Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-821_V1.0 Questions and Answers

Question # 6

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

A.

232.0.0.0 to 232.255.255.255

B.

239.0.0.0 to 239.255.255.255

C.

224.0.0.0 to 224.0.0.255

D.

224.0.1.0 to 231.255.255.255

Full Access
Question # 7

On an OSPF network, there are multiple types of packets, each with a different function. Which of the following are the main functions of Hello packets?

A.

Neighbor relationship maintenance

B.

Neighbor discovery

C.

Neighbor deletion

D.

Neighbor relationship establishment

Full Access
Question # 8

On a WLAN, the HSB service sets up an HSB channel between two devices that back up each other, maintains the channel status, and backs up data. Which of the following can HSB back up in real time?

A.

CAPWAP tunnel information

B.

DHCP address information

C.

AP entries

D.

User data information

Full Access
Question # 9

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

A.

80

B.

50

C.

40

D.

30

Full Access
Question # 10

ICMPv6 messages are classified as error or informational messages.

A.

TRUE

B.

FALSE

Full Access
Question # 11

In IPv6, to communicate with a destination host, a host must obtain the link-layer address of the destination host through ARP.

A.

TRUE

B.

FALSE

Full Access
Question # 12

After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?

A.

Multiple DHCP servers are configured.

B.

STP is enabled on the DHCP server.

C.

The DHCP function is disabled by default, and the administrator forgets to enable the DHCP function.

D.

DHCP clients and the DHCP server are on different network segments, and no DHCP relay agent is configured on the network.

Full Access
Question # 13

On a broadcast IS-IS network shown in the following figure, a DIS needs to be elected to create and update pseudonodes. Which of the following routers is elected as the DIS?

A.

R1

B.

R3

C.

R4

D.

R2

Full Access
Question # 14

BFD can quickly detect faults in channels at multiple network layers, ensuring high reliability. To which of the following layers does BFD belong?

A.

Application layer

B.

Data link layer

C.

Physical layer

D.

Network layer

Full Access
Question # 15

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Full Access
Question # 16

Which of the following PIM protocol packets have unicast destination addresses.

A.

Register Stop

B.

Bootstrap

C.

Graft

D.

Assert

Full Access
Question # 17

Multicast applies to any point-to-multipoint data transmission. Which of the following types of application data can be forwarded in multicast mode?

A.

Real-time audio conferencing

B.

Livestreaming

C.

Network TV

D.

Data warehouse

Full Access
Question # 18

VRRP defines three states. Only the device in which state can forward packets destined for a virtual IP address?

(Write in full and capitalize the first letter.)

Full Access
Question # 19

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

Full Access
Question # 20

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Full Access
Question # 21

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Full Access
Question # 22

Hackers often obtain the login permissions of system administrators through various attacks.

Which of the following measures can be taken to enhance the security of administrator accounts?(Select all that apply)

A.

Periodically check whether unnecessary administrator accounts exist in the system. If such accounts exist, delete them to reduce the attack surface.

B.

Encrypt passwords before transferring them. Whenever possible, transfer passwords by email.

C.

Assign exclusive accounts for administrators with different maintenance roles to avoid account sharing.

D.

To ensure security and make the password easier to remember, you can set the password to be valid for a long time.

Full Access
Question # 23

BGP routes have multiple path attributes. When a router advertises a BGP route to its peers, the route carries multiple path attributes. These attributes describe the characteristics of the BGP route and affect route selection in some scenarios. The attribute is Huawei-specific. It is valid only on the local device and is not transmitted to BGP peers. (Enter the attribute name in lowercase as it appears in the command output about the BGP routing table.)

Full Access
Question # 24

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Full Access
Question # 25

On an OSPF network, routers learn routing information on the entire network by exchanging LSAs. Which of the following values is the LS Age in the LSA header when an LSA is deleted?

A.

1800s

B.

3600s

C.

1200s

D.

600s

Full Access
Question # 26

On an OSPF network, an IR in area 0 must be a BR, but an ASBR may not be an ABR.

A.

TRUE

B.

FALSE

Full Access
Question # 27

On a broadcast IS-IS network, a DIS needs to be elected to create and update pseudonodes. Which of the following values is the default DIS priority of an IS-IS interface?

A.

200

B.

64

C.

1

D.

100

Full Access
Question # 28

If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.

A.

TRUE

B.

FALSE

Full Access
Question # 29

Which of the following statements is false?

A.

If the current DR fails, the current BDR automatically becomes a new DR, and a BDR will be elected again.

B.

