Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

A.

200

B.

600

C.

400

D.

0

Full Access
Question # 5

Network devices running SNMP can proactively report traps to help network administrators detect faults in a timely manner.

A.

TRUE

B.

FALSE

Full Access
Question # 6

Which of the following statements is true about root bridge election in STP?

A.

The device with the largest bridge priority becomes the root bridge.

B.

If the bridge priorities of devices are the same, the device with the largest MAC address becomes the root bridge.

C.

The device with the smallest bridge priority becomes the root bridge.

D.

If the bridge priorities are the same, the device with the largest number of ports becomes the root bridge.

Full Access
Question # 7

Which of the following statements is true about link aggregation in manual load balancing mode?

A.

A maximum of four active interfaces can be configured in manual load balancing mode.

B.

In manual load balancing mode, devices at both ends of a link send LACPDUs to each other.

C.

In manual load balancing mode, all active interfaces forward data and load balance traffic.

D.

The number of active interfaces can be set in manual load balancing mode.

Full Access
Question # 8

Which of the following is the default value of the Router Dead Interval field in OSPF Hello packets on a broadcast network?

A.

20 seconds

B.

30 seconds

C.

40 seconds

D.

10 seconds

Full Access
Question # 9

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

2

B.

100

C.

1

D.

4

Full Access
Question # 10

Which of the following fields are included in an MPLS header?

A.

Label

B.

TTL

C.

EXP

D.

Tos

Full Access
Question # 11

The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments.

A.

TRUE

B.

FALSE

Full Access
Question # 12

As shown in the figure, if host A has the ARP cache of host B, host A can ping host B.

A.

TRUE

B.

FALSE

Full Access
Question # 13

Which of the following sources of routes can be obtained by a router?

A.

Static routes

B.

Direct routes

C.

Summary routes

D.

Dynamic routes

Full Access
Question # 14

When two switches are connected through link aggregation, what are the requirements for the interfaces on the two switches?

A.

The physical interface rates of the interconnected switches are the same.

B.

The physical interface quantities of the interconnected switches are the same.

C.

The models of the optical modules used by the interconnected switches are the same.

D.

The duplex modes of the physical interfaces on the interconnected switches are the same.

E.

The physical interface IDs of the interconnected switches are the same.

Full Access
Question # 15

According to the one-armed routing configurations shown in the figure, even if ARP proxy is disabled on the sub-interface of R1, the Administration Dept and Finance Dept can still communicate with each other.

A.

TRUE

B.

FALSE

Full Access
Question # 16

After a switch restarts, static MAC address entries saved on the switch remain in the MAC address table.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Which of the following statements about the network shown in the figure is true?

A.

The sub-interface of Router B cannot learn the MAC address of the sub-interface of Router A.

B.

The sub-interface of Router A cannot learn the MAC address of the sub-interface of Router B.

C.

The sub-interface numbers of Router A and Router B are different, so Router A and Router B cannot communicate with each other.

D.

The host at 10.0.12.1 can ping the host at 10.0.12.2.

Full Access
Question # 18

If a device running STP receives an RSTP configuration BPDU, it discards the BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 19

The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.

A.

TRUE

B.

FALSE

Full Access
Question # 20

The router that runs OSPF first enters the Full state and then synchronizes the LSDB.

A.

TRUE

B.

FALSE

Full Access
Question # 21

Which of the following statements are true about transport-layer protocols?

A.

UDP uses SYN and ACK flags to request and confirm connection establishment.

B.

UDP is suitable for transmitting delay-sensitive traffic, and UDP packets can be reassembled based on the sequence number field in the packet header.

C.

Establishing a TCP connection requires the three-way handshake mechanism, while terminating a TCP connection requires the four-way handshake mechanism.

D.

The well-known port number range is from 0 to 1023.

Full Access
Question # 22

To provide the information about the IP addresses that a user packet traverses along the path to the destination, which of the following does Tracert record in each expired ICMP TTL packet?

A.

Source port.

B.

Destination IP address.

C.

Source IP address.

D.

Destination port.

Full Access
Question # 23

What is the number range of an advanced ACL?

A.

2000-2999

B.

3000-3999

C.

6000-6031

D.

4000-4999

Full Access
Question # 24

Which of the following port states are included in Rapid Spanning Tree Protocol (RSTP)?

A.

Discarding

B.

Forwarding

C.

Learning

D.

Listening

Full Access
Question # 25

In a broadcast address, all host bits are set to 1, and a broadcast address can be used as a host address.

A.

TRUE

B.

FALSE

Full Access
Question # 26

Which of the following packets are exchanged between STAs and an AP to obtain the AP's SSID before association with the AP?

A.

Probe Request

B.

Discovery

C.

Probe Response

D.

Beacon

Full Access
Question # 27

O: 25

In RSTP, a backup port can replace a faulty root port.

A.

TRUE

B.

FALSE

Full Access
Question # 28

What is the length range of an Ethernet_II frame that contains an Ethernet header?

A.

64-1518 bytes

B.

60-1560 bytes

C.

64-1500 bytes

D.

46-1500 bytes

Full Access
Question # 29

telnetlib is a module provided by Python to implement the Telnet protocol.

A.

TRUE

B.

FALSE

Full Access
Question # 30

Which of the following statements about switches is false?

A.

A switch can provide network access services for terminals such as PCs and servers.

B.

A switch can exchange data frames.

C.

A switch is typically deployed as an egress device of a network.

D.

A switch usually works at the data link layer.

Full Access
Question # 31

If Spanning Tree Protocol (STP) is disabled on the network consisting of switches, a Layer 2 loop will definitely occur.

A.

TRUE

B.

FALSE

Full Access
Question # 32

If Proto of a route displayed in the routing table is OSPF, the preference of the route must be 10.

A.

TRUE

B.

FALSE

Full Access
Question # 33

Only one SSID can be bound to each radio of an AP.

A.

TRUE

B.

FALSE

Full Access
Question # 34

After the administrator performs the configuration shown in the figure on a router, which of the following commands can be used to specify a short lease for addresses assigned using DHCP?

A.

dhcp select relay

B.

lease 0

C.

lease day 0 hour 10

D.

lease 24

Full Access
Question # 35

Which of the following parameters is used to elect the root bridge in STP?

A.

Bridge ID

B.

System name of the switch

C.

Port ID

D.

Root path cost

Full Access
Question # 36

In RSTP, an edge port becomes a common STP port after receiving a configuration BPDU.

A.

TRUE

B.

FALSE

Full Access
Question # 37

Which of the following states indicates that the OSPF neighbor relationship has been established?

A.

Attempt

B.

Down

C.

Full

D.

2-way

Full Access
Question # 38

Which of the following methods is not supported by the Versatile Routing Platform (VRP) to configure a router?

A.

Configure the router through FTP.

B.

Configure the router through the mini USB port.

C.

Configure the router through Telnet.

D.

Configure the router through the console port.

Full Access
Question # 39

How many bytes are there in a basic IPv6 header?

A.

40

B.

48

C.

32

D.

64

Full Access
Question # 40

RSTP uses the proposal/agreement mechanism to shorten the time that an upstream port waits before transitioning to the Forwarding state, but no temporary loop occurs. Why?

A.

RSTP introduces the edge port role.

B.

RSTP accelerates port role election.

C.

RSTP uses a synchronization mechanism to prevent temporary loops.

D.

RSTP shortens the time taken by port status transition (Forward Delay).

Full Access
Question # 41

Which of the following advantages is/are provided by inter-VLAN routing in one-arm routing mode?

A.

Reduced use of IP addresses

B.

Reduced number of links

C.

Reduced number of entries in the routing table

D.

Reduced number of devices

Full Access
Question # 42

TION NO: 29

For an Eth-Trunk in LACP mode, what is the default LACP system priority of a Huawei switch?

A.

4096

B.

36864

C.

32768

D.

24576

Full Access
Question # 43

If the network address of a network is 10.1.1.0/30, what is its broadcast address? ()

A.

10.1.1.3

B.

C. 10.1.1.4

C.

D. 10.1.1.1

Full Access
Question # 44

The IPv6 protocol uses NS and NA. packets for duplicate address detection ().

A.

True

B.

False

Full Access
Question # 45

AC. Use CAPWAP control tunnel to transmit management messages to FIT AP. ()

A.

True

B.

False

Full Access
Question # 46

To ensure that the same data flow is forwarded on the same physical link, which load sharing method does the Eth-Trunk adopt? ()

A.

Flow-based load sharing

B.

B. Packet-based load sharing

C.

C. Load sharing based on application layer information

D.

D. Load sharing based on data packet inbound interface

Full Access
Question # 47

Among the configuration BPDUs sent by the switch, which bridge D. is unlikely to appear? ()

A.

819200-01-02-03-04-CC

B.

409600-01-02-03-04-CC

C.

000-01-02-03-04-CC

D.

204800-01-02-03-04-CC

Full Access
Question # 48

When the router is powered on, it will read the configuration file from the default storage path to initialize the router. If there is no configuration file in the default storage path, what will the router use for initialization? ()

A.

Initial configuration

B.

Current configuration

C.

New configuration

D.

Default parameter

Full Access
Question # 49

Two switches use manual link aggregation at the same time. The following statement is wrong. () (Single-choice question)

A.

Only switch off G0/0/2 port on switch B. The Eth-Trunk status is still UP

B.

