Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What function does Ctrl+Z have in the VRP system?

A.

Exits the console interface view.

B.

Exits the interface view.

C.

Returns from any view to the user view.

D.

Exits the current view.

E.

Returns from the system view to the user view.

Full Access
Question # 5

Which of the following is the default value of the Router Dead Interval field in OSPF Hello packets on a broadcast network?

A.

20 seconds

B.

30 seconds

C.

40 seconds

D.

10 seconds

Full Access
Question # 6

The CAPWAP protocol defines the communication standard between ACs and APs. Which of the following statements about CAPWAP is true?

A.

To reduce the load on APs, CAPWAP uses a tunnel to transmit both control and data packets.

B.

To establish a CAPWAP tunnel, a Fit AP can discover an AC only by broadcasting packets.

C.

APs encapsulate user data packets using CAPWAP and send them to an AC.

D.

CAPWAP is an application-layer protocol based on TCP transmission.

Full Access
Question # 7

The default bridge priority of a Huawei switch is 32768.

A.

TRUE

B.

FALSE

Full Access
Question # 8

Which of the following statements are true about the OSPF neighbor status?

A.

In the Exchange state, routers send DD packets that briefly describe link-state information to each other to describe the content of the local LSDB.

B.

The master/slave relationship of OSPF is formed in the ExStart state.

C.

After LSDB synchronization is completed, the router state changes to Full.

D.

The sequence number of DD packets is determined in the Exchange state.

Full Access
Question # 9

In RSTP, a backup port can replace a faulty root port.

A.

TRUE

B.

FALSE

Full Access
Question # 10

When two switches are connected through link aggregation, what are the requirements for the interfaces on the two switches?

A.

The physical interface rates of the interconnected switches are the same.

B.

The physical interface quantities of the interconnected switches are the same.

C.

The models of the optical modules used by the interconnected switches are the same.

D.

The duplex modes of the physical interfaces on the interconnected switches are the same.

E.

The physical interface IDs of the interconnected switches are the same.

Full Access
Question # 11

For STP, the Message Age in the configuration BPDUs sent by the root bridge is 0.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Loops may cause broadcast storms on a Layer 2 network.

A.

TRUE

B.

FALSE

Full Access
Question # 13

The country code configuration affects the actual transmission frequency and maximum transmission power.

A.

TRUE

B.

FALSE

Full Access
Question # 14

Only one SSID can be bound to each radio of an AP.

A.

TRUE

B.

FALSE

Full Access
Question # 15

Network devices running SNMP can proactively report traps to help network administrators detect faults in a timely manner.

A.

TRUE

B.

FALSE

Full Access
Question # 16

Which of the following application-layer protocols are based on TCP?

A.

TFTP

B.

HTTP

C.

FTP

D.

Ping

Full Access
Question # 17

When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Which of the following planes does a network device have?

A.

Control plane

B.

Management plane

C.

Data plane

D.

Service plane

Full Access
Question # 19

The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Which of the following parameters is used to elect the root bridge in STP?

A.

Bridge ID

B.

Port ID

C.

Root path cost

D.

System name of the switch

Full Access
Question # 21

Which of the following is not a common network layer in a midsize campus network?

A.

Core layer

B.

Network layer

C.

Access layer

D.

Aggregation layer

Full Access
Question # 22

Only the WPA2-PSK security policy supports TKIP data encryption.

A.

TRUE

B.

FALSE

Full Access
Question # 23

Which of the following network types does OSPF support?

A.

Broadcast.

B.

Point-to-Point.

C.

Non-Broadcast Multi-Access (NBMA).

D.

Point-to-Multipoint.

Full Access
Question # 24

(Which of the following descriptions regarding the STP forwarding state is incorrect?)

A.

A port in a forwarding state can send BPDU.

B.

A port in a forwarding state does not learn the source MAC address of a frame.

C.

A port in a forwarding state can receive BPDU.

D.

A port in a forwarding state can forward frames.

Full Access
Question # 25

As shown in the figure, which of the following ports will be in blocking state?

A.

G0/0/3 of SWA

B.

G0/0/3 of SWB

C.

G0/0/2 of SWC

D.

G0/0/1 of SWC

Full Access
Question # 26

On an interface that uses PPP as the data link layer protocol, you can configure a static route by specifying a next-hop address or outbound interface.

A.

TRUE

B.

FALSE

Full Access
Question # 27

Which of the following network parameters can be allocated using DHCP?