A device with a higher router priority has a higher election priority.

C.

When a router with the highest router priority joins an OSPF network, this router will become the new DR.

D.

If two devices have the same router priority, the device with a larger router ID has a higher election priority.

Full Access
Question # 30

An edge port is a new port role added to RSTP to overcome the disadvantages of STP. Which of the following statements is false about this port role?

A.

The port does not participate in RSTP calculation.

B.

The port can directly enter the Forwarding state from the Discarding state.

C.

After receiving a configuration BPDU, the port is still in the Forwarding state.

D.

The Up and Down states of the port do not cause network topology changes.

Full Access
Question # 31

The following figure shows acampus network. IS-IS is configured on all routers, and the network runs normally.

By default, which of the following routers havespecific routeson the entire network?

A.

R2

B.

R3

C.

R1

D.

R7

Full Access
Question # 32

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Full Access
Question # 33

An enterprise administrator views the following details about a BGP route during routine O&M:

yaml

CopyEdit

display bgp routing-table 192.168.1.1

BGP local router ID: 10.1.1.1

Local AS number: 100

Paths: 2 available, 0 best, 0 select

BGP routing table entry information of 192.168.1.1/32:

From: 10.1.1.2 (10.1.1.2)

Route Duration: 00h01m31s

Relay IP Nexthop: 0.0.0.0

Relay IP Out-Interface: --

Original nexthop: 172.16.1.2

AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable

Not advertised to any peer yet

Which of the following statements are true about the BGP route?

A.

The original next hop of the route is 172.16.1.2.

B.

The local BGP router ID is 10.1.1.1.

C.

The local AS number is 100.

D.

The route is preferentially selected because its Local_Pref has a higher priority.

Full Access
Question # 34

Which of the following protocols are multi-channel protocols?

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Full Access
Question # 35

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

A.

TRUE

B.

FALSE

Full Access
Question # 36

In special scenarios, when advertising routes to an IBGP peer, a BGP device needs to set the next hop to its IP address to prevent blackhole routes. Which of the following commands can be run in this case?

A.

peer next-hop-local

B.

peer mpls-local-ifnet

C.

peer private-nexthop

D.

peer next-hop-invariable

Full Access
Question # 37

What parameters can a DHCP6 server assign to a DHCPv6 client?

A.

Gateway address

B.

DNS server address

C.

IPV6 address/prefix

D.

SNTP server address

Full Access
Question # 38

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

A.

Port number

B.

Mask

C.

Action

D.

Index

Full Access
Question # 39

A non-client is an IBGP peer that functions as neither an RR nor a client. A non-client must establish fully meshed connections with the RR and all the other non-clients.

A.

TRUE

B.

FALSE

Full Access
Question # 40

The Next_Hop attribute in BGP records the next hop of a route. Similar to the next hop in an IGP, the Next_Hop attribute in BGP must be the IP address of a peer interface.

A.

TRUE

B.

FALSE

Full Access
Question # 41

Which of the following statements is false about BFD?

A.

The asynchronous mode is the primary BFD operating mode.

B.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection interval, the BFD session is declared down.

C.

The asynchronous mode does not support the echo function.

D.

In demand mode, after a BFD session is set up, the system does not periodically send BFD Control packets.

Full Access
Question # 42

BGP can select routes based on the AS_Path attribute. Therefore, in some cases, a route-policy needs to be used to modify the AS_Path attribute for route selection. Which of the following parameters can be specified in the apply as-path command for a route-policy to modify this attribute?

A.

Delete

B.

Additive

C.

Copy

D.

Overwrite

Full Access
Question # 43

Match the following IPv4 multicast protocols with the corresponding functions.

Full Access
Question # 44

As shown in the figure, SWA, SWB, and SWC run the Rapid Spanning Tree Protocol (RSTP). What are the roles of SWB's GE0/0/2 and SWC's GE0/0/1?

A.

Backup port, alternative port

B.

Alternative port, backup port

C.

Backup port, root port

D.

Root port, designated port

Full Access
Question # 45

In IP multicast, RPF routes can be elected only from among unicast routes and multicast static routes.

A.

TRUE

B.

FALSE

Full Access
Question # 46

Which of the following statements isfalseabout thesession table mechanismon firewalls?

A.

Generally, the default session aging time of the system can be used. To change the aging time, you need to estimate and determine the traffic type and number of connections on the network.

B.

The fast session aging function also takes effect for persistent connection sessions.

C.

A created session entry needs to be matched by packets constantly.

D.

