. The router works at the physical layer
B. The switch works at the physical layer
C. The switch works at the network layer
D. The router works at the network layer

A

D. The router works at the network layer

191
Q

*SA-C
QUESTION NO: 249
In what state does the OSPF protocol determine the master-slave relationship of DD packets?

A.ExStart
B.Full
C.2-way
D.Exchange

A

C.2-way

192
Q

*SA-C
QUESTION NO: 250
What is the priority value of the direct route entry?

A.0
B.30
C.10
D.20

A

A.0

193
Q

*SA-C
QUESTION NO: 252
Connection between switches and hosts, which port link type is often used by the switch?

A. Access link
B. Trunk link
C. Trunk link
D. Hybrid link

A

A. Access link

194
Q

*SA-C
QUESTION NO: 254
Among the following commands to configure the default route, which one is correct?

A.[Huawei-Seria10] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0
B.[Huawei] ip route-static 0.0.0.0 0.0.0.0 192.168.1.1
C.[Huawei] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0
D.[Huawei] ip route-static 0.0.0.0 255.255.255.255 192.168.1.1

A

B.[Huawei] ip route-static 0.0.0.0 0.0.0.0 192.168.1.1

195
Q

*SA-C
QUESTION NO: 256
What address does 192.168.1.127/25 represent?

A. Broadcast
B. Multicast
C. Network
D. Host

A

A. Broadcast

196
Q

*SA-C
QUESTION NO: 258
When the Trunk port send the data frame, how to deal with?

A. When the VLAN ID is the same as the PVID of the port and is a VLAN ID allowed by the port, remove the Tag and send the message
B. When the VLAN ID is different from the PVID of the port, the data frame is dropped
C. When the VLAN ID is different from the PVID of the port, replace it with PVID forwarding
D. When the VLAN ID is different from the PVID of the port, strip off the TAG and forward

A

A. When the VLAN ID is the same as the PVID of the port and is a VLAN ID allowed by the port, remove the Tag and send the message

197
Q

*SA-C
QUESTION NO: 260
The administrator has configured the AR2200 as shown in the figure, then which of the following description of the configuration information is correct?

A. The saved configuration file will be replaced by the running configuration file
B. If the user wants to clear the next startup configuration file of the device configuration, then should select “N”
C. If the user wants to clear the next startup configuration file of the device configuration, then should select “Y”
D. The next startup file of the device configuration will be retained

A

C. If the user wants to clear the next startup configuration file of the device configuration, then should select “Y”

198
Q

*SA-C
QUESTION NO: 262
In the WLAN network architecture, what is terminal equipment that supports the 802.11 standard called?

A.Client
B.AC
C.STA
D.AP

A

C.STA

199
Q

*SA-C
QUESTION NO: 264
Before the STA associates with the AP, it needs to exchange some messages to obtain the SSID. What are these messages?

A. Discovery
B. Beacon
C. Probe
D. ResponseProbe Request

A

D. ResponseProbe Request

200
Q

*SA-C
QUESTION NO: 265
The network administrator hopes to effectively use the IP address of the 192.168.176.0/25 network segment. Now that the company’s marketing department has 20 hosts, which of the following is the best address segments allocated to the marketing department?

A. 192.168.176.160/27
B. 192.168.176.0/25
C. 192.168.176.96/27
D. 192.168.176.48/29

A

A. 192.168.176.160/27

201
Q

*SA-C
QUESTION NO: 267
The administrator has configured the router as shown in the figure, then what IP address can a host connected to the G1/0/0 interface of the router obtain through DHCP?

A. The IP address data obtained by the host 10.10.10.0/24
B. The IP address obtained by the host may belong to the 10.10.10.0/24 network, or it may belong to the 10.20.20.0/24 network
C. The host cannot obtain an IP address
D. The IP address obtained by the host belongs to the 10.20.20.0/24 network

A

A. The IP address data obtained by the host 10.10.10.0/24

202
Q

*SA-C
QUESTION NO: 269
If the Length/Type of an Ethernet data frame = 0x8100, which of the following statements is correct?
A. There must be an IP header in the upper layer of this data frame
B. This data frame must carry VLAN TAG
C. There must be a UDP header in the upper layer of this data frame
D. There must be a TCP header in the upper layer of this data frame

A

B. This data frame must carry VLAN TAG

203
Q

*SA-C
QUESTION NO: 271
If the broadcast address of a network is 172.16.1.255, what might its network address be?

A.172.16.2.0
B.172.16.1.128
C.172.16.1.1
D.172.16.1.253

A

B.172.16.1.128

204
Q

*SA-C
QUESTION NO: 276
Which of the following descriptions about firewalls is wrong?

