Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

A.

TRUE

B.

FALSE

Full Access
Question # 5

The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.

A.

TRUE

B.

FALSE

Full Access
Question # 6

In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.

A.

TRUE

B.

FALSE

Full Access
Question # 7

A filter named si is configured on a device using the as-path-filter command and is applied to a specified BGP peer. The detailed configurations are as follows:

csharp

Copy

[SW1] ip as-path-filter si permit _65500$

[SW1] bgp 65100

[SW1-bgp] ipv4-family unicast

[SW1-bgp-af-ipv4] peer 10.1.1.2 as-path-filter si import

After the configuration is complete, which of the following statements is true about the way the local device processes the routes received from the peer?

A.

It accepts only the routes whose AS_Path contains AS 65500.

B.

It accepts only the routes originated from AS 65500.

C.

It accepts only the routes that last pass through AS 65500.

D.

It accepts only the routes forwarded by AS 65500.

Full Access
Question # 8

On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.

A.

TRUE

B.

FALSE

Full Access
Question # 9

Which of the following attribute must be carried in an Update message?

A.

Local-pref

B.

Prefval

C.

MED

D.

AS-Path

Full Access
Question # 10

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Full Access
Question # 11

An enterprise office network runs OSPF and is divided into multiple OSPF areas. Enterprise network engineers can configure route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

A.

TRUE

B.

FALSE

Full Access
Question # 12

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Full Access
Question # 13

Which of the following attacks is not the network layer attack?

A.

IP spoofing attack

B.

ICMP attack

C.

Smurf attack

D.

ARP spoofing attack

Full Access
Question # 14

BFD can quickly detect faults in channels at multiple network layers, ensuring high reliability. To which of the following layers does BFD belong?

A.

Application layer

B.

Data link layer

C.

Physical layer

D.

Network layer

Full Access
Question # 15

A Huawei firewall by default creates security zones named untrust, dmz, _________ and local. (Use Lowercase letters.)

Full Access
Question # 16

Which of the following statements regarding DR/BDR are false?

A.

In a broadcast network, DR and BDR must be elected. A broadcast network without a DR or BDR cannot operate normally.

B.

DR others listen on the multicast address 224.0.0.5.

C.

All DR others establish neighbor relationships with DR and BDR only.

D.

DR others listen on the network address 224.0.0.6.

Full Access
Question # 17

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

A.

TRUE

B.

FALSE

Full Access
Question # 18

Which of the following statement regarding the display ospf peer command output is true?

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Full Access
Question # 19

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Full Access
Question # 20

Which of the following is used as the destination port for single-hop BFD?

A.

UDP port 3784

B.

UDP port 4784

C.

TCP port 3784

D.

TCP port 4784

Full Access
Question # 21

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Full Access
Question # 22

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

A.

TRUE

B.

FALSE

Full Access
Question # 23

On an OSPF network, if a router receives an update of an LSA that exists in the local LSDB, the router updates the LSDB and floods the LSA.

A.

TRUE

B.

FALSE

Full Access
Question # 24

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Which of the following configurations are not mandatory when an administrator configures VRRP?

A.

Preemption mode

B.

Preemption delay

C.

Virtual router priority

D.

Virtual IP address

Full Access
Question # 26

On a broadcast IS-IS network, a DIS needs to be elected to create and update pseudonodes. Which of the following values is the default DIS priority of an IS-IS interface?

A.

200

B.

64

C.

1

D.

100

Full Access
Question # 27

IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?

A.

Group-Specific Query message

B.

Leave message

C.

Report message

D.

Specifying a multicast source

Full Access
Question # 28

In PIM-DM, which of the following processes are involved in SPT establishment?

A.

Prune

B.

Graft

C.

Flooding

D.

State-refresh

Full Access
Question # 29

In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

A.

TRUE

B.

