Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H31-161 Questions and Answers

Note! Following H31-161 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H31-161 Questions and Answers

Question # 6

On the IP bearer network, media and signaling packets must first be guaranteed by PQ scheduling.

The IP priority of protocol packets on the routers is 6 or 7, and these packets must also first be guaranteed. Other data packets are placed in the BE queue for scheduling. However, devices cannot be connected in inband Telnet mode if network congestion occurs. Which of the following statements are true?

A.

Telnet packets are discarded during network congestion because the IP priority of Telnet packets is 0 and is scheduled in the BE queue.

B.

Telnet packets are protocol packets and join high-priority queues by default.

C.

You can improve the priority of Telnet packets and add them to the PQ queue to ensure them during network congestion.

D.

The UDP port number for Telnet packets is 23.

Full Access
Question # 7

Exhibit.

Which statement about inter-AS MPLS VPN Option_B is false?

A.

The ASBR cannot be used as a PE simultaneously and a CE cannot be connected to an ASBR.

B.

When ASBRs are directly connected, packets transmitted on the VPN between them have only one label.

C.

The undo policy vpn-target command must be configured in the VPN4 address family view of the BGP neighbor of the ASBR to prevent routes from being filtered automatically.

D.

When ASBRs are directly connected, VPN traffic can be forwarder between them only after MPLS is enabled on the interfaces.

Full Access
Question # 8

As shown in the figure, for SWA, Eth0/2 belongs to VLAN 2, and Eth0/24 (PVID = 2) is a trunk interface and permits packets from VLAN 2 and VLAN 3 to pass through; for SWB, Eth0/2 belongs to VLAN 2, Eth0/3 belongs to VLAN 3, and Eth0/24 (PVID) is a trunk interface and permits packets from VLAN 2 and VLAN 3 to pass through. Which statement is true?

A.

PC A can ping both PC B and PC C.

B.

PC A can ping neither PC B nor PC C.

C.

PC A can ping PC B instead of PC C.

D.

PC A can ping PC C instead of PC B.

Full Access
Question # 9

Exhibit.

The preceding information shows the configurations of Ethernet 6/1/1 and ensure created based on received IGMPv2 Report messages. Which action does Ethernet 6/1/1 after receiving Leave messages for group 224.1.2.3?

A.

Deletes the record of group 224.1.2.3

B.

Sends group-specific query messages for group 224.1.2.4

Full Access
Question # 10

Which of the following statements about the L2VPN are true?

A.

If the length of a L2VPN packet that arrives at a P node exceeds the maximum transmission unit (MTU) of relevant interfaces of the P node, the packet will be fragmented and then forwarded.

B.

When a traditional L2VPN (ATM and FR) is upgraded to an MPLS L2VPN, the network topology does not need to be adjusted.

C.

When providing the MPLS L2VPN service for enterprise users, the carrier must filter user route advertisements. Otherwise, flapping of user routes may lead to flapping of network routes.

D.

On a L2VPN, routing information of users does not need to be maintained or managed.

Full Access
Question # 11

Refer to the exhibit.

OSPF process 1 is started on RTA and assigned to the vpn1 instance.

After the vpn-instance-capability simple command is configured in the OSPF view, which of the following statements are false?

A.

Bit B is not set in the router LSA generated by RTA in area 1.

B.

When RTA receives a Type 3 summary LSA with the DN bit in area 1, it ignores the calculation of the LSA.

C.

After RTA imports a BGP route from the MPLS VPN backbone network, if Domain ID of the BGP route is the same as that used in the local OSPF area and the BGP route is an intra-area route, a Type 3 summary LSA is generated and flooded to area 1.

D.

When RTA imports a BGP route from OSPF process 1, an extended community identification must be carried to specify the OSPF attributes of the route.

Full Access
Question # 12

Which message does the pseudo wire emulation edge-to-edge (PWE3) add for LDP signaling

extension compared with Martini VLL?

A.

Request

B.

Mapping

C.

Withdraw

D.

Release

E.