A. Firewall can realize user identity authentication
B. Firewall can realize access control between different networks
C. Firewall can isolate networks with different security levels
D. The firewall cannot achieve network address translation

A

D. The firewall cannot achieve network address translation

205
Q

*SA-C
QUESTION NO: 277
After the administrator successfully logs in to the router through Telnet, and finds that the router’s interface IP address cannot be allocated, the possible reasons are ()

A. The Telnet user level is incorrectly configured
B. SNMP parameter is incorrectly configured
C. The Telnet user authentication mode is incorrectly configured
D. The administrator uses the telnet terminal software to prohibit the corresponding operation

A

A. The Telnet user level is incorrectly configured

206
Q

*SA-C
QUESTION NO: 278
In the network shown in the figure below, the router receives a data packet with a destination IP address of 11.0.12.1 from host A. After this data packet is forwarded by the router, what are the destination MAC and
destination IP?
A. MAC-C, 11.0.12.1
B. MAC-D, 10.0.12.2
C. MAC-D, 11.0.12.1
D. MAC-B, 11.0.12.1

A

C. MAC-D, 11.0.12.1

207
Q

*SA-C
QUESTION NO: 279
The configuration information of a certain port of the switch is shown in the figure, then the port will strip off the VLAN TAG when sending data frames carrying which VLAN?

A.4.6
B.1.4.5.6
C.4.5.6
D.1.4.6

A

D.1.4.6

208
Q

*SA-C
QUESTION NO: 280
If the largest number in an ACL rule is 12, by default, the user does not specify a number when configuring a new rule, then what is the number assigned by the system for the new rule?

A.13
B.15
C.14
D.16

A

B.15

209
Q

```

~~~

*SA-C
QUESTION NO: 281
By default, the port cost calculated by STP has a certain relationship with the port bandwidth, that is, the greater the bandwidth, the () the cost.
A. greater
B. Consistent
C. Not necessarily
D. smaller

A

D. smaller

210
Q

*SA-C
QUESTION NO: 282
Which of the following statement about static routing is wrong?

A. Cannot automatically adapt to changes in network topology
B. Manual configuration by the network administrator
C. Low system performance requirements
D. Routers need to exchange routing information

A

D. Routers need to exchange routing information

211
Q

*SA-C
QUESTION NO: 283
The host’s IPv4 address is 200.200.200.201/30. Which of the following hosts has an IPv4 address and its communication does not need to be forwarded by a router?

A.200.200.200.202
B.200.200.200.200
C.200.200.200.203
D.200.200.200.1

A

A.200.200.200.202

212
Q

*SA-C
QUESTION NO: 287
In the network shown in the figure below, all routers run OSPF protocol. Above the link is the value of the Cost value, then the path for RTA to reach the network 10.0.0.0/8 is:

A.A-B-D
B.RTA cannot reach 10.0.0.0/8
C.A-C-D
D.A-D

A

C.A-C-D

213
Q

*SA-C
QUESTION NO: 288
An existing switch is connected to a designated port through a port, but the port does not forward any packets, but can monitor network changes by receiving BPDUs, then what is the role of the port?

A. Designated port
B. Alternate port
C. Disable port
D. Root port

A

B. Alternate port

214
Q

*SA-C
QUESTION NO: 289
Which of the following port states is not included in the RSTP protocol?

A. Learning
B. Discarding
C. Forwarding
D. Blocking

A

D. Blocking

215
Q

*SA-C
QUESTION NO: 291
If during the PPP authentication process, the authenticatee sends the wrong user name and password to the authenticator, what type of message will the authenticator send to the authenticatee?

A.Authenticate-Reject
B.Authenticate-Ack
C.Authenticate-Nak
D.Authenticate-Reply

A

C.Authenticate-Nak

216
Q

*SA-C
QUESTION NO: 293
The router output information is shown in the figure. Which of the following statements is wrong?

A. The IP address of the Ethernet0/0/0 interface is 10.0.12.1/24
B. The MTU value of the Ethgrnet0/0/0 interface is 1480
C. The physical link of the Ethernet0/0/0 interface is normal
D. The broadcast address corresponding to the Ethernet0/0/0 interface is 10.0.12.255

A

B. The MTU value of the Ethgrnet0/0/0 interface is 1480

217
Q

*SA-C
QUESTION NO: 294
Which of the following fields is not included in the HELLO packet of the OSPF protocol?

A. Neighbor
B.Network mask
C.Sysname
D.Hellointerval

A

C.Sysname

218
Q

*SA-C
QUESTION NO: 297
Which of the following descriptions about wireless devices is correct?

A. The wireless device has no wired interface
B.FIT AP-like independent user access, Authentication, Forwarding services and other functions
C. Wireless Controller AC-like at the aggregation layer of the entire network, providing highspeed, Safe and Reliable VLAN business
D. FAT AP generally works with wireless controller

A

C. Wireless Controller AC-like at the aggregation layer of the entire network, providing highspeed, Safe and Reliable VLAN business

219
Q

*SA-C
QUESTION NO: 298
Which version of the SNMP protocol below supports encryption features?