When stateful inspection is disabled, the firewall still creates session tables for non-first packets. This allows services to run properly without the need to enable the persistent connection function.

Full Access
Question # 47

BFD can associate with multiple protocols to quickly detect faults.

Which of the following functions are supported?(Select all that apply)

A.

BFD for PIM

B.

BFD for static routes

C.

BFD for OSPF

D.

BFD for BGP

Full Access
Question # 48

There are two types ofBGP peer relationships:EBGPandIBGP. When configuring EBGP, ensure that the peer IP address is routable and theUDPconnection can be correctly established.

A.

TRUE

B.

FALSE

Full Access
Question # 49

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Full Access
Question # 50

To prevent loops on anSTP network, after adesignated portis elected, it mustwait for a long timeand can forward packetsonly after the status of all ports on the entire network is determined. To solve this problem,RSTP uses the P/A mechanismto speed up thedownstream port's transition to the Forwarding state.

A.

TRUE

B.

FALSE

Full Access
Question # 51

IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.

A.

TRUE

B.

FALSE

Full Access
Question # 52

After IPsec is deployed on an enterprise network, services are interrupted. The administrator finds that no data flow triggers IKE negotiation.

Which of the following are possible causes?(Select all that apply)

A.

Configuration error of an interzone security policy

B.

An unreachable route

C.

The IPsec policy is not correctly applied to the related interface.

D.

A mismatch between the ACL and protected data flow

Full Access
Question # 53

Which of the following statements about the forwarding plane of a switch is false?

A.

Provides high-speed and non-blocking data channels.

B.

Can encapsulate and decapsulate packets.

C.

Can collect packet statistics.

D.

Consists of main control boards and interface boards.

Full Access
Question # 54

The filter-policy 2000 export command is run in an ISIS process. Which of the following statements about the functions of a filter policy is false?

A.

Is used together with the route import function to advertise some imported external routes to neighbors.

B.

If this command is not run, the device by default advertises all routes that ISIS Imports form external routing protocols.

C.

Controls the advertisement of routes generated by the device.

D.

Filters LSPs to be advertised.

Full Access
Question # 55

RSTP provides different functions in different scenarios. Which of the following statements Is false?

A.

After TC-BPDU attack defense function is enabled, you can set the number of times the switch processes TC BPDUs within a certain period

B.

The role of the designated port that is enabled with root protection cannot be changed

C.

If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation

D.

When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state

Full Access
Question # 56

An enterprise uses OSPF to implement network communication. To ensure data validity and security, all authentication modes supported by OSPF are enabled on routers. In this case, interface authentication is preferentially used by the routers.

A.

TRUE

B.

FALSE

Full Access
Question # 57

Which of the following statements regarding the BGP error display of a router false?

A.

The error may be caused by the incorrect neighbor address.

B.

The neighbor address of this router is 10.1.1.5.

C.

Error Type indicates that the BGP error is caused by the neighbor relationship error.

D.

The error occurred at 12:40:39 on March 22, 2010.

Full Access
Question # 58

The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?

A.

IGP > EGP > Incomplete

B.

Incomplete > IGP > EGP

C.

EGP > IGP > Incomplete

D.

Incomplete > EGP > IGP

Full Access
Question # 59

On an IS-IS network, each device needs to be configured with anetwork entity title (NET), which consists of three parts, each containing different fields. Which of the following fields are contained in theArea Address part?

A.

High Order DSP

B.

AFI

C.

IDI

D.

System ID

Full Access
Question # 60

In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

A.

TRUE

B.

FALSE

Full Access
Question # 61

SSHis a secure protocol that establishes tunnels for users on insecure networks.Which of the following statements is false about SSH login?

A.

The SSH server supports authentication. Only users who have passed authentication can log in to the device.

B.

When the SSH server function is enabled on a device, the socket obtaining service is also enabled on the device. This makes the device prone to scanning by attackers. As such, the SSH server function and the corresponding port can be disabled when the SSH server function is not required.

C.

An ACL rule can be configured for each VTY channel to control the IP addresses of clients that are allowed to log in to the device.

D.

By default, the port number of the SSH server is 23. You can change the port number of the SSH server to a non-well-known port number to reduce the probability of being scanned and attacked.

Full Access
Question # 62

Which of the following configurations are not mandatory when an administrator configures VRRP?

A.

Preemption mode

B.

Preemption delay

C.

Virtual router priority

D.

Virtual IP address

Full Access
Question # 63

By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.

A.

TRUE

B.

