Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which of the following statements is true about the Forward Delay timer of STP?

A.

Reduce the interval for sending BPDUs.

B.

Improve the STP convergence speed.

C.

Improve the configuration BPDU lifetime, ensuring that the configuration BPDUs can be forwarded to more switches.

D.

Prevent temporary loops.

E.

Delay is required when a port transitions between Blocking and Disabled.

Full Access
Question # 5

What function does Ctrl+Z have in the VRP system?

A.

Exits the console interface view.

B.

Exits the interface view.

C.

Returns from any view to the user view.

D.

Exits the current view.

E.

Returns from the system view to the user view.

Full Access
Question # 6

As shown in the figure. All four switches are running $TP. Various parameters are set to default values. If the GO/0/2 port of switch C is blocked and cannot send configuration BPDUs through this port, how long will it take for the blocked port in the network to enter the forwarding state? () (Single-choice question)

A.

About 50 seconds

B.

C. About 15 seconds

C.

D. About 3 seconds

Full Access
Question # 7

When the ACL in the following figure is configured on a Telnet server, only the device with an IP address of 172.16.105.2 can remotely log in to the Telnet server.

bash

Copy code

acl number 2000

rule 5 permit source 172.16.105.2 0

A.

TRUE

B.

FALSE

Full Access
Question # 8

Network devices running SNMP can proactively report traps to help network administrators detect faults in a timely manner.

A.

TRUE

B.

FALSE

Full Access
Question # 9

Which of the following fields are included in an MPLS header?

A.

Label

B.

TTL

C.

EXP

D.

Tos

Full Access
Question # 10

Which of the following are valid static route configurations?

A.

ip route-static 129.1.0.0 16 serial 0/0/0

B.

ip route-static 129.1.0.0 255.255.0.0 10.0.0.2

C.

ip route-static 10.0.0.2 16 129.1.0.0

D.

ip route-static 129.1.0.0 16 10.0.0.2

Full Access
Question # 11

What is the number range of an advanced ACL?

A.

2000-2999

B.

3000-3999

C.

6000-6031

D.

4000-4999

Full Access
Question # 12

If a device running STP receives an RSTP configuration BPDU, it discards the BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 13

(Network Functions Virtualization (NFV) implements software-based network application deployment.)

A.

TRUE

B.

FALSE

Full Access
Question # 14

Which of the following parameters is used to elect the root bridge in STP?

A.

Bridge ID

B.

System name of the switch

C.

Port ID

D.

Root path cost

Full Access
Question # 15

(When a network engineer enters a command, the following information is displayed:

Error: Unrecognized command found at 'A' position. Which of the following statements is true about such information?)

A.

The entered parameter is not specified.

B.

The entered command is incomplete.

C.

The parameter type is incorrect.

D.

No keyword is found.

Full Access
Question # 16

It is advised to assign static IP addresses to servers during campus network planning.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Which of the following statements are true about transport-layer protocols?

A.

UDP uses SYN and ACK flags to request and confirm connection establishment.

B.

UDP is suitable for transmitting delay-sensitive traffic, and UDP packets can be reassembled based on the sequence number field in the packet header.

C.

Establishing a TCP connection requires the three-way handshake mechanism, while terminating a TCP connection requires the four-way handshake mechanism.

D.

The well-known port number range is from 0 to 1023.

Full Access
Question # 18

Which of the following descriptions regarding the TTL field of the IP packet is correct?

A.

The TTL value will decrement by 1 each time the packet is routed.

B.

The TTL defines the duration during which the source can send packets.

C.

The TTL defines how many packets the source can send.

D.

The TTL value will increment by 1 each time the packet is routed.

Full Access
Question # 19

When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Which of the following are features of the OSPF protocol?

A.

The shortest path is calculated based on the number of hops.

B.

Triggered update is supported.

C.

Routing loops are likely to occur.

D.

Area division is supported.

Full Access
Question # 21

(Which of the following are not main functions of routers?)

A.

Routers forward data packets based on source IP addresses.

B.

Routers enable devices on the same network segment to communicate with each other.

C.

Routers forward data packets according to routing tables.

D.

Routers learn routes through multiple routing protocols and add them to the routing table.

Full Access
Question # 22

Which of the following port states are included in Rapid Spanning Tree Protocol (RSTP)?

A.

Discarding

B.

Forwarding

C.

Learning

D.

Listening

Full Access
Question # 23

The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments.

A.

TRUE

B.

FALSE

Full Access
Question # 24

RSTP uses the proposal/agreement mechanism to shorten the time that an upstream port waits before transitioning to the Forwarding state, but no temporary loop occurs. Why?

A.

RSTP introduces the edge port role.

B.

RSTP accelerates port role election.

C.

RSTP uses a synchronization mechanism to prevent temporary loops.

D.

RSTP shortens the time taken by port status transition (Forward Delay).

Full Access
Question # 25

For the Versatile Routing Platform (VRP), the login timeout period can be set only on a VTY interface.

A.

TRUE

B.

FALSE

Full Access
Question # 26

(Which of the following is a dynamic IGP routing protocol?)

A.

Static

B.

BGP

C.

Direct

D.

OSPF

Full Access
Question # 27

(An Eth-Trunk interface can be used only as a Layer 2 interface.)

A.

TRUE

B.

FALSE

Full Access
Question # 28

Refer to the following configuration of a switch interface. Which of the following statements is false?

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 200

port trunk allow-pass vlan 100

A.

If the VLAN tag carried in a data frame is 100, the switch removes the VLAN tag before sending the data frame.

B.

If the interface receives data frames without VLAN tags, the switch needs to tag the data frames with VLAN 200.

C.

The interface cannot send data frames tagged with VLAN 200.

D.

The link type of the interface is trunk.

Full Access
Question # 29

Which of the following is correct regarding the configuration of the trunk port and access port on a switch?

A.

Access ports can only send untagged frames.

B.

Trunk ports can only send tagged frames.

C.

Access ports can only send tagged frames.

D.

Trunk ports can only send untagged frames.

Full Access
Question # 30

(Which of the following statements about IPv6 anycast addresses are true?)

A.

Packets destined for an anycast address are sent to the nearest interface identified based on the routing distance.

B.

IPv6 anycast addresses implement load balancing for services.

C.

Anycast and unicast addresses use the same address space.

D.

IPv6 anycast addresses provide redundancy functions for services.

Full Access
Question # 31

Which of the following is the default value of the Router Dead Interval field in OSPF Hello packets on a broadcast network?

A.

20 seconds

B.

30 seconds

C.

40 seconds

D.

10 seconds

Full Access
Question # 32

To provide the information about the IP addresses that a user packet traverses along the path to the destination, which of the following does Tracert record in each expired ICMP TTL packet?

A.

Source port.

B.

Destination IP address.

C.

Source IP address.

D.

Destination port.

Full Access
Question # 33

Which of the following fields are contained in an ARP packet?

A.

Source Protocol Address

B.

Source Hardware Address

C.

Hardware Type

D.

Operation Code

Full Access
Question # 34

With SNMP, an NMS can only display the device running status but cannot deliver configurations.

A.

TRUE

B.

FALSE

Full Access
Question # 35

The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.

A.

TRUE

B.

FALSE

Full Access
Question # 36

What is correct about the SNMP protocol? ()

A.

SNMP protocol uses multicast to send management messages

B.

B. The SNMP protocol only supports sending management messages on the Ethernet link

C.

SNMP uses ICMP as the network layer protocol

D.

SNMP uses UDP as the transport layer protocol

Full Access
Question # 37

On a Layer 2 WLAN, STAs use an AC as their gateway.

A.

TRUE

B.

FALSE

Full Access
Question # 38

How many types of data flows with different service levels can be marked based on MPLS labels? ()

A.

4

B.

2

C.

16

D.

8

Full Access
Question # 39

The correct statement about the transport layer protocol is ()

A.

UDP is suitable for the transmission of delay-sensitive traffic, and can be reorganized according to the sequence number field in the message header

B.

Well-known port number range is 0-1023

C.

UDP uses the STNOACK flag to request and confirm the establishment of a connection

D.

The establishment of a TCP connection is a three-way handshake, and the termination of a TCP connection requires a four-way handshake.

Full Access
Question # 40

(An administrator cannot log in to a Huawei router through Telnet, but other administrators can log in to the router. Which of the following are possible causes?)

A.

The administrator account has been disabled.

B.

The Telnet service has been disabled on the AR2200 router.

C.

The administrator account has been deleted.

D.

The user level of the administrator account has been changed to 0.

Full Access
Question # 41

When two switches are connected through link aggregation, what are the requirements for the interfaces on the two switches?

A.

The physical interface rates of the interconnected switches are the same.

B.

The physical interface quantities of the interconnected switches are the same.

C.

The models of the optical modules used by the interconnected switches are the same.

D.

The duplex modes of the physical interfaces on the interconnected switches are the same.

E.

The physical interface IDs of the interconnected switches are the same.

Full Access
Question # 42

If Spanning Tree Protocol (STP) is disabled on the network consisting of switches, a Layer 2 loop will definitely occur.

A.

TRUE

B.

FALSE

Full Access
Question # 43

(If a routing table contains multiple routes to the same destination network, what are these routes called?)

A.

Sub-optimal routes

B.

Multipath routes

C.

Equal-cost routes

D.

Default routes

Full Access
Question # 44

In RSTP, a backup port can replace a faulty root port.