A.SNMPv3
B.SNMPv2c
C.SNMPv1
D.SNMPv2

A

A.SNMPv3

220
Q

*SA-C
QUESTION NO: 304
As shown in the figure below, all hosts can pass normally, so what is correct about the
correspondence between the MAC address and the port in the MAC table of the SWB?

A.MAC-A GO/0/2 MAC-B G0/0/2 MAC-C G0/0/3
B.MAC-A G0/0/3 MAC-B G0/0/3 MAC-C GO/0/1
C.MAC-A G0/0/1 MAC-B G0/0/1 MAC-C G0/0/3
D.MAC-A G0/0/1 MAC-B G0/0/2 MAC-C G0/0/3

A

B.MAC-A G0/0/3 MAC-B G0/0/3 MAC-C GO/0/1

221
Q

*SA-C
QUESTION NO: 305
The picture shows the display startup information of AR2200 router. Regarding these information, which of the following statement iswrong?

A. next system startup file system can use the command “startup
B. The running configuration file is not saved
C. The system file used by the device this time is ar2220-v200r003c00spc00.cc
D. The system file cannot be modified when the device is started next time

A

D. The system file cannot be modified when the device is started next time

221
Q

*SA-C
QUESTION NO: 306
Which of the following IPv4 addresses the host uses cannot directly access the Internet?

A.100.1.1.1
B.50.1.1.1
C.10.1.1.1
D.200.1.1.1

A

C.10.1.1.1

222
Q

*SA-C
QUESTION NO: 307
As shown in the figure below, which of the following statements are correct?

A. Host A can ping host B
B. Host A and Host B cannot obtain each other’s MAC address
C. The following entry 10.0.12.5 MAC-B exists in the ARP cache of host A
D. The broadcast address of host A and host B are the same

A

B. Host A and Host B cannot obtain each other’s MAC address

223
Q

*SA-C
QUESTION NO: 308
If the broadcast address of a network is 172.16.1.255, then what may its network address
be?

A.172.16.1.128
B.172.16.2.0
C.172.16.1.1
D.172.86.1.253

A

A.172.16.1.128

224
Q

*SA-C
QUESTION NO: 310
Which of the following is not the reason for RSTP improving the convergence speed?

A. Introduction of edge ports
B. Fast switching of the root port
C. P/A mechanism
D. Forward Delay canceled

A

D. Forward Delay canceled

225
Q

*SA-C
QUESTION NO: 311
Which OSPF version below is suitable for IPv6?

A.OSPFv1
B.OSPFv2
C.OSPFv3
D.OSPFv4

A

C.OSPFv3

226
Q

*SA-C
QUESTION NO: 312
What is the Solicited-node multicast address corresponding to IPv6 address 2019:: 8:AB?

A.FF02 :: 1 :: FF08 : AB
B.FF02 :: FF08 : AB
C.FF02 :: 1 :: FF20 : 19
D.FF02 :: 1 :: FE08 : AB

A

A.FF02 :: 1 :: FF08 : AB

227
Q

*SA-C
QUESTION NO: 313
Which statement about SNMP protocol is correct?

A. SNMP uses UDP as the transport layer protocol
B. SNMP uses ICMP as the network layer protocol
C. SNMP protocol uses multicast to send management messages
D. The SNMP protocol only supports the sending of flash management messages on the
Ethernet link

A

A. SNMP uses UDP as the transport layer protocol

228
Q

*SA-C
QUESTION NO: 314
The subnet mask of a network segment 150.25.0.O is 255.255.224.0, then what is a valid host address in the network segment?

A.150.25.2.24
B.150.25.0.0
C.150.25.1.255
D.150.15.3.30

A

A.150.25.2.24

229
Q

*SA-C
QUESTION NO: 316
Which of the following descriptions about spanning tree designated ports is correct?

A. The designated port can forward configuration BPDU messages to the network segment connected to it.
B. The port on the root switch must not be a designated port.
C. Each switch has only one designated port.
D. The port on the root switch must be a designated port.

A

A. The designated port can forward configuration BPDU messages to the network segment connected to it.

230
Q

*SA-C
QUESTION NO: 317
What is the value of the Type field in the RStp configuration BPDU message?

A.Ox01
B.ox00
C.ox02
D.ox03

A

C.ox02

231
Q

*SA-C
QUESTION NO: 318
A company applies for a Class C address segment, which needs to be evenly distributed to 8 subsidiaries. The largest subsidiary has 14 computers. Different subsidiaries must be in different network segments. The subnet mask should be designed as ().

A. 255.255.255.240
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.0

A

A. 255.255.255.240

232
Q

*SA-C
QUESTION NO: 320
The output information of a switch is shown in the figure. Which of the following interfaces
can forward data frames with VLAN ID 40 and do not carry tags when forwarding?