FALSE

Full Access
Question # 64

On an IS-IS network, the length and components of aNETare the same as those of anNSAP. Which of the followingNETfields is used to uniquely identify a host or router in an area?

A.

System ID

B.

IDI

C.

SEL

D.

Area Address

Full Access
Question # 65

Typically, a protocol that occupies two ports during communication is called a multi-channel protocol. For such protocols, the ASPF function must be enabled on the firewall to ensure smooth setup of the data channel and reduce the risk of attacks. Which of the following protocols is not a multi-channel protocol?

A.

FTP

B.

SIP

C.

SMTP

D.

H.323

Full Access
Question # 66

IGMPV3 not only supports IGMPv1 General Query and IGMPv2 Group-Specific Query, and also IGMPv3 Source/Group-Specific Query.

A.

TRUE

B.

FALSE

Full Access
Question # 67

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Full Access
Question # 68

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

A.

TRUE

B.

FALSE

Full Access
Question # 69

The administrator of an enterprise configuresSNMPv3on a device for communicating with theNMS (Network Management System). After the configuration is complete, thedisplay trapbuffercommand output shows that there are traps in the trap buffer of theinformation center, but theNMS does not receive any of them. Which of the following may cause this problem?

A.

The SNMP version configured on the device is different from the SNMP version of traps sent by the device.

B.

The SNMPv3 password used by the NMS is incorrect.

C.

The size of packets sent by the NMS exceeds the threshold set on the device.

D.

The community name configured on the NMS is inconsistent with that configured on the device.

Full Access
Question # 70

See the following figure. RTA, RTB, RTC, and RTD are in the same AS and establish IBGP peer relationships through direct links. RTB an RTC are route reflectors (RRs), RTA and RTC are the RR clients of RTB, and RTB and RTD are the RR clients of RTC. If RTA advertises the route 10.1.1.0/24 to the BGP process, the Originator ID of the BGP route received by RTD is------------------.

Full Access
Question # 71

IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?

A.

Group-Specific Query message

B.

Leave message

C.

Report message

D.

Specifying a multicast source

Full Access
Question # 72

A filter named si is configured on a device using the as-path-filter command and is applied to a specified BGP peer. The detailed configurations are as follows:

csharp

Copy

[SW1] ip as-path-filter si permit _65500$

[SW1] bgp 65100

[SW1-bgp] ipv4-family unicast

[SW1-bgp-af-ipv4] peer 10.1.1.2 as-path-filter si import

After the configuration is complete, which of the following statements is true about the way the local device processes the routes received from the peer?

A.

It accepts only the routes whose AS_Path contains AS 65500.

B.

It accepts only the routes originated from AS 65500.

C.

It accepts only the routes that last pass through AS 65500.

D.

It accepts only the routes forwarded by AS 65500.

Full Access
Question # 73

On Huawei switches, which of the following planes provides network information and forwarding entries that are mandatory for data plane forwarding?

A.

Forwarding plane

B.

Control plane

C.

Data plane

D.

Monitoring plane

Full Access
Question # 74

To inject IGP routes into BGP routes, you can only use the network command.

A.

TRUE

B.

FALSE

Full Access
Question # 75

Which of the following attributes must be carried when BGP sends route update messages?

A.

MED

B.

Next_Hop

C.

AS_Path

D.

Local_Preference

Full Access
Question # 76

A company has a stack consisting of three switches that are running properly. The master switch restarts due to a fault. Given this, which of the following statements are true?

A.

Before the restart of the original master switch is complete, the original slave switch is specified as the new standby switch.

B.

After the original master switch restarts, it becomes the new master switch.

C.

After the original master switch restarts, the original standby switch becomes a new slave switch.

D.

Before the restart of the original master switch is complete, the original standby switch becomes the new master switch.

Full Access
Question # 77

BGP is a distance-vector protocol that implements route reachability between ASs and selects optimal routes. Which of the following statements are true about this protocol?

A.

BGP does not support authentication. Therefore, it cannot ensure network security.

B.

BGP uses TCP as the transport layer protocol.

C.

BGP provides various routing policies.

D.

BGP supports automatic peer discovery.

Full Access
Question # 78

On an IS-IS network, all routers generate LSPs. Which of the following types of information isnotcontained in the LSPs generated by pseudonodes?

A.

Interface information

B.

Information about supported network protocols

C.

Route information

D.

Neighbor information

Full Access
Question # 79

By default, some security zones are created when Huawei firewalls are enabled. Which of the following security zones is created by users?

A.

DMZ

B.

ISP

C.

Trust

D.