A.

TRUE

B.

FALSE

Full Access
Question # 45

Only one SSID can be bound to each radio of an AP.

A.

TRUE

B.

FALSE

Full Access
Question # 46

Which of the following information is displayed when an entered command is incomplete on the Versatile Routing Platform (VRP)?

A.

Error: Wrong parameter found at 'A' position

B.

Error: Incomplete command found at 'A' position

C.

Error: Too many parameters found at 'A' position

D.

Error: Ambiguous command found at 'A' position

Full Access
Question # 47

(Which of the following routing protocols are dynamic routing protocols?)

A.

Static routing

B.

Direct routing

C.

OSPF

D.

BGP

Full Access
Question # 48

(The IP addresses of VLANIF interfaces on the same switch must be different.)

A.

TRUE

B.

FALSE

Full Access
Question # 49

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

2

B.

100

C.

1

D.

4

Full Access
Question # 50

Which SNMP version focuses on two main aspects, namely security and administration. The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.

A.

SNMPv2c

B.

SNMPv1

C.

SNMPv3

D.

SNMPv2

Full Access
Question # 51

The HybriD. port can be connected to the user host or other switches. ()

A.

True

B.

False

Full Access
Question # 52

Which of the following commands is used to configure the country code on an AC?

A.

country-code

B.

province-code

C.

nation-code

D.

state-code

Full Access
Question # 53

Which of the following is not a characteristic of small campus networks?

A.

Simple network requirements

B.

Wide coverage

C.

Simple network architecture

D.

Small number of users

Full Access
Question # 54

The network management system can only view the operating status of the device through the SNMP protocol, but cannot issue configurations. ()

A.

True

B.

False

Full Access
Question # 55

DHCP is an application layer protocol. In order to make it more reliable when assigning P, its transport layer uses TCP protocol.

A.

True

B.

False

Full Access
Question # 56

The following statement about the TTL field in the IP packet header is correct. ()

A.

TTL defines the time interval at which the source host can send data packets

B.

B. TTL defines the number of packets that the source host can send

C.

Each time a P packet passes through a router, its TTL value will be reduced by 1

D.

Each time an IP packet passes through a router, its TTL value is increased by 1

Full Access
Question # 57

Which of the following does not include the advantages of Wi-Fi6 compared to Wi-Fi5? ()

A.

B. Lower transmission delay

B.

Higher power consumption

C.

D. Higher number of access terminals per AP

Full Access
Question # 58

A company applies for a C. address segment, which needs to be evenly distributed to 8 subsidiaries. The largest subsidiary has 14 computers. Different subsidiaries must be in different network segments. The subnet mask should be designed as ( )

A.

255.255.255.240

B.

B. 255.255.255.128

C.

C. 255.255.255.192

D.

D. 255.255.255.0

Full Access
Question # 59

FAT AP can independently complete wireless user access, wireless user authentication, and business data forwarding without AC. ()

A.

True

B.

False

Full Access
Question # 60

Which of the following commands to configure the default route is correct? ()

A.

B. (Huawei)ip route-statiC.0.0.0.0 255.255.255.255192.168.1.1

B.

(Huawei)ip route-statiC.0.0.0.0 0.0.0.0 192.168.1.1

C.

D. (Huawei)ip route-statiC.0.0.0.0 0.0.0.0 0.0.0.0

Full Access
Question # 61

In what state does the OSPF protocol determine the master-slave relationship of DD. packets? ()

A.

B. Full

B.

2-way

C.

D. Exchange

Full Access
Question # 62

When using FTP for file transfer, how many TCP connections will be established? ()

A.

2

B.

B. 1

C.

C. 3

D.

D. 4

Full Access
Question # 63

IP route--statiC.10.0.12.0255.255.255.0192.168.1.1 About this command description is correct ()

A.

This command configures a route to the 10.0.12.0 network

B.

B. The priority of this route is 100

C.

If the router learns a router with the same destination network as this route through other protocols, the router will prefer this route

D.

D. This command configures a route to the 192.168.1.1 network

Full Access
Question # 64

The priority of OSPF routing protocol is ()

A.

10

B.

C. 60

C.

D. 100

Full Access
Question # 65

Which of the following port states is not included in the RSTP protocol? ()

A.

Learning

B.

Discarding

C.

Forwarding

D.

Blocking

Full Access
Question # 66

If the network address of a network is 192.168.1.0, then its broadcast address must be 192.168.1.255. ()

A.

True

B.

False

Full Access
Question # 67

On the VRP operating platform, what command is used to display the current interface configuration in the interface view? ()

A.

display users

B.

display version

C.

display this

D.

display ip interfacebrief

Full Access
Question # 68

The management of users by NAS devices is based on domains. Each user belongs to a domain, and a domain is a group composed of users belonging to the same domain. ()

A.

True

B.

False

Full Access
Question # 69

Which of the following protocols does the RA. message used by IPv6 stateless autoconfiguration belong to? ()

A.

ICMPv6

B.

C. UDPv6

C.

D. TCPv6

Full Access
Question # 70

The DHCP request message is sent by broadcast

A.

True

B.

False

Full Access
Question # 71

Wireless access controller (AC, Access Cntroller) As a unified management and control device in the FIT AP architecture, the following description of the role of AC. is wrong ()

A.

No matter when the data is forwarded, the user's data message will be forwarded by AC.

B.

B. User access control

C.

C. User access authentication

D.

D. AP configuration delivery

Full Access
Question # 72

VRP supports OSPF multi-process. If the process number is not specified when OSPF is enabled, the process number used by default is ().

A.

10

B.

100

C.

0

D.

1

Full Access
Question # 73

On Huawei switches, you can use the vlan batch command to create multiple VLANs in batches, simplifying the configuration process. ()

A.

True

B.

False

Full Access
Question # 74

UDP is connectionless and must rely on () to ensure the reliability of transmission.

A.

B. Transmission Control Protocol

B.

Network layer protocol

C.

D. Application layer protocol

Full Access
Question # 75

An existing switch is connected to a designated port through a port, but the port does not forward any packets, but can monitor network changes by receiving BPDUs, then the role of the port should be ().

A.

Alternate port

B.

Disable port

C.

D. Root port

Full Access
Question # 76

Network switch A and router A are connected by two links. The two links are aggregated in manual load sharing mode. The aggregated port number is 1, and the aggregated link needs to carry VLAN TAG100 when forwarding data. The switch When A uses a trunk link, which of the following configurations need to be used by switch A? ()

A.

4

B.

C. 5

C.

D. 3

Full Access
Question # 77

What kind of message does the DHCP server use to confirm that the host can use the IP address? ()

A.

B. DHCP ACK

B.

DHCP OFFER

C.

D. DHCP REQUSET

Full Access
Question # 78

VRP operating platform, which of the following commands can only view static routes? ()

A.

display ip routing-table protocol static

B.

B. display ip routing-table

C.

C. display ip routing-table verbose

D.

D. display ip routing-table statistics

Full Access
Question # 79

If a windows host is started for the first time, if it uses DHCP to obtain an IP address, what is the source IP address of the first packet sent by this host? ()

A.

0.0.0.0

B.

B. 169.254.2.33

C.

C. 255.255.255.255

D.

D. 127.0.0.1

Full Access
Question # 80

When planning a campus network, which of the following methods can be used to divide service VLANs? ()

A.

VLAN by business

B.

C. Divide VLAN by logical area

C.

D. Divide VLAN into J by geographical area

Full Access
Question # 81

The administrator has configured the AR2200. Which of the following descriptions about the configuration information is correct ()

A.

The saved configuration file will be replaced by the running configuration file

B.

If the user wants to clear the next startup configuration file of the device configuration, they should select "N"

C.

If the user wants to clear the next startup configuration file of the device configuration, they should select "Y"

D.

D. The next startup file of the device configuration will be retained

Full Access
Question # 82

Take effect immediately after the Router ID of the OSPF process is modified ()

A.

True

B.

False

Full Access
Question # 83

DNS is used for domain name resolution

A.

True

B.

False

Full Access
Question # 84

Which of the following statements about Prefix Segment is wrong? ()

A.

Prefix Segmont needs to be configured manually

B.

Prefix Segment spreads to other network elements through the IGP protocol, which is globally visible and effective

C.

Prefix Segment is used to identify a destination address prefix in the network (Prefix)

Full Access
Question # 85

Which of the following advantages does the single-arm routing method achieve routing intercommunication between Vlan? ()

A.

Reduce the number of equipment

B.

Reduce routing table entries

C.

Reduce the use of IP addresses

D.

Reduce the number of chain connections

Full Access
Question # 86

(Which of the following statements is true about active interface election for an Eth-Trunk in LACP mode?)

A.

Only interface priorities are compared.

B.

Device priorities are compared.

C.

Interface priorities are compared first. If priorities of interfaces on the Actor are the same, interfaces with smaller interface numbers are elected as active interfaces.

D.

Only interface numbers are compared.

Full Access
Question # 87

As shown in the figure, you only need to configure this static route on R1, and the two hosts can communicate with each other normally.

A.

True

B.

False

Full Access
Question # 88

The role of the OSPF protocol is

A.

Pass routing information

B.

B. Transmit MAC information

C.

C. Pass ARP information

D.

D. No effect

Full Access
Question # 89

Which state does the 0SPF protocol use to indicate that the adjacency relationship has been established? ()

A.

