Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H31-211 Questions and Answers

Note! Following H31-211 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H31-211 Questions and Answers

Question # 6

Which of the following protocols can be used for file transfer? (multiple choice)

A.

FTP

B.

TFTP

C.

Xmodem

D.

icmp

Full Access
Question # 7

Which of the following is valid host IP address?

A.

122.245.264.13/26

B.

192.168.2.15/28

C.

10.0.2.128/26

D.

224.0.4.5

E.

12.3.4.6/24

Full Access
Question # 8

Which of the following two types of interfaces can the switch be? (multiple choice)

A.

MDI

B.

MDI_S

C.

MDI_X

D.

MDI_R

Full Access
Question # 9

Which of the following statements about broadcast in IPv6 is correct?

A.

Broadcast in LAN can affect all nodes.

B.

Broadcast is not used in IPv6.

C.

The definition of broadcast in the IPv6 network is pending.

D.

Broadcast, as a basic mechanism, is used in various IPv6 operations.

Full Access
Question # 10

The firewall does not provide detection for encrypted data or for data in tunnels that traverse it.

A.

True

B.

False

Full Access
Question # 11

Which of the following fibers allows for multiangular incidence of "multiple" beams of light for transmission?

A.

4-core fiber

B.

"Single-mode" fiber

C.

Active fiber

D.

Multimode fiber

Full Access
Question # 12

OSPF runs over the IP protocol and the IP protocol No. used by which OSPF?

A.

89

B.

512

C.

80

D.

2328

Full Access
Question # 13

Which attribute is selection of a root bridge based on when the spanning tree is calculated by the STP?

A.

Path Cost

B.

Port ID

C.

Bridge ID

D.

Port Cost

Full Access
Question # 14

This type of firewall directly obtains the information such as source IP address, destination IP address, source TCP/UDP port, destination TCP/UDP port and protocol number in the packet header and filters the packets based on the defined policy. Which of the following is the firewall described above?

A.

Proxy firewall

B.

Packet filtering firewall

C.

Stateful firewall

D.

Link layer firewall

Full Access
Question # 15

IPv6 cancels the option field in the IPv4 packet header and adds multiple extended packet headers, which improves the processing efficiency and enhances the flexibility of IPv6 and provides a good scalability for the IP protocol.

A.

True

B.

False

Full Access
Question # 16

Which of the following commands can switch a view from the system view to the user view?

A.

Quit

B.

Router

C.

User-view

D.

System-view

Full Access
Question # 17

The switch is based on which of the following options is used for data forwarding?

A.

Source MAC address

B.

Destination MAC address

C.

Source IP address

D.

Destination IP address

Full Access
Question # 18

The firewall must log the traffic logs that pass, but there can be no records for the rejected traffic.

A.

True

B.

False

Full Access
Question # 19

According to the principle of STP protocol, all ports of the root switch are ()

A.

Root port

B.

Backup port

C.

Designated port

D.

Blocking the port

Full Access
Question # 20

Subnetting is in the () part of the IP address.

A.

Network segment address

B.

Host address

C.

Subnet segment

D.

Default subnet mask

Full Access
Question # 21

Since the FR virtual circuit is connection-oriented and the different local DLCIs are connected to different peer devices, the local DLCI can be considered as the "frame relay address" of the peer device.

A.

True

B.

False

Full Access
Question # 22

In the frame relay network, what are the correct descriptions about the bandwidth control parameters? (multiple choice)

A.

CIR is the rate of user information transmission agreed by the network and the user, that is, the committed information rate.

B.

Bc is the amount of data that the network allows users to transmit at CIR rate Tc intervals. They are related to Tc=Bc/CIR.

C.

Be is the amount of data that the network allows users to transmit more than Bc during the Tc interval.

D.

If the user transmits information at a rate less than or equal to CIR, the transmission of this part of information should be guaranteed.

Full Access
Question # 23

According to the different protocols applied by the routing protocol, what kind of routing protocols can be divided into? (multiple choice)

A.

Multicast routing protocol

B.

Unicast

C.

Distance vector

D.

Link status

Full Access
Question # 24

On the VRP platform, what is the command to set the data link layer encapsulation type to HDLC on the Serial port?

A.

encapsulation hdlc

B.

link-protocol hdlc

C.

hdlc enable

D.

link-protocol ppp

Full Access
Question # 25

Firewall generally needs to detect which scanning behavior () (multiple choice)

A.

Port-scan

B.

icmp-scan

C.

udp-scan

D.

tcp-synflood

Full Access
Question # 26

Which of the following types of ports allow transparent transmission of VLANs? (multiple choice)

A.

Trunk

B.

Access

C.

Hybrid

D.

Normal

Full Access
Question # 27

In order to check whether the serial port s0/1 on the Quidway router works in DTE or DCE mode, which of the following commands should be used?

A.

display controller serial

B.

display saved-config

C.

display interface s0/1

D.

display current-config

Full Access
Question # 28

What is the correct statement about free ARP? (multiple choice)

A.

By sending a free ARP, you can confirm whether the IP address has a conflict.

B.

The free ARP packet format belongs to the AR request packet.

