Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-811_V1.0 Questions and Answers

Question # 6

Which of the following is not a common network layer in a midsize campus network?

A.

Core layer

B.

Network layer

C.

Access layer

D.

Aggregation layer

Full Access
Question # 7

(An Eth-Trunk interface can be used only as a Layer 2 interface.)

A.

TRUE

B.

FALSE

Full Access
Question # 8

According to the command output shown in the figure, which of the following statements are true?

A.

GigabitEthemet0/0/1 does not allow packets of VLAN 1 to pass through.

B.

To configure GigabitEthernet0/0/1 as an access interface, first run the undo port trunk allow-pass vlan 2 to 4094 command.

C.

GigabitEthernet0/0/1 allows packets of VLAN 1 to pass through.

D.

To configure GigabitEthernet0/0/1 as an access interface, first run the undo port trunk allow-pass vlan all command.

Full Access
Question # 9

Which of the following authentication modes does/do not require a user name and a password?

A.

authentication-mode local

B.

authorization-mode hwtacacs

C.

authentication-mode hwtacacs

D.

authentication-mode none

Full Access
Question # 10

(The IP addresses of VLANIF interfaces on the same switch must be different.)

A.

TRUE

B.

FALSE

Full Access
Question # 11

Which of the following BIDs cannot be contained in a configuration BPDU sent by a switch?

A.

0 10-01-02-03-04-05

B.

0 00-01-02-03-04-05

C.

32768 06-01-02-03-04-05

D.

4096 01-01-02-03-04-05

Full Access
Question # 12

On an STP-enabled switch, a port in the Learning state can transition to the Forwarding state only after the Forward Delay timer expires.

A.

TRUE

B.

FALSE

Full Access
Question # 13

When a switch port receives a frame that does not carry a VLAN tag, it must add a PVID to the frame.

A.

TRUE

B.

FALSE

Full Access
Question # 14

What are the components of the OSI reference model from top to bottom?

A.

Application layer, presentation layer, session layer, network layer, transport layer, data link layer, and physical layer

B.

Application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer

C.

Application layer, transport layer, network layer, data link layer, and physical layer

D.

Application layer, session layer, presentation layer, transport layer, network layer, data link layer, and physical layer

Full Access
Question # 15

Which of the following states indicates that the OSPF neighbor relationship has been established?

A.

Attempt

B.

Down

C.

Full

D.

2-way

Full Access
Question # 16

In RSTP mode, both alternate and backup ports cannot forward user traffic and cannot receive, process, and send BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Which of the following statements about wireless devices is true?

A.

Typically, Fat APs collaborate with ACs.

B.

An AC is usually deployed at the aggregation layer of a network to provide high-speed, secure, and reliable WLAN services.

C.

Fit APs can independently provide user access, authentication, and service forwarding functions.

D.

Wireless devices do not provide wired interfaces.

Full Access
Question # 18

Which of the following are advantages of stacking and CSS (Cluster Switch System) technologies?

A.

The inter-chassis Eth-Trunk can be deployed.

B.

Devices are virtualized into one logical device, simplifying device management.

C.

They increase the number of ports.

D.

They effectively prevent single points of failure.

Full Access
Question # 19

What is the total length of the VLAN frame defined by IEEE 802.1Q?

A.

1 Byte

B.

3 Bytes

C.

2 Bytes

D.

4 Bytes

Full Access
Question # 20

(The administrator performs the configuration shown in the figure on a router, and a host is connected to Gi/0/0 of the router. Which of the following statements is true about the IP address obtained by the host through DHCP?)

A.

The host cannot obtain an IP address.

B.

The IP address obtained by the host belongs to the 10.10.10.0/24 network segment.

C.

The IP address obtained by the host belongs to the 10.20.20.0/24 network segment.

D.

The IP address obtained by the host may belong to the 10.10.10.0/24 or 10.20.20.0/24 network segment.

Full Access
Question # 21

Refer to the following VLAN configurations on a Huawei switch. Which of the following statements are true?

A.

Client 4 belongs to VLAN 40, and the commands for VLAN assignment on the switch are correct.