Notification

Full Access
Question # 13

Configurations are as follows:

#

multicast routing-enable

#

msdp

peer 2.2.2.2 connect-interface loopback0

peer 3.3.3.3 connect-interface loopback0

import-source acl 3000

peer 2.2.2.2 sa--policy import acl 3001

peer 3.3.3.3 sa--policy export acl 3002

#

Interface loopback0

ip address 1.1.1.1 32

pim sm

#

acl 3000

rule 5 deny ip destination 230.0.0.1 0 source 30.0.0.1 0

rule 10 permit ip

#

acl 3001

rule 5 permit ip destination 231.0.0.1 0 source 30.0.0.1 0

#

acl 3002

rule 5 permit ip destination 233.0.0.1 0 source 30.0.0.1 0

#

Which statement is true?

A.

A router sends a locally generated (30.0.0.1, 230.0.0.1) SA message to its MSDP peer 2.2.2.2.

B.

A router sends a locally generated (30.0.0.1, 230.0.0.2) SA message to its MSDP peer 2.2.2.2.

C.

A router can receive a (30.0.0.1, 230.0.0.2) SA message from its MSDP peer 2.2.2.2.

D.

After receiving a (30.0.0.1, 230.0.0.1) SA message from its MSDP peer 2.2.2.2, a router forwards the message to its MSDP peer 3.3.3.3.

Full Access
Question # 14

Exhibit.

As shown in the figure, RTA connects to RTB and RTC A TE tunnel is configure on RTA to reach RTC. The TE tunnel cannot be successfully established. However, CSPF-based calculation is successful and RTA does not receives any PathErro messages. What are possible causes?

A.

An interface address on RTP is the same as the address of interface RTA-1.

B.

RSVP-TE is not configured at interface RTB-2.

C.

Different authentication keys are configured on interface RTB-2 and RTC-1.

D.

The reserved bandwidth is insufficient at interface RTB-2

Full Access
Question # 15

Refer to the exhibit.

As shown in the figure, PE 1 sets up an MP-IBGP neighbor relationship

with PE 2 and they communicate over MPLS LDP. A CE communicates with a PE over OSPF.

Configure the VRF on PE 1 as follows:

ip vpn-instance vrf1

route-distinguisher 100:1

vpn-target 1:1 export-extcommunity

vpn-target 1:1 import-extcommunityConfigure OSPF on PE 1 as follows:

ospf 1 vpn-instance vrf1

area 0.0.0.0

network 100.1.1.0 0.0.0.255

Configure BGP on PE 1 as follows:

bgp 100

peer 22.22.22.22 as-number 100

peer 22.22.22.22 connect-interface LoopBack0

#

ipv4-family unicast

undo synchronization

peer 22.22.22.22 enable

#

ipv4-family vpnv4

policy vpn-target

peer 22.22.22.22 enable

#

ipv4-family vpn-instance vrf1

import-route ospf 1

PE 2 has the same configurations as PE 1. MP-IBGP neighbor relationships have been set up

between PEs, and OSPF neighbor relationships have been set up between PEs and CEs. A valid route 1.1.1.1/32 is imported from CE 1 to an OSPF area, but CE 1 does not learn the route. What is the reason?

A.

CE cannot be connected to a PE through OSPF.

B.

CE can be connected to a PE through OSPF only when the PE also runs OSPF.

C.

An RD is shared by VRFs on PE 1 and PE 2.

D.

BGP routes must be imported to OSPF areas on a PE.

Full Access
Question # 16

display igmp group

IGMP interface group report information of VPN-Instance: public net

Ethernet6/1/1(40.1.1.1):

Total 1 IGMP Group reported

Group: 232.0.0.1

Uptime: 00:00:22

Expires: off

Last reporter: 40.1.1.3

Last-member-query-counter: 0

Last-member-query-timer-expiry: off

Group mode: include

Version1-host-present-timer-expiry: off

Version2-host-present-timer-expiry: off

Source list:

Source: 20.1.1.56

Uptime: 00:00:22

Expires: 00:05:08

Last-member-query-counter: 3

Last-member-query-timer-expiry: 00:00:01

Source: 20.1.1.57

Uptime: 00:00:22

Expires: 00:00:17

Last-member-query-counter: 3

Last-member-query-timer-expiry: 00:00:01

The preceding information shows the entry states in the IGMP interface table on Ethernet 6/1/1.

Which statement is true when IGMP sends source/group query messages?

A.

IGMP sends two messages. In one message, the multicast source is 20.1.1.56 and the S flag is not configured. In the other message, the multicast source is 20.1.1.57 and the S flag is set to 1

B.

