Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

On a BGP/MPLS IP VPN network, which of the following are carried when a PE advertises VPNv4 routes?

A.

IPv4 prefix

B.

RD

C.

Export target

D.

Import target

Full Access
Question # 5

Which of the following reasons may cause the hosts in the same VLAN of the LAN to fail to communicate with each other?

A.

switchMA, Caddress learning errors

B.

interface is artificialshutdownor the physical interface is damaged

C.

The wrong port is configured on the switch andMA, Caddress binding

D.

Port isolation is configured on the switch

Full Access
Question # 6

In the process of viewing the debug output through the SSH terminal, a lot of information pops up. Which of the following operations can

Make the Moni tor terminal no longer pop up debug messages?

A.

exit currentMonitorinterface redesignSSHLog in to the device to open a new oneMonitorinterface

B.

Open Notepad and enterundo debugging a 11,Copy the command line and paste it intoMonitorinterface

C.

Open Notepad$SLIAundo terminal monitor,Copy the command line and paste it intoMonitorinterface

D.

open notepad inputundo terminal debugging,Copy the command line and paste it intoMonitorinterface

Full Access
Question # 7

A campus has deployed IPv6 for service testing. There are 4 routers in the network, running 0SPFv3 to implement IPv6 network interconnection. As shown in the figure, an engineer checked the LSDB of R2 and intercepted one of the Link-LSAs. Which of the following statements is true about the description of this LSA?

A.

The router that generates this LSA is R2 port R2 connected

B.

IPv6 address prefix for GEO/0/0: 2001:DB8:2345:23::/64

C.

The link-local address of R2 interface GEO/0/0 is: FE80::2E0:FCFF:FEC, D:4F79

D.

The SA shows 2 does not support external routing, but participates in IPv6 routing calculation

Full Access
Question # 8

On the network shown in the figure, EBGP peer relationships are established between neighboring routers through directly connected interfaces. The router ID of each router is 10.0.X.X, and the AS number is 6500X, where X is the number of the router. Both Rl and R4 have static routes to 192.168.1.0/24, which are imported to BGP through the import-route command. R3 is configured with the peer y.y.y.y as-path-filter 1 import command for all peers. Which of the following sets of commands enables R3 to select the route with the longest AS_Path to 192.168.1.0/24?

A.

jp as-path-filter 1 deny .*6500 ip as-path-filter 1 permit .*

B.

ip as-path-filter 1 deny A65002 ip as-path-filter 1 deny A65005 ip as-path-filter 1 permit .*

C.

ip as-path-filter 1 permit .* ip as-path-filter 1 deny 65001s ip as-path-filter 1 deny A65005

D.

ip as-path-filter 1 deny 65001s ip as-path-filter 1 permit .*

Full Access
Question # 9

In PLSVPN, in order to distinguish IPv4 prefixes that use the same address space, the value of R0 is added to the IPv4 address. The correct description of the following options is:

A.

On a PE device, each VP instance corresponds to a value of 0. On the same PE device, the RD value must be unique.____, ____, ____.

B.

RD can be used to control the publication of 1 routing information

C.

RD is encapsulated in Update message as BGP extended community attribute during delivery

D.

After the PE receives the IPv4 route from the CE, it adds RD to the IPv4 route to convert it into a globally unique VPN-IPv4 route, and publishes it on the public network

Full Access
Question # 10

What is the meaning of ipv6 enable topology ipv6 in IS-IS protocol view?

A.

SPFCalculated atIPv4,IPv6in the topology of the

B.

has no meaning

C.

not supportIPv6ofSPFcalculate

D.

IPv4,IPv6use the same topologySPFcalculate

Full Access
Question # 11

The traditional BGP 4 can only manage IPv4 single routing information. In order to provide support for a variety of network layer protocols, MP-BGP extends BGP-4. MP-BGP uses address families to distinguish different network layer protocols. Which of the following address families are currently supported?

A.

BGP-VPNv4address family

B.

BGP-IPV6Unicast address family

C.