B.

Client 2 belongs to VLAN 20, and the commands for MAC address-based VLAN assignment on the switch are correct.

C.

Client 1 belongs to VLAN 10, and the commands for VLAN assignment on the switch are correct.

D.

Client 3 belongs to VLAN 30, and the commands for VLAN assignment on the switch are correct.

Full Access
Question # 22

According to the one-armed routing configurations shown in the figure, even if ARP proxy is disabled on the sub-interface of R1, the Administration Dept and Finance Dept can still communicate with each other.

A.

TRUE

B.

FALSE

Full Access
Question # 23

(You can run the " pwd " and " dir " commands on the Versatile Routing Platform (VRP) to view file information in the current directory.)

A.

TRUE

B.

FALSE

Full Access
Question # 24

Only one SSID can be bound to each radio of an AP.

A.

TRUE

B.

FALSE

Full Access
Question # 25

An administrator wishes to configure a floating static route. In order to successfully achieve this, which operation should be performed?

A.

The administrator is required to configure different route tags for the primary static route and floating static route.

B.

The administrator is only required to configure two static routes.

C.

The administrator is required to configure a different preference value for the primary static route and floating static route.

D.

The administrator is required to configure a different cost metric for the primary static route and floating static route.

Full Access
Question # 26

Which of the following statements regarding static routing and dynamic routing is incorrect?

A.

Dynamic routing will use more resources than static routes.

B.

The static routing can automatically recover when a link failure is encountered.

C.

The use of dynamic routing is more convenient for the administrator to manage the network following network convergence.

D.

The static routing can be easily configured and managed on the enterprise network.

Full Access
Question # 27

The default bridge priority of a Huawei switch is 32768.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Which of the following are true about the Ethernet data frame with the " Length/Type " field being 0x0806?

A.

The source MAC address of the data frame is definitely not FFFF-FFFF-FFFF.

B.

The data frame is an Ethernet II frame.

C.

The data frame is an IEEE 802.3 frame.

D.

The destination MAC address of the data frame must be FFFF-FFFF-FFFF.

Full Access
Question # 29

Which of the following does not correctly describe Python?

A.

Python has rich third-party libraries.

B.

Python has a clear syntax, is easy to learn, and efficient at runtime.

C.

Python can be used in many fields, such as automatic O and M scripting, artificial intelligence, and data science.

D.

Python is a fully open-source high-level programming language.

Full Access
Question # 30

Refer to the following configuration of GigabitEthernet0/0/1 on the switch. For which VLAN does the switch forward untagged data frames?

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 10

port trunk allow-pass vlan 10 20 30 40

A.

10

B.

30

C.

40

D.

20

Full Access
Question # 31

On the network shown in the figure, HOST A and HOST B are required to communicate with each other across VLANs through one-armed routing. To satisfy this requirement, which of the

following commands needs to be performed on G0/0/1.1 of RTA?

A.

dot1q termination vid 20

B.

dot1q termination vid 30

C.

dot1q termination vid 10

D.

dot1q termination vid 1

Full Access
Question # 32

Which of the following authentication methods are supported for Telnet users?

A.

No authentication.

B.

Password authentication.

C.

MD5 authentication.

D.

AAA local authentication.

Full Access
Question # 33

A routing entry contains multiple fields. Which of the following statements about these fields is false?

A.

Pre: indicates the preference value of a routing protocol.

B.

NextHop: indicates the address of the local interface corresponding to a route.

C.

Proto: indicates the source of a route.

D.

Destination/Mask: indicates the address and mask length of the destination network or host.

Full Access
Question # 34

Which of the following is the full name of VRP?

A.

Virtual Routing Platform

B.

Versatile Routing Platform

C.

Versatile Redundancy Platform

D.

Versatile Routing Protocol

Full Access
Question # 35

A Layer 2 ACL can match information such as the source MAC address, destination MAC address, source IP address, and destination IP address.

A.

TRUE

B.

FALSE

Full Access
Question # 36

For an STP-enabled switch, a port in any state can transition to the Disabled state.

