Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What is the number range of an advanced ACL?

A.

2000-2999

B.

3000-3999

C.

6000-6031

D.

4000-4999

Full Access
Question # 5

What packet types are included in DHCP?

A.

DHCP Discover packet

B.

DHCP Request packet

C.

DHCP Rollover packet

D.

DHCP Offer packet

Full Access
Question # 6

Refer to the graphic: 00e0-fc99-9999 is a specific host MAC address learned by a switch through ARP, and the host changes the IP address three times.

Is the following statement true or false?

"The MAC address 00e0-fc99-9999 is dynamically associated with multiple IP addresses."

A.

TRUE

B.

FALSE

Full Access
Question # 7

Which of the following methods is not used for logging in to the VRP system?

A.

Telnet

B.

Netstream

C.

Web

D.

SSH

Full Access
Question # 8

Which of the following statements is true?

A.

Routers work at the physical layer.

B.

Switches work at the network layer.

C.

Switches work at the physical layer.

D.

Routers work at the network layer.

Full Access
Question # 9

(You can run the "pwd" and "dir" commands on the Versatile Routing Platform (VRP) to view file information in the current directory.)

A.

TRUE

B.

FALSE

Full Access
Question # 10

If the value of the "Type/Length" field of an Ethernet data frame is 0x0800, the length range of the upper-layer packet header carried by the data frame is from 20B to 60B.

A.

TRUE

B.

FALSE

Full Access
Question # 11

According to the VTY user interface configuration shown in the following figure, the user level is set to 3.

A.

TRUE

B.

FALSE

Full Access
Question # 12

(Which of the following OSPF packets can be used to confirm the received Link State Update (LSU) packets?)

A.

LSA

B.

LSU

C.

LSR

D.

LSACK

Full Access
Question # 13

Which of the following statements about the network shown in the figure is true?

A.

The sub-interface of Router B cannot learn the MAC address of the sub-interface of Router A.

B.

The sub-interface of Router A cannot learn the MAC address of the sub-interface of Router B.

C.

The sub-interface numbers of Router A and Router B are different, so Router A and Router B cannot communicate with each other.

D.

The host at 10.0.12.1 can ping the host at 10.0.12.2.

Full Access
Question # 14

Which of the following are types of network communication?

A.

Downloading emails from a mailbox to your computer.

B.

Accessing the official website of a company on your computer.

C.

Chatting with friends through instant messaging software (Facebook Messenger, WhatsApp, etc.).

D.

Watching an online video on your computer.

Full Access
Question # 15

Which of the following IEEE 802.11 standards supports a theoretical negotiated rate of 5 Gbit/s or higher?

A.

802.11a

B.

802.11ax

C.

802.11n

D.

802.11b

Full Access
Question # 16

(Which of the following methods can be used to assign service VLANs during campus network planning?)

A.

VLAN assignment by service type

B.

VLAN assignment by logical area

C.

VLAN assignment by geographic area

D.

VLAN assignment by personnel structure

Full Access
Question # 17

(Which layer of the OSI model does a router work at?)

A.

Network layer

B.

Transport layer

C.

Data link layer

D.

Application layer

Full Access
Question # 18

(Which of the following statements about IPv6 anycast addresses are true?)

A.

Packets destined for an anycast address are sent to the nearest interface identified based on the routing distance.

B.

IPv6 anycast addresses implement load balancing for services.

C.

Anycast and unicast addresses use the same address space.

D.

IPv6 anycast addresses provide redundancy functions for services.

Full Access
Question # 19

Which is a valid EUI-64 address?

A.

00E0-FCEF-FFFE-0FEC

B.

02E0-FCFF-FEEF-0FEC

C.

02E0-FCEF-FFFE-0FEC

D.

00E0-FCFF-FEEF-0FEC

Full Access
Question # 20

Which of the following port states are included in Rapid Spanning Tree Protocol (RSTP)?

A.

Discarding

B.

Forwarding

C.

Learning

D.

Listening

Full Access
Question # 21

(Which of the following are not main functions of routers?)

A.

Routers forward data packets based on source IP addresses.

B.

Routers enable devices on the same network segment to communicate with each other.

C.

Routers forward data packets according to routing tables.

D.

Routers learn routes through multiple routing protocols and add them to the routing table.

Full Access
Question # 22

On the network shown in the figure, router A adopts link aggregation in manual load balancing mode, and G0/0/1 and G0/0/2 are added to link aggregation group (LAG) 1. Which of the following statements is false about Eth-Trunk 1 on router A?