A.GE0/0/2
B.GE0/0/5
C.GE0/0/3
D.GE0/0/4

A

B.GE0/0/5

233
Q

*SA-C
QUESTION NO: 325
Which of the following description of static and dynamic routing is wrong?

A. Dynamic routing protocols take up more system resources than static routing protocols.
B. After the link fails, the static route can automatically complete the network convergence.
C. After the administrator deploys the dynamic routing protocol in the corporate network, later
maintenance and expansion can be more convenient
D. Static routing is simple to configure and easy to manage when applied in the enterprise

A

B. After the link fails, the static route can automatically complete the network convergence.

234
Q

*SA-C
QUESTION NO: 326
The MAC address table of the existing switch is shown in the figure. Which of the following statements are correct?

A. When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be relearned
B. When the switch restarts, the MAC address learned by port Eth0/0/3 needs to be learned again
C. The data frame with the source MAC address of 5489-9811-0b49 and the destination MAC address of 5489-9894-1d30 received from the port is forwarded from the Eth0/0/2 port
D. The data frame with the source MAC address of 5489-9885-18a8 and the destination MAC address of 5489-989d-1d30 received from the port is forwarded from the Eth0/0/1 port

A

D. The data frame with the source MAC address of 5489-9885-18a8 and the destination MAC address of 5489-989d-1d30 received from the port is forwarded from the Eth0/0/1 port

235
Q

*SA-C
QUESTION NO: 327
What kind of message does the OSPF protocol use to send LSA to neighbors?

A. LSU
B. LSACK
C. LSR
D. LSA

A

A. LSU

236
Q

*SA-C
QUESTION NO: 328
What type of IPv6 address FE80: 2E0: FCFF: FE6F: 4F36 belongs to?

A. Multicast address
B. Link local address
C. Global semicast address
D. Anycast address

A

B. Link local address

237
Q

*SA-C
QUESTION NO: 331
What is the full name of the general routing platform VRP?

A.Versatile Redundancy Platform
B.Versatile Routing Protocol
C.Versatile Routing Platform
D.Virtual Routing Platform

A

C.Versatile Routing Platform

238
Q

*SA-C
As shown in the figure, there is a web server in the private network that needs to provide HITRP services to public network users. Therefore, the network administrator needs to configure NAT on the gateway router RTA to achieve the requirements. Which of the
following configuration can meet the requirement?

A.RTA-Gigabitethernet0/0/1]nat server protocol tcp global 192.168.1.1 www inside 202.10.10.18080
B.[RTA-Seria11/0/1]nat server protocol tcp global 192.168.1.1 www inside 202.10.10.1 8080
C.[RTA-Gigabitethernet0/0/1]nat server protocol tcp global 202.10.10.1 www inside 192.168.1.18080
D.[RTA-Serial1/0/1]nat server protocol tcp global 202.10.10.1 www inside 192.168.1.1 8080

A

D.[RTA-Serial1/0/1]nat server protocol tcp global 202.10.10.1 www inside 192.168.1.1 8080

239
Q

*SA-C
QUESTION NO: 335
In order to join the wireless network STA needs to obtain wireless network information first. Which of the following messages is used by the STA to actively obtain the SSID information?

A.Probe
B.Join
C.Discovery
D.Beacon

A

A.Probe

240
Q

*SA-C
QUESTION NO: 336
Which of the following authentication methods does not require the user name and password?

A. authentication-mode local
B. authentication-mode none
C.authorization-mode hwtacacs
D.Authentication-mode hwtacacs

A

B. authentication-mode none

241
Q

*SA-C
QUESTION NO: 337
What is the total length of the IPv6 address in bits?

A.96
B.64
C.32
D.128

A

D.128

242
Q

*SA-C
QUESTION NO: 338
Broadly speaking, which of the following does the transmission medium that constitutes the wireless local area network wlan not include?

A. Ray
B. Radio waves
C. Infrared
D. Laser

A

A. Ray

243
Q

*SA-C
QUESTION NO: 339
The priority of the LACP protocol is shown in the figure. Switch A and Switch B adopt LACP mode link aggregation, and all interfaces join the link aggregation group. At the same time,
set the maximum number of active ports to 3. Which interface of switch A is not active port?

A. G0/0/1
B. G0/0/3
C. G0/0/0
D. G0/0/2

A

B. G0/0/3

244
Q

*SA-C
QUESTION NO: 340
Which of the following does not include in VRP system login method?

A.Telnet
B.Netstream
C.SSH
D.web

A

B.Netstream

245
Q

*SA-C
QUESTION NO: 341
In order to implement the FIT AP online, the FIT AP first needs to obtain the IP address of the AC. Which of the following is not included in the method of obtaining the IP address of the AC by the FIT AP?