A.

TRUE

B.

FALSE

Full Access
Question # 37

Assuming that an administrator is running the command shown in the figure on an AR2200 router, which of the following statements about the configuration is true?

< Huawei > reset saved-configuration

Warning: The action will delete the saved configuration in the device.

The configuration will be erased to reconfigure. Continue? [Y/N]:

A.

The saved configuration file will be replaced by the running configuration file.

B.

The configuration file for next startup is retained.

C.

To clear the configuration file for next startup, select Y.

D.

To clear the configuration file for next startup, select N.

Full Access
Question # 38

What is the main function of the DNS protocol?

A.

Remote access

B.

File transfer

C.

Domain name resolution

D.

Email transmission

Full Access
Question # 39

(ICMP packets do not contain port numbers. Therefore, NAPT cannot be used.)

A.

TRUE

B.

FALSE

Full Access
Question # 40

Which of the following network types does OSPF support?

A.

Broadcast.

B.

Point-to-Point.

C.

Non-Broadcast Multi-Access (NBMA).

D.

Point-to-Multipoint.

Full Access
Question # 41

Which of the following statements about VLANIF interfaces is/are correct?

A.

Different VLANIF interfaces can use the same IP address.

B.

A VLANIF interface is a Layer 3 interface.

C.

VLANIF interfaces do not need to learn MAC addresses.

D.

A VLANIF interface does not have a MAC address.

Full Access
Question # 42

As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

A.

0

B.

400

C.

200

D.

600

Full Access
Question # 43

Which of the following statements about static routes on Huawei devices is false?

A.

The default preference value of a static route is 60.

B.

When the preference value of a static route is 0, this static route is selected as the optimal route.

C.

The cost of a static route cannot be changed.

D.

The preference value of a static route is in the range 1 to 255.

Full Access
Question # 44

Which of the following is a valid default route configuration?

A.

[Huawei] ip route-static 0.0.0.0 0.0.0.0 192.168.1.1

B.

[Huawei] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0

C.

[Huawei] ip route-static 0.0.0.0 255.255.255.255 192.168.1.1

D.

[Huawei-Serial0] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0

Full Access
Question # 45

After a switch restarts, static MAC address entries saved on the switch remain in the MAC address table.

A.

TRUE

B.

FALSE

Full Access
Question # 46

When the header length of an IPv4 data packet is 20B and the total packet length is 1500B, what is the valid payload of the packet?

A.

1520B

B.

20B

C.

1500B

D.

1480B

Full Access
Question # 47

If AAA authentication is used on Huawei devices and the remote server does not respond, the authentication can be performed on network devices.

A.

TRUE

B.

FALSE

Full Access
Question # 48

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

1

B.

4

C.

2

D.

100

Full Access
Question # 49

The LACP priority is shown in the figure. Switch A and Switch B adopt link aggregation in LACP mode, all interfaces are added to the link aggregation group (LAG), and the maximum number of active ports is set to 3.

Which port of Switch A is NOT an active port?

Options:

A.

G0/0/2

B.

G0/0/1

C.

G0/0/3

D.

G0/0/0

Full Access
Question # 50

Which of the following statements is true about an STP-enabled port in Forwarding state?

A.

The port only receives and processes BPDUs and does not forward user traffic.

B.

The port forwards user traffic and processes BPDUs.

C.

The port does not process BPDUs or forward user traffic.

D.

The port creates MAC address entries based on the received user traffic but does not forward user traffic.

Full Access
Question # 51

For multiple paths to the same destination network, the router needs to compare the preference values of the paths. If the preference values are the same, the router selects the paths based on the cost value.

A.

TRUE

B.

FALSE

Full Access
Question # 52

(Which of the following methods can be used to assign service VLANs during campus network planning?)

A.

VLAN assignment by service type

B.

VLAN assignment by logical area

C.

VLAN assignment by geographic area

D.

VLAN assignment by personnel structure

Full Access
Question # 53

Assuming that OSPF has been enabled on all routers in the following figure, which router is the BDR on this network?

A.

Router B

B.

Router A

C.