A.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Up.

B.

If only G0/0/2 on router B is disabled, Eth-Trunk 1 is Up.

C.

If only G0/0/1 on router B is disabled, Eth-Trunk 1 is Up.

D.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Down.

Full Access
Question # 23

How many bytes are there in a basic IPv6 header?

A.

40

B.

48

C.

32

D.

64

Full Access
Question # 24

Which of the following commands is used to configure the country code on an AC?

A.

country-code

B.

province-code

C.

nation-code

D.

state-code

Full Access
Question # 25

In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 26

On VRP, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?

A.

Visit level

B.

Configuration level

C.

Monitoring level

D.

Management level

Full Access
Question # 27

The tree topology is a hierarchical star topology, facilitating network expansion. A consequence of this topology is that faults on a node at a higher layer are more severe.

A.

TRUE

B.

FALSE

Full Access
Question # 28

Which of the following configurations can prevent Host A and Host B from communicating with each other?

A.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/1

traffic-filter inbound acl 2000

B.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/2

traffic-filter inbound acl 2000

C.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/3

traffic-filter inbound acl 2000

D.

acl number 2000

rule 5 deny source 100.0.12.0 0.0.0.255

interface GigabitEthernet0/0/1

traffic-filter outbound acl 2000

Full Access
Question # 29

The router that runs OSPF first enters the Full state and then synchronizes the LSDB.

A.

TRUE

B.

FALSE

Full Access
Question # 30

An authenticator router has been configured with two domains named "Area1" and "Area2", following which a user is created with the username "huawei" and the password "hello" for authentication. Which domain does this user belong to?

A.

Area2 domain

B.

default_admin domain

C.

Area1 domain

D.

default domain

Full Access
Question # 31

Which of the following statements is true about root bridge election in STP?

A.

The device with the largest bridge priority becomes the root bridge.

B.

If the bridge priorities of devices are the same, the device with the largest MAC address becomes the root bridge.

C.

The device with the smallest bridge priority becomes the root bridge.

D.

If the bridge priorities are the same, the device with the largest number of ports becomes the root bridge.

Full Access
Question # 32

Which of the following statements are true about the dynamic MAC address table?

A.

Dynamic MAC address entries are obtained by learning the source MAC addresses of packets received by an interface and can be aged out.

B.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, dynamic MAC address entries on the device or interface card are lost.

C.

You can obtain the number of users communicating on an interface by checking the number of specified dynamic MAC address entries.

D.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, the saved entries on the device or interface card are not lost.

Full Access
Question # 33

(Which of the following descriptions regarding the STP forwarding state is incorrect?)

A.

A port in a forwarding state can send BPDU.

B.

A port in a forwarding state does not learn the source MAC address of a frame.

C.

A port in a forwarding state can receive BPDU.

D.

A port in a forwarding state can forward frames.

Full Access
Question # 34

By referring to the network structure and OSPF areas shown in the figure, it can be determined that all routers on the network except RTA are ABRs.

A.

TRUE

B.

FALSE

Full Access
Question # 35

Which of the following statements are true about transport-layer protocols?

A.

UDP uses SYN and ACK flags to request and confirm connection establishment.

B.

UDP is suitable for transmitting delay-sensitive traffic, and UDP packets can be reassembled based on the sequence number field in the packet header.

C.

Establishing a TCP connection requires the three-way handshake mechanism, while terminating a TCP connection requires the four-way handshake mechanism.

D.

The well-known port number range is from 0 to 1023.

Full Access
Question # 36

Refer to the graphic, which of the following statements is true about OSPF topology and configuration?

A.

Compared with R1, R2 is more likely to become the DR because the DR priority of the interface on R2 is lower than that of R1.

B.

After the default network type of the interface on R1 is restored to broadcast, a stable OSPF neighbor relationship can be set up between R1 and R2.

C.

After the default network type of the interface on R1 is restored to broadcast and the hello packet sending interval is changed to 10s, a stable OSPF neighbor relationship can be set up between R1 and R2.

D.

A stable OSPF neighbor relationship can be set up between R1 and R2.

Full Access
Question # 37

Which of the following are valid static route configurations?

A.

ip route-static 129.1.0.0 16 serial 0/0/0

B.

ip route-static 129.1.0.0 255.255.0.0 10.0.0.2

C.

ip route-static 10.0.0.2 16 129.1.0.0

D.

ip route-static 129.1.0.0 16 10.0.0.2

Full Access
Question # 38

As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

A.

