Year End Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-891_V1.0 Questions and Answers

Question # 6

The following statements about the VRRP protocol are correct (multiple choice).

A.

Both VRRPv2 and VRRPv3 support authentication

B.

VRRPv3 does not support authentication, while VRRPV2 does

C.

VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks

D.

The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254

Full Access
Question # 7

The following description of the GVRP interface registration mode in Huawei switches is correct?

A.

When fixed registration mode is selected, the interface cannot propagate dynamic VLANs

B.

When the normal registration mode is selected, allow the interface to dynamically register and unregister the VLAN. Logout here includes deleting dynamically learned VLANs and VLANs created natively by the administrator

C.

When the interface layer two operating mode must be hybird

D.

GVRP when the register mode with forbidden is selected, there are four types of interface registration mode

Full Access
Question # 8

What is the security level for untrust zones in the USG Series firewalls? ( Radio).

A.

50

B.

5

C.

10

D.

15

Full Access
Question # 9

?? Route ? Policy ??:ip community-filter Ipermit 100: 1 ip as-path-filter 2 permit ^I00$ route-policy test permit node 10 if-match communityfilter 1 if-match as-path-filter 2 apply

as-path 200 Is the above configuration description correct?

A.

The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 or if the AS PATH is 100 route one policy. The AS-one PATH attribute that matches the route is changed to 200

B.

The BGP route matches the above only if the BGP route carries a community attribute value of 100:1 and the AS-One PATH is 100 route policy? The AS-PATH nature of the matching route is changed to 200

C.

Only if the BGP route carries an AS-PATH of 100, the BGP route matches the route one policy above. The AS-one PATH attribute that matches the route is changed to 200

D.

As long as the BGP route carries a community attribute value of 100:1, the BGP route matches the route-policy above The AS-PATH attribute of the matching route is changed to 200

Full Access
Question # 10

When configuring ISIS zone authentication, which ISIS message will carry the authentication letter? ( Single choice questions).

A.

ISIS ?Level-1 ?SNP ?LSP?

B.

ISIS ?Level-2 ?SNP ?LSP?

C.

Hello message of ISIS's Level-1.

D.

Hello message of ISIS's Level-2

Full Access
Question # 11

Which of the following are used in Ethernet?

A.

A MAC address in a non-canonical format

B.

CSMA/CD in multiplexed interviews

C.

Mac address in canonical format

D.

D. 8025 encapsulated frames

E.

8023 Encapsulated Frame

Full Access
Question # 12

?BGP4+?,Update ????M IP_R EACH_NLRI ?????next hop network address ????? ?

A.

It can be just link-local address

B.

Can only be a link-local address

C.

You can carry a link-local address and a global unicast address

D.

at the same time Can only be a global unicast address

Full Access
Question # 13

The following description of Link ID, Data, Type, and Metirc in Router-LSA is correct :( Multiple select).

A.

Metric describes the overhead of this connection

B.

The Link ID represents the local identity of this connection, and the different connection types The Link ID represents different meanings

C.

Data is used to describe additional information for this connection, and different connection types describe different information

D.

Type indicates the type of connection

Full Access
Question # 14

Router HW1 exists in the carrier HW's network as an MPLSLSR router. The router receives a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle that message?

A.

Router HW1 strips off the label and looks for the FIB using the P destination address

B.

Router HW1 uses LDP to create an LSP and creates a new path in LFIB for the label carried in the message

C.

Router HW1 drops the message

D.

Router HW1 will forward the message with the default label

Full Access
Question # 15

What mechanisms or techniques can VRRP combine with to monitor uplink connectivity?

A.

IP-link

B.

BFD

C.

NQA

D.

Interface trace

Full Access
Question # 16

When running OSPFv3 on a Huawei router, the OSPFv3 process automatically selects an interface address as the process router id

A.

True

B.

False

Full Access
Question # 17

The following statement about the OSPFv3 message format is correct?( Multiple select).