Turn off the G0/0/1 and G0/0/2 ports on switch B, and the Efh-Trunk status is still UP

C.

C. Only switch off G0/0/1 port on switch B. The Eth-Trunk status is still UP

D.

D. Turn off the G0/0/1 and G0/0/2 ports on switch B. The Eth-Trunk status is down

Full Access
Question # 50

A device has been configured to complete Telnet configuration. The device login address is 10.1.1.10. The Telnet user name is admin and the password is Huawei@123. The following is the correct way to use telnertlit to log in to this device? ()

A.

telnetlib.Telnet (10.1.1.0

B.

telnetlib.TeInet (10.1.1.0, admin

C.

telnetlib.Telnet 10.1.1.0.admin.Fuawei@123)

D.

telnetlib.Teinet 10.1.1.0, 23, admin.Huawei@123)

Full Access
Question # 51

The network is shown in the figure. Which router is the BDR in this network? () (Single-choice question)

A.

B. No BDR

B.

C. Router C

C.

D. Router A

Full Access
Question # 52

In the history of WLAN development, which of the following is not included in the main wireless protocol standards in the primary mobile office era? ()

A.

802.11g

B.

802.11a

C.

802.11b

D.

802.11ac

Full Access
Question # 53

The switch G0/0/1 port configuration information is shown in the figure. Which VLAN data frame does the switch forward without VLANTAG? ? () (Single-choice question)

A.

B. 30

B.

C. 20

C.

D. 40

Full Access
Question # 54

As shown in the figure. When the router uses the 0$PF protocol at the same time. Which BDR is in this network? () (Single-choice question)

A.

Router A

B.

B. Router B

C.

C. Router C

D.

D. Router D

Full Access
Question # 55

The administrator made the configuration on the router as shown in the figure. At the same time, the administrator wants to assign a shorter lease period to the DHCP address. Which of the following commands should be used? () (Single-choice question)

ip pool pooll

netyork10.10.10.0ask255.255.255.0

gateway-list 10.10.10.1

A.

B. Dhcp select relay

B.

C. Lease day 0 hour 10

C.

D. Lease 24

Full Access
Question # 56

FIT AP can work independently without relying on AC. ()

A.

True

B.

False

Full Access
Question # 57

On an interface that uses PPP as the data link layer protocol, can you configure a static route by specifying the next hop address or outbound interface? ()

A.

True

B.

False

Full Access
Question # 58

The network management system can only view the operating status of the device through the SNMP protocol, but cannot issue the configuration ()

A.

True

B.

False

Full Access
Question # 59

As shown in the figure, the G0/0/0 and G0/0/1 interfaces of RTA are connected to two different network segments. RTA is the gateway of these two networks. Before host A sends data to host C, will it send an ARP Request to obtain O's MAC address? () (Single-choice question)

A.

SW

B.

Host C

C.

G0/0/1 interface of RTA

D.

G0/0/0 interface of RTA

Full Access
Question # 60

As shown in the figure below, in the MAC address table of the network. SWA and SWB, which of the MAC addresses, VLANs, and ports are correct? () (Single-choice question)

A.

SWB:

MAC Address VLAN

Port

MAC-A

MAC-B

MAC-C

100

200

100

GEC/0/3

GEC/0/3

GEC/0/1

B.

SWA:

MAC Address

VLAN

Port

MAC-A

MAC-B

MAC-C

10

GEC/O/1

GEC/0/2

GEC/0/3

20

100

C.

SWB:

MAC Address VLAN

Port

MAC-A

MAC-B

MAC-C

10

GEC/0/3

GEC/0/3

GEC/0/1

20

100

D.

SWA:

MAC

Address VLAN

Port

MAC-A

MAC-B

MAC-C

10

GEC/0/3

20

GEC/0/3

GEC/0/3

100

Full Access
Question # 61

As shown in the broadcast network. 0SPF runs on four routers. And in the same area. Same network segment. OSPF will automatically elect one DR and multiple BDRs to achieve a better backup effect. ()(True or False)

A.

True

B.

False

Full Access
Question # 62

The ACL configuration information of a certain router is shown in the figure. Which of the following statements is correct? () (Single-choice question)

A.

The packet whose source IP address is 192.168.1.254 is matched by the permit rule

B.

Packets with source IP addresses of 192.168.1.1 and 192.168.1.254 are matched by the permit rule

C.

The packet with the source IP address of 192.168.1.1 is matched by the pemit rule

D.

D. The packet with the source IP address 192.168.1.1 is matched by the deny rule

Full Access
Question # 63

When a company's network management needs to plan the network, the data packets that allow PC1 to access PC2 go through the G0/0/0 port (G0/0/2 on the picture). The data packet that PC2 accesses to PC1 goes from port G0/0/4 (G0/0/0 in the picture). () (Single-choice question)

A.

10.0.12.5255.255.255.25511.0.12.6

#10.0.12.1255.255.255.25511.0.12.1

B.

10.0.12.5255.255.255.25511.0.12.210.

0.12.1255.255.255.25511.0.12.5

C.

0.0.0.00.0.0.00

#11.0.12.6

#11.0.12.1

0

D.

0.0.0.0

#0.0.0.0

0

#11.0.12.2

#11.0.12.5

0

Full Access
Question # 64

AAA. Which of the following is not included? ()

A.

Authentication

B.

Accounting

C.

Authorization

D.

Audit

Full Access
Question # 65

As shown in the figure below. Which port of the following switches will be blocked? () (Single-choice question)

A.

B.SWA's G0/0/3

B.

C.SWC's G0/0/1

C.

D.G0/0/3 of SWB

Full Access
Question # 66

The network shown in the figure below. Two switches are connected by four links. COPPER refers to electrical interface and FIBER refers to optical interface. Then which two interfaces can realize link aggregation? () (Single-choice question)

A.

G0/0/2 and FE0/0/3

B.

G0/0/3 and FE0/0/3

C.

G0/0/2 and G0/0/1

D.

G0/0/3 and G0/0/2

Full Access
Question # 67

The origin of SDN is the separation of transfer and control. The separation of transfer and control is a way to realize SDN, not the essence. ()

A.

True

B.

False

Full Access
Question # 68

The following two configuration commands can realize the master and backup backup of the router RIA to the same destination 10.1.1.0.

A.

True

B.

False

Full Access
Question # 69

In the network shown in the figure below, the switch uses VLANIF interfaces to connect with the router sub-interfaces. Which of the following configurations can achieve this requirement? () (Single-choice question)

A.

interface Vlanif10

Ip address10.0.12.1255.255.255.0

#

Interface GigabitEthernet 0/0/2

Port link-type trunk

Port trunk pvid 10

Port trunk allow-pass vlan 10

#

B.

interface Vlanif10

Ip address10.0.12.1255.255.255.0#

Interface GigabitEthernet 0/0/2

Port link-type trunk

Port trunk allow-pass vlan 10#

C.

interface Vlanif10

Ip address10.0.12.1255.255.255.0#

Interface GigabitEthernet 0/0/267

Port link-type hybrid

Port hybrid untag vlan 10

#

D.

interface Vlanif10

Ip address10.0.12.1255.255.255.0#

Interface GigabitEthernet 0/0/2

Port link-type access

Port default vlan 10

Full Access
Question # 70

As shown in the figure, when the switch needs to forward frames with the destination mac address of 5489-98ec-f011, which of the following descriptions is correct? () (Single-choice question)

A.

The switch will send a message that the destination is unreachable to the source device

B.

The switch did not find a matching entry in the mac address table. So the frame will be discarded

C.

The switch needs to send a request to discover the device with the mac address of 5489-98ec-f011

D.

The switch will be All ports outside flood the frame

Full Access
Question # 71

In the VRP interface, use the command startup saved-confi guration backup.cfg. Configure the backup.cfg file to be used at the next startup. ()

A.

True

B.

False

Full Access
Question # 72

On an STP-enabled switch, a port in the Learning state can transition to the Forwarding state only after the Forward Delay timer expires.

A.

TRUE

B.

FALSE

Full Access
Question # 73

Which of the following is not a characteristic of small campus networks?

A.

Simple network requirements

B.

Wide coverage

C.

Simple network architecture

D.

Small number of users

Full Access
Question # 74

Which statement is true regarding the following command?

ip route-static 10.0.12.0 255.255.255.0 192.168.1.1

A.

The configuration represents a static route to the 10.0.12.0 network.

B.

The configuration represents a static route to the 192.168.1.1 network.

C.

If the router has learned the same destination network via a dynamic routing protocol, the static route will always take precedence.

D.

The preference value of this configured route is 100.

Full Access
Question # 75

On the network shown in the figure, host A logs in to router A through Telnet and obtains the configuration file of router B through FTP on the remote CLI. How many TCP connections exist on router A?

A.

1

B.

3

C.

4

D.

2

Full Access
Question # 76

Which of the following fields does the ARP packet format contain? ()*

A.

HardwareType

B.

Protocol Address of sender

C.

Operation Code

D.

Protocol Type

Full Access
Question # 77

As shown in the figure, which of the following ports will be in blocking state?

A.

G0/0/3 of SWA

B.

G0/0/3 of SWB

C.

G0/0/2 of SWC

D.

G0/0/1 of SWC

Full Access
Question # 78

The MAC address table of existing switches is shown in the figure. Which of the following statements are correct? () (Single-choice question)

A.