IGMP sends two messages. In one message, the multicast source is 20.1.1.56 and the S flag is set to 1. In the other message, the multicast source is 20.1.1.57 and the S flag is not configured.

C.

IGMP sends one message in which the multicast sources are 20.1.1.56 and 20.1.1.57 and the S flag is set to 1.

D.

IGMP sends one message in which the multicast sources are 20.1.1.56 and 20.1.1.57 and the S flag is not configured.

Full Access
Question # 17

As shown in the figure, RTA connects to RTB and RTC. A TE tunnel is configured on RTA to reach RTC. The TE tunnel cannot be successfully established. However, CSPFbased path calculation is successful and RTA does not receive any PathErro messages. What are possible causes?

A.

The reserved bandwidth is insufficient at interface RTB-2.

B.

An interface address on RTB is the same as the address of interface RTA-1.

C.

RSVP-TE is not configured at interface RTB-2.

D.

Different authentication keys are configured on interfaces RTB-2 and RTC-1.

Full Access
Question # 18

Refer to the exhibit.

As shown in the figure, RT 5 is a stub area router, an external Internet route is imported by RT 1, and a virtual connection is established between RT 1 and RT 3.At present, the Internet is accessible to routers except RT 5. Why can the Internet not be accessed from RT 5?(Select two answers)

A.

Category 5 LSAs cannot be sent in a stub area.

B.

A stub area cannot be connected using a virtual link.

C.

The cost of the link between RT 1 and RT 3 is excessively large.

D.

RT1 does not inform RT 5 that category 3 LSAs are configured by default.

Full Access
Question # 19

The traffic classification behavior is configured to the single rate dual-bucket CAR in color-blind mode at the upstream interface of the router. Configurations are as follows:

[Quidway]display traffic policy user-defined test User Defined Traffic Policy Information:

Policy: test

Statistic Enable

Classifier: default-class

Behavior: be

-noneClassifier: test

Behavior: test

Committed Access Rate:

CIR 400 (Kbit/s), PIR 0 (Kbit/s), CBS 100000 (byte), PBS 200000 (byte)

Conform Action: pass

Yellow Action: pass

Exceed Action: discardIf the traffic on an interface matches the traffic policy, the traffic rate is 10,000 PPS and the packet

frame length (including the CRC) is 125 bytes, which is the closest number of packets transmitted

through the interface in the first one second?

A.

400

B.

2800

C.

2000

D.

1200

Full Access
Question # 20

When the multicast source starts to send multicast data and no receiver joins in the RP in PIM-SM, which of the following statements are true?

A.

The RP receives a registration message from the source DR, creates a multicast routing entry (S,

G), and sends a register stop message to the source DR.

B.

After the source DR unicasts registration information to the RP, the multicast routing entries (S,

G) of all source groups are generated in the RP but the outbound interface is null.

C.

After receiving a registration message, the RP creates the multicast routing entries (*, G) of all

source groups and sends a register stop message to the source DR.

D.

After all sources unicast registration information to the RP, no multicast route entries related to source groups are generated due to receiver absence.

Full Access
Question # 21

1. On the backbone network , if a PE is connect to a CE, VPN instances need to b reconfigured on the PE, and interface on the PE for connecting to the CE must be bound to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface between PEs, IS-IS configured for PE interworking. PLSA basic capabilities and MPLS LSP are configured for LSP establishment, and MP _IBGP is configured for VPN route exchange VPN routes exchange , LDAP is short for Label Distribution Protocol, and IBGP is short for interior Border gateway protocol.

2. A CE exchange route exchange routers with a PE over External Border gateway Protocol (EBGP.

Configure interior gateway protocol (IGP) on the IS-IS+MPLS backbone networking to achieve the interworking between PEs and IP routers.

A.

-4

B.

-3

C.

-2

D.

-5

E.

-1

Full Access
Question # 22

The Huawei router is the last hop DR where the SSM Mapping function is enabled at the interface.

Some IGMPv2 hosts expect to receive (1.0.0.1, 232.1.0.1), (1.0.0.1, 232.1.0.2), and (2.0.0.1,

232.1.3.2) data. How can you satisfy the preceding requirements with the least configurations?