A.

There is no change in the option field of the Hello message

B.

Remove the Authentication, Auth Type fields

C.

Hello messages no longer contain address information, carrying Interface lD

D.

The OSPF version number changed from 2 to 3

Full Access
Question # 18

In an IPv6 network, two nodes A and B are neighbors to each other if node A sends to node B NS message, if Node B receives the message and then replies to the NA message, then on Node A On the view, the neighbor status will be marked as What?

A.

Reachable

B.

Incomplete

C.

Constant

D.

Probe Answer

Full Access
Question # 19

The following is the correct statement about the LSA of OSPFv3?

A.

Inter-AreaPrefix-SA's LinkStatelD contains the prefix

B.

Router-LSA and Network-LSA does not contain routing information

C.

When the Intra-AreaPrefixLSA's ReferencedLinkStateType-2, referencedLinkStatelD contains the interface to DR ID

D.

Inter-AreaPrefirLSA also contains LinkLocal information file

Full Access
Question # 20

A company network runs the OSPF protocol, a project in order to understand the OSPF mechanism in the network to perform packet transfer operations, the following description of ospf messages is correct?

A.

The interface sends a Hello packet immediately after joining the OSPF region

B.

LS update packet is sent only when the adjacency relationship is established

C.

When an LsUpdate packet is received, the router must send an LsAck acknowledgment

D.

LS update packet synchronizes the link state database by sending detailed LSA information

2

Full Access
Question # 21

When DLDP detects the presence of a one-way link in the fiber, the default actions of Huawei equipment include: the DLDP state machine migrates to the Disable state, outputs Trap information, and automatically sets the interface to a blocked state.

A.

True

B.

False

Full Access
Question # 22

The following description of Filter-Policy is correct?( Radio).

A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied The build is filtered.

B. Prefix lists can be used to filter both routes and packets.

C. Filter-policy filters the link state information received or published, and can modify the properties of route entries.

D. When filtering routes using the pre-slow list, the table entry ip-prefxldeny0000 0 lese-qual 32 indicates that only the default route matches

Full Access
Question # 23

The following description of the CHAP authentication function in the PPP protocol is correct?( Multiple choice questions).

A.

The user name must be configured under the authenticated party interface for CHAP authentication

B.

If the authenticator does not have a username configured, password

C.

can also be configured without the authenticated party interface Using the authentication sequence ID, random number, and key, a Hash value

D.

is calculated using the MD5 algorithm Three message interactions are required for authentication, and only the user name is transmitted on the network without the password

Full Access
Question # 24

What are the types of link types included in OSPF's route LSA?

A.

Stubnet

B.

P-2-P

C.

VLINK

D.

Fransnet

Full Access
Question # 25

R3 is not established with the RI's IS-IS neighbor, and according to the information in this figure, the possible cause is ?

A.

R3 duplicates the System ID of R1

B.

R3 does not match the IS-Level of R1

C.

R3 and R1 interconnection ports circuit-type do not match the lH authentication of

D.

R3 and R1

Full Access
Question # 26

The following description of the attributes of BGP is correct? Radio

A.

The AS number of the adjacent AS, ranked to the far right of the list of AS_Path in the BGP route entry.

B.

When a BGP Speaker publishes a route learned from an EBCP peer to an IBGP peer, it does not change the next hop attribute of that routing information.

C.

Local_Pref is valid only between EBGP peers and is not advertised to third-party AS

D.

A route can have only one community attribute value.

Full Access
Question # 27

ICMPv6 has two types: Error Messages and Information Messages.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Port isolation technology deployed in Ethernet can realize Layer 2 interoperability and Layer 3 isolation, making networking more flexible.

A.

TRUE

B.

FALSE

Full Access
Question # 29

IGMP SSMMapping is bound to multicast through a static multicast source, so that members of IGMPv1 and IGMP2 can also access the SSM multicast network. The following statement about IGMPSSMMapping is wrong?( Radio).