Received a data frame with a source MAC address of 5489-9811-0b49 and a destination MAC address of 5489-989d1d30 from the port. Forwarded from the Eth0/0/2 port

B.

The data frame with the source MAC address of 5489-9885-18a8 and the destination MAC address of 5489-989d-1d30 is received from the port. It is forwarded from the Eth0/0/1 port

C.

When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be relearned

D.

D. When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be relearned

Full Access
Question # 79

The number of VLANs that can be created using the commands "vlan batch1020 and "vlan batch10to20" respectively is ()

A.

11 and 11

B.

11 and 2

C.

2 and 2

D.

2 and 11

Full Access
Question # 80

What kind of message does the 0SPF protocol use to request the locally missing LSA? ()

A.

LSACK

B.

LSU

C.

HELL0

D.

LSR

Full Access
Question # 81

In order to distinguish between different users and provide different network services on the AP. Which of the following can be configured through configuration? ()

A.

VT

B.

B. VAP

C.

VAC

D.

D. WAP

Full Access
Question # 82

Which of the following commands can change the device name to huawei? ()

A.

Sysname Huawei

B.

C. Rename Huawei

C.

D. Do name Huawei

Full Access
Question # 83

The network shown in the figure below. The administrator wants RTA to use a static router. Priority is given to sending data packets to RTB's LoopbackO interface through G0/0/1 port. At the same time, G0/0/2 is used as a backup. Then any configuration on RTA can be Realize this requirement? () (Single-choice question)

A.

ip route-static10.0.2.2255.255.255.25510.0.12.2

Ip route-static10.0.2.2255.255.255.25510.0.21.2 preference 40

B.

ip route-static10.0.2.2255.255.255.25510.0.12.2

Ip route-static10.0.2.2255.255.255.25510.0.21.2

C.

ip route-static10.0.2.2255.255.255.25510.0.12.2 preference 70

Ip route.-static10.0.2.2255.255.255.25510.0.21.2

D.

ip route-static10.0.2.2255.255.255.25510.0.12.2

Ip route-static10.0.2.2255.255.255.25510.0.21.2 preference 70

Full Access
Question # 84

How many bits are there in the VLAN ID in the VLAN format defined by IEEE802.1Q? ()

A.

12

B.

B. 6

C.

C. 10

D.

D. 8

Full Access
Question # 85

The configuration information of a certain port of the switch is shown in the figure. Which of the following statements is wrong? ()

interface GigabitEthernet0/0/1 port link type trunk port trunk pviD.vlan 200 port trunk allow-pass vlan100#

A.

If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it out

B.

This port cannot send data frames carrying VLAN TAG200

C.

C. The port type is Trunk type

D.

If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG 200

Full Access
Question # 86

The administrator has configured the router as shown in the figure. Then a host connected to the G1/0/0 interface of the router. What kind of IP address can be obtained through DHCP? () (Single-choice question)

A.

The IP address obtained by the host belongs to the 10.10.10.0/24 network

B.

B. The IP address obtained by the host belongs to the 10.20.20.0/24 network

C.

The IP address obtained by the host may belong to the 10.10.10.0/24 network, or it may belong to the 10.20.20.0/24 network

D.

D. The host cannot get an address

Full Access
Question # 87

The two switches shown in the figure below have both enabled the STP protocol, which port will eventually be in the Blocking state? ()

A.

STB's G0/0/3 port

B.

C. G0/0/2 port of STA

C.

D. G0/0/3 port of STA

Full Access
Question # 88

What identifies the coverage area of ​​an AP in a WLAN? ()

A.

B. SSID

B.

BSSID

C.

D. ESS

Full Access
Question # 89

The network structure and OSPF partition are shown in the figure. Except for RTA in the figure, the routers RTB, RTC and RTD are all ABR routers. ()(True or False)

A.

True

B.

False

Full Access
Question # 90

As shown in the figure, the administrator hopes that all hosts cannot access the Internet from 8:00 to 17:00 every day. Which ACL rule needs to be bound to traffic-filter outbound in the interface configuration of G0/0/1? () (Single-choice question)

A.

time-range am9 to pm5 08:00 to 17:00 daily # Acl number 2001 Rule 5 deny time-range am9 to pm5 #

B.

time-range am9 to pm5 07:00 to 18:00 daily # Acl number 2002 Rule 5 permit time-range am9 to pm5 #

C.

time-range am9 to pm5 08:00 to 17:00 off-day # Acl number 2004 Rule 5 permit time-range am9 to pm5

Full Access
Question # 91

The two-layer switch is a data link layer device, which can identify the MAC address information in the data frame, and record these MAC addresses and corresponding port information in its own MAC address table. ()

A.

True

B.

False

Full Access
Question # 92

The configuration information of a certain port of the switch is shown in the figure. What is the PVID of this port? () (Single-choice question)

A.

100

B.

2

C.

4

D.

1

Full Access
Question # 93

Telnet is a module that implements the Telnet protocol that comes with Python ()

A.

True

B.

False

Full Access
Question # 94

The vty distribution responsibility is shown in the figure, and the user authority level is set to level 3. ()

[Huavei]user-interface vty o 14 Huavei-ul-vtyo-14acl 200o inbound Huavei-ui-vtyo-14Juser privilegelevel 3 [Huavei-ui-vtyo-14]authentication-node passworD.Please Configure the login passvord (maxiu length 16): huavei

A.

True

B.

False

Full Access
Question # 95

The following description of static and dynamic routing is wrong ().

A.

Dynamic routing protocols take up more system resources than static routing protocols.

B.

After the link fails, the static route can automatically complete the network convergence.

C.

After the administrator deploys the dynamic routing protocol in the corporate network, later maintenance and expansion can be more convenient

D.

Static routing is easy to configure and easy to manage when applied in the enterprise

Full Access
Question # 96

As shown in the picture. About OSPF topology and configuration. Which of the following statements is correct? () (Single-choice question)

A.

R1 and R2 can establish a stable OSPF neighbor relationship

B.

R1 is more likely to become DR than R2, because its interface DR priority value is smaller

C.

As long as the interface network type of R1 is restored to the default broadcast type, R1 and R2 can establish a stable neighbor relationship

D.

As long as the interface network type of R1 is restored to the default broadcast type, and the hello time is adjusted to 10s, R1 and R2 can establish a stable neighbor relationship

Full Access
Question # 97

Protocol Priority Switch A. and Switch B. adopt LACP mode link aggregation, and all interfaces join the link aggregation group. At the same time, set the maximum number of active ports to 3. Then which port of switch A is not an active port? ()

A.

B. G0/0/1

B.

G0/0/3

C.

D. G0/0/0

Full Access
Question # 98

As shown in the figure below. All hosts can communicate normally. Is the corresponding relationship between SWA MAC address and port correct? () (Single-choice question)

A.

MAC-A GO/0/1

MAC-B G0/0/2

MAC-C G0/0/1

B.

MAC-A G0/0/2

MAC-B GO/0/2

MAC-C GO/0/3

C.

MAC-A GO/0/1

MAC-B GO/0/1

MAC-C GO/0/3

D.

MAC-A GO/0/1

MAC-B GO/0/2

MAC-C GO/0/3

Full Access
Question # 99

The network management workstation manages network devices through the SNMP protocol. When an abnormality occurs in the managed device, what kind of SHMP message will the network management workstation receive? ()

A.

trap message

B.

B. get-response message

C.

C. set-request message

D.

D. get-request message

Full Access
Question # 100

Which of the following attributes cannot be used as a parameter to measure C0st? ()

A.

B. Hop count

B.

sysname

C.

D. bandwidth

Full Access
Question # 101

Ethernet_I containing the Ethernet headerIWhat is the length of the frame? ()

A.

46-1500B

B.

C. 64-1500B

C.

D. 64-1518B

Full Access
Question # 102

Which of the following methods can read data non-blocking in Python's telnetliB.? ()

A.

B. telnet_read_very_lazy

B.

telnet._read_eager

C.

D. telnet_reaD._very_eager

Full Access
Question # 103

By default, network devices running the SNMPv2C. protocol use which of the following port numbers to send trap messages to the network management system? ()

A.

6

B.

161

C.

17

D.

162

Full Access
Question # 104

The configuration information of a certain port of the switch is shown in the figure. Which of the following statements is wrong? () (Single-choice question)

A.

The port type is Hybrid

B.

If the VLAN TAG carried in the data frame is 200, the switch will strip off the VLAN TAG and send it out

C.

If the port receives a data frame without VLAN TAG, the switch needs to add VLAN TAG100

D.

If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it out

Full Access
Question # 105

The following figure shows the routing table of a router. When the router receives a destinationIWhen the P address is a data packet of 9.1.1.1,The router will forward according to the route of 9.1.0.0/16 because the mask length of this route is longer. ()(True or False)

A.

B. False

Full Access
Question # 106

The following protocols are China's link state routing protocol

A.

OSPF

B.

C. Direct

C.

D. Static

Full Access
Question # 107

UDP is oriented to connectionless and must rely on () to ensure the reliability of transmission. ()

A.

Internet Protocol

B.

Transmission Control Protocol

C.

Application layer protocol

D.

Network layer protocol

Full Access
Question # 108

The following statement about static routing in Huawei equipment is wrong ().

A.

The cost value (Cost) of a static route cannot be modified.