FLASE

Full Access
Question # 30

On a broadcast IS-IS network shown in the following figure, a DIS needs to be elected to create and update pseudonodes. Which of the following routers is elected as the DIS?

A.

R1

B.

R3

C.

R4

D.

R2

Full Access
Question # 31

Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)

Full Access
Question # 32

When two BGP peers support different Hold Time, they will negotiate to support the shortest Hold Time interval they can support.

A.

TRUE

B.

FALSE

Full Access
Question # 33

On a P2P IS-IS network, after a neighbor relationship is established between R1 and R2, R2 finds that its LSDB is not synchronized. Then, R2 requests corresponding LSPs from R1 for LSDB synchronization. The following figure shows the synchronization process. Drag the following packet types to the steps in which they are used.(Token is reusable)

Full Access
Question # 34

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Full Access
Question # 35

As shown in the following figure, a new AP is deployed In dual link MSB networking (load balancing mode). Which AC will the connect to?

A.

AC1

B.

Random access

C.

None

D.

AC2

Full Access
Question # 36

A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?

A.

Voltage monitoring

B.

Temperature monitoring

C.

Fan control

D.

System power-on and power-off control

Full Access
Question # 37

On an STP network, only the designated port processes inferior BPDUs. On an RSTP network, a port with any role processes inferior BPDUs.

A.

TRUE

B.

FALSE

Full Access
Question # 38

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

A.

1

B.

128

C.

4096

D.

32768

Full Access
Question # 39

On a network, each router has a local core routing table and protocol routing tables. A routing entry in the local core routing table has multiple key fields. Which of the following are included?

A.

Destination address of a route

B.

Routing protocol preference of a route

C.

Inbound interface that learns a route

D.

Routing protocol that learns a route

Full Access
Question # 40

Which of the following protocols are multi-channel protocols?

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Full Access
Question # 41

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

A.

TRUE

B.

FALSE

Full Access
Question # 42

iMaster NCE-Campus can be used as an authentication server on a WLAN to authenticate STAs.

A.

TRUE

B.

FALSE

Full Access
Question # 43

On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?

A.

Point-to-point

B.

NBMA

C.

P2MP

D.

Broadcast

Full Access
Question # 44

Which of the following statements regarding OSPF is true?

A.

OSPF does not have an acknowledgement mechanism. Therefore, OSPF relies on the upper-layer protocol, TCP, for acknowledgement.

B.

OSPF performs LSDB update every 30 minutes.

C.

OSPF uses the Bellman-Ford algorithm, and each router independently runs this algorithm.

D.

OSPF floods a LSU packet at an interval of 5s.

Full Access
Question # 45

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value of greater-equal-value is ____, and the value of less-equal-value is ____.

Full Access
Question # 46

Which of the following statements regarding multicast MAC addresses are false?

A.

One multicast MAC address maps to 32 multicast IP addresses.

B.

One multicast MAC address maps to only one multicast IP address.

C.

The high 24 bits of the multicast MAC address are 0x01005E, the 25th bit is fixed to 1, and the lower 23 bits of the MAC address map to the lower 23 bits of the multicast IP address.

D.

A multicast MAC address identifies receivers of a multicast group on the data link layer.

Full Access
Question # 47

OSPF networks are classified into four types of networks by link layer protocol. Drag the following link layer protocols to the corresponding network types.(Token is reusable)

Full Access
Question # 48

After HSB is configured, the HSB channel fails to be established and cannot back up information on the active device to the standby device. What are the possible causes for this HSB function failure?

A.

The TCP channel is not established.

B.

The retransmission count and interval for HSB service packets are different on the two devices.

C.

The two ACs have the same priority.

D.

The source IP address and port number of the local end are different from the destination IP address and port number of the remote end.

Full Access
Question # 49

L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.

A.

TRUE

B.

FALSE

Full Access
Question # 50

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Full Access
Question # 51

On an office network of an enterprise, OSPF is enabled on two directly connected routers. During adjacency establishment, the state machine stays in the 2-way state. Which of the following statements are not possible causes?