Router D

D.

Router C

Full Access
Question # 54

In a broadcast address, all host bits are set to 1, and a broadcast address can be used as a host address.

A.

TRUE

B.

FALSE

Full Access
Question # 55

OSPF allows for " multiple " processes. By default, OSPF selects a process whose number is _____.

A.

0

B.

100

C.

10

D.

1

Full Access
Question # 56

On the network shown in the figure, VLAN 2 is created on SWA and SWB, and interfaces connected to hosts are access ports added to VLAN 2. G0/0/1 on SWA and G0/0/2 on SWB are trunk interfaces allowing all VLANs. What additional configuration is needed on SWC to ensure communication between Host A and Host B?

A.

Create VLAN 2 on SWC.

B.

Configure G0/0/1 on SWC as a trunk interface that allows packets from VLAN 2 to pass through.

C.

Create VLAN 2 on SWC, and configure G0/0/1 and G0/0/2 as trunk interfaces that allow packets from VLAN 2 to pass through.

D.

On SWC, configure G0/0/1 as a trunk interface that allows packets from VLAN 2 to pass through, configure G0/0/2 as an access interface, and set the PVID to 2.

Full Access
Question # 57

As shown in the figure, RTA uses NAT and has an address pool configured to implement many-to-many non-NAPT address translation, so that hosts on the private network can access the public network. Assume that the address pool has only two public IP addresses, which are translated for Host A and Host B. If Host C wants to access the public network, which of the following statements is true?

A.

All hosts use public IP addresses in turn and can access the public network.

B.

No public IP address is assigned to Host C, and Host C cannot access the public network.

C.

RTA performs NAT based on the source port number of Host C, and Host C can access the public network.

D.

RTA assigns an interface address (200.10.10.3) to Host C, and Host C can access the public network.

Full Access
Question # 58

The users who log on the router through Telnet are not permitted to configure an IP address. What is the possible reason?

A.

Privilege level of Telnet is set incorrectly.

B.

SNMP parameters are set incorrectly.

C.

The authentication mode of Telnet is set incorrectly.

D.

Communication failures occur between the user and the router.

Full Access
Question # 59

Which of the following information is used by a VLANIF interface to determine whether to perform Layer 2 forwarding or Layer 3 forwarding?

A.

Source IP address

B.

Destination port

C.

Destination MAC address

D.

Source MAC address

Full Access
Question # 60

Trunk interfaces can send both tagged and untagged frames.

A.

TRUE

B.

FALSE

Full Access
Question # 61

The network administrator performs the configuration shown in the following figure on RTA. If a user needs to be authenticated in the authentication domain named huawei, which of the following statements is true?

A.

The authentication scheme au2 is used for authentication.

B.

The authentication scheme aul is used for authentication.

C.

The authentication scheme au2 is used for authentication. If the authentication scheme au2 is deleted, the authentication scheme aul is used.

D.

The authentication scheme aul is used for authentication. If the authentication scheme aul is deleted, the authentication scheme au2 is used.

Full Access
Question # 62

On the network shown in the figure, host A logs in to router A through Telnet and obtains the configuration file of router B through FTP on the remote CLI. How many TCP connections exist on router A?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 63

An ACL rule is as follows. Which of the following IP addresses can be matched by the permit rule?

rule 5 permit ip source 10.0.2.0 0.0.254.255

A.

10.0.6.7

B.

10.0.5.6

C.

10.0.4.5

D.

10.0.2.1

Full Access
Question # 64

Which of the following configurations can prevent Host A and Host B from communicating with each other?

A.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/1 traffic-filter inbound acl 2000

B.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/2 traffic-filter inbound acl 2000

C.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/3 traffic-filter inbound acl 2000

D.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/1 traffic-filter outbound acl 2000

Full Access
Question # 65

Which of the following traffic can be filtered by an advanced ACL on a Huawei device?

A.

Network traffic based on a specific source IP address

B.

Network traffic based on a specific source MAC address

C.

Network traffic based on a specific user name

D.

Network traffic based on a specific port number

E.