A.

The multicast address of the SSM is 232000~232255255255

B.

IGMP SSM Mapping does not process reporting messages from IGMPv3 In order to ensure that the same network segment runs any version

C.

IGMP hosts can make SSM services run IGMPv3 on the multicast router socket connected to the network segment where the member host is located

D.

If the IGMP SSM Mapping feature is not enabled, neither IGMPv1 nor IGMPv2 supports multicast for deploying SSM modules

Full Access
Question # 30

A campus deployed both IPv4 and IPv6 networks for service testing, and ran IS-S to interconnect the networks. (The S-S routing protocol has good scalability and is widely used in the live network.) Regarding IS-IS extensibility, which of the following statements is true?

A.

In order to support IPv6, IS-IS needs to add TLV to carry IPv6 address information

B.

IS-IS uses the TLV structure to build messages, making lS-IS more flexible and extensible

C.

NLPID is a new type of TLV added by IS-IS to support IPv6

D.

For IS-IS, adding new features simply adds a new TLV to

Full Access
Question # 31

In an HW MPLS network, what parameters are used to define a forwarding equivalent class??

A.

BGP MED ?

B.

IP prefix

C.

RSVP requests resource reservation

D.

from CE Layer 2 links

Full Access
Question # 32

As shown in the figure,

RI, R2 establishes an EBGP neighbor and turns on the BFD detection function, the following statement is correct

A.

Detection time for BFD packets for AR2 800ms

B.

R1 Detection time for BFD packets for 1280ms

C.

R1 Detection time for BFD packets The detection time for BFD packets for 660ms

D.

R2 is 600ms

Full Access
Question # 33

The following description of the characteristics of cross-domain VN-Optionc is correct?

A.

A maximum of two layers of tags need to be used in the message forwarding process.

B.

VPMV4 routes are not saved on the ASBR, and VPNv routes are not advertised to each other.

C.

VPN routes are exchanged directly between the ingress PE and egress PE and do not require an intermediate device to secure a circular VPN route.

D.

Cross-domain VN-Optionc, which is not suitable for use when spanning multiple AS.

Full Access
Question # 34

If a Huawei S series switch needs to designate a member switch as the primary switch of the stack, it can power on this switch first, and then power on other member switches after 20s.

A.

True

B.

False

Full Access
Question # 35

In cross-domain VPN-OptionB packet forwarding, two ASBRs exchange the same LSP tags once.

A.

True

B.

False

Full Access
Question # 36

Command IP as-path-filter1 permit^12,*74$ can match to which AS_PSTH?

A.

AS_PATH(321122374)

B.

AS PATH Q236217 ? 2374)

C.

AS_PATH(125 328 74 23)

D.

AS_PATH(32127423)

Full Access
Question # 37

If the topology of the entire network does not change, but the allocation of IP segments in the router changes, ISIS only uses PRC to calculate the changed routing information, and does not recalculate all SPT

A.

True

B.

False

Full Access
Question # 38

BGP4+ is running between two routers, and the neighbor relationship is normal, but the BGP routing table of the router on this side does not have a neighbor route entry.

A.

The route entry in the peer BGP route table is non-optimal.

B.

The next hop address of the

C.

BGP route entry is unreachable

D.

Peer ignore is configured on the peer

E.

The peer is configured with active-route-advertise

Full Access
Question # 39

A home user has opened a 1Mb/s bandwidth, and in order to improve the user experience, the operator can stabilize 2Mb/s when measuring speed If we use the listening bucket technology to achieve this requirement, which of the following methods is optimal.

A.

cir 10000 pir 12000

B.

cir 10o00 cbs 12000 pbd 12000

C.

cir 8000 pir 12000

D.

cir 10000 cbs 10000 pbs 12000

Full Access
Question # 40

The following is a description of how BFD sessions are established, which is the wrong one

A.

The system distinguishes between static BFD sessions and dynamic BPD sessions by dividing the identifier area Dynamically assign this landmark identifier

B.