B.

The default value of the static route priority is 60

C.

The range of static route priority value is 1-255

D.

When the priority of a static route is 0, the route will definitely be preferred.

Full Access
Question # 109

In a Layer 2 network with redundant links, which of the following protocols can be used to avoid loops?

A.

STP

B.

UDP

C.

ARP

D.

VRRP

Full Access
Question # 110

Only the WPA2-PSK security policy supports the use of TKIP for data encryption. ()

A.

True

B.

False

Full Access
Question # 111

In standard STP mode, which of the following non-root switches will forward the C-set BPDU generated by the root switch? ()

A.

Designated port

B.

Root port

C.

Backup port

D.

Preparatory port

Full Access
Question # 112

Which of the following address types does IPV6 have?

A.

Link local address

B.

C. Multicast address

C.

D. Unicast address

D.

E. Broadcast address

Full Access
Question # 113

RTA. Uses NAT technology and realizes many-to-many NAPT address translation by defining an address pool, so that hosts in the private network can access the public network. Assuming that there are only two public network P addresses in the address pool, and they have been assigned to hosts A and B for address conversion, and at this time, if the host also wants to access the public network, the following description is correct ().

A.

HostC.Unable to assign a public network address, and cannot access the public network

B.

All hosts can access the public network by using the public network address in turn

C.

RTA. Convert the source port of host C., the host can access the public network

D.

RTA. Assign interface address (200.10.10.3) to host C. Host C can access the public network

Full Access
Question # 114

When two OSPF routers form a 2-WAY neighbor relationship, LSDB. has been synchronized. ()

A.

True

B.

False

Full Access
Question # 115

Management Information Base (MIB) Information Base) is a virtual database, which only exists on the NMS. ()

A.

True

B.

False

Full Access
Question # 116

Which of the following descriptions about firewalls is wrong? ()

A.

Firewall can realize user identity authentication

B.

Firewall can realize access control between different networks

C.

The firewall can isolate the network of unreachable security level

D.

The firewall cannot implement network address translation

Full Access
Question # 117

The IPv4 address assigned by the network administrator to a host in the network is 192.168.128, how many more hosts can be added to the network where this host is located? ()

A.

12

B.

15

C.

13

D.

14

Full Access
Question # 118

Which of the following statements about Python is incorrect?

A.

Python has a wealth of third-party libraries.

B.

Python is a fully open source high-level programming language.

C.

Python can be used for automated operation and maintenance scripts, artificial intelligence data science and many other fields.

D.

Python has a clear grammatical structure, is simple and easy to learn, and runs efficiently.

Full Access
Question # 119

When the device running STP receives the RSTP configuration BPDU, it will discard it. ()

A.

True

B.

False

Full Access
Question # 120

The election of the root switch in STP only compares the priority of the switch, while in RSTP, the priority of the switch is compared with the MAC address at the same time. ()

A.

True

B.

False

Full Access
Question # 121

The load sharing mode at both ends of the Eth-Trunk can be inconsistent ()

A.

True

B.

False

Full Access
Question # 122

As shown in the figure, two hosts realize communication between TAs through single-arm routing. When the G0/0/1.2 sub-interface of RTA. receives the data frame sent by host B. to host A., RTA. will execute which of the following Operation? ()

A.

RTA. First delete VLAN tag 20, then add VLAN tag 10, and then send it out via G0/0/1.1 interface

B.

RTA. Forward the data frame directly through the G0/0/1.1 sub-interface

C.

RTA. The data frame will be discarded

D.

RTA. After deleting VLAN tag 20, it will be sent out by G0/0/1.1 interface

Full Access
Question # 123

Which of the following commands can be used to check the session status of the PPPoE client? ()

A.

display current configuration

B.

display pppoe-client session summary

C.

display ip interface brief

D.

display pppoe-client sessi on packet

Full Access
Question # 124

The administrator wants to configure the P address on the G0/0/0 interface of the router. Which of the following addresses is correct?

A.

237.6.1.2/24

B.

145.4.2.55/26

C.

127.3.1.4/28

D.

192.168.10.112/30

Full Access
Question # 125

The following description of the Layer 2 Ethernet switch is incorrect ().

A.

Need to make certain modifications to the layer 3 header of the forwarded message, and then forward it

B.

Able to learn MAC. Address

C.

Forward according to the Layer 2 header information of the Ethernet frame

D.

Layer 2 Ethernet switch works at the data link layer

Full Access
Question # 126

There is a WeB server in the private network that needs to provide HITP services to public network users. Therefore, the network administrator needs to configure NAT on the gateway router RTA.

A.

RTA-Gigabitethernet0/0/1 nat server protocol tcp global 192.168.1.1 www inside 202.10.10.18080

B.

(RTA-Serial1/0/1) nat server protocol tcpglobal 192.168.1.1 www inside202.10.1 0.18080

C.

(RTA-Gigabitethernet0/0/1) nat server protocol tcp global 202.10.10.1 www inside 192.168.1.18080

D.

(RTA-Serial1/0/1) nat server protocol top global 202.10.10.1 www inside192.168.1.18080

Full Access
Question # 127

The basic header length of IPv6 packets is a fixed value ()

A.

True

B.

False

Full Access
Question # 128

When the FIT AP goes online, the software version will be downloaded from AC.

A.

True

B.

False

Full Access
Question # 129

What is the number range of advanced ACLs? ()

A.

3000-3999

B.

2000-2999

C.

4000~4999

D.

6000~6031

Full Access
Question # 130

As shown in the figure below. All hosts can communicate normally. Which of the following statements are correct? () (Multiple Choice Questions)

A.

G0/0/3 of SWB learned 2 mac addresses

B.

SWA's G0/0/3 learned 1 mac address

C.

C. SWA's G0/0/3 learned 2 mac addresses

D.

D. SWA's G0/0/3 learned 3 mac addresses

Full Access
Question # 131

When adopting LACP mode for link aggregation, what is the default system interference level of Huawei switches? ()

A.

36864

B.

4096

C.

24576

D.

32768

Full Access
Question # 132

According to the command shown in the figure, which of the following descriptions is correct? () (Multiple Choice Questions)

A.

GigabitEthernet (PVID of port 0/0/1 is 1

B.

The pVD of the GigabitEthernet0/0/2 port is 1

C.

GigabitEthernet (the pVID of port 0/0/2 is 10

D.

GigabitEthernet (PVD of port 0/0/1 is 10

Full Access
Question # 133

For multiple paths to the same destination network, the router needs to select by comparing the magnitude of the Prererence value. If the Preference is the same, the router selects according to the magnitude of the Cost value. ()

A.

True

B.

False

Full Access
Question # 134

In order for the STA to obtain the SSID related information on the AP, which of the following messages is used by the AP to proactively declare the wireless network SSID information? ()

A.

Join

B.

eacon

C.

Probe

D.

Discovery

Full Access
Question # 135

The output information of a router's routing table is shown in the figure. Which of the following statements is correct? () (Multiple Choice Questions)

A.

The outbound interface of this router to 10.0.0.1 is Ethernet0/0/1

B.

The outgoing interface of this router to 10.0.0.1 is Ethernet0/0/0

C.

C. The outgoing interface of this router to 10.0.2.2 is Ethernet0/0/0

D.

The outbound interface of this router to 10.0.2.2 is Ethernet0/0/1

Full Access
Question # 136

What kind of packets does the OSPF protocol use to request LSAs that are missing locally? ()

A.

B. LSACK

B.

LSR

C.

D. LSU

Full Access
Question # 137

The mask length is 12 bits can be expressed as?

A.

255.240.0.0

B.

255.248.0.0

C.

255.255.0.0

D.

255.255.255.0

Full Access
Question # 138

When Huawei switches allow STP, the priority of the switch by default is ()

A.

32768

B.

8192

C.

16384

D.

4096

Full Access
Question # 139

By default, what is the period for sending 0SPF HELLO packets on the broadcast network? ()

A.

10s

B.

B. 20s

C.

C. 30s

D.

D. 40s

Full Access
Question # 140

When learning this switch needs to forward the frame with the destination MAC. The address is 5489-98ec-f011, the following description is correct ()

A.

The switch will flood the frame on all ports except the port that received the frame

B.

The switch will send a message that the destination is unreachable to the source device

C.

The switch does not find a matching entry in the MAC. address table, so the frame will be discarded

D.

The switch needs to discover the MAC by sending a request..Device with address 548998ec-f011

Full Access
Question # 141

In order to realize the launch of FIT AP, FIT AP first needs to obtain the IP address of AC. Which of the following is not included in the way FITAP obtains the IP address of AC.? ()

A.

Broadcasting method

B.

Static designation method on AP

C.

Multicast mode

D.

DHCP Option mode

Full Access
Question # 142

A device has been configured to complete Telnet configuration. The device login address is 10.1.1.10. The Telnet user name is admin and the password is Huawei (@123. The following is the correct way to log in to this device using telnetliB. ()

A.

telnetlib.Telnet (10.1.1.0, 23, admin, Huawei@123)

B.

telnetlib.Telnet (10.1.1.0)

C.

telnetlib.Telnet 10.1.1.0, 23, Huawei@123)

D.

telnetlib.Telnet (10.1.1.0, admin

Full Access
Question # 143

Which of the following routing protocols has the highest priority?

A.

Direct

B.