Network traffic based on a specific destination IP address

Full Access
Question # 66

What is the TPID value defined by IEEE 802.1Q?

A.

0x9100

B.

0x8100

C.

0x8200

D.

0x7200

Full Access
Question # 67

The following figure shows the MAC address table of a switch.

Assuming that the switch receives a data frame with the destination MAC address 5489-9885-18a8 from Eth0/0/2, which of the following statements is true?

Options:

A.

The switch forwards the data frame through Eth0/0/2.

B.

The switch floods the data frame.

C.

The switch discards the data frame.

D.

The switch forwards the data frame through Eth0/0/1.

Full Access
Question # 68

RADIUS is a common protocol for implementing AAA.

A.

TRUE

B.

FALSE

Full Access
Question # 69

When a host uses the stateless address autoconfiguration solution to obtain an IPv6 address, the host cannot obtain the DNS server address.

A.

TRUE

B.

FALSE

Full Access
Question # 70

If PPP authentication fails, which type of packet will be sent to the authenticated peer by the authenticator?

A.

Authenticate-Ack

B.

Authenticate-Reply

C.

Authenticate-Reject

D.

Authenticate-Nak

Full Access
Question # 71

Assume that an OSPF-enabled router has no loopback interface configured. What would be used as the router ID?

A.

The preference of the router

B.

The smallest IP address of a physical interface on the router (if configured)

C.

The IP address of the router ' s management interface (if configured)

D.

The biggest IP address of a physical interface on the router (if configured)

Full Access
Question # 72

The IP address 192.168.1.127/25 represents a ( ) address.

A.

Broadcast

B.

Multicast

C.

Host

D.

Network

Full Access
Question # 73

Which of the following is the default value of the Router Dead Interval field in OSPF Hello packets on a broadcast network?

A.

20 seconds

B.

30 seconds

C.

40 seconds

D.

10 seconds

Full Access
Question # 74

NAPT differentiates IP addresses of different users based on protocol ID in TCP, UDP, or IP packets.

A.

TRUE

B.

FALSE

Full Access
Question # 75

(Network Functions Virtualization (NFV) implements software-based network application deployment.)

A.

TRUE

B.

FALSE

Full Access
Question # 76

Which of the following OSPF versions is specific to IPv6?

A.

OSPFv4

B.

OSPFv1

C.

OSPFv2

D.

OSPFv3

Full Access
Question # 77

(Each network device running SNMP runs an agent process locally.)

A.

TRUE

B.

FALSE

Full Access
Question # 78

What are the characteristics of interface-based VLAN assignment?

A.

When a host is moved, you need to reconfigure the VLAN to which the host belongs.

B.

When a host is moved, you do not need to reconfigure the VLAN to which the host belongs.

C.

VLAN tags are added to data frames based on IP addresses carried in data frames.

D.

VLAN IDs are assigned based on the protocol type and encapsulation format of data frames.

Full Access
Question # 79

On an STP-enabled switch, a port in the forwarding state can receive BPDU packets.

A.

TRUE

B.

FALSE

Full Access
Question # 80

Refer to the following IP routing table on the router R1. If R1 sends a data packet with the destination IP address 10.0.2.2, which of the following interfaces will R1 use to send the packet?

A.

GigabitEthernet0/0/0

B.

Ethernet0/0/0

C.

Ethernet0/0/2

D.

Ethernet0/0/1

Full Access
Question # 81

Wi-Fi 6 is also known as the IEEE 802.11ax standard.

A.

TRUE

B.

FALSE

Full Access
Question # 82

The following figure shows the configuration of a sub-interface on a router. For which VLAN does the sub-interface receive tagged data frames?

A.

20

B.

1

C.

30

D.

100

Full Access
Question # 83

(The IPv6 address architecture does not include which of the following address types?)

A.

Unicast.

B.

Anycast.

C.

Multicast.

D.

Broadcast.

Full Access
Question # 84

Refer to the following configuration of an interface on a switch. For which VLAN does the interface remove VLAN tags before forwarding data frames?

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 10

port trunk allow-pass vlan 10 20 30 40

A.