BFD sessions can only be established dynamically

C.

Static configuration of BFD session refers to manual configuration of BFD session parameters through the command line, including local identifiers and remote identifiers

Full Access
Question # 41

Users within a typical VPN can only communicate with each other, not with Internet users, and with Internet. But VPN individual sites may have access to internet's needs. The correct description of the implementation of VPN interconnection with internet is ?( Multiple choice questions).

A.

is implemented on the user side, and the CE is directly connected to the Internet. Each user site can be connected to the Internet separately, that is, the CE of each site is configured with a default route to the Internet.

B.

Implementing a complex implementation on PE and having security implications, PE devices may be subject to Dos attacks on the Internet.

C.

Implemented on PE, the PE device issues a default route to the CE to the Internet and adds a default route to the VPN instance routing table pointing to the Internet Gateway o

D.

Implemented on the user side, the implementation method is simple, and the public network and private network routes are isolated, safe and reliable.

Full Access
Question # 42

Run the SSM across the entire HW IP multicast network. The following about SSM understands correctly?( Multiple choice question)

A.

No RP is required

B.

SSM uses only shared trees

C.

SSM uses only the SPT tree

D.

Ideal for 1-to-many applications

E.

SSM is recommended when you have multiple sources and expect to minimize the state of mroute in your network Ideal for many-to-many applications

Full Access
Question # 43

Two VTEPs in an XLAN can identify a VXLAN tunnel, and this VXLAN tunnel between the VTEPs will be covered by two NDEs is common to all VNI.

A.

True

B.

False

Full Access
Question # 44

Router HW cannot access hosts in the remote network, router HW runs routing protocols and only pings the remote file server address 105401 on router HW with extensions through a default route remote network , the result of ping on the router HW is rendered as 'requ.' est time out', according to the above description, the error in the following analysis is ?

A.

The next hop router for router HW did not reach the destination address

B.

Router HW does not have a legitimate router to reach the destination address

C.

Ping is successful, but congestion occurs on the path to the destination address

D.

There is a firewall in the remote destination network, and the destination address can be reached without releasing ICMP traffic E. ICMP packets, but the destination device fails to reply

Full Access
Question # 45

BGP EVPN does MAC address advertisement, ARP message advertisement, and IRB route advertisement for which BGP EVPN route is advertised?

A.

Type3

B.

Type2

C.

Type4

D.

Type1

Full Access
Question # 46

In which of the following cases, RSTP refreshes the MAC address table?( Multi-select)

A.

When the port state transitions from Forwarding to Disking

B.

Only when the port state transitions from Listening to Disccarding

C.

When a topology change notification is received

D.

When the status of a port changes

E.

CE when the port state transitions from Disking to Forwarding

Full Access
Question # 47

The following description of ISIS's routed infiltration is correct?( Multi-select)

A.

ISIS routing penetrates | Can be used in Pv6 environments.

B.

Route penetration for ISIS can be deployed on Level-1 routers.

C.

Route penetration for ISIS does not include aggregated routes.

D.

Route penetration of ISIS does not cause neighbor concussions.

E.

Route infiltration of ISIS is used to prevent routing loops.

Full Access
Question # 48

An engineer uses 2 routers to test Pv6 services and runs OSPFV3 to achieve interconnection and interoperability of IPV6 networks The RI has access to the loopback address of R2 The engineer looks at ri's OSPF3 routing table entry and finds that there is no route reaching the R2 loopback address It can't be caused by which of the following?

A.

R2 does not enable OSPFv3 on the loopback port

B.

R2 does not advertise the loopback address

C.

R2 in area 0 to advertise the loopback into a different OSPFv3 process

D.

R2 does not configure the Router ID used in the OSPFv3 process

Full Access
Question # 49

The following description is correct regarding route control

A.

IBGP routes can be introduced using the impot-route BGP command

B.

AS-path-fiter is for AS-path, which affects the routing of paths.