C. Static

C.

D. OSPF

Full Access
Question # 144

The configuration information of a certain port of the switch is shown in the figure. Then, when the data frame of which VLAN is sent by this port, it carries the VLAN TAG? ()interface GigabitEtherneto/0/1 port hybriD.taggeD.vlan 2 to 3 100 port hybriD. untaggeD. vlan 4 6#

A.

1, 2.3, 100

B.

2, 3, 100

C.

1, 2, 3, 4.6, 100

D.

2.3, 4, 6, 100

Full Access
Question # 145

After the administrator successfully logged in to the router through Te1net, he found that the router’s interface could not be configuredIP address. Then the possible reasons are ()

A.

The Telnet terminal software used by the administrator prohibits the corresponding operation

B.

SNMP parameter configuration fiveMistake

C.

Telnet user authentication mode configurationMistake

D.

Telnet user level configurationMistake

Full Access
Question # 146

In the campus network, the reliability of the network can be improved by using link aggregation and stacking technology. ()

A.

True

B.

False

Full Access
Question # 147

If the Length/Type of an Ethernet data frame is 0x8100. Which of the following statements is correct?

A.

There is always a UDP header in the upper layer of each data frame

B.

The upper layer of a data frame must exist IP header

C.

There is always a TCP header in the upper layer of each data frame

D.

Each data frame must carry VLAN TAG

Full Access
Question # 148

When the host frequently moves the office, which VLAN division method is most suitable? ()

A.

Based on MAC. Address division

B.

Based on port division

C.

Based on IP subnetting

D.

Based on strategy division

Full Access
Question # 149

Which of the following interfaces are not open to Huawei controllers?

A.

NETCONF

B.

RESTful

C.

AAA

D.

OpenFlow

Full Access
Question # 150

Which of the following messages does the AP use to request the software version from AC.? ()

A.

VRP System Request

B.

Software Request

C.

Image DatA.Request

D.

Image package Request

Full Access
Question # 151

OSPF Router ID. It must be the same as the IP address of an interface on the router.

A.

True

B.

False

Full Access
Question # 152

What is the range of VLAN ID that users can use? ()

A.

1-4096

B.

1-4094

C.

0-4096

D.

0-4095

Full Access
Question # 153

SNMPv1 defines five protocol operations. ()

A.

True

B.

False

Full Access
Question # 154

SNMP messages are carried over UDP.

A.

True

B.

False

Full Access
Question # 155

When a switch receives a unicast data frame with a VLAN tag, but finds that the destination MAC address of the data frame cannot be queried in its MAC address table, the switch's processing behavior for the data frame is ().

A.

The switch will broadcast this data frame to all ports (except the receiving port) in the VLAN where the data frame is located

B.

The switch will broadcast the data frame to all ports

C.

The switch will discard this data frame

D.

The switch will broadcast this data frame to all Access ports

Full Access
Question # 156

On the VRP platform, the default protocol priority of routes in the direct route, static route, RIP.OSPF area, from high to low, is ()

A.

Direct route. OSPF. Static route. RIP

B.

Direct route.Static route.RIP.OSPF

C.

Direct route. RIP. Static route. OSPF

D.

Direct route. OSPF. RIP. Static route

Full Access
Question # 157

Which of the following IPv6 addresses can be abbreviated as 2FFF DAC:ABEF:CDAA:732? ()

A.

2FFF:ODAC.:ABEF:0000:0000:0000:CDAA4:0732

B.

2FFF:ODAC:ABEF 0000:0000:CDAA:0732

C.

2FFF DACO:ABEF 0000000:0000:CDAA:0732

D.

2FFF:ODAC:ABEF:0000:0000:0000:CDAA:7320

Full Access
Question # 158

At what layer of the OSI reference model does a router operate? ( )

A.

Data link layer

B.

Transport layer

C.

Application layer

D.

Network layer

Full Access
Question # 159

The config mode is the default ACL matching order on Huawei devices. ()

A.

True

B.

False

Full Access
Question # 160

STA. The only way to discover the wireless network is the Beacom frame sent by the AP. ()

A.

True

B.

False

Full Access
Question # 161

By default, the bridge priority of Huawei switches is 32768.

A.

True

B.

False

Full Access
Question # 162

The login timeout time in the VRP system can only be set under the vty interface. ()

A.

True

B.

False

Full Access
Question # 163

The administrator plans to implement route backup by configuring static floating routes, the correct way to achieve this is ().

A.

The administrator needs to configure different protocol priority values ​​for the main static route and the standby static route

B.

B. The administrator only needs to configure two static routes

C.

The administrator needs to configure different metric values ​​for the main static route and the standby static route. The administrator only needs to configure two static routes

D.

D. The administrator only needs to configure two static routes

Full Access
Question # 164

ForwardD.Delay exists when an STP port transitions between which of the following states?

A.

Forwarding-Di sableD.Learning-Forwarding

B.

Learning-Forwarding

C.

Disabled-Blocking

D.

Blocking-Listening

E.

Listening-Learning

Full Access
Question # 165

Which of the following statements about static routes on Huawei devices is false?

A.

The default preference value of a static route is 60.

B.

When the preference value of a static route is 0, this static route is selected as the optimal route.

C.

The cost of a static route cannot be changed.

D.

The preference value of a static route is in the range 1 to 255.

Full Access
Question # 166

In order to realize the network layer function on the VLANIIF interface, need to be configured on the VLANIF interface? ()*

A.

Subnet mask

B.

MAC.Address

C.

IP prefix

D.

IP address

Full Access
Question # 167

The output information of a certain device is shown in the figure. Which of the following statements is correct? ( )

display interface G1gabitEthernet 0/0/0 G1 gabi tEthernet0/0/0 currentstate UP Line protocol current state UP Route Port,The Maximum Transmit Unit is 1000 Internet Address is 10.0.12.2/24 IP Sending Frames'Format is PRTFMT ETENT 2.Hardware address is 00e0-fc22-4fff Port Mode:FORCE COPPER SpeeD.:100, Loopback:NONE Duplex:FULL, Negotiation:DISABLE Md1 AUTO Last 300 seconds input rate 24 bits/seC.0 packets/sec Last 300 seconds output rate 24 bits /seC.0 packets/seC.*

A.

The P address of the interface is 10.0.12.2/24

B.

The MAC of the interface. The address is 00e0-fc22-4fff

C.

The working rate of this interface is 1Gbps

D.

The MTU value of this interface is 1000

Full Access
Question # 168

As shown in the figure below, assuming that the other configurations of the switch are kept in the default state, which port of the following switch will become the designated port? () (Multiple Choice Questions)

A.

G0/0/1 of SWB

B.

SWC's G0/0/2

C.

SWA's G0/0/3

D.

D. SWC's G0/0/1

Full Access
Question # 169

On the command line interface of Huawei AR routers, the role of the Save command is to save the current system time.

A.

TRUE

B.

FALSE

Full Access
Question # 170

Which of the following networks belong to a local area network? ()

A.

A home network

B.

A company office network

C.

Internet

D.

Broadband Metropolitan Area Network

Full Access
Question # 171

The load balancing modes at both ends of an Eth-Trunk can be different.

A.

TRUE

B.

FALSE

Full Access
Question # 172

Which of the following networks are LANs?

A.

Home network

B.

Metropolitan Area Network (MAN)

C.

Internet

D.

Office network of a company

Full Access
Question # 173

Which of the following commands sets the data forwarding mode on an AC to direct forwarding?

A.

forward mode tunnel

B.

forward-mode direct-forward

C.

forward-mode capwap-forward

D.

forward-mode direct

Full Access
Question # 174

Which of the following port statuses may exist on an STP-enabled switch?

A.

Discarding

B.

Listening

C.

Disabled

D.

Forwarding

Full Access
Question # 175

The transmission rate of the Eth-Truk port in manual link aggregation mode is related to ().*

A.

Number of member ports

B.

Bandwidth of member port

C.

Whether an IP address is configured on the member port

D.

Is the member port on the public or private network

Full Access
Question # 176

The following statement about the main functions of the router is wrong ()*

A.

Realize the mutual communication between the same network disconnection equipment

B.

According to the source of the received packetIP address for forwarding

C.

Establish routing table through multiple protocols

D.

Guide data forwarding according to the routing table

Full Access
Question # 177

After switches are virtualized into one logical switch using stacking or CSS, an inter-chassis Eth-Trunk can be deployed to improve network reliability.

A.

TRUE

B.

FALSE

Full Access
Question # 178

Which fields in the IPv4 header are related to fragmentation? ()*

A.

TTL

B.

Fragment Offset

C.

Identification

D.

Flags

Full Access
Question # 179

The network shown in the figure. Which of the following configurations can realize that the host A can access the Internet, but the host B can not? (ABCD) (Multiple Choice Questions)

A.

acl number 2000

Rule5 deny source100.0.12.0.0.0.0.255Rule 10 permit

#

Interface GigabitEthernet0/0/3

Traffic-filter outbound acl 2000

#

B.

acl number 2000

Rule 5 permit source 100.0.13.0.0.0.0.255

Rule10 deny source100.0.12.0.0.0.0.255#

Interface GigabitEthernet0/0/3

Traffic-filter outbound acl 2000

#

C.

acl number 2000

Rule 5 permit source 100.0.13.0.0.0.0.255

Rule 10 deny

#

Interface GigabitEthernet0/0/3

Traffic-filter outbound acl 2000

#

D.

acl number 2000

Rule5 deny source 100.0.12.0.0.0.0.255 Rule 10 permit source 100.0.13.0.0.0.0.255

#

Interface GigabitEthernet0/0/3

Traffic-filter outbound acl 2000

#

Full Access
Question # 180

The output information of a certain switch is shown in the figure. Which of the following statements is correct? () (Multiple Choice Questions)

A.