Local

Full Access
Question # 80

Which of the following statements regarding different LSA types is false?

A.

LS Request packets contain only LS Type, LS ID, and Advertising Router.

B.

LS Ack packets contain complete LSA information.

C.

DD packets contain only LSA summary information, including LS Type, LS ID, Advertising Router, and LS Sequence Number.

D.

LS Update packets contain complete LSA information.

Full Access
Question # 81

GRE is a VPN technology that can implement packet transmission over heterogeneous networks. Which of the following statements are true about GRE?

A.

GRE is a Layer 2 VPN encapsulation technology.

B.

GRE enables encapsulated data packets to be transmitted over another network layer protocol, butcannot encapsulate multicast data.

C.

GRE tunnels can work with IPsec to ensure the security of multicast services such as voice and video.

D.

GRE tunnels can extend the working range of network protocols with hop limits.

Full Access
Question # 82

On aBGP network, aroute-policycan be used to modify route attributes. Which of the following statements isfalseaboutroute-policies?

A.

When OSPF routes are imported using the import command, aroute-policycan be used to change their defaultMED value.

B.

When direct routes are imported using the import command, aroute-policycan be used to filter out the routes that you do not want to advertise.

C.

When routes are imported using the network command, aroute-policycannot be used to modify the attributes of the imported routes.

D.

In the address family view, the peer command can be run to reference aroute-policyto modify thelocal preferenceof the routes to be advertised.

Full Access
Question # 83

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value ofgreater-equal-valueis ____, and the value ofless-equal-valueis ____.

Full Access
Question # 84

Which of the following statements regarding the summary automatic command and BGP route summarization is false?

A.

After this command is configured, BGP sends only the summarized routes to peers

B.

This command is used to implement automatic summarization. Automatic summarization takes precedence over manual summarization

C.

This command enables automatic summarization for the locally imported routes

D.

After this command is configured, BGP summarizes routes based on natural network segments

Full Access
Question # 85

Which of the following statements about WLAN roaming are false?

A.

APs with which a STA is associated before and after roaming can work on different channels.

B.

During roaming, the STA sends a Reassociation Request frame containing home AP information to the foreign AP.

C.

During roaming, the STA sends an Association Request frame containing home AP information to the foreign AP.

D.

APs with which a STA is associated before and after roaming must work on the same channel.

Full Access
Question # 86

Which of the following statements about stack split is false?

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Full Access
Question # 87

BFD provides fast fault detection independent of media and routing protocols. To use this mechanism to detect link connectivity, devices at both ends must support this feature.

A.

TRUE

B.

FALSE

Full Access
Question # 88

See the command output of a router below. Which of the following statements is true?

display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Full Access
Question # 89

On an IPv6 network, intermediate forwarding devices do not fragment IPv6 packets for the purpose of reducing their packet processing pressure. Packets are fragmented only on the source node.

A.

TRUE

B.

FALSE

Full Access
Question # 90

In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.

Full Access
Question # 91

A route-policy consists of one or more nodes. What is the maximum number of nodes in a route-policy?

A.

4096

B.

65535

C.

256

D.

1024

Full Access
Question # 92

Which of the following TLVs is used by ISIS to describe the IP address of an interface?

A.

129

B.

131

C.

128

D.

132

Full Access
Question # 93

Multiple BGP processes cannot be configured on the same router.

A.

TRUE

B.

FALSE

Full Access
Question # 94

To overcome the disadvantages ofSTP,RSTPchanges the format ofconfiguration BPDUs. Which of the following fields inSTP BPDUsis used to specify theport role?

A.

Flags

B.

BPDU Type

C.

PID

D.

PVI

Full Access
Question # 95

See the network shown in the following figure.

R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?

A.

The routing table of R1 contains the route 10.0.2.3/32.

B.

The routing table of R1 does not contain the route 10.0.2.3/32.

C.

The routing table of R1 does not contain the routes 10.0.2.2/32 and 10.0.2.3/32.

D.

The routing table of R1 contains the route 10.0.2.2/32.

Full Access
Question # 96

On an STP network, only the designated port processes inferior BPDUs. On an RSTP network, a port with any role processes inferior BPDUs.

A.

TRUE

B.

FALSE

Full Access
Question # 97

OSPF networks are classified into broadcast, P2P, P2MP, and NBMA networks. Which of the following types of networks use the default Hello time (30s)?

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Full Access
Question # 98

Which of the following is the default dead time of an interface on an OSPF P2P or broadcast network?

A.

40s

B.

120s

C.

60s

D.

10s

Full Access