Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-261 Questions and Answers

Note! Following H12-261 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H12-261 Questions and Answers

Question # 6

Which of the following statements are true?

A.

SNMPv2c has privacy and uses usernames for authentication

B.

SNMPv3 has privacy and uses community for authentication

C.

SNMPv3 has privacy and uses usernames for authentication

D.

SNMPv1 has no privacy and uses community for authentication

E.

SNMPv2c has privacy and uses usernames for authentication

Full Access
Question # 7

Which of the following attacks are DoS (Denial of service) attacks?

A.

Single-packet attacks

B.

Flood attacks

C.

Man-in-the middle attacks

D.

Source IP address spoofing attacks

Full Access
Question # 8

Routers HW1 and HW2 are IP Multicast routers. These routers use (S, G) entries for multicast packet forwarding. Which of the following address types are used in the “S” entry?

A.

The block of administratively scoped multicast addresses

B.

Source Specific multicast addresses

C.

SDP/SAP addresses

D.

Any class A, Class B, or Class C host address

E.

GLOP addresses

Full Access
Question # 9

Switches use IPSG to verify the source address of IP packets. IPSG obtains the binding table by listening to the address resolution process.

A.

TRUE

B.

FALSE

Full Access
Question # 10

A bookstore provides a wired network for customers to learn online. However, some users are suddenly unable to access the network. After troubleshooting, it is found that all the IP addresses in the DHCP address pool have been used up. Which of the following is the best way to solve the problem?

A.

Configure static ARP binding entries

B.

Configure IPSG

C.

Configure DAI

D.

Limit the maximum number of DHCP snooping binding entries that can be learned on an interface.

Full Access
Question # 11

The LS Sequence Number field is used to detect expired and duplicate LSAs. This field is a signed 32-bit integer and therefore the minimum LS Sequence Number is 0x800000000.

A.

FALSE

B.

TRUE

Full Access
Question # 12

The default SSM group address range is 232.0.0.0/8. Which of the following configurations can be performed to modify the SSM group address range?

A.

Run the ssm-policy advanced-acl-number command in the system view to configure the SSM group address range

B.

Run the ssm-policy basic-acl-number command in the system view to configure the SSM group address range

C.

Run the ssm-policy advanced-acl-number command in the PIM view to configure the SSM group address range

D.

Run the ssm-policy basic-acl-number command in the PIM view to configure the SSM group address range

Full Access
Question # 13

When a Layer 2 switch sends IP packets originating from one VLAN to another, which of the following fields is rewritten?

A.

Layer 3 TTL

B.

Layer 3 source IP address

C.

Layer 3 transport protocol

D.

Layer 2 TTL

E.

Layer 3 destination IP address

Full Access
Question # 14

Router A has an IP route with the destination network segment of 10.0.0.1/32 and outbound interface of GigabitEthernet0/0/1. The following configuration is added:

Assume that router A receives a data packet with the destination IP address of 10.0.0.1.

Which of the following statements are true?

A.

If the source IP address of the data packet is 10.0.1.2, the data packet cannot be forwarded.

B.

If the source IP address of the data packet is 10.0.1.2, the data packet can be forwarded and the DSCP value is set to CS3.

C.

If the source IP address of the data packet is 10.0.1.1, the data packet can be forwarded and the DSCP value is set to CS3

D.

If the source IP address of the data packet is 10.0.1.2, the data packet can be forwarded and the DSCP value remains unchanged.

Full Access
Question # 15

Now there is a phone running RSTP. If the network topology changes, then the second table that is learned by the carrier will have what to change Turn?

A.

All tables are deleted

B.

Only the table related to the port that received the message will be deleted.

C.

Except for the table related to the port, the edge item is deleted, and other tables are deleted.

D.

If the aging time is set to 15 seconds, then the super aging entries will be deleted.

E.

Except for the table related to the port and the table related to the port that receives the edge item TC message, the other items are deleted.

Full Access
Question # 16

The following about the attribute BGP RD ( ) filter, is the description correct? Multiple selection

A.