C.

OSPF, ISIS, and BGP can issue default routes.

D.

In Node 10, if-match community-fiter1 and f-match as-pah-fiter1 are "and the relationship

Full Access
Question # 50

If multiple candidate RPs are configured in a multicast group, which of the following parameters does the RP that elect the group from multiple candidate RPs need to be compared?

A.

The mask length of the group range for the C-RP service that matches the group address that the user joined

B.

C-RP priority

C.

The IP address of the C. C-RP interface Number of

D.

C-RP interface

Full Access
Question # 51

Which of the following BGP attributes is not required in the Update message for a BGP route?

A.

WITH

B.

Local-Preference

C.

AS_PATH

D.

Origin

Full Access
Question # 52

Regarding the mpLS handling mode of TTL, is the following description correct?

A.

Pipe mode. When an IP message passes through the MPLS network, the IPTTL minus 1 is mapped to the WLSTTL field at the incoming node.

B.

The TTL in the B. MPLS label has the same meaning as the TTL field in the head. TTL prevents mpLS networks from developing bad routing.

C.

Unifore style, when an IP packet passes through the MPLS network, the IPTTL of the incoming node is minus l. The MPLS TTL field is a fixed value.

D.

In MPLSVPI, if you need to hide the structure of the MPLS backbone network, you can use Uniform mode on Ingress for private network messages .

Full Access
Question # 53

The following statement about isis protocol LSP messages is correct

A.

The isP rapid diffusion feature, which first diffuses out LSPs that are smaller than a specified number , speeding up the synchronization process of LSDB

B.

By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based on the frequency at which the routing information changes

C.

As link status information increases, the packet length of the LSP can be increased so that each ISP can carry more information.

D.

Reducing the minimum interval at which LSPs are sent per port can speed up the diffusion of LSPs.

Full Access
Question # 54

The address resolution feature for NDP in the following description is incorrect?

A.

When sending a neighbor request packet, the source address—is set as the link-local address

B.

of the local interface Two types of ICMPv6 messages,

C.

are used in the address resolution process, neighbor request and neighbor advertisement Address resolution implements the ability to resolve from IPv6 addresses to link-layer addresses

D.

When sending a neighbor request packet, the destination address must be the multicast address of the neighbor's requested node

Full Access
Question # 55

As shown in the following topology, EBGP is running between AS100, AS200, AS300, AS400, and the neighbor relationship is established S400 When you receive a BGP route from ASI00 for a 1.1.1.1/32 network segment, is the path order recorded in the ASPath properties correct?

A.

10,200,3

B.

400,300,200,100

C.

100, 200,300, 400

D.

300, 200,100

Full Access
Question # 56

As shown in the figure,

all interfaces of the router have OSPF turned on, and the COST value of the link is identified in the figure. R2's loop backO interface advertises a cost in region l, then R1 reaches 10022/32 The value is

Full Access
Question # 57

The router port to which the policy is applied has been idle for about 10 seconds, and there is a huge burst of c1 type coming in an instant, so how many bytes will the packets that are colored green?

A.

256K bytes

B.

48128 bytes

C.

32K bytes

D.

80128 bytes

Full Access
Question # 58

The following description of VRRP load sharing is correct?( Multiple choice questions).

A.

When configuring priority, make sure that the same router acts as a master in the three VRRP backup groups

B.

You can create multiple VRRP backup groups on one interface of a router . The router can act as a master for one VRRP backup group and as a backup for other VRRP backup groups

C.

When you deploy load sharing, hosts in the same LAN are required to configure the IP addresses of different virtual routers as gateway addresses for missing provinces

D.

VRRP load sharing requires at least two virtual routers to provide forwarding services at the same time

Full Access
Question # 59

The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration

A.

[Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quit

B.

[Qudway ineface gigabtethemnet /0'1

[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit

C.

Quidway inteface gigabiethenet ou0/1

[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut

D.

[Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20

E.

[Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit

Full Access
Question # 60

Configuration under a certain interface: isis timer hello 5 level-2, the following statement is correct?

A.

The hello packets sent at level-1 and Leve1-2 are both 5s

B.

The hello packets sent at level-1 are sent at 5s interval

C.

The level-2 hello packet send interval is 5s

D.

The CSNP packet sending interval for this interface Level-2 is 5S

Full Access
Question # 61

If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?

A.

PIM routers with long interface masks are elected dr.

B.

Compare the DR priority first; With the same priority, you need to compare the interface IP addresses of the PIM routers to elect dr

C.

PIM routers with small IP addresses are elected DR. PIM routers with low D. DR priority values are elected DR.

Full Access
Question # 62

Which of the following is the benefit of VLAN aggregation?

A.

Implements isolation of broadcast domains between Sub-VLANs

B.

Reduce the waste of IP addresses

C.

Increased number of available VLANs

D.

Increased flexibility in addressing

Full Access
Question # 63

As shown in the figure, the PPP link between R1 and R2 is not in the same network segment, but the R1 and R2 direct connectors can communicate, and the Ethernet link cannot communicate under the same planning, why?

A.

The interconnect POS ports of R1 and R2 learn the 24-bit subnet route of each other's direct connection ports through IPCP

B.

The interconnect POS ports of R1 and R2 learn the 32-bit host route for each other's direct connections through IPCP

C.

The interconnect POS port of RI and R2, through LCP learns the MAC address of the opposite termination , does not need to use ARP to request the MAC address

D.

The data packets of the interconnect POS ports of R1 and R2 do not need to encapsulate ethernet headers and do not need to use ARP to request MAC addresses

Full Access
Question # 64

The correct description of the extended features of ISIS is ?

A.

When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.

B.

ISIS can choose whether to authenticate incoming SNP and LSP packets

C.

If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices.

D.

After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process.

Full Access
Question # 65

Regarding the DSCP field, the following statement is incorrect: single selection

A.

The DSCP value can be 0, and packets use the default forwarding mechanism when 0

B.

When the value of DSCP is EF, it indicates that the data belongs to the accelerated forwarding class.

C.

In addition to indicating the priority of the data, DSCP can also indicate the probability of data being discarded. The CS class in D. DSCP divides data into 8 priorities.

Full Access
Question # 66

In a data communication session between two hosts, which level does the session layer of the oSI model of the host on one end communicate with the osl mode of the host on the other end?

A.

Communicate with the conversation layer on the other end B Communicate with the application layer at the other end

B.

Communicate with the data link layer at the other end

C.

Communicate with the physical layer at the other end

D.

Communicate with the presentation layer at the other end

Full Access
Question # 67

Mainstream Layer 2 technologies such as VXLAN, TRILL, NVGRE and MPLS

A.

True

B.

False

Full Access
Question # 68

The BSR/RP mechanism described below describes the correct determination ?( Multiple choice questions).

There can be multiple C-BSRs in the

A.

PIM-SM domain, but only one BSR can be elected.

B.

BSR collects C-RP information by receiving packets of C-RP

C.

BSR advertises BSR and C-RP information to all routers in the PIM-SM domain via flood bootstrap messages

D.

A C-BSR can also collect C-RP information by receiving C-RP packets

Full Access
Question # 69

When the ABR is a Type 5/7 LSA Switch router in the NSSA zone, then the ABR can be used against the Type 7 LSA The converted type 5 LSA is aggregated.

A.

True

B.

False

Full Access
Question # 70

The value of OSPF and BFD linkage is ? Radio

A.

Any change in BFD status is realized by detecting the BFD at the millisecond level, which correlates the OSPF state and realizes the purpose of OSPF rapid sensing link state

B.

Does not affect OSPF neighbor status

C.

BFD packet transmission interval can reach the 100-second level, which is slower than the OSPF induction link state

D.