200

B.

600

C.

400

D.

0

Full Access
Question # 39

SDN requires the control and forwarding planes to be separated.

A.

TRUE

B.

FALSE

Full Access
Question # 40

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

1

B.

4

C.

2

D.

100

Full Access
Question # 41

With SNMP, an NMS can only display the device running status but cannot deliver configurations.

A.

TRUE

B.

FALSE

Full Access
Question # 42

On the VRP platform, which of the following parameters can be used together with the "ping" command to specify the source address of an echo request message?

A.

-d

B.

-n

C.

-a

D.

-s

Full Access
Question # 43

Which of the following VRP commands can be used to enter area 0 view?

A.

[Huawei-ospf-1] area 0.0.0.0

B.

[Huawei-ospf-1] area 0 enable

C.

[Huawei-ospf-1] area 0

D.

[Huawei] ospf area 0

Full Access
Question # 44

Which of the following is the full name of VRP?

A.

Virtual Routing Platform

B.

Versatile Routing Platform

C.

Versatile Redundancy Platform

D.

Versatile Routing Protocol

Full Access
Question # 45

When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.

A.

TRUE

B.

FALSE

Full Access
Question # 46

An administrator wishes to manage the router in the remote branch office, which method can be used?

A.

Console Connection

B.

FTP

C.

Telnet

D.

DHCP

Full Access
Question # 47

The load balancing modes at both ends of an Eth-Trunk can be different.

A.

TRUE

B.

FALSE

Full Access
Question # 48

Which of the following statements is true about link aggregation in manual load balancing mode?

A.

A maximum of four active interfaces can be configured in manual load balancing mode.

B.

In manual load balancing mode, devices at both ends of a link send LACPDUs to each other.

C.

In manual load balancing mode, all active interfaces forward data and load balance traffic.

D.

The number of active interfaces can be set in manual load balancing mode.

Full Access
Question # 49

A company applies for a class C IP address for subnetting. It has eight branches, and the largest branch has a subnet that should support at least 14 hosts. What would be an appropriate subnet mask?

A.

255.255.255.192

B.

255.255.255.224

C.

255.255.255.128

D.

255.255.255.0

Full Access
Question # 50

Trunk interfaces can send both tagged and untagged frames.

A.

TRUE

B.

FALSE

Full Access
Question # 51

What is the total length of the interface ID in each link-local unicast address?

A.

96 bits

B.

32 bits

C.

48 bits

D.

64 bits

Full Access
Question # 52

After switches are virtualized into one logical switch using stacking or CSS, an inter-chassis Eth-Trunk can be deployed to improve network reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 53

Which of the following WLAN security policies support open link authentication?

A.

WPA

B.

WEP

C.

WPA2-PSK

D.

WPA2-802.1X

Full Access
Question # 54

As shown in the figure, if host A has the ARP cache of host B, host A can ping host B.

A.

TRUE

B.

FALSE

Full Access
Question # 55

(Each network device running SNMP runs an agent process locally.)

A.

TRUE

B.

FALSE

Full Access
Question # 56

Network devices running SNMP can proactively report traps to help network administrators detect faults in a timely manner.

A.

TRUE

B.

FALSE

Full Access
Question # 57

(Which of the following statements is true about active interface election for an Eth-Trunk in LACP mode?)

A.

Only interface priorities are compared.

B.

Device priorities are compared.

C.

Interface priorities are compared first. If priorities of interfaces on the Actor are the same, interfaces with smaller interface numbers are elected as active interfaces.

D.

Only interface numbers are compared.

Full Access
Question # 58

In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 59

Dynamic routing protocols can automatically adapt to network topology changes.

A.

TRUE

B.

FALSE

Full Access
Question # 60

SNMP packets are transmitted by UDP.

A.

TRUE

B.

FALSE

Full Access
Question # 61

What are the advantages of using DHCP to allocate IP addresses?

A.

DHCP can prevent IP address conflicts.

B.

DHCP provides heavy workload and is difficult to manage.

C.

IP addresses can be reused.

D.

If the configuration information changes, for example, the DNS server address changes, the administrator only needs to modify the configuration information on the DHCP server, facilitating unified management.

Full Access
Question # 62

(ICMP packets do not contain port numbers. Therefore, NAPT cannot be used.)

A.

TRUE

B.

FALSE

Full Access
Question # 63

After an Eth-Trunk in LACP mode is created, devices on both ends send LACPDUs to elect the Actor. Which of the following parameters in LACPDUs determine the Actor election?