BGP-IPV4broadcast address family

D.

BGP-MPexampleIPv6address family

Full Access
Question # 12

After the cutover is completeD. it is generally necessary to check the following items?

A.

Software version

B.

physical topology

C.

data flow

D.

control plane entry

Full Access
Question # 13

On the OSPFv3 network shown in the figure, area 1 is a stub area. Which of the following statements are true?

A.

Default routes exist in the routing tables of R1 and R2.

B.

Both R1 and R2 generate Network-LSAs.

C.

Both R1 and R2 generate Inter-Area-Prefix-LSAs.

D.

Both R1 and R2 generate Intra-Area-Prefix-LSAs.

Full Access
Question # 14

Which of the following statements about IPSG is false?

A.

IPSGcan preventIPaddress spoofing attack

B.

IPSGis a source based on a three-layer interfaceIPaddress filtering technology

C.

IPSGcan be turned onIPPacket inspection alarm function, linked with the network management to alarm

D.

able to passIPSGPrevent the host from changing privatelyIPaddress

Full Access
Question # 15

According to this picture, we can judge that R4 is on?

A.

1 default route

B.

2 equal-cost default routes

C.

2 default routes with different costs

D.

4 equivalent default routes

Full Access
Question # 16

multiple equal-cost routes may appear. About the IS-IS network , which of the following descriptions is false?

A.

When the number of equal-cost routes in the network is greater than the number configured by commands, and these routes have the same priority, the next-hop device is preferredSystem IDLarge routes for load balancing

B.

If load sharing is configureD. the traffic will be evenly distributed to each link

C.

After configuring equal-cost route priorityJS-ISWhen the device forwards the traffic reaching the destination network segment, it will not adopt the load balancing methoD. but forward the traffic to the next hop with the highest priority

D.

For each route in the equal-cost route, a priority can be specifieD. and the route with higher priority will be preferred. the rest as backup routes

Full Access
Question # 17

On the OSPF network shown in the figure, area 1 is a stub area, area 2 is a totally stub area, and area 3 is an NSSA. Which of the following LSAs does not exist in areas 1, 2, and 3?

A.

Type 2

B.

Type 4

C.

Type 1

D.

Type 3

Full Access
Question # 18

BGP allows you to use the filter-policy acl-number import command to filter received routes. The value of ad-number ranges from 2000 to 3999.

O TRUE

O FALSE

Full Access
Question # 19

Configured on an interface: isis timer hello 5 level-2, which of the following statements is correct?

A.

the interfaceLevel-2ofhelloThe packet sending interval is5s

B.

the interfaceLevel-1andLeva 1-2ofhell. The packet sending interval is3s

C.

the interfaceLevel-2ofCSNPThe packet sending interval

Full Access
Question # 20

Please pair the following DHCP attack types with corresponding explanations.

A.

DHCPstarvation attack-3 DHCPPhishing attack man-in-the-middle attack-2 DHCPPacket flood attack-4

B.

DHCPstarvation attack-2 DHCPPhishing attack-3man-in-the-middle attack-1 DHCPPacket flood attack-4

C.

DHCPstarvation attack-1 DHCPPhishing attack-3man-in-the-middle attack-2 DHCPPacket flood attack-4

D.

DHCPstarvation attack-4 DHCPPhishing attack-3man-in-the-middle attack-2 DHCPPacket flood attack-1

Full Access
Question # 21

In an MPLS domain, LSR can be divided into Ingress LSR, Transit LSR and Egress LSR according to the different processing methods of LSRs for data. For the same FEC. a certain LSR can be the Ingress LSR of the FEC or the Transit LSR of the FEC. LSRO

A.

True

B.

False

Full Access
Question # 22

The IS-IS Level-1 neighbor relationship between R3 and R4 is not established. According to the information in this figure_What is the possible reason?

A.

R3andR4the interconnect interfacecircuit-typeMismatch

B.

R3andR4different area codes

C.

R3andR4ofIS-LevelMismatch

D.