If configured, but the route does not match any of the specified RD-filter RD RD Permit rules, the default match is then recognized.

B.

The use of the RD-filter ” configuration is the relationship between rules or

C.

If there is no configuration, but reference RD-filter RD-filter deny, this is the filter line, the match is the result

D.

Multiple, according to the configuration, the line matching rules

Full Access
Question # 17

The five classes in the OSPF LSA LSA are used for external route delivery.

A.

The external routing meter can be calculated by the ASBR LSA LSA in the same area as the router in the same area.

B.

The strategies for configuring the phase can be five ABR ASBR LSA should filter the class

C.

Category 5 LSA ASBR Stub/NSSA OSPF is advertised and flooded in the network in the non-region

D.

In the five types of LSA FA FA 0.0.0.0, the address is included, but the reservation is not effective.

Full Access
Question # 18

In the network, IPv6 A B A B NS B NA , two nodes and neighbors are neighbors. If the node sends a message to the node, if the node receives the message, it will reply.

The news, look at the point on the section A, what status will be the status of the neighborhood?

A.

Reachable

B.

Stale

C.

Probe

D.

Incomplete

Full Access
Question # 19

The following are about 802.1x RADIUS HWTACACS authentication, and which authentication is correct.

A.

RADIUSi HWTACACS, authentication and authentication can be more secure for the same user.

B.

Use the user 802.1x, Radius authentication network access network to complete the identity authentication.

C.

RADIUS HWTACACS, authentication and authentication mutual exclusion cannot be used in the same way.

D.

RADIUS 802.1x authentication and authentication are mutually exclusive.

Full Access
Question # 20

When there are multiple matching VRP ACL rule rules, which of the following is true about matching order?

A.

Under the circumstances, follow, from small to large, match Rule-ID

B.

By default, the original line matching according to the depth first “ ”

C.

In case of case, the permit deny is matched first, and the order of matching is matched.

D.

There is only one match order and cannot be modified.

Full Access
Question # 21

As shown in the figure, three sets of exchanges are exchanged for SW1.SW2 SW3 SW1 SW1 SW2 SW2 and , where I have a root bridge, and the road has a chain between them.

The configuration of the root sends the BPDU, and the management needs to configure which generation guarantee mechanism to prevent the tree protection chain from having problems.

A.

Environmental protection

B.

Root protection

C.

TC-BPDU protection

D.

BPDU protection

Full Access
Question # 22

One of the VXLAN BD VNIs can have multiple correspondences

A.

Correct

B.

Error

Full Access
Question # 23

LAND's attack means that the attacker sends a source address and a destination address to the target host. The target is marked as the source port and the destination port.

SYN ACK TCP report text, the receiving end is waiting for the sending end of the final message, and the connection is always connected in a semi-connected state, causing the receiver to receive limited resources.

Waste

A.

Correct

B.

Error

Full Access
Question # 24

Which message is sent to the NMS SNMP? The event is a reliable report.

A.

Response

B.

Trap

C.

Inform

D.

Get

E.

Get Bulk

Full Access
Question # 25

Four routers are running, the router type has been marked R1.R2.R3.R4 ISIS ISIS R1 R1 10.34.34.4 class standard, look at the routing table check, did not arrive

The reason for the route is

A.

Configure routing policies on R2. Default route filtering.

B.

R2 system-ID R3 conflict

C.

R3 R4 and the area of ​​the regulation error

D.

R2 system-ID R1 conflict

Full Access
Question # 26

The following information about the MPLS label describes the error?

A.

The length of the MPLS 4 label is encapsulated between the link layer of the road and the network.

B.

By default, the support device PHP PHP Egress 3 feature, supported point allocation, the second-to-last hop point, the section label value

C.

If the bottom label stack in the identifier is S=0 IP, it indicates that the label stack label is directly forwarded.

D.

When the label value is 0, IPv4, the label is displayed. The label should be played, and the text must be based on the report.

Full Access
Question # 27

When the router is running on the same OSPFv3 ISIS OSPFv3 ISIS and the routes that need to be imported, the following types of import configurations are correct.

selected)

A.