A. Broadcasting method
B. Static designation method on AP
C. Multicast mode
D. DHCP Option mode

A

A. Broadcasting method

246
Q

*SA-C
QUESTION NO: 343
Which of the following cannot be the length of the IPv4 packet header?

A.32B
B.60B
C.20B
D.64B

A

D.64B

247
Q

*SA-C
QUESTION NO: 344
In the network shown in the figure below, two switches are connected by four links, COPPER refers to electrical interface, and FIBER refers to optical interface. Which of the following two interfaces can achieve link aggregation?

A.G0/0/2 and G0/0/1
B.G0/0/3 and FE0/0/3
C.G0/0/3 and G0/0/1
D.G0/0/2 and FE0/0/3

A

C.G0/0/3 and G0/0/1

248
Q

*SA-C
QUESTION NO: 347
After the link authentication is completed, the STA will continue to initiate link service negotiation. Which of the following messages is used to achieve the specific negotiation?

A.Join
B.Handshake
C.Association
D.Negotiate

A

D.Negotiate

249
Q

*SA-C
Which of the following does not be included in AAA?

A.Authentication
B.Accounting
C.Authorization
D.Audit

A

D.Audit

250
Q

*SA-C
QUESTION NO: 352
What kind of message does the DHCP server use to confirm that the host can use the IP address?

A. DHCP DISCOVER
B. DHCP ACK
C. DHCP OFFER
D. DHCP REQUSET

A

C. DHCP OFFER

251
Q

*SA-C
QUESTION NO: 354
VRP operating platform, which of the following commands can only view static routes?

A.display ip routing-table statistics
B.display ip routing-table verbose
C.display ip routing-table
D.display ip routing-table protocol static

A

D.display ip routing-table protocol static

252
Q

*SA-C
QUESTION NO: 356
When using FTP for file transfer, how many TCP connections will be established?

A.2
B.1
C.3
D.4

A

A.2

253
Q

*SA-C
QUESTION NO: 357
In the OSI reference model, what can complete end-to-end error detection and flow control?

A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer

A

D. Transport layer

254
Q

*SA-C
QUESTION NO: 358
On the VRP operating platform, what is the command to display the current interface configuration in the interface view?

A. display users
B. display version
C.display this
D.display ip interfacebrief

A

C.display this

255
Q

*SA-C
QUESTION NO: 361
As shown in the figure, all four switches run STP, and various parameters adopt default values. If the G0/0/2 port of switch C is blocked and the configuration BPDU cannot be sent through this port, how long will it take for the blocked port in the network to enter the forwarding state?

A. about 3 seconds
B. about 50 seconds
C. about 30 seconds
D. about 15 seconds

A

B. about 50 seconds

256
Q

*SA-C
QUESTION NO: 362
The two switches shown in the figure below have both enabled the STP protocol. Which port will eventually be in the Blocking state?

A. G0/0/2 port of SWB
B. G0/0/3 port of SWB
C. G0/0/2 port of SWA
D. G0/0/3 port of SWA

A

D. G0/0/3 port of SWA

257
Q

*SA-C
QUESTION NO: 363
What is the length of the Ethernet_II frame containing the Ethernet header?

A.60-1560B
B.46-1500B
C.64-1500B
D.64-1518B

A

B.46-1500B

258
Q

*SA-C
QUESTION NO: 364
Which of the following are not the characteristics of a small-sized campus network?

A. Simple network level
B. Fewer users
C. Simple network requirements
D. Wide coverage

A

D. Wide coverage

259
Q

*SA-C
QUESTION NO: 366
How many bits are there in the VLAN ID in the VLAN format defined by IEEE802.1Q?

A.12
B.6
C.10
D.8

A

A.12

260
Q

*SA-C
QUESTION NO: 367
In the history of WLAN development, which of the following is not included in the main wireless protocol standards in the primary mobile office era?

A.802.11g
B.802.11a
C.802.11b
D.802.11ac

A

D.802.11ac

261
Q

*SA-C
QUESTION NO: 368
Which of the following protocols does the RA message used by IPv6 stateless autoconfiguration belong to?

A.IGMPv6
B.ICMPv6
C.UDPv6
D.TCPv6

A

B.ICMPv6

262
Q

*SA-C
QUESTION NO: 370
Which of the following statements about Prefix Segment is wrong?

A. Prefix Segment spreads to other network elements through the IGP protocol, which is globally visible and effective
B. Prefix Segment needs to be configured manually
C. Prefix Segment is used to identify a destination address prefix in the network (Prefix)
D. Prefix Segment can be automatically allocated by IGP

A

D. Prefix Segment can be automatically allocated by IGP

263
Q

*SA-C
QUESTION NO: 375
The network administrator created VLAN 10 on the Layer 3 switch and configured an IP address under the virtual interface of the VLAN. When the command “display ip interface brief” is used to check the port status, it is found that the VLANIF 10 interface is in the down
state. What should be done to restore the VLANIF 10 interface to normal?