A.

Address of the DNS server

B.

Operating system

C.

Gateway address

D.

IP address

Full Access
Question # 28

When an AP and an AC are located on different Layer 3 networks, which of the following methods is recommended for the AP when discovering the AC?

A.

Broadcast

B.

DHCP

C.

Manually specified on the AP

D.

DNS

Full Access
Question # 29

Which of the following authentication methods are supported for Telnet users?

A.

No authentication.

B.

Password authentication.

C.

MD5 authentication.

D.

AAA local authentication.

Full Access
Question # 30

As shown in the figure, the host has ARP cache. Host A sends a data packet to host B. Which of the following are the destination MAC address and destination IP address of the data packet?

A.

MAC-A, 11.0.12.1

B.

MAC-C, 11.0.12.1

C.

MAC-C, 10.0.12.2

D.

MAC-B, 11.0.12.1

Full Access
Question # 31

(By default, in the SNMP protocol, which port number is used by the proxy process to send alarm messages to the NMS?)

A.

164

B.

163

C.

161

D.

162

Full Access
Question # 32

By default, all SNMP versions (SNMPv1, SNMPv2c, and SNMPv3) are supported on Huawei AR G3 series routers.

A.

TRUE

B.

FALSE

Full Access
Question # 33

Refer to the display startup command output shown in the figure. Which of the following statements are true?

A.

The current VRP configuration file is different from that used for next startup.

B.

The current VRP configuration file is the same as that used for next startup.

C.

The current VRP version file is different from that used for next startup.

D.

The current VRP version file is the same as that used for next startup.

Full Access
Question # 34

On the network shown in the figure, which router is elected as the BDR?

A.

No BDR

B.

Router C

C.

Router A

D.

Router B

Full Access
Question # 35

Which of the following commands sets the data forwarding mode on an AC to direct forwarding?

A.

forward mode tunnel

B.

forward-mode direct-forward

C.

forward-mode capwap-forward

D.

forward-mode direct

Full Access
Question # 36

Which of the following WLAN security policies support open link authentication?

A.

WPA2-PSK

B.

WPA

C.

WEP

D.

WPA2-802.1X

Full Access
Question # 37

The TCP protocol uses the three-way handshake mechanism to establish and disable connections. Therefore, TCP supports reliable data transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 38

The Priority field in a VLAN tag can be used to identify the priority of a data frame. What is the value range of the field?

A.

0 to 3

B.

0 to 15

C.

0 to 7

D.

0 to 63

Full Access
Question # 39

The tracert diagnostic tool of Huawei routers is used to trace data forwarding paths.

A.

TRUE

B.

FALSE

Full Access
Question # 40

Which of the following are features of the OSPF protocol?

A.

The shortest path is calculated based on the number of hops.

B.

Triggered update is supported.

C.

Routing loops are likely to occur.

D.

Area division is supported.

Full Access
Question # 41

A company applies for a class C IP address for subnetting. It has eight branches, and the largest branch has a subnet that should support at least 14 hosts. What would be an appropriate subnet mask?

A.

255.255.255.192

B.

255.255.255.224

C.

255.255.255.128

D.

255.255.255.0

Full Access
Question # 42

Refer to the graphic: 00e0-fc99-9999 is a specific host MAC address learned by a switch through ARP, and the host changes the IP address three times.

Is the following statement true or false?

"The MAC address 00e0-fc99-9999 is dynamically associated with multiple IP addresses."

A.

TRUE

B.

FALSE

Full Access
Question # 43

Dynamic routing protocols can automatically adapt to network topology changes.

A.

TRUE

B.

FALSE

Full Access
Question # 44

(Which of the following is a dynamic IGP routing protocol?)

A.

Static

B.

BGP

C.

Direct

D.

OSPF

Full Access
Question # 45

Making a call on a landline telephone is a type of network communication.

A.

TRUE

B.

FALSE

Full Access
Question # 46

According to the VTY user interface configuration shown in the following figure, the user level is set to 3.

A.

TRUE

B.

FALSE

Full Access
Question # 47

What is the TPID value defined by IEEE 802.1Q?

A.

0x7200

B.

0x9100

C.

0x8100

D.

0x8200

Full Access
Question # 48

If Proto of a route displayed in the routing table is OSPF, the preference of the route must be 10.

A.

TRUE

B.

FALSE

Full Access
Question # 49

Which of the following statements regarding Designated Routers (DR) in OSPF are correct?