A.

Hello time values are different.

B.

Area IDs are different.

C.

Router IDs conflict.

D.

The N-bit and E-bit of Hello packets are the same.

Full Access
Question # 52

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

A.

TRUE

B.

FALSE

Full Access
Question # 53

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Full Access
Question # 54

On an OSPF network, if two routers with the same router ID run in different areas and one of the routers is an ASBR, LSA flapping occurs.

A.

TRUE

B.

FALSE

Full Access
Question # 55

Which of the following statements about WLAN roaming are false?

A.

APs with which a STA is associated before and after roaming can work on different channels.

B.

During roaming, the STA sends a Reassociation Request frame containing home AP information to the foreign AP.

C.

During roaming, the STA sends an Association Request frame containing home AP information to the foreign AP.

D.

APs with which a STA is associated before and after roaming must work on the same channel.

Full Access
Question # 56

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Full Access
Question # 57

BFD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?

A.

4784

B.

3784

C.

5784

D.

2784

Full Access
Question # 58

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

A.

232.0.0.0 to 232.255.255.255

B.

239.0.0.0 to 239.255.255.255

C.

224.0.0.0 to 224.0.0.255

D.

224.0.1.0 to 231.255.255.255

Full Access
Question # 59

BGP is generally applied to complex networks where routes change frequently. Frequent route flapping consumes a large number of bandwidth and CPU resources, and even affects the normal operation of the network. This is an unavoidable problem that cannot be solved in BGP.

A.

TRUE

B.

FALSE

Full Access
Question # 60

An enterprise administrator configures route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.

A.

TRUE

B.

FALSE

Full Access
Question # 61

BGP is a distance-vector protocol that implements route reachability between ASs and selects optimal routes. Which of the following statements are true about this protocol?

A.

BGP does not support authentication. Therefore, it cannot ensure network security.

B.

BGP uses TCP as the transport layer protocol.

C.

BGP provides various routing policies.

D.

BGP supports automatic peer discovery.

Full Access
Question # 62

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Full Access
Question # 63

Which of the following statements regarding OSPF multi-instance is false?

A.

Route exchange between different OSPF processes is similar to route exchange between different routing protocols.

B.

An interface of a router belongs to only a certain OSPF process.

C.

The OSPF process IDs must be the same when OSPF neighbor relationships are established between different routers.

D.

Multiple OSPF processes can run on the same router, and they are independent of each other.

Full Access
Question # 64

When configuring an ACL on a router, you can specify a unique number or name to identify the ACL. Once a named ACL is created, it cannot be modified. You can only delete the named ACL and reconfigure it.

A.

TRUE

B.

FALSE

Full Access
Question # 65

See the network shown in the following figure.

R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?

A.

The routing table of R1 contains the route 10.0.2.3/32.

B.

The routing table of R1 does not contain the route 10.0.2.3/32.

C.

The routing table of R1 does not contain the routes 10.0.2.2/32 and 10.0.2.3/32.

D.

The routing table of R1 contains the route 10.0.2.2/32.

Full Access
Question # 66

OSPF has multiple types of routes with varying priorities. Which of the following types of routes has the lowest priority when they have the same prefix?

A.

Type 1 external route

B.

Inter-area route

C.

Type 2 external route

D.

Intra-area route

Full Access
Question # 67

On an OSPF network, an algorithm is used to prevent loops within an area, but loops may occur between areas. Therefore, OSPF defines a loop prevention mechanism for inter-area routes. Which of the following statements are true about the loop prevention mechanism?

A.

Inter-area routes cannot be directly transmitted between non-backbone areas.

B.

All non-backbone areas must be directly connected to area 0.

C.

Inter-area routes need to be forwarded through area 0.

D.

An ABR cannot inject Type 3 LSAs that describe routes to a network segment in an area back to the same area.