[Huawei] isis 1

[Huawei-isis-1] is-level level-1

[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00

[Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1

[Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huaweiospfv3-1] router-id 2.2.2.2

B.

[Huawei] isis 1

[Huawei-isis-1]is-level level-1

[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00

[Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1

[Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

C.

[Huawei] isis 1

[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00

[Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1

[Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huaweiospfv3-1] router-id 2.2.2.2

D.

[Huawei] isis 1

[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00

[Huawei-isis-1] import-route ospfv3 1

[Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

Full Access
Question # 28

The following description of the MPLS error?

A.

LDP MP-BGP 16-1023, etc. The null of the signaling is dynamic protocol label

B.

MPLS 20 tag length is bit, used for message forwarding

C.

Adopt mode mode Pipe TTL IP MPLS IP TTL MPLS When the message is transmitted on the network, the value of the message is only at the in and out points.

Subtraction 1

D.

MPLS S 1 supports multiple nested layer labels, and the innermost layer label is value

Full Access
Question # 29

The following topology diagram can be established through the R1 R2 R3 internet R1 R2 R1 R3 EBGP R2, R3 and access, and , and

By AS BGP R1 internet R2 ( ), the default route is advertised, and the traffic required for access is preferred. The following practices can be implemented.

A.

R2 R1 export MED 150 specifies that the body pair is set in the direction attribute

B.

R1 R3 import MED 150 specifies the body to be set in the direction attribute

C.

R2 R1 export 150 specifies the body to set the priority in the direction

D.

R1 R2 import 150 specifies that the body is set to the local direction in the direction.

Full Access
Question # 30

In the command, ipv4-address { mask | mask-length } [ as-set | attribute-policy route-policy-name1 ] detail suppressed | origin-policy route-policy-name2 | suppress-policy route-policy-name3 ] Parameters can be used to influence

Summary The route and its result. What is correct about the command description?

A.

If configured, the Suppress policy Route-production clause can also be used to pick the suppressed route. policy if-match is fine,

The clear route will still be advertised. Other Route-policy BGP will be given to neighbors.

B.

If only the matching routes are configured to participate in the aggregation Origin-policy, Route-policy is fine.

C.

If you have configured the attribute Attribute-policy that can change the aggregated route,

D.

If the route's As-set, AS_ATH AS is configured, the summary contains path information of all specific routes to prevent routing loops.

Full Access
Question # 31

OSPFv3 OSPFv2 OSPFv3 protocol Single-issue protocol is a separate one. It differs from the other in terms of road-based rather than network segment chain.

The next thing is to say the mistake ?

A.

Two routers connected to the link, even if their IPv6 addresses are differently suffixed, they can still establish a neighbor relationship.

B.

Pairing the two routers connected to the road, even if you do not configure the broadcast IPv6 address, you can establish a neighbor.

C.

The OSPFv3 Link-local router obtains the next hop of the neighboring address from the neighboring routing information.

D.

In addition to the virtual connection, all interfaces use the address of the address composition OSPFv3 Link-local

Full Access
Question # 32

If the interface of the router is out of A GigabitEthernet0/0/0 OSPFv3 Hello Option 0x000013, the field value is the following.

The correct one is more ( )

A.

The interface of the router belongs to the area A GigabitEthernet0/0/0 NSSA

B.

The router will participate in the routing calculation. A GigabitEthernet0/0/0 IPv6 meter

C.

Router is capable A OSPFv3 standby forwarding device

D.

Router Support Flooding

Full Access
Question # 33

Which of the following techniques use tunneling technology to implement a communication space for IPv6 addresses?

A.

Dual Stack

B.

6to4

C.

ISATAP

D.

NAT64

Full Access
Question # 34

If there are multiple receiver groups in a broadcast, IGMP-Snooping, manages the switcher on the receiver's switch. When the receiver changes from the switch

After receiving the general post-query query group query report, how many recipients should return

A.

All recipients will respond to the Report message.

B.

Only if it is running, all receivers will return to the IGMPv1 Report response message.