A. Add an interface that must be Up and must be of type Trunk into VLAN 10
B. Assign any physical interface to VLAN 10
C. Assign a physical interface that must be Up to VLAN 10
D. Use the command “undo shutdown” under VLANIF 10 interface

A

D. Use the command “undo shutdown” under VLANIF 10 interface

264
Q

*SA-C
QUESTION NO: 377
On which layer of the OSI reference model does the Ethernet switch work?

A. Network layer
B. Data link layer
C. Physical layer
D. Transport layer

A

B. Data link layer

265
Q

*SA-C
QUESTION NO: 378
The network administrator of a certain company wants to uniformly divide the users who often access the company network from different switches into VLAN 10 when they frequently change office locations. Which of the following methods should be used to divide
VLANs?

A. Divide VLAN based on protocol
B. Divide VLAN based on MAC address
C. Divide VLAN based on port
D. Divide VLAN based on subnet

A

D. Divide VLAN based on subnet

266
Q

*SA-C
QUESTION NO: 380
The OSI reference model from high-level to bottom-level is ().

A. Application layer, transport layer, network layer, data link layer, physical layer
B. Application layer, session layer, presentation layer, transport layer, network layer, data link layer, physical layer
C. Application layer, presentation layer, session layer, network layer, transport layer, data link layer, physical layer
D. Application layer, presentation layer, session layer, transport layer, network layer, data link layer, physical layer

A

D. Application layer, presentation layer, session layer, transport layer, network layer, data link layer, physical layer

267
Q

*SA-C
QUESTION NO: 382
Regarding the IPv6 address 2031:0000:720C:0000:0000:09E0:839A:130B, which of the following abbreviations is correct?

A.2031:0:720C:0:0:9E:839A:130B
B.2031:0:720C::9E0:839A:130B
C.2031:0:720C:0:0:9E0:839A:130B
D.2031::720C::9E0:839A:130B

A

B.2031:0:720C::9E0:839A:130B

268
Q

*SA-C
QUESTION NO: 385
In the network shown in the figure below, all routers run the OSPF protocol, and the link cost
value is shown in the figure. What is the cost value of the route entry to the network 10.0.0.0/8 in the RTA routing table?

A.70
B.100
C.20
D.60

A

D.60

269
Q

*SA-C
QUESTION NO: 386
Which of the following IPv6 is a global unicast address?

A.2001::12:1
B.FF02::1
C.FF::02::2E0:FCFF:FEEF:FEC
D.FEE:FCFF:FEEF:FEC

A

A.2001::12:1

270
Q

*SA-C
QUESTION NO: 387
The switch GO/0/1 port configuration information is shown in the figure. Which VLAN data frame does the switch forward without VLAN TAG?
interface GigabitEtherneto/o/1
port link-type trunk
port trunk pvid vlan 10
port trunk allow-pass vlan 10 20 304o

A.10
B.30
C.20
D.40

A

A.10

271
Q

*SA-C
QUESTION NO: 389
Which of the following IPv4 addresses can be used by a host to directly access the Internet?

A.192.168.1.1/24
B.172.32.1.1/24
C.172.16.255.254/24
D.10.255.255.254/24

A

B.172.32.1.1/24

272
Q

*SA-C
Which of the following statements about the role of STP protocol Forward Delay is correct?

A. Prevent temporary loops
B. There is a delay when the B1ocking state and the Disabled state are converted
C. Reduce the time interval of BPDu sending. Improve the convergence speed of STP
D. Improve the survival time of BPDUs to ensure that the configured BPDUs can be forwarded to more switches

A

A. Prevent temporary loops

273
Q

*SA-C
QUESTION NO: 392
It is known that there are two entries in the routing table of a router. If the router wants to forward packets with the destination address of 9.1.4.5, which of the following statements is correct?

A. Choose the second item as the best matching item, because the cost of the RIP protocol is small
B. Select the second item as the best matching item, because the route is a more accurate match relative to the destination 9.1.4.5
C. Choose the second item as the best match, because Ethernet0 is faster than serial0
D. Select the first item as the best matching item, because the priority value of the ospf protocol is higher

A

B. Select the second item as the best matching item, because the route is a more accurate match relative to the destination 9.1.4.5

274
Q

*SA-C
QUESTION NO: 394
After the network administrator uses the TracertRoute function on the router device, in the data packet sent by the router, what is the value of the Protoco1 field in the IPv4 header?

A.17
B.2
C.6
D.1

A

D.1

275
Q

*SA-C
QUESTION NO: 397
What is the range of VLAN ID that users can use?

A.1-4096
B.1-4094
C.0-4096
D.0-4095

A

B.1-4094

276
Q

*SA-C
QUESTION NO: 398
The device port running STP protocol is in Forwarding state. Which of the following statements is correct?