R3andR1ofIIHAuthentication failed

Full Access
Question # 23

As shown in the figure, private network routing information is exchanged between PE1 and PE2 and their respective CEs through OSPF, and the same DomainlD is set on both PE1 and PE2. When routes are imported from BGP to OSPF on PE2, it is possible that Which of the following types of SAs are passed to CE2?

A.

Typel LSA

B.

Type3 LSA

C.

Type7 LSA

D.

Type5 LSA

Full Access
Question # 24

Configuring DHCP Snooping can be used to prevent imitator attacks, so the configuration process needs to include the following

What are the steps?

A.

enable globalDHCP SnoopingFunction

B.

enable globalDHCPFunction

C.

Configure Interface Trust Status

D.

enable interface orVLANofDHCP SnoopingFunction

Full Access
Question # 25

On the ISIS network shown in the figure, R1 imports a default route using the default-route-advertise always level-1 command. In this case, R3 can learn this default route through IS-IS.

A.

TRUE

B.

FALSE

Full Access
Question # 26

R1 executes the operation ping -a lO.l.Ll 10.5.16.2, what is the meaning of this command?

A.

pingpackage sourceIPaddress isR1any direct interface address of

B.

pingpackage sourceIFPaddress isR1direction10.5.16.2the optimalIPThe outgoing interface address of the route, and is not

10.1.1.1

C.

pingpackage sourceIPaddress is10.1.1.1

D.

pingPurpose of the packageIPaddress is10.1.1.1and10.5.16.2

Full Access
Question # 27

Please match the command with the function implemented.

A.

display device-® Display version-® Display memory-usage-® Display cpu-usage-③

B.

display device-® Display version-® Display memory-usage-® Display cpu-usage-④

C.

display device-® Display version-® Display memory-usage-® Display cpu-usage-④

D.

display device-® Display version-® Display memory-usage-® Display cpu-usage-④

Full Access
Question # 28

On the OSPF network shown in the figure, the cost values of links are marked, and OSPF IP FRR is enabled on R1. Which of the following statements are true?

A.

No backup path can be established between R1 and 10.0.3.3/32.

B.

If SI is powered off, R1 directly uses the backup path to forward packets to R3.

C.

If BFD (with default detection parameters) is enabled on the entire network and the link between R2 and SI is disconnected, R1 can quickly detect the OSPF adjacency fault.

D.

If the link between R1 and SI is disconnected, R1 directly uses the backup path to forward packets to R3.

Full Access
Question # 29

There is the concept of forwarding equivalence class FEC in MPLS. The following description is wrong:

A.

MPLSGrouping packets with the same forwarding processing method is calledFEC

B.

a forwarding equivalence classFECA unique label value is assigned on all routers

C.

sameFECgrouped inMPLSThere will be different processing in the network

D.

FECThe division is very flexible. Can be the source address, and the address, source port, destination port, protocol type or

VPNEqual to any combination of division basis

Full Access
Question # 30

A company consists of a head office and two branch offices, and uses MPLS VPN technology to transmit private network routes. In the networking mode of HuB&Spoke. Branches can only send and receive routes to and from the head office, and branches cannot directly send and receive routes to each other. In order to achieve the above requirements, which of the following schemes can the setting of RT be?

A.

head office:Import Target 12:3; Export Targetr 3:12OBranchl:Import Target,3:12;Export Target 12:3OBranch2:Import Target: 3:12: Export Target: 12:3

B.

head officeImport Target:l:l;Export Target: 3:3OBranchl:Import

Targeta:3:3;Export Target: l:loBranch2:Import Target: 3:3; Export Target:2:2

C.

head office:Import Target 1:1, 2:2;Export Target: 3:3OBranchl:Import Target:3:3;

Export Target: l:loBranch2:ImportTarget:3:3; Export Target:2:2

D.

head office:Import Target: 2:2;Export Target:3:3oBranchl:Import Target:

3:3.Export Target: l:loBranch2:ImportTarget: 3:3; Export Target.2:2

Full Access
Question # 31

Which of the following information can the DHCP binding table contain?