10

B.

30

C.

20

D.

40

Full Access
Question # 85

UDP does not guarantee data transmission reliability and does not provide packet sorting and traffic control functions. It is suitable for the traffic that has low requirements for data transmission reliability, but high requirements for the transmission speed and delay.

A.

TRUE

B.

FALSE

Full Access
Question # 86

Which statement is true regarding the following command?

ip route-static 10.0.12.0 255.255.255.0 192.168.1.1

A.

The configuration represents a static route to the 10.0.12.0 network.

B.

The configuration represents a static route to the 192.168.1.1 network.

C.

If the router has learned the same destination network via a dynamic routing protocol, the static route will always take precedence.

D.

The preference value of this configured route is 100.

Full Access
Question # 87

When a host uses the IP address 192.168.1.2 to access the Internet, NAT must be performed.

A.

TRUE

B.

FALSE

Full Access
Question # 88

On a network running STP, the root switch is elected only by comparing switch priorities. On a network running RSTP, both the priorities and MAC addresses of switches will be compared for electing the root switch.

A.

TRUE

B.

FALSE

Full Access
Question # 89

In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 90

By referring to the information about an interface on R1 shown in the figure, which of the following statements is true?

[R1]display interface g0/0/0

GigabitEthernet0/0/0 current state : Administratively DOWN

Line protocol current state : DOWN

A.

GigabitEthernet0/0/0 has an incorrect cable connected.

B.

GigabitEthernet0/0/0 has been manually shut down by an administrator.

C.

No IP address is configured for GigabitEthernet0/0/0.

D.

No dynamic routing protocol is enabled on GigabitEthernet0/0/0.

Full Access
Question # 91

For STP, the Message Age in the configuration BPDUs sent by the root bridge is 0.

A.

TRUE

B.

FALSE

Full Access
Question # 92

When a router is powered on, the router reads the configuration file saved in the default save directory to get itself initialized. If the configuration file does not exist in the default save directory, what does the router use to initialize itself?

A.

Default parameters.

B.

Initial configuration file.

C.

Current configuration file.

D.

New configuration file.

Full Access
Question # 93

On the network shown in the figure, G0/0/0 and G0/0/1 of RTA connect to two different network segments, and RTA is the gateway between the two networks. Given this, the MAC address from which of the following needs to be obtained using an ARP Request message before HostA sends data to HostC?

A.

HostC

B.

G0/0/1 of RTA

C.

SWA

D.

G0/0/0 of RTA

Full Access
Question # 94

Which of the following commands can switch a view from the system view to the user view?

A.

System-view

B.

User-view

C.

Quit

D.

Router

Full Access
Question # 95

A network administrator wishes to assign an IP address to a router interface G0/0/0. Which of the following IP addresses can be assigned?

A.

237.6.1.2/24

B.

127.3.1.4/28

C.

145.4.2.55/26

D.

192.168.10.112/30

Full Access
Question # 96

What is the protocol of the Router Advertisement (RA) packet, which is used in IPv6 stateless address auto-configuration?

A.

TCPv6

B.

ICMPv6

C.

UDPv6

D.

IGMPv6

Full Access
Question # 97

When an AP and an AC are located on different Layer 3 networks, which of the following methods is recommended for the AP when discovering the AC?

A.

Broadcast

B.

DHCP

C.

Manually specified on the AP

D.

DNS

Full Access
Question # 98

Which of the following elements are included in a routing table?

A.

Cost

B.

Next-hop address

C.

Protocol

D.

Interface

E.

Destination/Mask

Full Access
Question # 99

After switches are virtualized into one logical switch using stacking or CSS, an inter-chassis Eth-Trunk can be deployed to improve network reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 100

VLAN 4095 is reserved for system use and VLAN 1 cannot be deleted on Huawei switches.

A.

TRUE

B.

FALSE

Full Access
Question # 101

Which of the following network parameters can be allocated using DHCP?

A.

Address of the DNS server

B.

Operating system

C.

Gateway address

D.