C.

When the first recipient of the louder response time is sent, the report is sent, and the other recipients are not sent.

D.

Only if it is running, all receivers will return to the IGMPV2 Report response message.

Full Access
Question # 35

xThe existing Route-policy is as follows:

Ip community-filter 1 permit 100:1 ip as-path-filter 2 permit^100$

Route-policytest permit node 10

If-match community-filter 1

If-match as-path-filter 2

Apply as-path 200

What is the correct description about the above configuration?

A.

Only if the BGP 100:1 AS_PATH 100 BGP route carry attribute has a value of or , the route will match the above

B.

The route matches the above only if the BGP 100:1 AS-PATH 100 BGP route- policy route-routed carrier attribute has a value of quo.

Policy AS-PATH 20 AS_PATH 200 . The attribute of the matching route will be changed to the attribute of the matching route will be changed to

C.

Only if the BGP AS-PATH 100 BGP route-policy AS_PATH route is carried as , the route will match the above. Matching route

Sex will be changed to 200

D.

As long as the route bearer attribute BGP 100:1 BGP route-policy has a group value, the route will match the above. Matching route

The AS_PATH 200 attribute will be changed to

Full Access
Question # 36

ISIS P2P CSNP is adjacent to the home establishment process, and does not send packets under the network type.

A.

True

B.

False

Full Access
Question # 37

Which of the following are used in Ethernet (multiple choices)

A.

Non-standard format MAC address

B.

Multiple access in CSMA/CD

C.

MAC address in canonical format

D.

802.5 encapsulated frames

E.

802.3 encapsulated frames

Full Access
Question # 38

Established as shown below, R1.R2 E-BGP, BFD, neighbor and open function detection The following method is correct

A.

R2 BFD 800ms text report detection time is

B.

R2 BFD 600ms text report detection time is

C.

R1 BD 660ms text report detection time is

D.

R1 BFD 1280ms text report detection time is

Full Access
Question # 39

In the experimental network, the network is built according to the following topology. The SW1 SW2 STP is configured as the default and the function is disabled. The scene description is correct.

A.

Sw1 G0/0/2 Discarding entry status

B.

sw2 G0/0/1 Discarding entry status

C.

sw2 G0/0/2 Discarding entry status

D.

No interface is blocked

E.

SW1 G0/0/1 Discarding entry status

Full Access
Question # 40

As shown in the figure, in the broadcast mode of the MPLS bgp VPN hub&spoke group, the branch can only communicate with the department to achieve the total and branch communication.

Which of the following settings can be set for RT?

A.

Headquarters: Import Target 12:3 Export Targe : Division Division t:12:3 1: Import Target:12:3 Export Target:12:3 2: Import

Target:12:3 Export Target:12:3

B.

Headquarters: Import Target 1:1 Export Targe : Division Division t:3:3 1: Import Target: 3:3 Export Target:1:1 2: Import

Target: 3:3 Export Target: 2:2

C.

Headquarters: Import Target 2:2 Export Targe : Division Division t:3:3 1: Import Target:3:3 Export Target:1:1 2: Import

Target: 3:3 Export Target: 2:2

D.

Headquarters: Import Target: 12:3 Export Target: 3:12 1: Import Tar Division Division get:3:12 Export Target:12:3 2: Import

Target: 3:12 Export Target: 12:3

Full Access
Question # 41

The following description of the aggregation is correct for BGP, ?( ) radio

A.

After the configuration, only Aggregate ipv4-address mask is sent, and the route is not specified.

B.

For IPv6, BGP routing supports manual aggregation and self-aggregation.

C.

By default, self-aggregation BGP is enabled.

D.

You can manually aggregate the routes in the BGP local routing table.

Full Access
Question # 42

Regarding the OSPF stub protocol area in the middle, the following is correct.

A.

The stub cannot exist in the ASBR area.

B.

The virtual path cannot traverse the chain stub area

C.

stub type7 LSA area is not allowed to be injected

D.

The backbone area cannot be configured as a stub area.

Full Access
Question # 43

Which of the following high-level features is supported by BGP EVPN?