Switch GE0/0/1 port does not carry VLAN TAG when sending VLAN20 data frame

B.

The GE0/0/2 port of the switch carries VLAN TAG when sending VLAN20 data frames

C.

Switch GE0/0/1 port does not carry VLAN TAG when sending VLAN10 data frame

D.

The user manually created 4 VLANs

Full Access
Question # 181

What is the role of link aggregation? ()*

A.

Improve network reliability

B.

Increase bandwidth

C.

Facilitate analysis of data

D.

Achieve load sharing

Full Access
Question # 182

IPv6 uses NS and NA packets to perform duplicate address detection (DAD).

A.

TRUE

B.

FALSE

Full Access
Question # 183

The router Radius information configuration is shown in the figure. Which of the following statements are correct? ()#Radius-server template Huawei radius-server shared.key cipher Huawei radius-server authentication 200.0.12.1 1812 radius-server accounting 200.0.12.1 1813#*

A.

The source IP address of the Radius packet sent by the router is 200.0.12.2

B.

The P address of the accounting server is 200.0.12.1

C.

The P address of the authorization server is 200.0.12.1

D.

The P address of the authentication server is 200.0.12.1

Full Access
Question # 184

Refer to the following commands run on GigabitEthernet0/0/1 and GigabitEthernet0/0/2. Which of the following statements are true?

A.

The PVID of GigabitEthernet0/0/1 is 1.

B.

The PVID of GigabitEthernet0/0/2 is 1.

C.

The PVID of GigabitEthernet0/0/1 is 10.

D.

The PVID of GigabitEthernet0/0/2 is 10.

Full Access
Question # 185

To enable Router A to communicate with Loopback 0 on Router B on the network shown in the figure, which of the following commands needs to be run on Router A?

A.

ip route-static 10.0.2.2 32 GigabitEthernet 0/0/0

B.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.1

C.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.2

D.

ip route-static 10.0.2.2 0 GigabitEthernet 0/0/0

Full Access
Question # 186

In what ways does VRP support router configuration? ()*

A.

Configure the router via FTP

B.

Configure the router through the mni USB. port

C.

Configure the router through the Console port

D.

Configure the router via Telnet

Full Access
Question # 187

Which of the following attributes cannot be used as a measure of CoThe parameter of st? ()*

A.

bandwidth

B.

Sysname

C.

Time delay

D.

Hop count

Full Access
Question # 188

Which of the following messages is used for IPv6 stateless address autoconfiguration? ()*

A.

NS

B.

RA

C.

NA

D.

RS

Full Access
Question # 189

Which of the following is a link-state routing protocol?

A.

FTP

B.

OSPF

C.

Direct

D.

Static

Full Access
Question # 190

ip route-static.10.0.2.2255.255.255.25510.0.12.2 preference20, the correct statement about this command is ()

A.

The NextHop of this route is 10.0.12.2

B.

The priority of this route is 20

C.

This route can guide the forwarding of packets with the destination P address of 10.0.2.2.

D.

This route can guide the forwarding of packets with the destination IP address 10.0.12.2

Full Access
Question # 191

The output information of the router R1 routing table is shown in the figure. Which of the following statements is correct? () (Multiple Choice Questions)

<R1>display ip routing-table

Route Flags: R-relay, D-download to fib

A.

The data packet whose destination network is 12.0.0.0/8 will be forwarded from the router's Ethernet0/0/0 interface

B.

The router will discard packets whose destination network is 11.0.0.0/8

C.

The router will forward data packets whose destination network is 12.0.0.0/8

D.

The data packet whose destination network is 11.0.0.0/8 will be forwarded from the router's GigabitEthernet0/0/0 interface

Full Access
Question # 192

In the following figure, after the OSPF routers converge, in which state is the OSPF neighbor relationship between Router B and Router C?

A.

Full

B.

Down

C.

2-way

D.

Attempt

Full Access
Question # 193

The following figure shows the display interface Eth-Trunk 1 command output on a switch. Which of the following commands can be used to delete Eth-Trunk 1?

A.

inte GigabitEthernet 0/0/1 undo eth-trunk quit inte GigabitEthernet 0/0/2 undo eth-trunk quit undo interface Eth-Trunk 1

B.

inte GigabitEthernet 0/0/2 undo eth-trunk quit undo interface Eth-Trunk 1

C.

undo interface Eth-Trunk 1

D.

inte GigabitEthernet 0/0/1 undo eth-trunk quit undo interface Eth-Trunk 1

Full Access
Question # 194

On VRP, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?

A.

Visit level

B.

Configuration level

C.

Monitoring level

D.

Management level

Full Access
Question # 195

If the broadcast address of a network is 172.16.1.255, which of the following addresses is the network address?

A.

172.16.1.128

B.

172.16.1.1

C.

172.16.2.0

D.

172.16.1.253

Full Access
Question # 196

When the ACL in the following figure is configured on a Telnet server, only the device with an IP address of 172.16.105.2 can remotely log in to the Telnet server.

bash

Copy code

acl number 2000

rule 5 permit source 172.16.105.2 0

A.

TRUE

B.

FALSE

Full Access
Question # 197

Telnetlib is a module that implements the Telnet protocol that comes with Python ()

A.

True

B.

False

Full Access
Question # 198

As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

A.

0

B.

400

C.

200

D.

600

Full Access
Question # 199

Which of the following statements about RA. and RS messages in IPv6 are correct? ()*

A.

RS is used to request address prefix information

B.

RA. Used to reply address prefix information

C.

D. RS is used to reply address prefix information

Full Access
Question # 200

Making a call on a landline telephone is a type of network communication.

A.

TRUE

B.

FALSE

Full Access
Question # 201

As shown in the figure below, are the following statements correct? () (Multiple Choice Questions)

A.

The broadcast address of host A and host B are the same

B.

Host A can ping host B

C.

Host A and Host B cannot obtain each other's MAC address

D.

The following entry 10.0.12.5 MAC-B exists in the ARP cache of host A

Full Access
Question # 202

As shown in the figure, router A has successfully telneted to router B using 10.0.12.2. Which of the following operations will interrupt the Telnet session between router A and router B?

A.

Enable OSPF on G0/0/1

B.

Change the IP address of G0/0/1

C.

Disable G0/0/1

D.

Configure a static route

Full Access
Question # 203

Which of the following elements are included in a routing table?

A.

Cost

B.

Next-hop address

C.

Protocol

D.

Interface

E.

Destination/Mask

Full Access
Question # 204

The following figure shows the display interface Eth-Trunk 1 command output on SWA. In the MAC address table of SWA, which of the following interfaces maps the MAC address of SWB?

A.

GigabitEthernet0/0/1

B.

Eth-Trunk 1

C.

GigabitEthernet0/0/3

D.

GigabitEthernet0/0/2

Full Access
Question # 205

Which of the following are not open interfaces for Huawei network equipment? ()*

A.

NETCONF

B.

RESTCONF

C.

JSON

D.

XML

Full Access
Question # 206

Which of the following statements are true about the dynamic MAC address table?

A.

Dynamic MAC address entries are obtained by learning the source MAC addresses of packets received by an interface and can be aged out.

B.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, dynamic MAC address entries on the device or interface card are lost.

C.

You can obtain the number of users communicating on an interface by checking the number of specified dynamic MAC address entries.

D.

After a device is reset, an interface card is hot-swapped, or an interface card is reset, the saved entries on the device or interface card are not lost.

Full Access
Question # 207

Which of the following statements about IPv6 address configuration are correct? ()*

A.

IPv6 supports stateless automatic configuration

B.

IPv6 address supports automatic configuration in multiple ways

C.

IPv6 supports DHCPv6 for address configuration

D.

IPv6 addresses can only be configured manually

Full Access
Question # 208

The following figure shows the configuration of a sub-interface on a router. For which VLAN does the sub-interface receive tagged data frames?

A.

20

B.

1

C.

30

D.

100

Full Access
Question # 209

Which devices are generally involved in wlan deployment schemes in enterprise scenarios? ()*

A.

AC (Acess Controller)

B.

Poe switch

C.

CPE

D.

AP

Full Access
Question # 210

Which of the following methods can be used to add APs on an AC?

A.

Import APs when they are offline.

B.

Add APs when they are online.

C.

Configure the AC to automatically discover APs.

D.

Manually confirm APs in the list of unauthorized APs.

Full Access
Question # 211

Now there are the following four segments: 10.24.0.0/24, 10.24.1.0/24, 10.24.2.0/24, 10.24.3.0/24, which route can point to these four network segments at the same time? ()*

A.

10.24.1.0/23

B.

0.0.0.0/0

C.

10.24.0.0/22

D.

10.24.0.0/21

Full Access
Question # 212

Which of the following statements about encapsulation and decapsulation are true?

A.

Encapsulation and decapsulation can locate network faults.

B.

Encapsulation and decapsulation shorten the packet length.

C.