A.

port andUDPport

B.

MA, Caddress

C.

IPaddress

D.

lease time

Full Access
Question # 32

the configuration file of the device. Is the following statement D wrong?

A.

Regardless of whether the device is configured with apricotBPDU Tunnel,neither will be correctMSTPmake an impact

B.

Port connected to user terminal equipmentMSTPWhether it is disabled or configured as an edge port

C.

Check port configuration to confirm enableMSTPWhether the port is enabled with the protocol packet sending command. Such as:bpdu enable

D.

Check if the port is added to the correct oneWLAN

Full Access
Question # 33

Which statement about DHCP Snooping is wrong?

A.

DHCP SnoopingYou can prevent illegal attacks by setting trusted ports (all interfaces are untrusted by default.

mouth)

B.

Global enableDHCP Snoopingfunction, without any post-parameters, the device only processes by default

DHCPv4message

C.

Enable in interface viewDHCP Snoopingfunction, then all theDHCPThe message command function takes effect

D.

existVLANEnable in viewDHCP Snoopingfunction, then all interfaces of the device receive data belonging to thisVLANofDHCPThe message command function takes effect

Full Access
Question # 34

As shown in the figure, OSPF is deployed in a campus, and Area 1 is deployed as an NSSA area. In the case of missing header, R2 will automatically generate a missing header route of Type 7 LSA and flood it in the NSSA area

A.

True

B.

False

Full Access
Question # 35

Can Huawei equipment perform traffic suppression for Mingbi packets?

A.

Unknown unicast

B.

known unicast

C.

multicast

D.

broadcast

Full Access
Question # 36

Which of the following statements about LDP Label Retention - Free Way is true:

A.

Requires more memory and tab space

B.

Keep all labels distributed by neighbors

C.

Only keep labels from next-hop neighbors and discard all labels from next-hop neighbors

D.

Save memory and label space

Full Access
Question # 37

aboutOSPFWhich of the following statements is false?

A.

For a pair of additional 0hers on an Ethernet link, it is normal to stop clearing in the 2-72 state

B.

Stalling in ExStart state may be a bad match between neighbor routers

C.

stagnantINThe it state indicates that the router has received the neighbor'sHello message. butHell messagedoes not include this routerOSPF Router ID

D.

The two router databases are synchronized, SPFAn error occurred in the calculation, it must be because of the RouterID repeated

Full Access
Question # 38

The ORF function of BGP can control the routing entries sent by neighbors. In order to achieve this purpose, the BGP router will send the list of routes to be filtered to the neighbors. Which tool is generally used to send the list to the neighbors?

A.

A, CL

B.

Filter-Policy

C.

IP Prefix List

D.

Route-Policy

Full Access
Question # 39

A campus deploys OSPF to implement network interworking. The LSDB of R2 is shown in the figure. From this LSDB. it is possible to

What information was obtained?

A.

ArealNone inType3 LSA. maybeR2in the area1In the correct directiontype3 LSAfiltered

B.

Area 1forNSSAarea

C.

R2WillType7 LSAThe default route is converted toType5 LSAdefault route for

D.

R2existOSPFThe default route is delivered in the process

Full Access
Question # 40

The figure shows the LSP information of R1 and R3 on an MPLS network. An administrator runs the ping -a 1.1.1.1 3.3.3.3 command on R1. Given this, which of the following statements is true?

A.

The Echo Request packet received by R2 carries label 1025, and the Echo Reply packet received by R2 does not carry any label.

B.

The Echo Request packet received by R2 carries label 1025, and the Echo Reply packet received by R2 carries label 1024.

C.

Both the Echo Request and Echo Reply packets received by R2 do not carry any label.

D.

The Echo Request packet received by R2 does not carry any label, and the Echo Reply packet received by R2 carries label 1024.