C.

Free ARP helps update old IP address information

D.

The free ARP packet format belongs to the ARP reply packet.

Full Access
Question # 29

Stateful Inspection Firewall Firewall dynamically determines the flow of packets by detecting connection status based on TCP/UDP connections and application layer protocol information, and monitoring connection-based application layer protocol status.

A.

True

B.

False

Full Access
Question # 30

What is the packet that the STP downstream device uses to notify the upstream device that the network topology changes?

A.

Agency BPDU

B.

TCN BPDU

C.

Discover BPDUs

D.

Reverse BPDU

Full Access
Question # 31

How can the default route be generated? (Select multiple)

A.

Manually configured

B.

Generated by link layer protocol

C.

Generated by dynamic routing protocols

D.

Automatically generated by the router

Full Access
Question # 32

Which of the following options are the disadvantages of single spanning tree? (multiple choice)

A.

Single spanning tree may cause hosts on the same VLAN on different switches to fail to communicate.

B.

Traffic sharing on different links cannot be performed under single spanning tree conditions.

C.

When running a single spanning tree, the entire network converges slowly.

D.

Under the condition of single spanning tree, there may be a suboptimal second layer path.

Full Access
Question # 33

Which of the following storage devices are supported by Huawei Quidway router?

A.

CF Card

B.

Hard Disk

C.

SDRAM

D.

NVRAM

E.

Flash

Full Access
Question # 34

Which of the following descriptions about function of VRRP is true?

A.

VRRP improves the reliability of the default gateway in the network.

B.

VRRP is mainly used for load balancing.

C.

VRRP makes the routing protocols converge faster.

D.

VRRP provides the same default gateway for different network segments, thus simplifies gateway configuration of PCs in the network.

Full Access
Question # 35

Adding a shielding layer on the outside of the twisted pair, called (), can improve the anti-electromagnetic interference capability of the twisted pair.

A.

STP

B.

UTP

C.

BTP

D.

RPR

Full Access
Question # 36

During STP calculation, when a port is in a certain state, it neither forwards any data frame nor learns MAC address labels. Instead, it only receives and processes STP protocol packets. Which state does the abovementioned state refer to?

A.

Listening

B.

Forwarding

C.

Learning

D.

Blocking

Full Access
Question # 37

Which of the following firewalls acts as an intermediate node in which it acts as a server for the client and acts as a client for the server?

Which of the following firewalls best describes the firewall mentioned above?

A.

Application layer gateway firewall

B.

Packet filtering firewall

C.

Stateful firewall

D.

Proxy firewall

Full Access
Question # 38

The RTA uses the Ethernet0/0 interface to connect to a LAN. The IP address of the port is 10.1.1.251 and the network mask is 255.255.255.0.

It is required to create a virtual router on the RTA with ID 1 and virtual IP address 10.1.1.254. Which of the following is correct?

A.

[RTA-Ethernet0/0]vrrp vrid 1 virtual-ip 10.1.1.254

B.

[RTA]vrrp vrid 1 virtual-ip 10.1.1.254

C.

[RTA-Ethernet0/0]vrrp vrid 1 virtual-ip 10.1.1.254 mask 255.255.255.0

D.

[RTA]vrrp vrid 1 virtual-ip 10.1.1.254 mask 255.255.255.0

Full Access
Question # 39

What are the common methods in VLAN-based partitioning? (multiple choice)

A.

Port-based VLAN

B.

VLAN based on MAC address

C.

VLAN based on protocol

D.

Divide VLAN based on TCP port number

Full Access
Question # 40

Which of the following are the message types of the LMI protocol? (multiple choice)

A.

Link Integrity Verification Only message

B.

Full Status message

C.

Status Enquiry message

D.

Asynchronous PVC Asynchronous Status (Single PVC Asynchronous Status) message

E.

Status message

Full Access
Question # 41

When the network fails, which of the following originated routes cannot be automatically corrected, and the administrator needs to reconfigure it?

A.

Link discovered by the link layer

B.

Static routing

C.

Dynamic routing

D.

All routes

Full Access
Question # 42

If the IP address 10.110.53. and 10.110.127.2 44 are on the same network segment, what are the mask lengths? (multiple choice)

A.

16

B.

17

C.

18

D.

19

Full Access
Question # 43

Which of the following values is the default preference value for static route on the VRP platform?

A.

60

B.

20

C.

100

D.

0

Full Access
Question # 44

Which of the following storage media are commonly used by Huawei routers? (multiple choice)

A.

SDRAM

B.

NVRAM

C.

Flash

D.

Hard Disk

E.

CF Card

Full Access
Question # 45

Which layer of the TCP/IP model does the repeater work on?

A.

Physical layer

B.

Data link layer

C.

Transport layer

D.

Application layer

Full Access
Question # 46

When a router that enables proxy ARP receives an ARP request packet, it finds that the destination address of the packet is not its own. Which operation is required? (Multiple selection)

A.

Discard the message

B.

Find the route to the destination address

C.

If there is a route to the destination address, send its own MAC address to the ARP requester.

D.