Full

B.

B. 2-way

C.

C. Attempt

D.

D. Down

Full Access
Question # 90

Telnet.read in TelnetliB._The role of all() is to read all data until EOF. If the echo does not return EOF, it will always block ()

A.

True

B.

False

Full Access
Question # 91

What is the value of TPID. defined by IEEE802.1Q? ()

A.

B. 0x7200

B.

0x8100

C.

D. 0x9100

Full Access
Question # 92

Switch stacking supports more than two devices, and multiple switches can be grouped into a logical device through stacking. ()

A.

True

B.

False

Full Access
Question # 93

The VlanIF IP addresses of the same switch cannot be the same. ()

A.

True

B.

False

Full Access
Question # 94

What kind of packets does the OSPF protocol use to discover and maintain neighbor relationships? ()

A.

HELLO

B.

C. LSU

C.

D. DD

Full Access
Question # 95

The broadcast address is a special address that all the host bits in the network address are set to, and it can also be used as a host address. ()

A.

True

B.

False

Full Access
Question # 96

Which of the following packet types is used by RADIUS to indicate authentication rejection? ()

A.

Access-Accept

B.

Access-Request

C.

Access-Challenge

D.

Access-Reject

Full Access
Question # 97

About the above configuration command is correct ()

A.

Modify the user's authority level to 3. And save the configuration

B.

B. Modify the limit level of the save command used by a user to 3

C.

C. Modify the permission level of the user view command to 3, and save the matching sinus

D.

Modify the permission level of the save command in the user view to 3

Full Access
Question # 98

In order to join the wireless network $TA. The wireless network information needs to be obtained first. Which of the following messages is used by the STA to actively obtain the SSID information? ()

A.

Probe

B.

B. Join

C.

C. Discovery

D.

D. Beacon

Full Access
Question # 99

VRP operating system commands are divided into four levels: access level, monitoring level, configuration level, and management level. Which level can run various business configuration commands but cannot operate the file system? ()

A.

Configuration level

B.

B. Monitoring level

C.

C. Access level

D.

D. Management level

Full Access
Question # 100

Which field of the ipv6 packet header can be used for QoS? ()

A.

TraffiC.Class

B.

B. PayloaD.Length

C.

Version

D.

D. Next Header

Full Access
Question # 101

What is the MAC address of the data link layer of each VAP on the AP? ()

A.

SSID

B.

BSS

C.

ESS

D.

BSSID

Full Access
Question # 102

When building a campus network, which of the following protocols can be used to avoid Layer 2 loops? ()

A.

RSTP

B.

C. NAT

C.

D. OSPF

Full Access
Question # 103

What is the full name of the general routing platform VRP? ()

A.

Versatile Redundancy Platform

B.

Versatile Routing Protocol

C.

Versatile Routing Platform

D.

Virtual Routing Platform

Full Access
Question # 104

Neither the A1 ternate interface nor the Backup port in RSTP can forward user traffic, nor can they receive, process, and forward BPDUs ()

A.

True

B.

False

Full Access
Question # 105

When the IPv4 protocol is used as the network layer protocol, which field is not included in the network layer header? ()

A.

Source IPv4 Address

B.

TTL

C.

Destination IPv4 Address

D.

Sequence Number

Full Access
Question # 106

On the broadcast network, both DR and BDR use the multicast address 224.0.0.6 to receive link state update messages ()

A.

True

B.

False

Full Access
Question # 107

VLAN4095 cannot be created on Huawei switches, and VLAN1 cannot be created ()

A.

True

B.

False

Full Access
Question # 108

Which of the following OSCan PF protocol packets ensure the reliability of LSA update? ()

A.

LSACK

B.

B. DD

C.

LSU

D.

D. LSR

Full Access
Question # 109

Is there any correct statement about the shortcut keys of the VRP operating platform? ()*

A.

TAB. Prompt for the most recently entered command

B.

CTRL+C. Stop the current command

C.

The left cursor key (<) moves the cursor one place to the left.

D.

CTRL+Z back to user view

Full Access
Question # 110

How many port states are involved in RSTP?

A.

1

B.

2

C.

4

D.

3

Full Access
Question # 111

The following figure shows the display interface Eth-Trunk 1 command output on a switch. Which of the following commands can be used to delete Eth-Trunk 1?

A.

inte GigabitEthernet 0/0/1 undo eth-trunk quit inte GigabitEthernet 0/0/2 undo eth-trunk quit undo interface Eth-Trunk 1

B.

inte GigabitEthernet 0/0/2 undo eth-trunk quit undo interface Eth-Trunk 1

C.

undo interface Eth-Trunk 1

D.

inte GigabitEthernet 0/0/1 undo eth-trunk quit undo interface Eth-Trunk 1

Full Access
Question # 112

Which of the following statements is true?

A.

Routers work at the physical layer.

B.

Switches work at the network layer.

C.

Switches work at the physical layer.

D.

Routers work at the network layer.

Full Access
Question # 113

What are the functions of OSPF protocol DR and BDR?

A.

Reduce the number of adjacencies

B.

Reduce the types of OSPF protocol packets

C.

Reduce the time to establish adjacency

D.

Reduce the number of exchanges of link state information

Full Access
Question # 114

Refer to the display startup command output shown in the figure. Which of the following statements are true?

A.

The current VRP configuration file is different from that used for next startup.

B.

The current VRP configuration file is the same as that used for next startup.

C.

The current VRP version file is different from that used for next startup.

D.

The current VRP version file is the same as that used for next startup.

Full Access
Question # 115

If the application-layer protocol is Telnet, what is the value of the "Protocol" field in the IPv4 header?

A.

67

B.

53

C.

6

D.

17

Full Access
Question # 116

The router enables the FTP service, the user name and password are both huawei, and the root directory of FTP is set to flash:/dhcp/. Which of the following commands must be configured?*

A.

ftp server enable

B.

local-user huawoi ftp-directory flash:/dhcp/

C.

local -user huawei passrorD.cipher Huawei

D.

local-user huawei service-type ftp

Full Access
Question # 117

How to enter in the vP operating system OView of SPF area 0? ()*

A.

(Huawei-ospf-1) areA.0 enabel

B.

(Huawei-ospf-1) areA.0

C.

(Huawei) ospf areA.0

D.

(Huawei-ospf-1) areA.0.0.0.0

Full Access
Question # 118

On Huawei AR G3 Series routers, which authentication modes does AAA support?

A.

Radius

B.

None

C.

Local

D.

802.1X

Full Access
Question # 119

When Fit APs go online on an AC, they will necessarily download the system software package from the AC.

A.

TRUE

B.

FALSE

Full Access
Question # 120

The country code configuration affects the actual transmission frequency and maximum transmission power.

A.

TRUE

B.

FALSE

Full Access
Question # 121

As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

A.

0

B.

400

C.

200

D.

600

Full Access
Question # 122

Which of the following MAC addresses cannot be used as the MAC address of the host network card? ()*

A.

03-04-05-06-07-08

B.

00-02-03-04-05-06

C.

02-03-04-05-o6-d7

D.

01-02-03-04-05-06

Full Access
Question # 123

As shown in the figure, after the two routers are configured with 0SPF, the administrator configures the command on RTA. Is the following description correct? () (Multiple Choice Questions)

A.

RTA will continue to receive, analyze and process OSPF packets sent by RTB

B.

The neighbor relationship between the two routers will be down

C.

The neighbor relationship between the two routers will not be affected

D.

RTA will no longer send OSPF packets

Full Access
Question # 124

In the network as shown in the figure, the administrator hopes that all hosts cannot access the Web service (the port number is 80). Other services can be accessed normally. Then, in the interface configuration of G0/0/1, traffic-filWhich ACL rule needs to be bound to ter outbound? ()

A.

acl number 3000

ARule 5 deny tcy destination-port eq www

Rule 10 permit ip

#

B.

acl number 3001

Rule 5 deny udp destination-port eg www

Rule 10 permit ip

#

C.

acl number 3002

Rule 5 permit ip

Rule 10 deny tep destination eq www

#

D.

acl number 3003

Rule 5 permit ip

Rule 10 deny udp destination eq www

#

Full Access
Question # 125

Router A. and Router B are established OSPF neighbor relationship, the OSPF process number of router A. is 1, and the area number is 0. Which of the following configurations on router A can enable router B to obtain the route of the network segment where host A is located? ()

A.

ospf 1 AreA.0.0.0.0 Network 192.168.1.2 0.0.0.0

B.

ospf 1 Import-route direct

C.

ospf 1 AreA.0.0.0.0 Network 192.168.0.00.0.255.255

D.

ospf 1 AreA.0.0.0.0 Network 192.168.1.00.0.0.255

Full Access
Question # 126

Which of the following network parameters can be assigned by Dynamic Host Configuration Protocol DHCP? ()*

A.

IP address

B.

Gateway address

C.

Operating system name

D.

DNS address

Full Access
Question # 127

What are the three sources for routers to obtain routing entries? ()*

A.

Aggregate routing

B.

Static routing

C.

Dynamic routing

D.

Direct route

Full Access
Question # 128

Which of the following statements are true about the dynamic MAC address table?

A.

Dynamic MAC address entries are obtained by learning the source MAC addresses of packets received by an interface and can be aged out.

B.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, dynamic MAC address entries on the device or interface card are lost.