A.

DR and BDR must establish an adjacency relationship.

B.

If the priorities of two routers are different, the router with the lower priority will be elected as DR.

C.

DR is elected by all the routers in the same network segment.

D.

If the priorities of two routers are equal, the router with the higher Router ID will be elected as DR.

Full Access
Question # 50

Refer to the network diagram.

Which of the following statements describes the network shown?

A.

There are 2 broadcast domains in the network.

B.

There are 4 collision domains in the network.

C.

There are 6 broadcast domains in the network.

D.

There are 6 collision domains in the network.

Full Access
Question # 51

The network administrator has decided to configure link aggregation in the enterprise network. Which of the following represent advantages of link aggregation?

A.

Load balancing.

B.

Improved bandwidth.

C.

Enhanced reliability.

D.

Improved security.

Full Access
Question # 52

When an Ethernet frame is received by an interface on a Layer 2 Ethernet switch, which field is used to generate an entry in the MAC address table?

A.

Destination MAC address

B.

Source MAC address

C.

Source IP address

D.

Destination IP address

Full Access
Question # 53

The following figure shows the display interface Eth-Trunk 1 command output on SWA. In the MAC address table of SWA, which of the following interfaces maps the MAC address of SWB?

A.

GigabitEthernet0/0/1

B.

Eth-Trunk 1

C.

GigabitEthernet0/0/3

D.

GigabitEthernet0/0/2

Full Access
Question # 54

On Huawei VRP platform, which of the following can be used to invoke the history command saved by the command line interface?

A.

Ctrl+P

B.

Upper cursor key

C.

Ctrl+U

D.

Left cursor key

Full Access
Question # 55

Which of the following is correct regarding the configuration of the trunk port and access port on a switch?

A.

Access ports can only send untagged frames.

B.

Trunk ports can only send tagged frames.

C.

Access ports can only send tagged frames.

D.

Trunk ports can only send untagged frames.

Full Access
Question # 56

On an STP-enabled switch, a port in the forwarding state can receive BPDU packets.

A.

TRUE

B.

FALSE

Full Access
Question # 57

On Huawei AR G3 Series routers, which authentication modes does AAA support?

A.

Radius

B.

None

C.

Local

D.

802.1X

Full Access
Question # 58

What is the total length of the interface ID in each link-local unicast address?

A.

96 bits

B.

32 bits

C.

48 bits

D.

64 bits

Full Access
Question # 59

Which of the following statements is false about OSPF area partitioning?

A.

Only Area Border Routers (ABRs) can function as the Autonomous System Boundary Routers (ASBRs).

B.

Area 0 is the backbone area, and other areas must be connected to this area.

C.

OSPF area partitioning can reduce the LSDB size of the router.

D.

The Link-State Databases (LSDBs) of routers are the same in the same OSPF area.

Full Access
Question # 60

(When a network engineer enters a command, the following information is displayed:

Error: Unrecognized command found at 'A' position. Which of the following statements is true about such information?)

A.

The entered parameter is not specified.

B.

The entered command is incomplete.

C.

The parameter type is incorrect.

D.

No keyword is found.

Full Access
Question # 61

Which of the following traffic can be filtered by an advanced ACL on a Huawei device?

A.

Network traffic based on a specific source IP address

B.

Network traffic based on a specific source MAC address

C.

Network traffic based on a specific user name

D.

Network traffic based on a specific port number

E.

Network traffic based on a specific destination IP address

Full Access
Question # 62

In the figure, bridge IDs of SWA, SWB, SWC, and SWD have been marked. After the stp root secondary command is run on SWD, which switch will be selected as the root bridge?

A.

SWC

B.

SWA

C.

SWD

D.

SWB

Full Access
Question # 63

A switch receives a unicast data frame with a VLAN tag but cannot find the destination MAC address of the data frame in its MAC address table. In this case, which action will the switch take?

A.

The switch broadcasts the data frame on all interfaces.

B.

The switch broadcasts the data frame on all interfaces (except that on which it was received) in the VLAN to which the data frame belongs.

C.

The switch discards the data frame.

D.

The switch broadcasts the data frame on all access interfaces.

Full Access
Question # 64

As shown in the figure, which of the following ports will be in a blocking state?

A.

G0/0/2 of SWC

B.

G0/0/3 of SWB

C.

G0/0/1 of SWC

D.