Broadcast ARP request message

Full Access
Question # 47

What are the correct functions of the functions implemented on VRP? (multiple choice)

A.

Achieve a unified user interface and management interface

B.

Implement control plane functions

C.

Defining the forwarding plane interface specification

D.

Prevent the interaction between the forwarding plane and the VRP control plane

Full Access
Question # 48

Which of the following pictures is fiber?

A.

B.

C.

D.

Full Access
Question # 49

If a switch displays part of the information as follows, what is the PVID of this port?

[Quidway] display interface Ethernet 1/0/1...Mdi type:autoPort link-type:accessTagged VLAN ID:noneUntagged VLAN ID:5

A.

0

B.

1

C.

5

D.

Insufficient information, unknown

Full Access
Question # 50

In the RIP protocol, what is the parameter for calculating the cost value?

A.

MTU

B.

Delay

C.

Bandwidth

D.

Route hop count

Full Access
Question # 51

What is the correct statement about the size of the IP network subnet address space? (multiple choice)

A.

The subnet space must meet the actual needs, and there must be some redundancy to ensure scalability.

B.

Since the IP address borrowing and other technical means can be used, in order to save the IP address, the subnet space size should generally be smaller than the actual needs.

C.

The size of the subnet space should be as large as 2 to facilitate the implementation of various strategies.

D.

The above statements have some truth, but they cannot be applied in engineering practice.

Full Access
Question # 52

What are the correct descriptions of the working principle of the Layer 2 Ethernet switch in the following options? (Multiple choice)

A.

All data frames on the network segment connected to the receiving port

B.

Establish a MAC address table by using the destination MAC address in the received data frame.

C.

Look up the destination MAC address in the data frame in the MAC address table, send the data frame to the corresponding port if it is found (excluding the source port); if not found, go to all ports except the source port send

D.

Address table maintenance using the address aging mechanism

Full Access
Question # 53

What is the correct statement about the alternate route? (multiple choice)

A.

Do not join the global routing table

B.

Does not guide the forwarding of data

C.

After the primary route fails, it will be promoted to the primary route and added to the global routing table.

D.

Direct data forwarding with the primary route

Full Access
Question # 54

Each routing protocol corresponds to a routing priority. What is the priority range?

A.

1-1024

B.

0-255

C.

0-256

D.

0-1024

Full Access
Question # 55

Which commands can be used to view the configuration information of interface Serial 1/0/1? (multiple choice)

A.

[Quidway] display current-configuration

B.

[Quidway-Serial1/0/1] display this

C.

[Quidway] view saved-configuration

D.

[Quidway] show current-configuration

Full Access
Question # 56

Frame Relay works at the data link layer, which of the following functions are provided? (multiple choice)

A.

Statistical multiplexing

B.

Frame transparent transmission

C.

Error detection

D.

Retransmission operation

Full Access
Question # 57

When the network topology changes, if the best path to the destination IP is no longer available, the dynamic routing protocol can adapt to the network change and determine the best path to the destination IP.

A.

True

B.

False

Full Access
Question # 58

Huawei routers can update system files through FTP and TFTP. Which of the following is correct? (multiple choice)

A.

Huawei router can be used as FTP client

B.

Huawei router can be used as FTP server

C.

Huawei router can be used as TFTP client

D.

Huawei router can be used as TFTP Server

Full Access
Question # 59

Which component of the VRP platform does user authentication and accounting and user policy management belong to?

A.

Business Control Plane

B.

Universal control plane

C.

System management plane

D.

The above is not correct

Full Access
Question # 60

Which of the following techniques can improve the efficiency of IP address usage?

A.

DHCP

B.

DNS

C.

ARP

D.

FTP

Full Access
Question # 61

75For such several network segments: 172.168.16.0, 172.168.17.0, 172.168.18.0, 172.168.19.0, which of the following network segments is best used to implement route summarization?

A.

172.168.16.0/21

B.

172.168.17.0/21

C.

172.168.16.0/22

D.

172.168.20.0/20

Full Access
Question # 62

The MRU indicates the maximum value of the data field of the PPP data frame received by the local end. In general, how many bytes is this parameter option using the default value?

A.

1492

B.

1500

C.

4700

D.

9600

Full Access
Question # 63

What is the broadcast MAC address?

A.

FF-FF-FF-FF

B.

FF-FF-FF-FF-FF-FF

C.

00-00-00-00-00-00

D.

00-00-00-FF-FF-FF

Full Access
Question # 64

Which of the following is the correct description of the Message Age in the configuration BPDU packet? (multiple choice)

A.

If the configuration BPDU is sent by the root bridge, the Message Age is 1.

B.

Message Age is the total time that the BPDU is sent from the root bridge to the current bridge.

C.

In actual implementation, the BPDUs are configured to pass through a bridge, and the Message Age is increased by 1.

D.

The value of Message Age will not exceed 15

Full Access
Question # 65

The firewall acts as an intermediate node for business access. For the Client, the firewall is a server. For the server, the firewall is a client called a firewall.

A.

Packet filtering firewall

B.

Proxy firewall

C.

Stateful inspection firewall

D.

Application gateway firewall

Full Access