C.

You can obtain the number of users communicating on an interface by checking the number of specified dynamic MAC address entries.

D.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, the saved entries on the device or interface card are not lost.

Full Access
Question # 129

You can run the user-interface maximum-vty command to configure the maximum number of users who can log in to the device through Telnet simultaneously.

A.

TRUE

B.

FALSE

Full Access
Question # 130

To enable Router A to communicate with Loopback 0 on Router B on the network shown in the figure, which of the following commands needs to be run on Router A?

A.

ip route-static 10.0.2.2 32 GigabitEthernet 0/0/0

B.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.1

C.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.2

D.

ip route-static 10.0.2.2 0 GigabitEthernet 0/0/0

Full Access
Question # 131

On the network shown in the figure, router A adopts link aggregation in manual load balancing mode, and G0/0/1 and G0/0/2 are added to link aggregation group (LAG) 1. Which of the following statements is false about Eth-Trunk 1 on router A?

A.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Up.

B.

If only G0/0/2 on router B is disabled, Eth-Trunk 1 is Up.

C.

If only G0/0/1 on router B is disabled, Eth-Trunk 1 is Up.

D.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Down.

Full Access
Question # 132

What are the network types supported by the OSPF protocol? ()*

A.

Point-to-Point

B.

Non-Broadcast Multi-Access

C.

Point-to-Multipoint

D.

Broadcast

Full Access
Question # 133

Which of the following fields does the MPLS header include? ()*

A.

EXP

B.

TTL

C.

Label

D.

Tos

Full Access
Question # 134

After OSPF is configured on the two routers, the administrator configures commands on RTA. Which of the following descriptions is correct? ()

A.

The neighbor relationship between the two routers will be down

B.

RTA. Will no longer send OSPF packets

C.

The neighbor relationship between the two routers will not be affected

D.

RTA. will continue to receive and analyze and process OSPF packets sent by RIB.

Full Access
Question # 135

The output information of the routing table of a certain router is shown in the figure. Which of the following statements is correct? () (Multiple Choice Questions)

<R1>display ip routing-table

Route Flags: R-relay, D-download to fib

A.

The NextHop for this router to reach 10.0.2.2 is 10.0.12.2

B.

The NextHop for this router to reach 10.0.0.1 is 10.0.12.2

C.

The NextHop for this router to reach 10.0.2.2 is 10.0.21.2

D.

The NextHop for this router to reach 10.0.0.1 is 10.0.21.2

Full Access
Question # 136

The output information of a router is shown in the figure. Which of the following statements are correct? ()

A.

The configuration file currently used is different from the configuration file used for the next startup

B.

The current VRP version file is the same as the VRP file used for the next startup

C.

The current configuration file used is the same as the configuration file used for D next startup

Full Access
Question # 137

In the CAPWAP tunnel establishment phase, after AC. receives the Join Request message sent by the AP, AC. will check the validity of the AP. Which of the following is the authentication method supported by AC. ()*

A.

SN certification

B.

PassworD. certification

C.

MAC. Authentication

D.

Not certified

Full Access
Question # 138

Which of the following port states does the RSTP protocol include? ()*

A.

Learning

B.

Discarding

C.

Listening

D.

Forwarding

Full Access
Question # 139

Refer to the graphic, which of the following statements is true about OSPF topology and configuration?

A.

Compared with R1, R2 is more likely to become the DR because the DR priority of the interface on R2 is lower than that of R1.

B.

After the default network type of the interface on R1 is restored to broadcast, a stable OSPF neighbor relationship can be set up between R1 and R2.

C.

After the default network type of the interface on R1 is restored to broadcast and the hello packet sending interval is changed to 10s, a stable OSPF neighbor relationship can be set up between R1 and R2.

D.

A stable OSPF neighbor relationship can be set up between R1 and R2.

Full Access
Question # 140

If the packet matches the deny rule in an ACL, the packet is discarded.

A.

TRUE

B.

FALSE

Full Access
Question # 141

Which of the following port states is not included in Rapid Spanning Tree Protocol (RSTP)?

A.

Learning

B.

Forwarding

C.

Blocking

D.

Discarding

Full Access
Question # 142

The network shown in the figure below. The host has an ARP cache. Which of the following statements are correct? )(Multiple Choice Questions)

A.

The following entries may appear in the ARP cache of host A 10.0.12.2MAC-C

B.

The router needs to be configured with a static route. Otherwise, host A and host B cannot communicate in both directions

C.

Host A and Host B can communicate in two directions

D.

D. The following entry 11.0.12.1 MAC-B exists in the ARP cache of host A

Full Access
Question # 143

As shown in the figure, router A has successfully telneted to router B using 10.0.12.2. Which of the following operations will interrupt the Telnet session between router A and router B?

A.

Enable OSPF on G0/0/1

B.

Change the IP address of G0/0/1

C.

Disable G0/0/1

D.

Configure a static route

Full Access
Question # 144

How to add AP on AC.? ()*

A.

Import AP offline

B.

Automatically discover AP

C.

Add online

D.

Manually confirm APs in the non-certified list

Full Access
Question # 145

SWA and SWB run RSTP. Which of the following statements are true?

A.

G0/0/3 of SWB is a backup port.

B.

G0/0/3 of SWA is a designated port.

C.

G0/0/3 of SWB is an alternate port.

D.

G0/0/2 of SWA is a designated port.

Full Access
Question # 146

Which of the following commands is used to display the CPU usage of a router?

A.

display cpu-state

B.

display interface

C.

display cpu-usage

D.

display memory

Full Access
Question # 147

In the case of Huawei routers, what is the "-i" parameter in a Ping command issued on a VRP operating system used to set?

A.

Destination IP address for receiving an Echo Reply packet.

B.

Interface for receiving an Echo Reply packet.

C.

Source IP address for sending an Echo Request packet.

D.

Interface for sending an Echo Request packet.

Full Access
Question # 148

Which is a valid EUI-64 address?

A.

00E0-FCEF-FFFE-0FEC

B.

02E0-FCFF-FEEF-0FEC

C.

02E0-FCEF-FFFE-0FEC

D.

00E0-FCFF-FEEF-0FEC

Full Access
Question # 149

Which of the following statements about the election of DR and BDR are correct? ()*

A.

BDR must exist in broadcast networks

B.

If the priority is the same, compare the Router ID, the larger the value, the more preferred to be elected as the DR

C.

DR must exist in broadcast networks

D.

If the priority of an interface is, the interface will not participate in the election of DR or BDR

Full Access
Question # 150

According to the VTY user interface configuration shown in the following figure, the user level is set to 3.

A.

TRUE

B.

FALSE

Full Access
Question # 151

Which of the following applications is based on the TCP protocol?()*

A.

Ping

B.

TFTP

C.

FTP

D.

HTTP

Full Access
Question # 152

After switches are virtualized into one logical switch using stacking or CSS, an inter-chassis Eth-Trunk can be deployed to improve network reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 153

Which of the following parameters is used to elect the root bridge in STP?

A.

Bridge ID

B.

Port ID

C.

Root path cost

D.

System name of the switch

Full Access
Question # 154

Which statement about the dynamic AC. address table is correct?

A.

The dynamic MAC obtained through the source AC. Address learning in the message. The table entries will age

B.

By viewing the number of specified dynamic MAC. address table entries, you can get the number of users communicating under the interface. After the device restarts, the previous dynamic table entries will be lost

C.

After the device restarts, the previous dynamic entries will be lost

D.

After the device restarts, the previously saved entries will not be lost

Full Access
Question # 155

The users who log on the router through Telnet are not permitted to configure an IP address. What is the possible reason?

A.

Privilege level of Telnet is set incorrectly.

B.

SNMP parameters are set incorrectly.

C.

The authentication mode of Telnet is set incorrectly.

D.

Communication failures occur between the user and the router.

Full Access
Question # 156

Which of the following elements are included in the routing table? ()*

A.

Interface

B.

Destination/mask

C.

Nexthop

D.

Protocol

E.

Cost

Full Access
Question # 157

Fit APs can provide wireless services independently of an AC.

A.

TRUE

B.

FALSE

Full Access
Question # 158

When an AP and an AC are located on different Layer 3 networks, which of the following methods is recommended for the AP when discovering the AC?

A.

Broadcast

B.

DHCP

C.

Manually specified on the AP

D.

DNS

Full Access
Question # 159

When OSPF protocol establishes adjacency, which of the following parameters must be consistent?*

A.

Router ID

B.

AreA.ID

C.

Router Priority

D.

Router Dead.Interval

Full Access
Question # 160

There are hosts in a private network that need to access 1nternet. In order to achieve this requirement, which of the following configurations should be done by the administrator on the edge router of the network? ()*

A.

Default route

B.

STP

C.

DHCP

D.

NAT

Full Access
Question # 161

Which of the following are not open interfaces for Huawei network equipment? ()*

A.

NETCONF

B.

RESTCONF

C.

JSON

D.

XML

Full Access
Question # 162

If the broadcast address of a network is 172.16.1.255, which of the following addresses is the network address?

A.

172.16.1.128

B.

172.16.1.1

C.

172.16.2.0

D.

172.16.1.253

Full Access
Question # 163

On the network shown in the following figure, assuming that SWA, SWB, and SWC retain factory defaults, which of the following ports will be selected as a designated port?

A.

G0/0/2 on SWC

B.