Encapsulation and decapsulation participate in achieving different network protocol functions.

D.

Encapsulation and decapsulation can implement network communication.

Full Access
Question # 213

As specified by the RSTP protocol, when a root port fails, which type of port will function as a new root port and enter the forwarding state without any delay?

A.

Alternate Port

B.

Forwarding Port

C.

Backup Port

D.

Edge Port

Full Access
Question # 214

If the Ethernet data frame Length/Type=0X0806, which statement is correct ()*

A.

The source MAC of the secondary data frame. The address must not be FFFF-FFFF-FFFF

B.

This data frame is an IEEE802.3 frame

C.

The secondary data frame is EthernetⅡ frame

D.

The destination MAC of this data frame. The address may be FFFF-FFFF-FFFF

Full Access
Question # 215

What are the user authentication methods that can be deployed in wlan? ()

A.

Portal authentication

B.

MAC. Authentication

C.

Radius certification

D.

802.1X authentication

Full Access
Question # 216

On the network shown in the figure, router A adopts link aggregation in manual load balancing mode, and G0/0/1 and G0/0/2 are added to link aggregation group (LAG) 1. Which of the following statements is false about Eth-Trunk 1 on router A?

A.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Up.

B.

If only G0/0/2 on router B is disabled, Eth-Trunk 1 is Up.

C.

If only G0/0/1 on router B is disabled, Eth-Trunk 1 is Up.

D.

If both G0/0/1 and G0/0/2 on router B are disabled, Eth-Trunk 1 is Down.

Full Access
Question # 217

Which of the following statements about the default route are correct? ()

A.

If the destination address of the message cannot match any other routing entries in the routing table, the router will forward the message according to the default route

B.

There must be a default route in the routing table of any router

C.

The default route can only be manually configured by the administrator

D.

In the routing table, the default route appears in the form of a route to the network 0.0.0.0 (the mask is also 0.0.0.0)

Full Access
Question # 218

In the network shown in the figure below, there are the following configurations in Router A. Which of the following statements is correct?

ip route-statiC.10.0.2.2255.255.255.25510.0.12.2iP

Route-statiC.10.0.2.2255.255.255.25510.0.21.2pre ference 70

A.

The Next in the routing table of Router A reaches 10.0.2.2. Hop is 10.0.21.2

B.

The Next in the routing table of Router A reaches 10.0.2.2. Hop is 10.0.12.2

C.

If the G0/0/2 port is Down, then Router A reaches 10.0.2.2. The route NextHop. is changed to 10.012.2

D.

If the G0/0/1 port is Down, the route NextHap from Router A to 10.0.2.2 is changed to 10.0.21.2

Full Access
Question # 219

Which of the following statements about the default route are correct?

A.

If the destination address of the message cannot match any other routing entries in the routing table, the router will forward the message according to the default route

B.

The default route can only be manually configured by the administrator

C.

There must be a default route in the routing table of any router

D.

In the routing table, the default route appears in the form of a route to the network 0.0.0.0 (the mask is also 0.0.0.0)

Full Access
Question # 220

A network administrator wishes to assign an IP address to a router interface G0/0/0. Which of the following IP addresses can be assigned?

A.

237.6.1.2/24

B.

127.3.1.4/28

C.

145.4.2.55/26

D.

192.168.10.112/30

Full Access
Question # 221

Refer to the following configuration of an interface on a switch. What is the PVID of the interface?

interface GigabitEthernet0/0/1

port hybrid tagged vlan 2 to 3 100

port hybrid untagged vlan 4 6

A.

1

B.

4

C.

2

D.

100

Full Access
Question # 222

Which of the following are valid static route configurations?

A.

ip route-static 129.1.0.0 16 serial 0/0/0

B.

ip route-static 129.1.0.0 255.255.0.0 10.0.0.2

C.

ip route-static 10.0.0.2 16 129.1.0.0

D.

ip route-static 129.1.0.0 16 10.0.0.2

Full Access
Question # 223

The network administrator performs the configuration shown in the following figure on RTA. If a user needs to be authenticated in the authentication domain named huawei, which of the following statements is true?

A.

The authentication scheme au2 is used for authentication.

B.

The authentication scheme aul is used for authentication.

C.

The authentication scheme au2 is used for authentication. If the authentication scheme au2 is deleted, the authentication scheme aul is used.

D.

The authentication scheme aul is used for authentication. If the authentication scheme aul is deleted, the authentication scheme au2 is used.

Full Access
Question # 224

Which SNMP version focuses on two main aspects, namely security and administration. The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.

A.

SNMPv2c

B.

SNMPv1

C.

SNMPv3

D.

SNMPv2

Full Access
Question # 225

Which of the following network parameters can be allocated using DHCP?

A.

Address of the DNS server

B.

Operating system

C.

Gateway address

D.

IP address

Full Access
Question # 226

TION NO: 58

If the MAC address of an interface is 00E0-FCEF-0FEC, the corresponding EUI-64 address is ( ).

A.

02E0-FCFF-FEEF-0FEC

B.

02E0-FCEF-FFFE-0FEC

C.

00E0-FCEF-FFFE-0FEC

D.

00E0-FCFF-FEEF-0FEC

Full Access
Question # 227

Which of the following IEEE 802.11 standards supports a theoretical negotiated rate of 5 Gbit/s or higher?

A.

802.11a

B.

802.11ax

C.

802.11n

D.

802.11b

Full Access
Question # 228

Which of the following statements regarding static routing and dynamic routing is incorrect?

A.

Dynamic routing will use more resources than static routes.

B.

The static routing can automatically recover when a link failure is encountered.

C.

The use of dynamic routing is more convenient for the administrator to manage the network following network convergence.

D.

The static routing can be easily configured and managed on the enterprise network.

Full Access
Question # 229

Which of the following information is displayed when an entered command is incomplete on the Versatile Routing Platform (VRP)?

A.

Error: Wrong parameter found at 'A' position

B.

Error: Incomplete command found at 'A' position

C.

Error: Too many parameters found at 'A' position

D.

Error: Ambiguous command found at 'A' position

Full Access
Question # 230

When a host uses the stateless address autoconfiguration solution to obtain an IPv6 address, the host cannot obtain the DNS server address.

A.

TRUE

B.

FALSE

Full Access
Question # 231

If the transport-layer protocol is UDP, the value of the "Protocol" field at the network layer is 6.

A.

TRUE

B.

FALSE

Full Access
Question # 232

On the broadcast network, both DR and BDR use the multicast address 224.0.0.6 to receive link state update messages ()

A.

True

B.

False

Full Access
Question # 233

What kind of message does the DHCP server use to confirm that the host can use the IP address? ()

A.

B. DHCP ACK

B.

DHCP OFFER

C.

D. DHCP REQUSET

Full Access
Question # 234

The HybriD. port can be connected to the user host or other switches. ()

A.

True

B.

False

Full Access
Question # 235

The role of the OSPF protocol is

A.

Pass routing information

B.

B. Transmit MAC information

C.

C. Pass ARP information

D.

D. No effect

Full Access
Question # 236

What is the MAC address of the data link layer of each VAP on the AP? ()

A.

SSID

B.

BSS

C.

ESS

D.

BSSID

Full Access
Question # 237

Since the TCP protocol uses a three-way handshake mechanism when establishing a connection and closing a connection, TCP supports reliable transmission.

A.

True

B.

False

Full Access
Question # 238

When the Access type port sends a message, it will ().

A.

Strip the VLAN information of the high packet, and then send it out

B.

Type the PVID. information of this port, and then send it out

C.

C. Send tagged messages

D.

Add the VLAN information of the message, and then send it out

Full Access
Question # 239

The router needs to modify the destination IP address in the data packet when forwarding the data packet ()

A.

True

B.

False

Full Access
Question # 240

1/128 is the IPv6 loopback address ()

A.

True

B.

False

Full Access
Question # 241

The Backup port in RSTP can replace the failed root port ()

A.

True

B.

False

Full Access
Question # 242

DNS is used for domain name resolution

A.

True

B.

False

Full Access
Question # 243

In the RSTP standard, in order to improve the convergence speed, the port that the switch is directly connected to the terminal can be defined as ()

A.

Edge port

B.

B. Root port

C.

C. Fast port

D.

D. Backup port

Full Access
Question # 244

Which of the following packet types is used by RADIUS to indicate authentication rejection? ()

A.

Access-Accept

B.

Access-Request

C.

Access-Challenge

D.

Access-Reject

Full Access
Question # 245

Network devices running the SNMP protocol run an agent process locally. ()

A.

True

B.

False

Full Access
Question # 246

The CAPWAP protocol stipulates the communication standard between AC. and Ap. Which of the following statements about the CAPWAP protocol is correct? ()

A.

CAPWAP is an application layer protocol based on TCP transmission

B.

In order to establish a CAPWAP tunnel, the FIT Ap can only discover the AC through broadcast messages

C.

In order to reduce the burden on the AP, CAPWAP uses a tunnel to simultaneously transmit control messages and data messages

D.

The AP can encapsulate the user's data message in CAPWAP and hand it over to the AC.

Full Access
Question # 247

The administrator has configured the AR2200. Which of the following descriptions about the configuration information is correct ()

A.

The saved configuration file will be replaced by the running configuration file

B.

If the user wants to clear the next startup configuration file of the device configuration, they should select "N"

C.