OSPF's hello send interval is seconds, which is faster than BFD inductive link state

Full Access
Question # 71

When you deploy BGP/MPLSIPVPN, when two VPNs have a common site, the common site must not use overlapping address spaces with the other sites of the two VPNs.

A.

TRUE

B.

FALSE ?:B

499The series description for configuring static lSPs in MPLS networks is correct?

C.

When an LSR is Ingress LSR, only configure Out Label, which ranges from 16-1048575

D.

When an LSR is a Transit LSR, you need to configure both In Label and Out label, both in the range of 16-1023

E.

When an LSR is TransitLSR, you need to configure both ln Label and Out Label, both of which are 161023 The Out Label ranges from 16 to 1048575

F.

When an LSR is An Egyptian LSR, only in Label needs to be configured, ranging from 16-1023

Full Access
Question # 72

A company's two-layer phase network architecture as shown in the figure, when the engineer is configured to find that the business between departments can not communicate, through the command to view the status of the equipment as follows, please determine the possible causes?

A.

The BPDU interval between switches is not configured

B.

The Transition VLAN mapping between the handover machines is not configured to be caused

C.

The Revislon Level configuration is inconsistent between switches

D.

Inconsistent Registry Name configuration between text exchange machines

Full Access
Question # 73

Which address prefix in the following options indicates that the address is globally unique and globally routable among unicast addresses in IPv6, similar to a public address in IPv4?(). Single choice questions).

A.

::1/128

B.

FE80:/10

C.

FE80::/10

D.

2000:;/3

Full Access
Question # 74

The following description of VLANs in Ethernet is correct?

A.

VLANs do not support bulk creation on devices

B.

The range of VLANs is 0 to 4096

C.

The default reserved VLANs for Huawei devices are 4000~4010

D.

VLANs can be extended through QinQ technology.

Full Access
Question # 75

The following statement about the security alliance SA in IPSec is incorrect

A.

SA is uniquely identified by a triple that includes the security parametric reference SPI (Security Parameter Inder), the source IP address, and the security protocol number (AH or ESP)

B.

Use the display ipsec command to view the encryption algorithm used with another IPSec peer, the traffic of interest, and so on.

C.

IPSec only supports encrypting data using symmetric encryption algorithms.

D.

A two-way SA must exist between IPSec peers to establish an IPSec VPN connection

Full Access
Question # 76

The following about the Router-LSA of OSPFv3 is correct?( Single choice questions).

A.

The router-LSA data area contains the Link-Local address

B.

The router-LSA data area contains the Interface ID of the neighbor on this side

C.

Similar to OSPFv2, the Option field exists in the header of LSA, not in the data area of Router-LSA

D.

When LS type= Ox0001 in the head of LSA, the data area representing LSA is Router-LSA

Full Access
Question # 77

What are some of the following misrepresentations about URPF, IPSG, and DAI technologies? ( Multiple choice questions).

A.

DAI does not support manual configuration of binding tables.

B.

IPSG checks the source IP address and source MAC address of the IP packet , and DAI only checks the correspondence between the IP and the MAC.

C.

URPF can be used to protect against DDoS spoofed source attacks.

D.

IPSG technology checks IP packets for source IP spoofing attack prevention, while DAI checks ARP packets to filter attack sources.

Full Access
Question # 78

Underneath, what doesn't belong to EVPN Type2 routing is ?( Multiple choice question)

A.

Host ARP advertisement

B.

BUM message forwarding

C.

Host MAC address advertisement

D.

Host IP Route Advertisement

Full Access
Question # 79

The correct statement about the IGMP proxy is ? Multi-select

A.

The downstream interface of the IGMP proxy device generates multicast relay table items

B.

IGMP proxy can detect the link status with the linkage through the information of the member host joining/leaving the multicast group, and realize the rapid switching of the primary and standby device links

C.

IGMP proxy is typically deployed on devices between hosts that are members of the access device

The

D.

