Refer to the graphic: 00e0-fc99-9999 is a specific host MAC address learned by a switch through ARP, and the host changes the IP address three times.
Is the following statement true or false?
"The MAC address 00e0-fc99-9999 is dynamically associated with multiple IP addresses."
Which of the following methods is not used for logging in to the VRP system?
(You can run the "pwd" and "dir" commands on the Versatile Routing Platform (VRP) to view file information in the current directory.)
If the value of the "Type/Length" field of an Ethernet data frame is 0x0800, the length range of the upper-layer packet header carried by the data frame is from 20B to 60B.
According to the VTY user interface configuration shown in the following figure, the user level is set to 3.
(Which of the following OSPF packets can be used to confirm the received Link State Update (LSU) packets?)
Which of the following statements about the network shown in the figure is true?
Which of the following IEEE 802.11 standards supports a theoretical negotiated rate of 5 Gbit/s or higher?
(Which of the following methods can be used to assign service VLANs during campus network planning?)
(Which of the following statements about IPv6 anycast addresses are true?)
Which of the following port states are included in Rapid Spanning Tree Protocol (RSTP)?
On the network shown in the figure, router A adopts link aggregation in manual load balancing mode, and G0/0/1 and G0/0/2 are added to link aggregation group (LAG) 1. Which of the following statements is false about Eth-Trunk 1 on router A?
Which of the following commands is used to configure the country code on an AC?
In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.
On VRP, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?
The tree topology is a hierarchical star topology, facilitating network expansion. A consequence of this topology is that faults on a node at a higher layer are more severe.
Which of the following configurations can prevent Host A and Host B from communicating with each other?
The router that runs OSPF first enters the Full state and then synchronizes the LSDB.
An authenticator router has been configured with two domains named "Area1" and "Area2", following which a user is created with the username "huawei" and the password "hello" for authentication. Which domain does this user belong to?
Which of the following statements is true about root bridge election in STP?
Which of the following statements are true about the dynamic MAC address table?
(Which of the following descriptions regarding the STP forwarding state is incorrect?)
By referring to the network structure and OSPF areas shown in the figure, it can be determined that all routers on the network except RTA are ABRs.
Which of the following statements are true about transport-layer protocols?
Refer to the graphic, which of the following statements is true about OSPF topology and configuration?
As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?
Refer to the following configuration of an interface on a switch. What is the PVID of the interface?
interface GigabitEthernet0/0/1
port hybrid tagged vlan 2 to 3 100
port hybrid untagged vlan 4 6
With SNMP, an NMS can only display the device running status but cannot deliver configurations.
On the VRP platform, which of the following parameters can be used together with the "ping" command to specify the source address of an echo request message?
When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.
An administrator wishes to manage the router in the remote branch office, which method can be used?
Which of the following statements is true about link aggregation in manual load balancing mode?
A company applies for a class C IP address for subnetting. It has eight branches, and the largest branch has a subnet that should support at least 14 hosts. What would be an appropriate subnet mask?
What is the total length of the interface ID in each link-local unicast address?
After switches are virtualized into one logical switch using stacking or CSS, an inter-chassis Eth-Trunk can be deployed to improve network reliability.
Which of the following WLAN security policies support open link authentication?
As shown in the figure, if host A has the ARP cache of host B, host A can ping host B.
Network devices running SNMP can proactively report traps to help network administrators detect faults in a timely manner.
(Which of the following statements is true about active interface election for an Eth-Trunk in LACP mode?)
In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.
Dynamic routing protocols can automatically adapt to network topology changes.
(ICMP packets do not contain port numbers. Therefore, NAPT cannot be used.)
After an Eth-Trunk in LACP mode is created, devices on both ends send LACPDUs to elect the Actor. Which of the following parameters in LACPDUs determine the Actor election?
An administrator wishes to configure a floating static route. In order to successfully achieve this, which operation should be performed?
What is used as the data link-layer MAC address that identifies each VAP on an AP?
If a device running STP receives an RSTP configuration BPDU, it discards the BPDU.
Which of the following commands can switch a view from the system view to the user view?
Which of the following WLAN security policies support open link authentication?
As specified by the RSTP protocol, when a root port fails, which type of port will function as a new root port and enter the forwarding state without any delay?
Which of the following IP addresses can be used by another host to communicate with the host whose IP address is 200.200.200.201/30 without the need to forward traffic through a router?
Which of the following protocols can be used to prevent Layer 2 loops on a campus network?
Refer to the following configuration of an interface on a switch. What is the PVID of the interface?
interface GigabitEthernet0/0/1
port hybrid tagged vlan 2 to 3 100
port hybrid untagged vlan 4 6
Which of the following packets are exchanged between STAs and an AP to obtain the AP's SSID before association with the AP?
On the VRP, when the mkdir test command is run, the system creates a directory named test.
UDP does not guarantee data transmission reliability and does not provide packet sorting and traffic control functions. It is suitable for the traffic that has low requirements for data transmission reliability, but high requirements for the transmission speed and delay.
Which SNMP version focuses on two main aspects, namely security and administration. The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.
In a broadcast address, all host bits are set to 1, and a broadcast address can be used as a host address.
If the application-layer protocol is Telnet, what is the value of the "Protocol" field in the IPv4 header?
Refer to the following configuration of a switch interface. Which of the following statements is false?
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 200
port trunk allow-pass vlan 100
On the Huawei VRP, what is the default preference of different route types, in descending order?
An ACL is essentially a packet filter. An ACL takes effect only after it is applied to a service module.