A.

ARP broadcast suppression

B.

VRRP over VXLAN

C.

Multi-live gateway

D.

VXLAN Qos

Full Access
Question # 44

Level 1-2 IS can transmit Level-2 LSPs to level-1 area. If the ATT bit in the Level-2 LSPs is set to 1, the Level-1 IS in the area can communicate with devices in other area through the Level 1-2 IS.

A.

TRUE

B.

FALSE

Full Access
Question # 45

As shown in the figure, 1 2 , , URPP routers share the traffic between the branch network load network and the branch network. In this case, configure the router physical interface.

Source address bullying must use loose mode P to spoof.

A.

True

B.

False

Full Access
Question # 46

The following is true for the VXLAN?

A.

External destination IP VXLAN VTEP IP address is the address of the tunnel end

B.

Source port number is UDP 4789

C.

Purpose The port number is UDP 4789

D.

VNI 24, VLAN has bits for distinguishing segments

Full Access
Question # 47

The following is true about the route aggregation method.

A.

Route aggregation can be configured and valid on all routers.

B.

Route aggregation can only be configured on the router to take effect level--1

C.

Route aggregation can only be configured on the router to take effect level--2

D.

Route aggregation can only be configured on the router to take effect level--1-2

Full Access
Question # 48

Which of the following statements correctly describes the corresponding MPLS TTL processing mode?

A.

On an MPLS VPN, if the structure of the MPLS backbone network needs to be shielded, the Uniform mode is recommended for VPN packets,

B.

In Uniform mode, when IP packets enter an MPLS network, the ingress node decrements the IP TTL by one and the MPLS TTL field has a fixed value.

C.

The TTL field in an MPLS label serves the same function as that in an IP packet header. That is, the TTL is used to prevent loops on an MPLS network.

D.

In Pipe mode, when IP packets enter an MPLS network, the ingress node decrements the IP TTL by one and copies this new value to the MPLS TTL field.

Full Access
Question # 49

ISIS P2P, LSP, PSNP, LSDB protocol in the broadcast network and the network. When the router receives it, it needs to use the line to ensure the synchronization.

A.

True

B.

False

Full Access
Question # 50

Configure the column-based traffic shaping team, if the column exceeds the storage size, the captain is too slow, then the disk is discarded.

A.

True

B.

False

Full Access
Question # 51

As shown in the fallowing figure, R1, R2, and R3 run 05PF and advertise their loopback interface addresses into OSPF. Which of the following statements is false?

A.

filter import command can be executed on R2 in Area 0 to filter loopback interface routes of R3.

B.

The filter policy import command can be executed on R1 to filter loopback interface routes of R3.

C.

The filter export command can be executed on R2 in Area 1 to filter loopback interface routes of R3.

D.

The filter policy export command can be executed on R2 to filter loopback interface routes of R3.

Full Access
Question # 52

Each router of the OSPFv3 Router-LSA is produced. It describes the interface address and the cost of the router. It also includes the neighboring router.

Router ID

A.

True

B.

False

Full Access
Question # 53

In a project, the researcher built the network topology for the working mechanism of OSPFv3, R1 R2, and R1 R2 protocols. The configuration of the following is as follows:

What are the LSA ? types?

R1 ospfv3 1 configuration

Router-id 1.1.1.1

Interface Gigabitethernet0/0/0 ipv6 enable

Ipv6 address auto link-local ospfv3 1 area 0

R2 ipv6 ospfv3 1 configuration

Router-id 2.2.2.2

Interface Gigabitethernet0/0/0 ipv6 enable

Ipv6 address auto link-local ospfv3 1 area 0. 0 0.0

A.

router-lsaB. link-lsa

B.

network-lsa

C.

Inter-area-prefix-lsa

Full Access
Question # 54

In the network, the MPLS VPN CE PE CE network can use different routes to exchange routing information with the same device protocol device, different from the same device.

The routing used by the backup protocol is independent of each other.

A.

True

B.

False

Full Access
Question # 55

As shown below, the map field, the correct description is

A.