IGMP proxy device cannot send query messages to downstream member hosts in place of the IGMP queryer to maintain group membership

Full Access
Question # 80

The multicast IP address is 2291301301, and its corresponding MAC address is :(Multilist)

A.

01-00-5E-O2-82-01

B.

01-00-5E-82-82-01

C.

00-00-5E-02-82-01

D.

00-00-5E-82-82-01

Full Access
Question # 81

The following description of the process of sending and receiving data frames in switch interface Access mode is correct? ( Single choice questions).

A.

In Access mode, labeled data frames are discarded directly when they are received.

B.

Access mode strips off the VLAN tag of the dataton when sending .

C.

Access mode receives only unlabeled data frames.

D.

When a data frame enters the switch interface, the switch learns the destination MAC address in the data frame.

Full Access
Question # 82

: :1/128 is the IPV6 loopback address

A.

TRUE

B.

False

Full Access
Question # 83

In the laboratory network, the network is built according to the following topology diagram, SWI is the default configuration, and SW2 disables the switch STP function.

A.

SG0/0/2 for WI enters the Discarding state

B.

SW2 and G0/0/1 enters the Discarding state

C.

SW2 G0/0/2 enters discarding state

D.

No interface is backed up for blocking

E.

SWI's G0/0/1 enters the Discarding state

Full Access
Question # 84

/R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration, the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then the possible cause is the question).

A.

This router does not have an OSPF process number configured

B.

This router is configured with a different zone ID than its neighbor router's zone ID

C.

This router does not have authentication features configured, but neighbor routers configure authentication features

D.

The declared network address of this router does not match the interface mask

Full Access
Question # 85

As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).

A.

The 2::/64 route appears in the P route table

B.

The 2019:/64 route appears in the IP routing table

C.

2020::/64 The route appears in the IP routing table

D.

The 2021/64 route will appear in the IP routing table

Full Access
Question # 86

The following statement about the VXLAN gateway is incorrect?( Single choice questions).

A.

Layer 2 gateway: Used to solve the problem of tenant access to the VXLAN virtual network, and can also be used for subnet communication of the same VXLAN virtual network.

B.

Layer 3 gateway: Used for cross-subnet communication of the VXLAN virtual network and access to external networks.

C.

VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.

D.

Layer 2 gateway and VPN instance binding.

Full Access
Question # 87

In the city, that is, mpLS BGPVPN network, when the packet enters the public network forwarding, it will be encapsulated with two layers of MPLS tags, the following description of the two layers of tags, the error is ?

A.

Private network tags are carried and distributed by MP-BGP when routing, and public network tags are distributed by the LDP protocol.

B.

MPLS BGPVPN uses two layers of tags: public labels (also known as outer labels) and private network labels (also known as inner labels).

C.

By default, the router assigns the same tag value to all VPNv4 routes destined for the peer

D.

The egress PE uses the inner tag when determining which egress CE the message should be sent to.

Full Access
Question # 88

The switch role in the stacking system does not include ?

A From the switch

B. Candidate Switch

C. Standby Switch

D. Primary Switch

Full Access
Question # 89

What is the relationship between CIR, BC and TC? (single select)

A.

CIR=TC/BC

B.

CIR=BE/TC

C.

TC=CIR/BC

D.

TC=BC/CIR

Full Access
Question # 90

The command to adjust the LINK cost value for the IS-IS interface is ?( Radio)

A.

ISIS cost

B.

ISIS timer hello

C.

lSIS circuit type

D.

ISIS circuit level

Full Access
Question # 91

WRED is configured on the newly deployed router HW. What is the correct description of the WRED features below? (Multiple choice questions).

A.

WRED can set different drop thresholds and packet loss rates for packets of different priority

B.

When the flow exceeds the minimum threshold, WRED begins to discard all inlet flow (tail drop)

C.

Avoid global synchronization by selectively dropping multiple TCP streams

D.

Low-bandwidth traffic is easier to drop than high-bandwidth traffic

Full Access