G0/0/3 on SWA

C.

G0/0/1 on SWB

D.

G0/0/1 on SWC

Full Access
Question # 164

As shown in the figure below, the network. All switches enable the STP protocol. Disable SWA's G0/0/2 port to configure the BPDU sending function. SWC's G0/0/1 reconverges to become the root port. Which of the following statements is correct about this process? () (Multiple Choice Questions)

A.

SWB forwards TCN BPDU to SWA

B.

SWB sends configuration BPDU with TCA set to SWC

C.

SWC sends TCN BPDU to SWB

D.

D. SWA sends configuration BPDU with TC set

Full Access
Question # 165

Which of the following fields does the ARP packet format contain? ()*

A.

HardwareType

B.

Protocol Address of sender

C.

Operation Code

D.

Protocol Type

Full Access
Question # 166

What is the total length of the interface ID in each link-local unicast address?

A.

96 bits

B.

32 bits

C.

48 bits

D.

64 bits

Full Access
Question # 167

When deploying ACL on Huawei equipment, which of the following descriptions is correct is ().*

A.

ACL can match the TCP/UDP port number of the packet, and can specify the range of port numbers

B.

The same ACL can be called under multiple interfaces

C.

When ACL defines rules, it can only proceed in the order of 10, 20, 30

D.

ACL cannot be used to filter OSPF traffic, because OSPF traffic does not use UDP protocol encapsulation

E.

When calling ACL under the interface, it can only be applied to the outbound direction

Full Access
Question # 168

The output information of a certain device is shown in the figure. Which of the following statements is correct? ( )

display interface G1gabitEthernet 0/0/0 G1 gabi tEthernet0/0/0 currentstate UP Line protocol current state UP Route Port,The Maximum Transmit Unit is 1000 Internet Address is 10.0.12.2/24 IP Sending Frames'Format is PRTFMT ETENT 2.Hardware address is 00e0-fc22-4fff Port Mode:FORCE COPPER SpeeD.:100, Loopback:NONE Duplex:FULL, Negotiation:DISABLE Md1 AUTO Last 300 seconds input rate 24 bits/seC.0 packets/sec Last 300 seconds output rate 24 bits /seC.0 packets/seC.*

A.

The P address of the interface is 10.0.12.2/24

B.

The MAC of the interface. The address is 00e0-fc22-4fff

C.

The working rate of this interface is 1Gbps

D.

The MTU value of this interface is 1000

Full Access
Question # 169

The priority of the LACP protocol is shown in the figure. Switch A and Switch B adopt LACP mode link aggregation, and all interfaces are added to the link aggregation group. At the same time, set the maximum number of active ports to 3. Then which port of switch A is not an active port ? () (Single-choice question)

A.

G0/0/0

B.

G0/0/1

C.

G0/0/2

D.

G0/0/3

Full Access
Question # 170

The switch G0/0/1 port configuration information is shown in the figure. Which VLAN data frame does the switch forward without VLANTAG? ? () (Single-choice question)

A.

B. 30

B.

C. 20

C.

D. 40

Full Access
Question # 171

Which stage in the life cycle of campus network construction is the beginning of a project? ()

A.

B. Network implementation

B.

Planning and design

C.

Network operation and maintenance

Full Access
Question # 172

The following figure shows the routing table of a router. When the router receives a destinationIWhen the P address is a data packet of 9.1.1.1,The router will forward according to the route of 9.1.0.0/16 because the mask length of this route is longer. ()(True or False)

A.

B. False

Full Access
Question # 173

As shown in the picture. About OSPF topology and configuration. Which of the following statements is correct? () (Single-choice question)

A.

R1 and R2 can establish a stable OSPF neighbor relationship

B.

R1 is more likely to become DR than R2, because its interface DR priority value is smaller

C.

As long as the interface network type of R1 is restored to the default broadcast type, R1 and R2 can establish a stable neighbor relationship

D.

As long as the interface network type of R1 is restored to the default broadcast type, and the hello time is adjusted to 10s, R1 and R2 can establish a stable neighbor relationship

Full Access
Question # 174

Protocol Priority Switch A. and Switch B. adopt LACP mode link aggregation, and all interfaces join the link aggregation group. At the same time, set the maximum number of active ports to 3. Then which port of switch A is not an active port? ()

A.

B. G0/0/1

B.

G0/0/3

C.

D. G0/0/0

Full Access
Question # 175

The administrator has configured the router as shown in the figure. Then a host connected to the G1/0/0 interface of the router. What kind of IP address can be obtained through DHCP? () (Single-choice question)

A.

The IP address obtained by the host belongs to the 10.10.10.0/24 network

B.

B. The IP address obtained by the host belongs to the 10.20.20.0/24 network

C.

The IP address obtained by the host may belong to the 10.10.10.0/24 network, or it may belong to the 10.20.20.0/24 network

D.

D. The host cannot get an address

Full Access
Question # 176

AAA. Which of the following is not included? ()

A.

Authentication

B.

Accounting

C.

Authorization

D.

Audit

Full Access
Question # 177

Which of the following 0SPF protocol packets can ensure the reliability of LSA update? ()

A.

LSACK

B.

C. LSR

C.

D. DD

Full Access
Question # 178

As shown in the figure. When the router uses the 0$PF protocol at the same time. Which BDR is in this network? () (Single-choice question)

A.

Router A

B.

B. Router B

C.

C. Router C

D.

D. Router D

Full Access
Question # 179

What command can be typed in the system view to switch to the user view? ()

A.

quit

B.

C. user-view

C.

D. souter

Full Access
Question # 180

The administrator made the configuration on the router as shown in the figure. At the same time, the administrator wants to assign a shorter lease period to the DHCP address. Which of the following commands should be used? () (Single-choice question)

ip pool pooll

netyork10.10.10.0ask255.255.255.0

gateway-list 10.10.10.1

A.

B. Dhcp select relay

B.

C. Lease day 0 hour 10

C.

D. Lease 24

Full Access
Question # 181

A DHCP server is deployed on the network, but the administrator finds that some hosts have not correctly obtained the addresses specified by the DHCP server. What are the possible reasons? (Multiple Choice Questions)

A.

The address pool of the DHCP server has all been allocated

B.

Some hosts cannot communicate with the DHCP server normally, and the client systems of these hosts automatically generate addresses in the range of 169.2540.0

C.

There is another DHCP server that works more efficiently in the network

D.

Some hosts cannot communicate with the DHCP server normally, and the client systems of these hosts automatically generate addresses in the range of 127.254.0.0

Full Access
Question # 182

The network management workstation manages network devices through the SNMP protocol. When an abnormality occurs in the managed device, what kind of SHMP message will the network management workstation receive? ()

A.

trap message

B.

B. get-response message

C.

C. set-request message

D.

D. get-request message

Full Access
Question # 183

The network shown in the figure below. Two switches are connected by four links. COPPER refers to electrical interface and FIBER refers to optical interface. Then which two interfaces can realize link aggregation? () (Single-choice question)

A.

G0/0/2 and FE0/0/3

B.

G0/0/3 and FE0/0/3

C.

G0/0/2 and G0/0/1

D.

G0/0/3 and G0/0/2

Full Access
Question # 184

As shown in the figure. If host A has the ARp cache table of host B, then host A can ping host B. ()(True or False)

A.

True

B.

False

Full Access
Question # 185

Which of the following attributes cannot be used as a parameter to measure C0st? ()

A.

B. Hop count

B.

sysname

C.

D. bandwidth

Full Access
Question # 186

The IPv6 protocol uses NS and NA. packets for duplicate address detection ().

A.

True

B.

False

Full Access
Question # 187

Which of the following is not included in AAA? ()

A.

Audit

B.

B. Authentication

C.

C. Authorization

D.

D. Accounting)

Full Access
Question # 188

If the network address of a network is 10.1.1.0/30, what is its broadcast address? ()

A.

10.1.1.3

B.

C. 10.1.1.4

C.

D. 10.1.1.1

Full Access
Question # 189

In the OSPF protocol, which of the following descriptions of DR is correct? ()

A.

If the priority values ​​of the two routers are equal, the router with the larger Router ID is selected as the DR

B.

By default, all routers in this broadcast network will participate in the DR election

C.

If the priority values ​​of the two routers are different, the router with the lower priority is selected as the DR

D.

D. DThe adjacency relationship should also be established between R and BDR

Full Access
Question # 190

All the devices in the picture can communicate normally. Is the corresponding relationship between the MAC address table of $WA and the port correct? () (Single-choice question)

A.

MAC-AG0/0/2

MAC-BG0/0/2

MAC-CG0/0/3

B.

MAC-AG0/0/1

MAC-BG0/0/2

MAC-CG0/0/1

C.

MAC-A--GO/0/1

MAC-B--G0/0/1

MAC-C--GO/0/3

D.

MAC-A--GO/0/1

MAC-B-G0/0/2

MAC-C-GO/0/3

Full Access
Question # 191

What is the length of the basic IPv6 header in bytes? ()

A.

40

B.

B. 64

C.

C. 48

D.

D. 32

Full Access
Question # 192

If the configured ACL rules have an inclusive relationship, it should be noted that the rule numbers of strict conditions need to be sorted first, and the rule numbers of loose conditions need to be sorted later to prevent packets from hitting the rules of loose conditions and stop being pushed down to continue matching. Cannot hit the strict conditions of the rules. ()

A.