Full Access
Question # 41

In BGP/MPLS IP VPN, the 0SPF multi-instance process uses the DN bit to prevent Type5 LSA loops.

A.

True

B.

False

Full Access
Question # 42

IGP converges faster than BGP, which may cause network traffic loss. By enabling the OSPF and BGP linkage feature of the device, the device can keep the OSPF and BGP linkage during the set linkage time.____The router makes the link metric value in the LSA advertised to be the maximum value, so as to inform other OSPF devices not to use this router to forward data, so as to avoid traffic loss. (Note: If English letters are involved, all uppercase)

Full Access
Question # 43

As shown in the figure, an engineer uses 4 routers to test branch network interoperability. Among them, R1, R2, and R3 in branch 1 deploy OSPF to implement network interoperability. R2, R3, and R4 in branch 2 deploy IS-S to implement network interoperability. Now the engineer wants to implement R1 to access the loopback interface address of R4. Which of the following operations can meet this requirement?

A.

existR2ofOSFFprocess neutralizationIS-ISDuring the process, the default route is advertised separately

B.

No configuration required

C.

only atR2ofIS-ISDuring the process, the default route is advertised

D.

only atR2ofOSPFDuring the process, the default route is advertised

Full Access
Question # 44

When deploying MPLS/BGP IP VPN, which of the following descriptions is wrong about using BGP to exchange routing information between PEs and CEs?

A.

existCEIn the case of multi-homing, enableBGP ASThe number substitution function may cause routing loops that can be passed throughBGP SoDpreventVPNIntra-site routing loops

B.

whenPEandCEbetweenBGPWhen exchanging routing information, if twoVPNThe autonomous system the site is in uses the same privateASnumber, can be passed throughASThe number replacement function is to use any specifiedASreplace the received private network route with theASnumber to preventASRoutes are discarded due to duplicate numbers

C.

existHub&Spokescene, whenHub-CEandHub-PEuseIGPTimeSpoke-PEandSpake-CEcannot makeEBGP

D.

whenPEandCEbetweenBGPWhen exchanging routing information, you do not need toPEPerform private network route import on theBGPoperation

Full Access
Question # 45

Since BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors.

The routing policy deployed between IBGP neighbors is invalid.

A.

True

B.

False

Full Access
Question # 46

Which of the following are advantages of VLAN aggregation?

A.

decreasedIPwaste of address

B.

added availableM LANquantity

C.

Increased addressing flexibility

D.

accomplishSub-VLANIsolation between broadcast domains

Full Access
Question # 47

As shown in the figure, there is a packet containing a three-layer label header. Please select the values ​​(decimal) corresponding to the x, and Z fields in the figure.

Full Access
Question # 48

According to this figure, it can be known that in VLAN 300, from 17:22:38 to 17:22.44,00e0-fc3d-3bdB. 0 MA, C flaps occurred on 2020-06-04.

A.

5

B.

65535

C.

300

D.

1

Full Access
Question # 49

During the test phase of the cutover, the criteria to indicate that the test has been completed are:

A.

IPThe configuration view result of the device is normal as the standard

B.

Test that the network service is normal as the standard

C.

The upper-layer application service test carried by the network is normal as the standard

D, check that the network is running normally as a standard

Full Access
Question # 50

Which of the following statements is false when troubleshooting the dual-active failure of a VRRP backup group?

A.

No need to check deliveryVRRPWhether the switch port of the advertisement message is in the sameVLAN

B.

need to check the interfaceVRRPGroupIDIs it the same

C.

Interface needs to be checkedIPWhether the address is in the same network segment

D.

need to checkVRRPgroup of virtualIPIs the address the same

Full Access
Question # 51

About the difference between NSR and NSF, which is correct?

A.

NSFCan be done without neighbor routers

B.

NSRMust rely on neighbor routers to complete

C.

NSFMust rely on neighbor routers to complete

D.

NSRandNSFBy6Requires neighbor router to complete

Full Access
Question # 52

What is the meaning of display current-configuration I include vlan command?

A.