R1 Level-1 Level-2 LSDB is the same as when

B.

R1 Ping R21 1oopbapk0 can pass the interface address

C.

R1 R2 1oopback0 10.0.2.2/32 There is a route to arrive

D.

R1.R2 can not establish a relationship between neighbors

Full Access
Question # 56

BGP can automatically summarize only routes with the Origin attribute being Incomplete.

A.

TRUE

B.

FALSE

Full Access
Question # 57

SWA and 5WB are connected through two physical Ethernet links. SWA has the following interface configurations:

The two links are aggregated. Assume that the configuration on SWB is correct. Given this information, which of the following statements are true?

A.

GigabitEthernet1/0/1 and GigabitEthernet1/0/2 can be added to the same LAG without changing the current configurations.

B.

After link aggregation is configured on SWA and SWB, if MSTP is enabled on them, GigabitEthernet1/0/1 and GigabitEthernet1/0/2 enter the Forwarding state in MSTP.

C.

GigabitEthernet1/0/1 and GigabitEthernet/0/2 can be added to the same LAG only after the configuration of GigabitEthernet/0/2 is changed to be the same as that of GigabitEthernet1/0/1.

D.

GigabitEthernet1/0/1 and GigabitEthernet/0/2 cannot be added to the same LAG because the allowed VLANs are different.

Full Access
Question # 58

If P1M-SM is enabled on a multicast network, an RP needs to be configured. The RP can be configured the following statements regarding RP configuration is true?

A.

No BSR needs to be configured when a dynamic RP is configured.

B.

When a static RP is configured, you need to configure a BSR that advertises RP information.

C.

The BSR needs to be configured as the RP backup when a dynamic RP is configured.

D.

RP information needs to be specified on all PIM routers when a static RP is configured-

Full Access
Question # 59

On a Huawei device, when an external route is imported to IS-IS and the tag of the external route is set, the IS-IS metric type does not need to be changed, and the default style is retained.

A.

TRUE

B.

FALSE

Full Access
Question # 60

Router R1 and R2 run BGP. Both the routers reside in A5 65234. Routers of R2 exist in the BGP routing table of R1 but do not exist in the IP routing table of R1. What is the cause of this problem?

A.

BGP is disabled on both R and R2.

B.

Multi-hop BGP is disabled on R1.

C.

The routes are not optimal.

D.

The BGP peer relationship between R1 and R2 is in Down state.

Full Access
Question # 61

When router R1 runs OSPF and the display ip routing-table command is executed on R1 to check the routing table, Which of the following statements regarding OSPF information in the routing table is true?

A.

In the routing table, the routing entries identified by the O_ASE identifier can be learned only through route import.

B.

In the routing table, the routing entries identified by the OSPF identifier can be learned through Type 1/2/3/5 LSAs.

C.

In the routing table, the routing entries marked OSPF can be learned only through Type 1 LSAs.

D.

In the routing table, the routing entries identified by the OSPF identifier can be learned only through Type 3 LSAs.

Full Access
Question # 62

Which of the following statements regarding CHAP authentication in the PPP protocol are true?

A.

If no user name is configured for the authenticated party, the password does not need to be configured on the interface of the authenticated party.

B.

The MD5 algorithm is used to calculate a hash based on the authentication sequence ID, a random number, and the key.

C.

Authentication requires three-way handshake. Only the user name is transmitted on the network, not the password.

D.

The user name must be configured on the interface of the authenticated party.

Full Access
Question # 63

The BGP EVPN distributed gateway is implemented in the virtual machine migration field. Which of the following is required?

A.

Type3

B.

Type5

C.

Type4

D.

Type2

E.

Type1

Full Access
Question # 64

If host HW1 on the network wants to join a video conference, what will the host do?

A.

The host multicasts an 1GMPv2 Membership Report message that carries the expected multicast address to the local network.

B.

The host multicasts an IGMPv2 Membership Report message with the multicast address for all PIM routers (224.0.0.2) to the local network.

C.

The host unicasts an IGMPv2 Membership Report message to the default router on the local network.