True

B.

False

Full Access
Question # 193

The following rules exist in an ACL of a router. Rule deny top source192.168, 1.00.0.0.255 destination 172.16.10.1 0.0.0.0 destination-port eq 21 is the correct statement? ()

A.

sourceIP is 192.168.1.1, destination P is 172.16.10.1, and all TCP packets with destination port number 21 match this rule

B.

The source IP is 192.168.1.1, the destination IP is 172.16.10.2, and all 1CP packets whose destination port number is 21 match this rule

C.

Rule sourceIP is 192.168.1.1, the destination IP is 72.16.10.3, and all TCP packets with the destination port number of 21 match this rule

D.

D. The type of ACL is basic ACL

Full Access
Question # 194

The output information of the router is shown in the figure. Which of the following statements is wrong? () (Single-choice question)

A.

The MTU value of the Ethernet0/0/0 interface is 1480

B.

B. The broadcast address corresponding to the Ethernet0/0/0 interface is 10.0.12.255

C.

The physical link of the Ethernet0/0/0 interface is normal

D.

D. Ethernet (The IP address of the /0/0 interface is 10.0.12.1/24

Full Access
Question # 195

NAPT distinguishes the IP addresses of different users through the protocol numbers in TCP, UDP, or IP packets ()

A.

True

B.

False

Full Access
Question # 196

Which of the following fields is not included in the He1lo packet of the OSPF protocol? ()

A.

sysname

B.

C. HelloInterval

C.

D. Neighbor

Full Access
Question # 197

As shown in the following figure, in the switching network, all switches are running the stp protocol. When the topology is stable, which of the following switches can be used to modify the BPDU sending cycle. Can it affect the SWD configuration BPDU sending cycle? () (Single-choice question)

A.

SWA

B.

C. SWC

C.

D. SWD

Full Access
Question # 198

STA. Before associating to AP, it needs to obtain SSID through some message exchange. What are these messages? ()

A.

Discovery

B.

Beacon

C.

Probe

D.

ResponseProbe Request

Full Access
Question # 199

As shown in the figure, when the switch needs to forward frames with the destination mac address of 5489-98ec-f011, which of the following descriptions is correct? () (Single-choice question)

A.

The switch will send a message that the destination is unreachable to the source device

B.

The switch did not find a matching entry in the mac address table. So the frame will be discarded

C.

The switch needs to send a request to discover the device with the mac address of 5489-98ec-f011

D.

The switch will be All ports outside flood the frame

Full Access
Question # 200

As shown in the figure below. Which port of the following switches will be blocked? () (Single-choice question)

A.

B.SWA's G0/0/3

B.

C.SWC's G0/0/1

C.

D.G0/0/3 of SWB

Full Access
Question # 201

The network structure and OSPF partition are shown in the figure. Except for RTA in the figure, the routers RTB, RTC and RTD are all ABR routers. ()(True or False)

A.

True

B.

False

Full Access
Question # 202

Which of the following are related to the purpose of encapsulation and decapsulation? ()

A.

Encapsulation and decapsulation can complete network fault location

B.

Encapsulation and decapsulation are important steps to realize the functions of different protocols

C.

Interworking between different networks

D.

D. Shorten the length of the message

Full Access
Question # 203

As shown in the broadcast network. 0SPF runs on four routers. And in the same area. Same network segment. OSPF will automatically elect one DR and multiple BDRs to achieve a better backup effect. ()(True or False)

A.

True

B.

False

Full Access
Question # 204

Which of the following commands can change the device name to huawei? ()

A.

Sysname Huawei

B.

C. Rename Huawei

C.

D. Do name Huawei

Full Access
Question # 205

The mac address of the existing switch is shown in the figure. Which of the following statements is correct ()? (Multiple Choice Questions)

A.

When the switch restarts, the mac address learned by port Eth0/0/2 does not need to be relearned

B.

The data frame with the source mac address of 5489-9885-18a8 and the destination mac address of 5489-989d-1d30 learned from the port is forwarded from the Eth0/0/1 port

C.

The source mac address learned from the port is 5489-9811-0b49. The data frame with the destination mac address 5489-989d-1d30 is forwarded from the Eth0/0/2 port

D.

When the switch restarts, the mac address learned by port Eth0/0/3 needs to be re-learned

Full Access
Question # 206

Apply the ACL configured in the figure in Telnet. Only the device with the IP address of 172.16.105.2 is allowed to log in remotely: ()#acl number 2000 rule 5 permit source 172.16.105.20#

A.

True

B.

False

Full Access
Question # 207

Use the ACL shown in the figure on the router RTA to match routing entries. Then which of the following entries will be matched?

(RTA) acl 2002

(RTA-acl-basic-2002) rule deny source 172.16.1.1 0.0.0.0

(RTA-acl-basic-2002) rule deny source 172.16.0.0 0.255.0.0

A.

172.18.0.0/16

B.

B. 172.16.1.0/24

C.

192.17.0.0/24

D.

D. 172.16.1.1/24

Full Access
Question # 208

The network shown in the figure below. The network where host A is required to access the Internet through Easy IP, then which of the following ACLs should be used on the G0/0/3 interface of router A? () (Single-choice question)

A.

acl number 2000 Rule 5 permit source 10.0.12.0.0.0.0.255#

B.

acl number 2000 Rule 5 permit source 10.0.13.0.0.0.0.255#

C.

acl number 2000 Rule 5 permit source 10.0.12.1.0.0.0.0#

D.

D. acl number 2000 Rule 5 permit source 10.0.13.1.0.0.0.0

Full Access
Question # 209

As shown in the figure, host A and host B want to implement inter-VLAN communication through single-arm routing. What configuration should be done under the G0/0/1.1 interface of RTA?()(Single-choice question)

A.

dotlq termination vid 10

B.

C. dotlq termination vid 20

C.

D. dotlq termination vid 30

Full Access
Question # 210

The MAC address table of a certain switch is shown in the figure. If the switch receives a data frame with a destination MAC of 5489-9811-0b49 from port Eth0/0/2, which of the following statements is correct? ()

A.

Forward this data frame from the Eth0/0/2 port

B.

B. Discard this data frame

C.

Forward this data frame from the Eth0/0/3 port

D.

D. Flood out this data frame

Full Access
Question # 211

The following two configuration commands can realize the master and backup backup of the router RIA to the same destination 10.1.1.0.

A.

True

B.

False

Full Access
Question # 212

The network shown in the figure below. The administrator wants RTA to use a static router. Priority is given to sending data packets to RTB's LoopbackO interface through G0/0/1 port. At the same time, G0/0/2 is used as a backup. Then any configuration on RTA can be Realize this requirement? () (Single-choice question)

A.

ip route-static10.0.2.2255.255.255.25510.0.12.2

Ip route-static10.0.2.2255.255.255.25510.0.21.2 preference 40

B.

ip route-static10.0.2.2255.255.255.25510.0.12.2

Ip route-static10.0.2.2255.255.255.25510.0.21.2

C.

ip route-static10.0.2.2255.255.255.25510.0.12.2 preference 70

Ip route.-static10.0.2.2255.255.255.25510.0.21.2

D.

ip route-static10.0.2.2255.255.255.25510.0.12.2

Ip route-static10.0.2.2255.255.255.25510.0.21.2 preference 70

Full Access
Question # 213

Which of the following types of addresses are not included in IPv6 addresses? ()

A.

Anycast address

B.

Broadcast address

C.

Unicast address

D.

Multicast address

Full Access
Question # 214

As shown in the figure below, host A and host B cannot communicate ()

A.

True

B.

False

Full Access
Question # 215

The administrator has configured the router as shown in the figure. At the same time, the administrator wants to assign a shorter lease period to the DHCP address. Which of the following commands should be used? () (Single-choice question)

A.

lease day 0 hour 10

B.

B. lease 24

C.

C. dhcp select relay

D.

D. lease

Full Access
Question # 216

Regarding the corresponding relationship between the access control list number and type, the following description is correct ()

A.

The number range of the second-level access control list is 4000-4999

B.

C. The number range of the interface-based access control list is1000-2000

C.

D. Advanced access control list number range is 3000-4000

Full Access
Question # 217

Which information of the data frame is used by the interface to determine whether to forward Layer 2 or Layer 3 forwarding? ()

A.

Source IP

B.

Source MAC

C.

Destination port

D.

Destination MAC

Full Access
Question # 218

As shown in the figure, the switch runs STP with default parameters. Which of the following ports will be elected as the designated port? () (Single-choice question)

A.

B.HUB's G0/0/1 port

B.

C.HUB's G0/0/2 port

C.

D.Port G0/0/2 of switch A

Full Access
Question # 219

When a company's network management needs to plan the network, the data packets that allow PC1 to access PC2 go through the G0/0/0 port (G0/0/2 on the picture). The data packet that PC2 accesses to PC1 goes from port G0/0/4 (G0/0/0 in the picture). () (Single-choice question)

A.

10.0.12.5255.255.255.25511.0.12.6

#10.0.12.1255.255.255.25511.0.12.1

B.

10.0.12.5255.255.255.25511.0.12.210.

0.12.1255.255.255.25511.0.12.5

C.

0.0.0.00.0.0.00

#11.0.12.6

#11.0.12.1

0

D.