Full Access
Question # 68

IGMP group entries play an important role in multicast forwarding. An administrator runs a command to view information about a multicast entry. The information is as follows:

sql

Copy

display igmp group

Interface group report information

Vlanif100(10.1.6.2):

Total 1 IGMP Group reported

Group Address Last Reporter Uptime Expires

225.1.1.2 10.1.6.10 00:02:04 00:01:17

Given this, which of the following statements are true?

A.

This entry can be used to construct the corresponding (S, G) entry.

B.

This entry is created when the device receives an IGMP Join message from a user.

C.

Expires indicates the aging time of the IGMP group.

D.

225.1.1.2 is the address of the group that the user joins.

Full Access
Question # 69

Multicast applies to any point-to-multipoint data transmission. Which of the following types of application data can be forwarded in multicast mode?

A.

Real-time audio conferencing

B.

Livestreaming

C.

Network TV

D.

Data warehouse

Full Access
Question # 70

ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?

A.

If the firewall security policy permits packets to pass, the session table is created.

B.

By default, when status detection is disabled and the permit policy is configured packets can pass.

C.

Packets must pass the firewall, and a session table is established.

D.

If the firewall security policy permits packets to pass, the packets can pass the firewall.

Full Access
Question # 71

To enable PC1 to access PC2 using the IP address of the firewall's GE0/0/2, you need to configure NAPT for source address translation. In the following figure, fill in the blank to complete the command.

Full Access
Question # 72

An ACL can be used to match routes or data, but cannot be used to match both the IP address prefix length and mask length.

A.

TRUE

B.

FALSE

Full Access
Question # 73

Which of the following statements regarding the summary automatic command and BGP route summarization is false?

A.

After this command is configured, BGP sends only the summarized routes to peers

B.

This command is used to implement automatic summarization. Automatic summarization takes precedence over manual summarization

C.

This command enables automatic summarization for the locally imported routes

D.

After this command is configured, BGP summarizes routes based on natural network segments

Full Access
Question # 74

OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.

A.

TRUE

B.

FALSE

Full Access
Question # 75

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Full Access
Question # 76

A campus network uses OSPF for network communication. The display ospf peer command is run on a router, and the command output is as follows:

vbnet

Copy

Edit

display ospf peer

OSPF Process 1 with Router ID 10.0.2.2

Area 0.0.0.0 interface 10.0.235.2 (GigabitEthernet0/0/1)'s neighbors

Router ID: 10.0.5.5 Address: 10.0.235.5

State: Full Mode: Nbr is Master Priority: 1

DR: 10.0.235.5 BDR: 10.0.235.3 MTU: 0

Dead timer due in 40 sec

Area 0.0.0.0 interface 10.0.24.2 (Serial1/0/1)'s neighbors

Router ID: 10.0.4.4 Address: 10.0.24.4

State: Full Mode: Nbr is Master Priority: 1

DR: None BDR: None MTU: 0

Dead timer due in 35 sec

Which of the following statements are true about the device?

A.

The IP address of the DR on the network where R2 and its neighbor 10.0.5.5 reside is 10.0.235.5.

B.

R2 has established adjacencies with 10.0.5.5 and 10.0.4.4.

C.

The DR/BDR election fails on the network where R2 and its neighbor 10.0.4.4 reside.

D.

Router IDs of the two OSPF neighbors of R2 are 10.0.5.5 and 10.0.4.4.

Full Access
Question # 77

Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.

A.

TRUE

B.

FALSE

Full Access
Question # 78

Link aggregation is a common network technology. Which of the following are advantages of link aggregation?

A.

Load balancing

B.

Improved reliability

C.

Increased link bandwidth

D.

Route backup

Full Access
Question # 79

In IPv6, to communicate with a destination host, a host must obtain the link-layer address of the destination host through ARP.

A.

TRUE

B.

FALSE

Full Access