A.

ssm-mapping 232.1.0.2 32 1.0.0.1

B.

ssm-mapping 232.1.0.1 32 1.0.0.1

C.

ssm-mapping 232.1.0.0 24 1.0.0.1

D.

ssm-mapping 232.1.3.2 16 2.0.0.1

E.

ssm-mapping 232.1.3.1 24 2.0.0.1

F.

ssm-mapping 232.1.3.0 8 2.0.0.1

Full Access
Question # 23

As shown in the figure, the DiffServ model is deployed in E-LSP mode on the MPLS network. A tester connects to GE interfaces of RTA and RTC on the edge of the MPLS network through GE links. The trust upstream default command is configured for interfaces on the IP access side of RTA and RTC. When the tester sends IP packets with DSCP values 10, 12, and 14,the DSCP values of IP packets received at the receiver side are supposed to remain unchanged. However, the DSCP values of all received IP packets are 10. In this case, which of the following statements are true? (Default mapping is configured between the EXP and DSCP values on each router.)

A.

The DSCP values are 10 when RTA’s IP packets leave the MPLS network because the EXP values are 1 when RTA’s IP packets enter the MPLS network.

B.

The configurations on RTA or RTC are incorrect.

C.

If the qos phb disable command is configured for the outbound interface on the IP access side of RTC, the DSCP values of packets the tester receives remain unchanged.

D.

The DSCP values of packets the tester receives are 10 regardless of whether qos phb disable is configured for the outbound interface on RTC’s IP access side.

Full Access
Question # 24

RTA is an edge router of the MPLS backbone network. It provides the access service for users under Layer 2 switches and differentiates users by subinterface. User A accesses VLAN 100 and has subscribed to the HSI, VoIP, and IPTV services. According to 802.1p priorities, the value 0 indicates the HSI service, 1 indicates the VoIP service, and 4 indicates the IPTV service. The DiffServ model is deployed in E-LSP mode on the MPLS network, and the STC is configured for subinterfaces on the access side of RTA (the qos phb disable command is not configured). Outgoing traffic on the G1/0/0.1 subinterface involves the HSI, VoIP, and IPTV services on the access side of RTA. Which statement about EXP values corresponding to these three services is true?

A.

Only one EXP value may be contained, and the value is uncertain.

B.

Only two EXP values may be contained, and the values are uncertain.

C.

At least three EXP values may be contained, and the values are uncertain.

D.

The EXP values must be 0, 1, and 4.

Full Access
Question # 25

On a VPLS network a PE router receive a packet that containers layer 2 user data from a PE. How does the PE router determine the source VSI of this packet?

A.

Outer label of the packets

B.

Destination MAC address in the L2 PDU encapsulation in the packet

C.

MAC address and VLAN ID in the PDU encapsulated in the packet

D.

Inner label of the packet

Full Access
Question # 26

Which statement about the tunnel policy configuration is false?(A)

A.

The tunnel policy is configured in the system view. You can run the tunnel-policy policy-name command to create tunnel policies and enter the tunnel policy view. One VPN instance supports multiple tunnel policies, and multiple VPN instances can share a tunnel policy.

B.

You can run tunnel select-seq { gre | lsp | cr-lsp } * load-balance-number load-balance-number in the tunnel policy view to configure the priorities of tunnels and the number of tunnels among which load is balanced.

C.

You can run the tnl-policy policy-name command in the VPN instance view to apply tunnel

policies to VPN instances. If the required tunnel policy does not exist, the configuration is saved but does not take effect. If you create this tunnel policy in the system view later, the saved configuration will take effect.

D.

If a VPN instance does not have a tunnel policy, an LSP is used and the number of tunnels

configured for load balancing is set to 1

Full Access
Question # 27

Refer to the exhibit.

As shown in the figure, Border Gateway Protocol (BGP) is used to

advertise VPN routes between PE 1 and PE 2.BGP process 100 is started on PE 1 and BGP process 200 is started on PE 2.OSPF is used between a PE and a CE and between CE 1 and CE 2 within area 1.To avoid routing loops, which of the following route tag configurations is true? (Note: 0Xd0000000=3489660928)

A.

Configure the route tag to 3489661028 on PE 1 and leave it blank on PE 2.

B.

Configure the route tag to 3489661128 on PE 1 and leave it blank on PE 2.

C.

Configure the route tag to 100 on PE 1 and to 200 on PE 2.

D.

Configure the route tag to 100 on PE 2 and to 200 on PE 1.

Full Access