D.

The host unicasts an IGMPv2 Membership Report message to the RP.

Full Access
Question # 65

mm en

Router HW1 functions as an MPLS LSR router on the carrier's network. The router receives a labelled packet, but the label entry does not exist in the router's LFIB. Given this information, how will the router process the packet?

A.

Router HW1 discards the packet.

B.

Router HW1 uses the default label to forward the packet.

C.

Router HW1 removes the label, searches the FIB, and uses the destination IP address to forward the packet.

D.

Router HW1 uses LDP to create an LSP and creates a path in its LFIB for the label carried in the packet.

Full Access
Question # 66

You are assigned the task of compressing an IPv6 address as much as possible. If the original IPv6 address is 2013:0000:130F:000Q:00G0:09C0:876A:130B, which of the following is the IPv6 address in its compressed format?

A.

2013:0; 130F::9C0:876A: BOB

B.

2013::130F::9CO:876A:130B

C.

2013:0:130F:0:0:O9C0:876A:130B

D.

213::13F::9C:876A:13B

E.

2013:0:130F:0:0:9C0:876A:130B

Full Access
Question # 67

On the network shown in the figure below, SW1, SW2, and 5W3 are deployed. 5W1 is the root bridge, link congestion occurs between SW1 and SW2, and SW2 cannot receive configuration BPDUs sent by the root bridge. Given this information, which of the following spanning tree protection mechanisms needs to be configured to prevent problems caused by link congestion?

A.

Defense against TC BPDU attacks

B.

Root protection

C.

BPDU protection

D.

Loop protection

Full Access
Question # 68

The correct way to do the following is the IPSG theory.

A.

IPSG P can match the incoming and outgoing check packets of the incoming interface and the outgoing interface.

B.

On the router, Huawei, Vlanif IPSG can configure the function on it.

C.

If an interface is configured as DHCP Snooping Trust HCP ACK DHCP NAKHCP Offerf , , and reports other untrusted ports are not working properly.

Receive some texts

D.

ip source check user-bind check-item VLAN IP, the command is used to configure the interface check item based on the interface or the static state command and static table.

All items are in force.

Full Access
Question # 69

Routes received from AS100 match the AS-Path filter configured using the ip as-path-filter 10 permit _100$ command.

A.

TRUE

B.

FALSE

Full Access
Question # 70

Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on the outside interface. BGP has been configured so the two routers should peer, including the correct BGP

session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first test to see if BGP will work across the firewall?

A.

There is no way to make BGP work across a firewall without special configuration, so there is no simple test that will show you if BGP will work, other than trying to start the peering session.

B.

Attempt to Telnet from the router connected to the inside of the firewall to the router connected to the outside of the firewall. If Telnet works, BGP will work, since telnet and BGP both use TCP to transport data

C.

There is no way to make BGP work across a firewall

D.

Ping from the router connected to the inside interface of the firewall to the router connected to the outside interface of the firewall. If you can ping between them, BGP should work, since BGP uses IP to transport

packets.

Full Access
Question # 71

As shown in the following figure, R1 and R2 establish an EBGP peer relationship and the BFD function is enabled. Given this information, which of the following statements is true?

A.

The time taken to detect BFD packets on R1 is 660 ms.

B.

The time taken to detect BFD packets on R2 is 800 ms.

C.

The time taken to detect BFD packets on R2 is 600 ms.

D.

The time taken to detect BFD packets on R1 is 1280 ms.

Full Access
Question # 72

Which of the following functions cannot be implemented using the EVPN Type2 route?

A.

Host MAC address advertisement

B.

Host ARP advertisement

C.

Host IP route advertisement

D.

BUM packet forwarding

Full Access
Question # 73

With regard to TCP headers, which control bit tells the receiver to reset the TCP connection?

A.

SND

B.

CLR

C.

PSH

D.

SYN

E.

RST

F.

ACK

Full Access
Question # 74

Does the following figure correctly show the process of obtaining the link-layer address using NDP?

A.

TRUE

B.

FALSE

Full Access