0.0.0.0

#0.0.0.0

0

#11.0.12.2

#11.0.12.5

0

Full Access
Question # 220

Among the configuration BPDUs sent by the switch, which bridge D. is unlikely to appear? ()

A.

819200-01-02-03-04-CC

B.

409600-01-02-03-04-CC

C.

000-01-02-03-04-CC

D.

204800-01-02-03-04-CC

Full Access
Question # 221

In the figure below, all switches have enabled the STP protocol, assuming that the path cost value of all ports is 200. What is the root path cost value contained in the configuration BPDU message received by the G0/0/4 port of $WD? () (Single-choice question)

A.

600

B.

200

C.

0

D.

400

Full Access
Question # 222

The MAC address table of existing switches is shown in the figure. Which of the following statements are correct? () (Single-choice question)

A.

The MAC address 5489-9811-0b49 is manually configured by the administrator

B.

B. The MAC address 5489-989d-1d30 is manually configured by the administrator

C.

After the switch restarts, all MAC addresses need to be relearned. The MAC address 5489-9885-18a8 is manually configured by the administrator

D.

The MAC address 5489-9885-18a8 is manually configured by the administrator

Full Access
Question # 223

The router receives a data packet with a destination IP address of 11.0.12.1 from host A. After this data packet is forwarded by the router, what are the destination MAC. and destination IP? ()

A.

B. MAC-D.10.0.12.2

B.

MAC-D.11.0.12.1

C.

D. MAC-B.11.0.12.1

Full Access
Question # 224

In the MAC address table of the switch, which of the following entries will not age? ()

A.

Static MAC. Address table entry

B.

C. Port MAC. Address table entry

C.

D. Device MAC. Address table entry

Full Access
Question # 225

The configuration information of a certain port of the switch is shown in the figure. Which of the following statements is wrong? ()

interface GigabitEthernet0/0/1 port link type trunk port trunk pviD.vlan 200 port trunk allow-pass vlan100#

A.

If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it out

B.

This port cannot send data frames carrying VLAN TAG200

C.

C. The port type is Trunk type

D.

If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG 200

Full Access
Question # 226

A device has been configured to complete Telnet configuration. The device login address is 10.1.1.10. The Telnet user name is admin and the password is Huawei@123. The following is the correct way to use telnertlit to log in to this device? ()

A.

telnetlib.Telnet (10.1.1.0

B.

telnetlib.TeInet (10.1.1.0, admin

C.

telnetlib.Telnet 10.1.1.0.admin.Fuawei@123)

D.

telnetlib.Teinet 10.1.1.0, 23, admin.Huawei@123)

Full Access
Question # 227

In an IPv4 network, AP supports static and DHCP methods to obtain IP addresses. ()

A.

True

B.

False

Full Access
Question # 228

Refer to the configuration of the single-arm routing in the figure below, you can judge that even if the ARP proxy is not enabled on the sub-interface of R1,The administrative department and the financial department can also visit each other. ()(True or False)

A.

True

B.

False

Full Access
Question # 229

The network shown in the figure below. All links are Ethernet links, and all interfaces of all routers run OSPF protocol, how many DRs are elected in the entire network? () (Single-choice question)

A.

B. 2

B.

4

C.

3

Full Access
Question # 230

Which of the following address types does IPV6 have?

A.

Link local address

B.

C. Multicast address

C.

D. Unicast address

D.

E. Broadcast address

Full Access
Question # 231

Which of the following IPv4 addresses is a class A address? ()

A.

192.168.1.1

B.

100.1.1.1

C.

127.0.0.1

D.

172.16.1.1

Full Access
Question # 232

The election of the root switch in STP only compares the priority of the switch, while in RSTP, the priority of the switch is compared with the MAC address at the same time. ()

A.

True

B.

False

Full Access
Question # 233

The IP addresses of the VLANIF interfaces of the same switch cannot be the same. ()

A.

True

B.

False

Full Access
Question # 234

What is the total length of port ID in Spanning Tree Protocol? ()

A.

2

B.

8

C.

4

D.

16

Full Access
Question # 235

In the VRP system, what function does the Ctrl+Z key combination have? ()

A.

Return to user view from any view

B.

B. Return from system view to user view

C.

C. Exit interface view

D.

D. Exit the current view

E.

E. Exit the console interface view

Full Access
Question # 236

Which of the following OSPF versions is suitable for IPv6? ()

A.

OSPFv1

B.

OSPFv2

C.

OSPFv3

D.

OSPFv4

Full Access
Question # 237

The output information of a router's routing table is shown in the figure. Which of the following statements is correct? () (Multiple Choice Questions)

A.

The outbound interface of this router to 10.0.0.1 is Ethernet0/0/1

B.

The outgoing interface of this router to 10.0.0.1 is Ethernet0/0/0

C.

C. The outgoing interface of this router to 10.0.2.2 is Ethernet0/0/0

D.

The outbound interface of this router to 10.0.2.2 is Ethernet0/0/1

Full Access
Question # 238

Which of the following descriptions of wireless devices is correct? ()

A.

The wireless controller AC is generally located at the convergence layer of the entire network, providing high-speed, safe and reliable VLAN services

B.

FIT AP generally independently completes user access, authentication, service forwarding and other functions

C.

FAT AP. Generally work with wireless controller

D.

The wireless device does not have a wired interface

Full Access
Question # 239

The RSTP protocol uses the P/A mechanism to speed up the speed of the upstream port to the F orwarding state, but what is the reason for the no temporary loop? . Shorten the time of ForwarD.Del ay

A.

Shorten the time of ForwarD.Del ay

B.

Edge port

C.

Speed ​​up port role election

D.

Ensure that there will be no temporary loops through the synchronization mechanism

Full Access
Question # 240

Which of the following IPv6 addresses can be abbreviated as 2FFF DAC:ABEF:CDAA:732? ()

A.

2FFF:ODAC.:ABEF:0000:0000:0000:CDAA4:0732

B.

2FFF:ODAC:ABEF 0000:0000:CDAA:0732

C.

2FFF DACO:ABEF 0000000:0000:CDAA:0732

D.

2FFF:ODAC:ABEF:0000:0000:0000:CDAA:7320

Full Access
Question # 241

It is known that there are two entries in the routing table of a router. If the router wants to forward packets with the destination address of 9.1.4.5, the correct one of the following statements is ()

A.

Choose the second item as the best matching item, because the cost of the RIP protocol is small

B.

The second item is selected as the best matching item, because the route is a more accurate match relative to the destination 9.1.4.5

C.

Select the second item as the best match, because the speed of Ethernet0 is faster than the speed of serial0

D.

Chooses the first item as the best matching item, because the priority value of the ospf protocol is higher

Full Access
Question # 242

By default, what is the period for sending 0SPF HELLO packets on the broadcast network? ()

A.

10s

B.

B. 20s

C.

C. 30s

D.

D. 40s

Full Access
Question # 243

Which of the following fields is not included in the HELL0 packet of the OSPF protocol?

A.

B. Nei ghbor

B.

sysname

C.

D. He11 oInt erval

D.

E. He11 oInt erval

Full Access
Question # 244

The mask length is 12 bits can be expressed as?

A.

255.240.0.0

B.

255.248.0.0

C.

255.255.0.0

D.

255.255.255.0

Full Access
Question # 245

By default, what is the RouterDeadInterval of the ospf protocol on the broadcast network? ()

A.

20s

B.

40s

C.

10s

D.

30s

Full Access
Question # 246

When a switch receives a unicast data frame with a VLAN tag, but finds that the destination MAC address of the data frame cannot be queried in its MAC address table, the switch's processing behavior for the data frame is ().

A.

The switch will broadcast this data frame to all ports (except the receiving port) in the VLAN where the data frame is located

B.

The switch will broadcast the data frame to all ports

C.

The switch will discard this data frame

D.

The switch will broadcast this data frame to all Access ports

Full Access
Question # 247

When two OSPF routers form a 2TAY neighbor relationship, LSDB. has been synchronized.

A.

True

B.

False

Full Access
Question # 248

If it is UDP, the value of the protocol field of the network layer is 6 ()

A.

True

B.

False

Full Access
Question # 249

STA. The only way to discover the wireless network is the Beacom frame sent by the AP. ()

A.

True

B.

False

Full Access
Question # 250

All interfaces of routers running 0SPF protocol must belong to the same area. ()

A.

True

B.

False

Full Access
Question # 251

What elements can NAPT convert? ()

A.

Only MAC. address

B.

IP address + port number

C.

MAC. Address + port number

D.

Only IP address

Full Access
Question # 252

Which statement about OSPF area division is wrong? ( )

A.

AreA.0 is the backbone area. All other areas must be connected to this area

B.

The LSDBs in the routers in the same OSPF area are exactly the same

C.

Dividing OSPF areas can reduce the size of the LSDB of some routers

D.

Only ABR can be used as ASBR

Full Access
Question # 253

What is the value of the Type field in the RStp configuration BPDU message? ()

A.

0x01

B.

0x00

C.

0x02

D.

0x03

Full Access
Question # 254

The basic header length of IPv6 packets is a fixed value ()

A.

True

B.

False

Full Access
Question # 255

VRP operating platform, which of the following commands can only view static routes? ()

A.

display ip routing-table statistics

B.

display ip routing-table verbose

C.

display ip routing-table

D.

display ip routing-table protocol static

Full Access
Question # 256

Which of the following descriptions about the switch is wrong? ()

A.