If the user wants to clear the next startup configuration file of the device configuration, they should select "Y"

D.

D. The next startup file of the device configuration will be retained

Full Access
Question # 248

CSS refers to the combination of two switch devices that support cluster features. Logically combined into one switch device. ()

A.

True

B.

False

Full Access
Question # 249

When the host frequently moves, which VLAN division method is most appropriate? ()

A.

Based on MAC. Address division

B.

B. Based on strategy division

C.

C. Based on IP subnetting

D.

D. Based on port division

Full Access
Question # 250

Which of the following are not the characteristics of a small campus network? ()

A.

Simple network level

B.

Fewer users

C.

Simple network requirements

D.

Wide coverage

Full Access
Question # 251

ARP request is sent by ()

A.

broadcast

B.

B. Unicast

C.

C. There are broadcast and unicast

D.

D. Multicast

Full Access
Question # 252

The following two configuration commands can realize the router RTA. The main and backup backup routes to the same destination 10.1.1.0: ()

(RTA)ip route--statiC.10.1.1.02412.1.1.1 permanent(RTA)ip route--statiC.10.2.2.02413.1.1.1.

A.

True

B.

False

Full Access
Question # 253

Network switch A and router A are connected by two links. The two links are aggregated in manual load sharing mode. The aggregated port number is 1, and the aggregated link needs to carry VLAN TAG100 when forwarding data. The switch When A uses a trunk link, which of the following configurations need to be used by switch A? ()

A.

4

B.

C. 5

C.

D. 3

Full Access
Question # 254

IP route--statiC.10.0.12.0255.255.255.0192.168.1.1 About this command description is correct ()

A.

This command configures a route to the 10.0.12.0 network

B.

B. The priority of this route is 100

C.

If the router learns a router with the same destination network as this route through other protocols, the router will prefer this route

D.

D. This command configures a route to the 192.168.1.1 network

Full Access
Question # 255

UDP is connectionless and must rely on () to ensure the reliability of transmission.

A.

B. Transmission Control Protocol

B.

Network layer protocol

C.

D. Application layer protocol

Full Access
Question # 256

Among the following commands for configuring the default route, the correct one is ()

A.

(Huawei) ip route-statiC.0.0.0.0 0.0.0.0 192.168.1.1

B.

(Huawei) ip route-statiC.0.0.0.0 0.0.0.0 0.0.0.0

C.

D. (Huawei) ip route-statiC.0.0.0.0 255.255.255.255192.168.1.1

Full Access
Question # 257

In the broadcast network, OSPF runs on four routers in the same area and on the same network segment. OSPF will automatically elect one DR and multiple BDRs to achieve a better backup effect ()

A.

True

B.

False

Full Access
Question # 258

FTP transfer data at a time requires several TCP connections to be established

A.

2

B.

C. 3

C.

D. 4

Full Access
Question # 259

FIT AP can work independently without relying on AC. ()

A.

True

B.

False

Full Access
Question # 260

Telnet is based on TCP protocol ()

A.

True

B.

False

Full Access
Question # 261

On Huawei switches, you can use the vlan batch command to create multiple VLANs in batches, simplifying the configuration process. ()

A.

True

B.

False

Full Access
Question # 262

When the lease period reaches what percentage does the DHCP client send the lease renewal message for the first time? ()

A.

0.5

B.

0.875

C.

D. 0.25

Full Access
Question # 263

What is the value of TPID. defined by IEEE802.1Q? ()

A.

B. 0x7200

B.

0x8100

C.

D. 0x9100

Full Access
Question # 264

When planning a campus network, which of the following mask lengths is recommended for device interconnection IP addresses? ()

A.

16

B.

32

C.

24

D.

30

Full Access
Question # 265

The following description about the specified port of the spanning tree is correct ()

A.

The designated port can forward configuration BPDU packets to the network segment connected to it

B.

C. The port on the root switch must be a designated port

C.

D. The port on the root switch must not be a designated port

Full Access
Question # 266

Which of the following IPv6 is a global unicast address ()

A.

2001::12:1

B.

B. FF02:1

C.

C. FF:02:2E0:FCFF:FEEF:FEC

D.

D. FEE:FCFF:FEEF:FEC

Full Access
Question # 267

The following is the statement about the election of active ports in link aggregation LACP mode. the correct one is? ()

A.

The interface priority is compared first, and the better one cannot be judged to continue to compare the interface number, the smaller the better.

B.

B. Only compare interface priority

C.

C. Compare device priority

D.

D. Only compare interface numbers

Full Access
Question # 268

All interfaces of the router belong to the same broadcast domain. ()

A.

True

B.

False

Full Access
Question # 269

The switch becomes a logical switch after stacking and clustering, and Eth-Trunk across physical devices can be deployed to improve network reliability. ()

A.

True

B.

False

Full Access
Question # 270

Take effect immediately after the Router ID of the OSPF process is modified ()

A.

True

B.

False

Full Access
Question # 271

IPCP dynamic address negotiation can automatically obtain the address()

A.

True

B.

False

Full Access
Question # 272

After FIT AP obtains AC.'s IP address, what is the first operation to perform? ()

A.

B. Download the configuration file

B.

Establish a CAPWAP tunnel

C.

D. Request configuration file

Full Access
Question # 273

Layer 2 ACL can match source MAC, destination MAC, source IP, destination IP and other information. ()

A.

True

B.

False

Full Access
Question # 274

The correct statement about the transport layer protocol is ()

A.

UDP is suitable for the transmission of delay-sensitive traffic, and can be reorganized according to the sequence number field in the message header

B.

Well-known port number range is 0-1023

C.

UDP uses the STNOACK flag to request and confirm the establishment of a connection

D.

The establishment of a TCP connection is a three-way handshake, and the termination of a TCP connection requires a four-way handshake.

Full Access
Question # 275

Basic ACL number value range ().

A.

2000-2999

B.

B. 1000-1999

C.

C. 3000-3999

D.

D. 4000-4999

Full Access
Question # 276

In a Layer 2 network with redundant links, which of the following protocols can be used to avoid loops? ()

A.

VRRP

B.

ARP

C.

UDP

D.

STP

Full Access
Question # 277

After FIT AP obtains AC.'s IP address, what is the first operation to perform? ()

A.

B. Upgrade software version

B.

Establish a CAPTAP tunnel

C.

D. Request configuration file

Full Access
Question # 278

During data access, when accessing different network segments, the destination MAC. Encapsulate the MAC address of the gateway on the source host

A.

True

B.

False

Full Access
Question # 279

The VlanIF IP addresses of the same switch cannot be the same. ()

A.

True

B.

False

Full Access
Question # 280

The subnet mask of a network segment 150.25.0.0 is 255.255.224.0, then () is a valid host address in this network segment. ()

A.

150.25.2.24

B.

B. 150.25.0.0

C.

C. 150.25.1.255

D.

D. 150.15.3.30

Full Access
Question # 281

Which of the following descriptions about firewalls is wrong? ()

A.

The firewall cannot network address translation

B.

C. Firewall can realize user identity authentication

C.

Firewall can realize access control between different networks

Full Access
Question # 282

VRP operating system commands are divided into four levels: access level, monitoring level, configuration level, and management level. Which level can run various business configurations and set commands but cannot operate the file system?

A.

Configuration level

B.

B. Access level

C.

C. Management level

D.

D. Monitoring level

Full Access
Question # 283

Which of the following statements about MPLS Labe1 labels is wrong? ()

A.

The label is encapsulated between the network layer and the transport layer

B.

The label is carried by the header of the message and does not contain the topologyinformation.

C.

The label is used to uniquely identify the forwarding equivalence class FEC to which a packet belongs

D.

The tag is a short identifier with a fixed length. It only has a local meaning

Full Access
Question # 284

VRP operating platform, which of the following commands can only view static routes? ()

A.

display ip routing-table protocol static

B.

B. display ip routing-table

C.

C. display ip routing-table verbose

D.

D. display ip routing-table statistics

Full Access
Question # 285

The broadcast address is a special address that all the host bits in the network address are set to, and it can also be used as a host address. ()

A.

True

B.

False

Full Access
Question # 286

The output information of the link aggregation port of a certain switch is as follows. If you want to delete Eth-Trunk1, which of the following commands is correct? ()

A.

undo interface Eth-trunk 1

B.

B. inte GigabitEthernet 0./0/2 Undo eth-trunk Quit Undo interface eth-trunk 1

C.

inte GigabitEthernet 0./0/1 Undo eth-trunk Quit inte GigabitEthernet0./0/2 Undo ethtrunk Quit

D.

D. inte GigabitEthernet 0./0/1 Undo eth-trunk Quit Undo interface eth-trunk 1

Full Access
Question # 287

The following statement about static routing is wrong ()

A.

Cannot automatically adapt to changes in network topology

B.

Manual configuration by network administrator

C.

Low system performance requirements

D.

Routers need to exchange routing information

Full Access
Question # 288

NAPT distinguishes the IP addresses of different users through the protocol numbers in TCP, UDP, or IP packets ()

A.

True

B.

False

Full Access
Question # 289

VRP operating system commands are divided into four levels: access level, monitoring level, configuration level, and management level. Which level can run various business configuration commands but cannot operate the file system? ()

A.

Configuration level

B.

B. Monitoring level

C.

C. Access level

D.

D. Management level

Full Access