G0/0/3 of SWA

Full Access
Question # 65

NAPT differentiates IP addresses of different users based on protocol ID in TCP, UDP, or IP packets.

A.

TRUE

B.

FALSE

Full Access
Question # 66

Which of the following statements are true about the dynamic MAC address table?

A.

Dynamic MAC address entries are obtained by learning the source MAC addresses of packets received by an interface and can be aged out.

B.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, dynamic MAC address entries on the device or interface card are lost.

C.

You can obtain the number of users communicating on an interface by checking the number of specified dynamic MAC address entries.

D.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, the saved entries on the device or interface card are not lost.

Full Access
Question # 67

If the application-layer protocol is Telnet, what is the value of the "Protocol" field in the IPv4 header?

A.

67

B.

53

C.

6

D.

17

Full Access
Question # 68

On the network shown in the following figure, assuming that SWA, SWB, and SWC retain factory defaults, which of the following ports will be selected as a designated port?

A.

G0/0/2 on SWC

B.

G0/0/3 on SWA

C.

G0/0/1 on SWB

D.

G0/0/1 on SWC

Full Access
Question # 69

A company applies for a class C IP address for subnetting. It has six branches and the largest branch should have 26 hosts. What would be an appropriate subnet mask for the largest branch?

A.

255.255.255.0

B.

255.255.255.128

C.

255.255.255.192

D.

255.255.255.224

Full Access
Question # 70

Which of the following IPv4 addresses can be directly used by a host to access the Internet?

A.

172.32.1.1/24

B.

10.255.255.254/24

C.

192.168.1.1/24

D.

172.16.255.254/24

Full Access
Question # 71

Which of the following parts compose SNMP?

A.

Management Information Base (MIB)

B.

Managed object

C.

Agent process

D.

NMS

Full Access
Question # 72

(The IPv6 address architecture does not include which of the following address types?)

A.

Unicast.

B.

Anycast.

C.

Multicast.

D.

Broadcast.

Full Access
Question # 73

When redundant links exist on a switching network, STP can be used to eliminate loops.

A.

TRUE

B.

FALSE

Full Access
Question # 74

Refer to the following VLAN configurations on a Huawei switch. Which of the following statements are true?

A.

Client 4 belongs to VLAN 40, and the commands for VLAN assignment on the switch are correct.

B.

Client 2 belongs to VLAN 20, and the commands for MAC address-based VLAN assignment on the switch are correct.

C.

Client 1 belongs to VLAN 10, and the commands for VLAN assignment on the switch are correct.

D.

Client 3 belongs to VLAN 30, and the commands for VLAN assignment on the switch are correct.

Full Access
Question # 75

What is the main function of the DNS protocol?

A.

Remote access

B.

File transfer

C.

Domain name resolution

D.

Email transmission

Full Access
Question # 76

(Which of the following OSPF packets can be used to confirm the received Link State Update (LSU) packets?)

A.

LSA

B.

LSU

C.

LSR

D.

LSACK

Full Access
Question # 77

Which of the following methods is not used for logging in to the VRP system?

A.

Telnet

B.

Netstream

C.

Web

D.

SSH

Full Access
Question # 78

Which of the following is not included in the routing table?

A.

MAC

B.

Next-hop address

C.

Cost

D.

Destination/Mask

Full Access
Question # 79

More than two switches can be stacked into one logical device.

A.

TRUE

B.

FALSE

Full Access
Question # 80

Which of the following fields are included in an MPLS header?

A.

Label

B.

TTL

C.

EXP

D.

Tos

Full Access
Question # 81

(Each network device running SNMP runs an agent process locally.)

A.

TRUE

B.

FALSE

Full Access
Question # 82

On the network shown in the figure, router A adopts link aggregation in manual load balancing mode, and G0/0/1 and G0/0/2 are added to link aggregation group (LAG) 1. Which of the following statements is false about Eth-Trunk 1 on router A?

A.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Up.

B.

If only G0/0/2 on router B is disabled, Eth-Trunk 1 is Up.

C.

If only G0/0/1 on router B is disabled, Eth-Trunk 1 is Up.

D.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Down.

Full Access
Question # 83

The following figure shows the configuration of a sub-interface on a router. For which VLAN does the sub-interface receive tagged data frames?

A.

20

B.

1

C.

30

D.

100

Full Access
Question # 84

When the ACL in the following figure is configured on a Telnet server, only the device with an IP address of 172.16.105.2 can remotely log in to the Telnet server.

bash

Copy code

acl number 2000

rule 5 permit source 172.16.105.2 0

A.