The switch can complete the exchange of data frames

B.

The switch can provide network access services for terminal equipment (PC. Server)

C.

Switches generally work at the data link layer

D.

The switch is generally used as the export equipment of the network

Full Access
Question # 257

Which of the following statements about direct routing is correct? ()

A.

Direct routing requires the administrator to manually configure the destination network and next hop address

B.

Direct routes have lower priority than static routes

C.

Direct routing has lower priority than dynamic routing

D.

Direct routing has the highest priority

Full Access
Question # 258

The bridge ID of the STP protocol in the switching network is as follows. Which of the following bridge IDs will be the root bridge? ()

A.

409600-01-02-03-04-DD

B.

3276800-01-02-03-04-AA

C.

3276800-01-02-03-04-CC

D.

3276800-01-02-03-04-BB

Full Access
Question # 259

Which of the following parameters is used in LCP negotiation to detect link loops and other abnormal conditions? ()

A.

MRU

B.

CHAP

C.

Magic word

D.

PAP

Full Access
Question # 260

Users cannot configure VLAN ID. to 0. ()

A.

True

B.

False

Full Access
Question # 261

On Huawei routers, what is the default value of the OSPF protocol internal routing priority? ()

A.

20

B.

10

C.

30

D.

0

Full Access
Question # 262

What is the length of the Ethernet II frame containing the Ethernet header?

A.

64-1518B

B.

60-1560B

C.

46-1500B

D.

64-1500B

Full Access
Question # 263

The Trunk port can send both tagged data frames and untagged data frames.

A.

True

B.

False

Full Access
Question # 264

The DHCPv6 server supports the provision of other configuration information such as DNS server addresses for the host. ()

A.

True

B.

False

Full Access
Question # 265

There is a WeB server in the private network that needs to provide HITP services to public network users. Therefore, the network administrator needs to configure NAT on the gateway router RTA.

A.

RTA-Gigabitethernet0/0/1 nat server protocol tcp global 192.168.1.1 www inside 202.10.10.18080

B.

(RTA-Serial1/0/1) nat server protocol tcpglobal 192.168.1.1 www inside202.10.1 0.18080

C.

(RTA-Gigabitethernet0/0/1) nat server protocol tcp global 202.10.10.1 www inside 192.168.1.18080

D.

(RTA-Serial1/0/1) nat server protocol top global 202.10.10.1 www inside192.168.1.18080

Full Access
Question # 266

The config mode is the default ACL matching order on Huawei devices. ()

A.

True

B.

False

Full Access
Question # 267

On Huawei equipment, if AAA authentication is used for authorization, when the remote server does not respond, authorization can be performed from the network equipment side ()

A.

True

B.

False

Full Access
Question # 268

When adopting LACP mode for link aggregation, what is the default system interference level of Huawei switches? ()

A.

36864

B.

4096

C.

24576

D.

32768

Full Access
Question # 269

The login timeout time in the VRP system can only be set under the vty interface. ()

A.

True

B.

False

Full Access
Question # 270

The RSTP protocol uses the P/A mechanism to speed up the upstream port's transition to the Forwarding state, but what is the reason for no temporary loop? ()

A.

Speed ​​up port role election

B.

Ensure that there will be no temporary loops through the synchronization mechanism

C.

Edge port

D.

Reduced the time of ForwarD.Delay

Full Access
Question # 271

The following figure shows the routing table of a router. When the router receives a data packet with a destination IP address of 9.LL, the router will forward it according to the route of 91.0.016 because the mask length of this route is longer. ()

A.

True

B.

False

Full Access
Question # 272

As shown in the figure below, assuming that the MAC address table of SWA. is as follows, now host A. sends a data frame with a destination MAC address of MAC-B. Which of the following statements is correct? ()

A.

Forward this data according to the G0/0/2 port

B.

SWA. Discard the data frame

C.

D. Forward this data frame from port G0/0/3

Full Access
Question # 273

On an interface that uses PPP as the data link layer protocol, you can configure a static route by specifying the next hop address or outgoing interface. ()

A.

True

B.

False

Full Access
Question # 274

When two OSPF routers form a 2-WAY neighbor relationship, LSDB. has been synchronized. ()

A.

True

B.

False

Full Access
Question # 275

Switch stacking supports more than two devices, and multiple switches can be grouped into a logical device through stacking. ()

A.

True

B.

False

Full Access
Question # 276

A company applies for a C. IP address segment, which needs to be evenly distributed to 8 subsidiaries. The largest subsidiary has 14 computers. Different subsidiaries must be in different network segments, so the subnet mask should be set. for()

A.

255.255.255.240

B.

255.255.255.0

C.

D. 255.255.255.128

Full Access
Question # 277

If a windows host is started for the first time, if it uses DHCP to obtain an IP address, what is the source IP address of the first packet sent by this host? ()

A.

127.0.0.1

B.

169.254.2.33

C.

0.0.0.0

D.

255.255.255.255

Full Access
Question # 278

After the administrator successfully logged in to the router through Te1net, he found that the router’s interface could not be configuredIP address. Then the possible reasons are ()

A.

The Telnet terminal software used by the administrator prohibits the corresponding operation

B.

SNMP parameter configuration fiveMistake

C.

Telnet user authentication mode configurationMistake

D.

Telnet user level configurationMistake

Full Access
Question # 279

What is the number range of advanced ACLs? ()

A.

3000-3999

B.

2000-2999

C.

4000~4999

D.

6000~6031

Full Access
Question # 280

For the description of the PPP link establishment process, the following statement is wrong ()

A.

In the Establish phase, the PPP link performs LCP parameter negotiation. The negotiation content includes the maximum receiving unit MRU, authentication method magic word and other options

B.

After the NCP negotiation is successful, the PPP link will maintain the communication state and enter the Terminate phase

C.

The Dead phase is also called the physical layer unavailable phase. When both ends of the communication parties detect that the physical circuit is activated, they will migrate from the Dead phase to the Establish phase, which is the link establishment phase.

D.

In the Network phase, the PPP link performs NCP negotiation. Select and configure a network layer protocol through NCP negotiation, E.PPP link supports half-duplex and full-duplex modes

Full Access
Question # 281

What is the range of VLAN ID that users can use? ()

A.

1-4096

B.

1-4094

C.

0-4096

D.

0-4095

Full Access
Question # 282

Which of the following descriptions about firewalls is wrong? ()

A.

Firewall can realize user identity authentication

B.

Firewall can realize access control between different networks

C.

The firewall can isolate the network of unreachable security level

D.

The firewall cannot implement network address translation

Full Access
Question # 283

In a Layer 2 network with redundant links, which of the following protocols can be used to avoid loops?

A.

STP

B.

UDP

C.

ARP

D.

VRRP

Full Access
Question # 284

The following two configuration commands can implement router RIA. The route to the same destination 10.1.1.1.0 is active and standby:

A.

True

B.

Mistake

Full Access
Question # 285

The IPv6 address 2001: ABEF:224E:FFE2:BCC0:CD00:DDBE:8D58 cannot be abbreviated. ()

A.

True

B.

False

Full Access
Question # 286

By default, the bridge priority of Huawei switches is 32768.

A.

True

B.

False

Full Access
Question # 287

The FIT AP can obtain the IP address of AC. through the DHCP Option to establish a CAPWAP tunnel. Which Option needs to be configured on the DHCP server for this? ()

A.

Option 82

B.

B. Option 10

C.

C. Option 43

D.

D. Option 55

Full Access
Question # 288

UDP is oriented to connectionless and must rely on () to ensure the reliability of transmission. ()

A.

Internet Protocol

B.

Transmission Control Protocol

C.

Application layer protocol

D.

Network layer protocol

Full Access
Question # 289

Which of the following statements about Adjacency Segment is wrong? ()

A.

Adjacency Segment is identified by Adjacency Segment ID. (SID)

B.

Adjacency Segment spreads to other network elements through the IGP protocol, which is visible globally and valid locally

C.

Adjacency Segment must be configured manually

D.

Adjacency Segment is used to identify an adjacency of a node in the network

Full Access
Question # 290

Which of the following methods is not supported by the Versatile Routing Platform (VRP) to configure a router?

A.

Configure the router through FTP.

B.

Configure the router through the mini USB port.

C.

Configure the router through Telnet.

D.

Configure the router through the console port.

Full Access
Question # 291

In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 292

Which of the following WLAN security policies support open link authentication?

A.

WPA2-PSK

B.

WPA

C.

WEP

D.

WPA2-802.1X

Full Access
Question # 293

In a broadcast address, all host bits are set to 1, and a broadcast address can be used as a host address.

A.

TRUE

B.

FALSE

Full Access
Question # 294

Which of the following operations are mandatory to restore the factory default settings of an AR2200 router?

A.

Restarting the AR2200 router

B.

Resetting saved configurations

C.

Clearing the current configuration

D.

Specifying the configuration file for the next startup

Full Access
Question # 295

A router in the backbone area has complete LSDBs of routers in other areas.

A.

TRUE

B.

FALSE

Full Access
Question # 296

Which of the following packets are exchanged between STAs and an AP to obtain the AP's SSID before association with the AP?

A.

Probe Request

B.

Discovery

C.

Probe Response

D.

Beacon

Full Access
Question # 297

If Proto of a route displayed in the routing table is OSPF, the preference of the route must be 10.

A.

TRUE

B.

FALSE

Full Access