A. The port not only forwards user traffic but also processes BPDU packets.
B. The port only receives and processes BPDUs, and does not forward user traffic.
C. The port will build a MAC address table based on the received user traffic, but does not forward user traffic.
D. The port not only does not process BPDU packets, but also does not forward user traffic.

A

A. The port not only forwards user traffic but also processes BPDU packets.

277
Q

*SA-C
QUESTION NO: 400
To apply the ACL configured in the figure in Telnet, which of the following statements is
correct?

A. The device with IP address 172.16.105.4 can use Telnet service
B. The device with IP address 172.16.105.3 can use Telnet service
C. The device with IP address 172.16.105.5 can use Telnet service
D. The device with IP address 172.16.105.6 can use Telnet service

A

D. The device with IP address 172.16.105.6 can use Telnet service

278
Q

*SA-C
QUESTION NO: 401
What percentage does the DHCP client expect to send the lease renewal message for the first time?

A.0.5
B.0.875
C.1
D.0.25

A

A.0.5

279
Q

*SA-C
QUESTION NO: 402
In the network shown in the figure below, when the OSPF neighbor status is stable, what is the neighbor status of Router B and Router C?

A.Attempt
B.2-way
C.Fu11
D.Down

A

B.2-way

280
Q

*SA-C
QUESTION NO: 403
Which of the following messages is used by AP to request software version from AC?

A.VRP System Request
B.Software Request
C.Image Data Request
D.Image package Request

A

C.Image Data Request

281
Q

*SA-C
QUESTION NO: 404
Which of the following levels is not a common network level in mid-sized campus network architecture?

A. Access layer
B. Core layer
C. Convergence layer
D. Network layer

A

D. Network layer

282
Q

*SA-C
QUESTION NO: 406
Which of the following parameters cannot be used in the advanced visit control list?

A. Protocol number
B. Destination port number
C. Physical interface
D. Time range

A

C. Physical interface

283
Q

*SA-C
QUESTION NO: 407
What is the maximum negotiation rate supported by the IEEE 802.llg standard?

A.300Mbps
B.150Mbps
C.54Kbps
D.1200Mbps

A

C.54Kbps

284
Q

*SA-C
QUESTION NO: 408
When the Access type port sends a message, it will ().

A. Send messages with tag
B. Strip the VLAN information of the message, and then send it out
C. Type the PVID information of this port, and then send it out
D. Add the ZLAN message of the message, and then send it out

A

B. Strip the VLAN information of the message, and then send it out

285
Q

*SA-C
QUESTION NO: 409
In the network shown in the figure below, the output information of switch A is shown in the figure. Then in the MAC address table of switch A, which interface does the MAC address of host B correspond to?

A.GigabitEthernet 0/0/3
B.GigabitEthernet0/0/2
C.Eth-Trunk 1
D.GigabitEthernet0/0/1

A

C.Eth-Trunk 1

286
Q

*SA-C
QUESTION NO: 410
Which stage of the life cycle of campus network construction is the beginning of a project?

A. Network optimization
B. Network implementation
C. Planning and design
D. Network operation and maintenance

A

C. Planning and design

287
Q

*SA-C
QUESTION NO: 412
As shown in the figure below, suppose the MAC address table of SWA is as follows. Now host A sends a data frame with the destination MAC address MAC-B. Which of the following statements is correct?

A. Forward this data frame only from port G0/0/2
B. Forward this data frame only from port G0/0/3
C. STA discards the data frame
D. Flood this data frame

A

A. Forward this data frame only from port G0/0/2

288
Q

*SA-C
QUESTION NO: 415

How many types of OSPF messages are there?
A.2
B.4
C.5
D.3

A

C.5

289
Q

*SA-C
QUESTION NO: 416
What kind of message does the OSPF protocol use to discover and maintain neighbor relationships?

A.DD
B.LSR
C.LSU
D.HELLO

A

D.HELLO

290
Q

*SA-C
QUESTION NO: 418
The administrator wants to configure a hundred IP address on the G0/0/0 interface of the router, then which of the following addresses is correct?

A.192.168.10.112/30
B.237.6.1.2/24
C.127.3.1.4/28
D.145.4.2.55/26

A

D.145.4.2.55/26

291
Q

*SA-C
QUESTION NO: 421
If the application layer protocol is Te1net, what is the value of the Protoco1 field in the IPv4 header?

A.23
B.17
C.6
D.67

A

A.23

292
Q

*SA-C
QUESTION NO: 423
What is the data link layer MAC address of each VAP on the AP?

A.SSID
B.BSS
C.ESS
D.BSSID

A

D.BSSID

293
Q

*SA-C
QUESTION NO: 424
The IPv4 address assigned by the network administrator to a host in the network is 192.168.1.1/28. How many hosts can be added to the network where this host is located?