TRUE

B.

FALSE

Full Access
Question # 85

(The IP addresses of VLANIF interfaces on the same switch must be different.)

A.

TRUE

B.

FALSE

Full Access
Question # 86

As specified by the RSTP protocol, when a root port fails, which type of port will function as a new root port and enter the forwarding state without any delay?

A.

Alternate Port

B.

Forwarding Port

C.

Backup Port

D.

Edge Port

Full Access
Question # 87

In which state does OSPF determine the master/slave relationship of DD packets?

A.

Full

B.

Exchange

C.

2-way

D.

ExStart

Full Access
Question # 88

In standard STP mode, which of the following ports on non-root switches forward the BPDUs with TC bits set generated by the root switch?

A.

Root port.

B.

Designated port.

C.

Backup port.

D.

Alternate port.

Full Access
Question # 89

Which is a valid EUI-64 address?

A.

00E0-FCEF-FFFE-0FEC

B.

02E0-FCFF-FEEF-0FEC

C.

02E0-FCEF-FFFE-0FEC

D.

00E0-FCFF-FEEF-0FEC

Full Access
Question # 90

On the VRP CLI, files cannot be permanently deleted using the delete or delete /unreserved command. To permanently delete them, you need to delete the files in the recycle bin.

A.

TRUE

B.

FALSE

Full Access
Question # 91

Which of the following OSPF versions is specific to IPv6?

A.

OSPFv4

B.

OSPFv1

C.

OSPFv2

D.

OSPFv3

Full Access
Question # 92

The priority of static routes cannot be manually specified.

A.

TRUE

B.

FALSE

Full Access
Question # 93

Which of the following methods is not supported by the Versatile Routing Platform (VRP) to configure a router?

A.

Configure the router through FTP.

B.

Configure the router through the mini USB port.

C.

Configure the router through Telnet.

D.

Configure the router through the console port.

Full Access
Question # 94

The load balancing modes at both ends of an Eth-Trunk can be different.

A.

TRUE

B.

FALSE

Full Access
Question # 95

Which of the following port statuses may exist on an STP-enabled switch?

A.

Discarding

B.

Listening

C.

Disabled

D.

Forwarding

Full Access
Question # 96

On the VRP, when the mkdir test command is run, the system creates a directory named test.

A.

TRUE

B.

FALSE

Full Access
Question # 97

How many VLANs are created when using the following commands?

vlan batch 10 20

vlan batch 10 to 20

A.

11 and 2

B.

2 and 11

C.

2 and 2

D.

11 and 11

Full Access
Question # 98

Which of the following statements is true?

A.

Routers work at the physical layer.

B.

Switches work at the network layer.

C.

Switches work at the physical layer.

D.

Routers work at the network layer.

Full Access
Question # 99

Which of the following ACLs can match the transport layer port number?

A.

Basic ACL

B.

Layer 2 ACL

C.

Advanced ACL

D.

Intermediate ACL

Full Access
Question # 100

How many port states are involved in RSTP?

A.

1

B.

2

C.

4

D.

3

Full Access
Question # 101

An ACL rule is as follows. Which of the following IP addresses can be matched by the permit rule?

rule 5 permit ip source 10.0.2.0 0.0.254.255

A.

10.0.6.7

B.

10.0.5.6

C.

10.0.4.5

D.

10.0.2.1

Full Access
Question # 102

When both ends running PPP protocol detect that the physical link is active, the link state will transit from dead to establish. Which of the following protocols is used to negotiate the link parameters during this phase?

A.

IP

B.

NCP

C.

LCP

D.

DHCP

Full Access
Question # 103

Which of the following are types of network communication?

A.

Downloading emails from a mailbox to your computer.

B.

Accessing the official website of a company on your computer.

C.

Chatting with friends through instant messaging software (Facebook Messenger, WhatsApp, etc.).

D.

Watching an online video on your computer.

Full Access
Question # 104

To enable the FTP server function on a router, set the username and password to "huawei", and set the FTP root directory to "flash:/dhcp/", which of the following commands must be configured?

A.

local-user huawei service-type ftp

B.

local-user huawei password cipher huawei

C.

local-user huawei ftp-directory flash:/dhcp/

D.

ftp server enable

Full Access
Question # 105

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

1

B.

4

C.

2

D.

100

Full Access