A.

Device priority

B.

Interface number

C.

MAC address

D.

Interface priority

Full Access
Question # 64

An administrator wishes to configure a floating static route. In order to successfully achieve this, which operation should be performed?

A.

The administrator is required to configure different route tags for the primary static route and floating static route.

B.

The administrator is only required to configure two static routes.

C.

The administrator is required to configure a different preference value for the primary static route and floating static route.

D.

The administrator is required to configure a different cost metric for the primary static route and floating static route.

Full Access
Question # 65

What is used as the data link-layer MAC address that identifies each VAP on an AP?

A.

BSSID

B.

SSID

C.

BSS

D.

ESS

Full Access
Question # 66

If a device running STP receives an RSTP configuration BPDU, it discards the BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 67

Which of the following is not a type of OSPF LSA?

A.

LSA

B.

LSU

C.

LSR

D.

LSACK

Full Access
Question # 68

A trunk interface allows frames from multiple VLANs including VLAN 4096.

A.

TRUE

B.

FALSE

Full Access
Question # 69

Which of the following commands can switch a view from the system view to the user view?

A.

System-view

B.

User-view

C.

Quit

D.

Router

Full Access
Question # 70

Which of the following WLAN security policies support open link authentication?

A.

WPA2-PSK

B.

WPA

C.

WEP

D.

WPA2-802.1X

Full Access
Question # 71

As specified by the RSTP protocol, when a root port fails, which type of port will function as a new root port and enter the forwarding state without any delay?

A.

Alternate Port

B.

Forwarding Port

C.

Backup Port

D.

Edge Port

Full Access
Question # 72

Which of the following IP addresses can be used by another host to communicate with the host whose IP address is 200.200.200.201/30 without the need to forward traffic through a router?

A.

200.200.200.1

B.

200.200.200.203

C.

200.200.200.202

D.

200.200.200.200

Full Access
Question # 73

Which of the following protocols can be used to prevent Layer 2 loops on a campus network?

A.

SNMP

B.

RSTP

C.

NAT

D.

OSPF

Full Access
Question # 74

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

2

B.

100

C.

1

D.

4

Full Access
Question # 75

Which of the following packets are exchanged between STAs and an AP to obtain the AP's SSID before association with the AP?

A.

Probe Request

B.

Discovery

C.

Probe Response

D.

Beacon

Full Access
Question # 76

On the VRP, when the mkdir test command is run, the system creates a directory named test.

A.

TRUE

B.

FALSE

Full Access
Question # 77

UDP does not guarantee data transmission reliability and does not provide packet sorting and traffic control functions. It is suitable for the traffic that has low requirements for data transmission reliability, but high requirements for the transmission speed and delay.

A.

TRUE

B.

FALSE

Full Access
Question # 78

Which SNMP version focuses on two main aspects, namely security and administration. The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.

A.

SNMPv2c

B.

SNMPv1

C.

SNMPv3

D.

SNMPv2

Full Access
Question # 79

In a broadcast address, all host bits are set to 1, and a broadcast address can be used as a host address.

A.

TRUE

B.

FALSE

Full Access
Question # 80

If the application-layer protocol is Telnet, what is the value of the "Protocol" field in the IPv4 header?

A.

67

B.

53

C.

6

D.

17

Full Access
Question # 81

Refer to the following configuration of a switch interface. Which of the following statements is false?

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 200

port trunk allow-pass vlan 100

A.

If the VLAN tag carried in a data frame is 100, the switch removes the VLAN tag before sending the data frame.

B.

If the interface receives data frames without VLAN tags, the switch needs to tag the data frames with VLAN 200.

C.

The interface cannot send data frames tagged with VLAN 200.

D.

The link type of the interface is trunk.

Full Access
Question # 82

Which of the following network types are supported by OSPF?

A.

Point-to-point (P2P)

B.

Point-to-multipoint (P2MP)

C.

Broadcast

D.

NBMA

Full Access
Question # 83

On the Huawei VRP, what is the default preference of different route types, in descending order?

A.

Direct > Static > RIP > OSPF

B.

Direct > OSPF > RIP > Static

C.

Direct > RIP > Static > OSPF

D.

Direct > OSPF > Static > RIP

Full Access
Question # 84

An ACL is essentially a packet filter. An ACL takes effect only after it is applied to a service module.

A.

TRUE

B.

FALSE

Full Access