A.12
B.15
C.13
D.14

A

D.14

294
Q

*SA-C
QUESTION NO: 426
Which of the following statements about link aggregation is correct?

A. GE electrical interfaces and GE optical interfaces cannot be added to the same Eth-Trurnk interface.
B. Eth-Trurnk interfaces cannot be nested.
C. When two devices are connected, it is necessary to ensure that the link aggregation mode on both devices is the same.
D. GE interface and FE interface cannot be added to the same Eth-Trunk interface.

A

B. Eth-Trurnk interfaces cannot be nested.

295
Q

*SA-C
QUESTION NO: 427
The network management workstation manages network equipment through the SNMP protocol. When an abnormality occurs in the managed device, what kind of SHMP message will the network management workstation receive?

A. trap message
B. get-response message
C. set-request message
D. get-request message

A

A. trap message

296
Q

*SA-C
QUESTION NO: 429
In the network shown in the figure, which of the following description is correct?

A. The network between RTA and SWC is the same conflict domain
B. The network between SWA and SWC is the same conflict domain
C. The network between SWA and SWB is the same broadcast domain
D. The network between SWA and SWC is the same broadcast domain

A

B. The network between SWA and SWC is the same conflict domain

297
Q

*SA-C
QUESTION NO: 431
When building a campus network, which of the following protocols can be used to avoid Layer 2 loops?

A.SNMP
B.RSTP
C.NAT
D.OSPF

A

B.RSTP

298
Q

*SA-C
QUESTION NO: 432
In the RSTP standard, in order to improve the convergence speed, the port that the switch is directly connected to the terminal can be defined as ( ).

A. Edge port
B. Root port
C. Fast port
D. Backup port

A

A. Edge port

299
Q

*SA-C
QUESTION NO: 434
As shown in the figure, the correct description of this network topology is ().

A. There are 6 collision domains in this network
B. There are 2 broadcast domains in this network
C. There are 6 broadcast domains in this network
D. There are 12 conflict domains in this network

A

B. There are 2 broadcast domains in this network

300
Q

*SA-C
QUESTION NO: 435
How many more bytes are the packets using MPLS label double-layer nesting technology than the original IP packets?

A.32
B.8
C.4
D.16

A

B.8

301
Q

*SA-C
QUESTION NO: 438
As shown in the figure, RTA uses NAT technology and realizes multiple-to-multiple NAPT address translation by defining an address pool, so that hosts in the private network can access the public network. Suppose that there are only two public IP addresses in the
address pool, and they have been assigned to hosts A and B for address conversion, and if host C also wants to access the public network, which of the following description is correct?

A. Host C cannot be assigned a public network address and cannot access the public network
B. All hosts can access the public network by using the public network address in turn
C. RTA converts the source port of host C, and host C can access the public network
D. RTA assigns the interface address (200.10.10.3) to host C, host C can access the public network

A

C. RTA converts the source port of host C, and host C can access the public network

302
Q

*SA-C
The last option field of IPv4 is variable-length optional information. What is the maximum
length of this field?

A.10B
B.40B
C.60B
D.20B

A

D.20B

303
Q

*SA-C
QUESTION NO: 442
Which of the following SNMP packets are sent to the NMS by the Agent on the managed device?

A.Set-Request
B.Get-Request
C.Get-Next-Request
D.Response

A

D.Response

304
Q

*SA-C
Regarding the corresponding relationship between the access control list number and type, which of the following description is correct?

A. The basic access control list number range is 1000-2999
B. The access control list number range of the second layer is 4000-4999
C. The number range of interface-based access control list is 1000-2000
D. The range of advanced access control list numbers is 3000-4000

A

B. The access control list number range of the second layer is 4000-4999

305
Q

*SA-C
QUESTION NO: 447
The wireless access controller (AC, Access Cntroller) is the unified management and control device in the FIT AP architecture. Which of the following description of the role of AC is wrong?

A. No matter when the data is forwarded, the user’s data message will be forwarded by AC
B. User access control
C. User access authentication
D. AP configuration delivery

A

A. No matter when the data is forwarded, the user’s data message will be forwarded by AC

306
Q

*SA-C
QUESTION NO: 451
The bridge ID of the STP protocol in the switching network is as follows. Which of the following bridge ID switches will become the root bridge?

A.4096 00-01-02-03-04-DD
B.32768 00-01-02-03-04-AA
C.32768 00-01-02-03-04-CC
D.32768 00-01-02-03-04-BB

A

A.4096 00-01-02-03-04-DD

307
Q

*SA-C
QUESTION NO: 454
Which of the following commands can modify the device name to huawei?

A. Hostname Huawei
B. Sysname Huawei
C. Rename Huawei
D.Do name Huawei

A

B. Sysname Huawei