IP address

Full Access
Question # 102

Refer to the following commands run on GigabitEthernet0/0/1 and GigabitEthernet0/0/2. Which of the following statements are true?

A.

The PVID of GigabitEthernet0/0/1 is 1.

B.

The PVID of GigabitEthernet0/0/2 is 1.

C.

The PVID of GigabitEthernet0/0/1 is 10.

D.

The PVID of GigabitEthernet0/0/2 is 10.

Full Access
Question # 103

Refer to the following configuration of an interface on a switch. For which VLAN does the interface transmit tagged data frames?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

2, 3, 4, 6, 100

B.

2, 3, 100

C.

1, 2, 3, 4, 6, 100

D.

1, 2, 3, 100

Full Access
Question # 104

(Which of the following statements is true about active interface election for an Eth-Trunk in LACP mode?)

A.

Only interface priorities are compared.

B.

Device priorities are compared.

C.

Interface priorities are compared first. If priorities of interfaces on the Actor are the same, interfaces with smaller interface numbers are elected as active interfaces.

D.

Only interface numbers are compared.

Full Access
Question # 105

Refer to the graphic, which of the following statements is true about OSPF topology and configuration?

A.

Compared with R1, R2 is more likely to become the DR because the DR priority of the interface on R2 is lower than that of R1.

B.

After the default network type of the interface on R1 is restored to broadcast, a stable OSPF neighbor relationship can be set up between R1 and R2.

C.

After the default network type of the interface on R1 is restored to broadcast and the hello packet sending interval is changed to 10s, a stable OSPF neighbor relationship can be set up between R1 and R2.

D.

A stable OSPF neighbor relationship can be set up between R1 and R2.

Full Access
Question # 106

On the network shown in the following figure, assuming that SWA, SWB, and SWC retain factory defaults, which of the following ports will be selected as a designated port?

A.

G0/0/2 on SWC

B.

G0/0/3 on SWA

C.

G0/0/1 on SWB

D.

G0/0/1 on SWC

Full Access
Question # 107

The Priority field in a VLAN tag can be used to identify the priority of a data frame. What is the value range of the field?

A.

0 to 3

B.

0 to 15

C.

0 to 7

D.

0 to 63

Full Access
Question # 108

Only the WPA2-PSK security policy supports TKIP data encryption.

A.

TRUE

B.

FALSE

Full Access
Question # 109

Which of the following port numbers is used by the FTP control plane?

A.

22

B.

23

C.

21

D.

24

Full Access
Question # 110

A switch needs to forward a frame with the destination MAC address 5489-98EC-F011. Refer to the display mac-address command output. Which of the following statements is true?

A.

The switch does not find a matching entry in the MAC address table, so it discards the frame.

B.

The switch needs to send a request to discover the device whose MAC address is 5489-98EC-F011.

C.

The switch floods the frame on all interfaces except the one on which it received the frame.

D.

The switch sends an ICMP unreachable message to the source device.

Full Access
Question # 111

Which of the following are basic parameters for configuring a static route?

A.

Destination network

B.

Outbound interface

C.

MAC address of the outbound interface

D.

Next-hop IP address

Full Access
Question # 112

As shown in the figure, which of the following ports will be in a blocking state?

A.

G0/0/2 of SWC

B.

G0/0/3 of SWB

C.

G0/0/1 of SWC

D.

G0/0/3 of SWA

Full Access
Question # 113

Which of the following are not layers in the TCP/IP model?

A.

Presentation layer

B.

Transport layer

C.

Session layer

D.

Application layer

E.

Network layer

Full Access
Question # 114

According to OSI reference model, which layer is responsible for end to end error checking and flow control?

A.

Transport layer.

B.

Physical layer.

C.

Network layer.

D.

Data link layer.

Full Access
Question # 115

Which of the following frequency bands are supported by IEEE 802.11n?

A.

2.5 GHz

B.

2.4 GHz

C.

5 GHz

D.

6 GHz

Full Access
Question # 116

Which of the following parts compose SNMP?

A.

Management Information Base (MIB)

B.

Managed object

C.

Agent process

D.

NMS

Full Access