View eachVLANphysical interface information bound to the

B.

See what's currently createdVLAN

C.

CheckVLANIFinterfaceIPaddress

D.

View all included"VLAN"Configuration of keywords

Full Access
Question # 53

An administrator runs the display mpls Isp command to view LSPs on a device. The command output is shown in the figure. Which of the following statements are true?

A.

Traffic sent from GEO/0/1 of the device to 3.3.3.3 does not carry any label.

B.

For the traffic destined for 3.3.3.3, the device is the penultimate transit device.

C.

For the traffic destined for 1.1.1.1, the device is the last hop, that is, the egress device.

D.

Traffic sent from GE0/0/0 of the device to 1.1.1.1 carries label 1026.

Full Access
Question # 54

Which of the following descriptions is correct about configuring static LSPs in MPLS networks?

A.

when a certainLSRforEgress LSR, you only need to configureIn Label,The range is16-1023

B.

when a certainLSRforTransit LSR, you need to configureIn LabelandOut labeljn LabelThe range is16~1023,Out LabelThe range is16~1048575

C.

when a certainLSRforTransit LSRneed to be configured at the same timeIn LabelandOut Label,The range is16-1023

D.

when a certainLSRforIngress LSR, just configureOut Label,The range is16~1048575

Full Access
Question # 55

An engineer uses two routers to test IPv6 services, and simulates the headquarters and branches by running BGP4+

of interconnection. As shown in the figure, an engineer captures packets to view the update packets sent by R1. About this message 

Description of information, which of the following statements is correct

A.

The next hop address of the route described in this packet is:2001:db8::2345:l.:l

B.

This message describes the current revocationIPv6routing

C.

the route described in this packet may be throughimportbow

Full Access
Question # 56

MPLS can carry multiple network protocol services, including unicast IPv4 services, multicast IPv4 services, unicast IPv6 services, and multicast IPv6 services.

A.

TRUE

B.

FALSE

Full Access
Question # 57

From this picture, we can judge

A.

R1Zone authentication is configured

B.

R1The device type isLevel-1

C.

R1The device type isLevel-2

D.

R1Routing domain authentication is set

Full Access
Question # 58

Which of the following are static information coke analysis?

A.

Interface Type

B.

Packet loss rate

C.

License

D.

Equipment type

Full Access
Question # 59

From this figure, it can be known that

A.

R1access172.17.1.5There is a loop

B.

R1have access172.17.1 5routing

C.

R1no access172.17.1.5routing

D.

R1access172.17.1.5There is no problem with the path

Full Access
Question # 60

About the difference between NSR and NSF, which is correct?

A.

NSF must rely on neighbor routers to complete

B.

Both NSR and NSP require neighbor routers to complete

C.

NSR must rely on neighbor routers to complete

Full Access
Question # 61

On the network shown in the figure, the DHCP server function is enabled on GEO/0/0 of R2, and the address pool is an interface address pool. When GEO/0/0 and GEO/0/1 of R1 function as DHCP clients, only one interface can obtain an IP address by default.

A.

TRUE

B.

FALSE

Full Access
Question # 62

A company purchased private lines from two operators. In order to optimize the lines, the company used the 6GP protocol to learn from two

Route entries that operate off. However, after the enterprise found that this configuration, the traffic of the port route increased greatly, and the network engineering arrangement

After investigation, it was found that the traffic of the two operators was passed to each other through the enterprise egress router. Therefore, the enterprise intends to use the routing strategy so that the traffic of the packets of different carriers is no longer passed to each other. Is the configuration in the following figure correct?

A.

True

B.

False

Full Access
Question # 63

The rules of RR advertising routes violate the rules of IBGP split horizon, so it may cause loops in the AS

road. Which routing attributes does RR use to prevent loops?

A.

Cluster List

B.

Originator ID

C.

Nexthop

D.

AS-PATH

Full Access
Question # 64

As shown below:

A.

in the pictureLSAis generated by this router

B.

ShouldLSAThe described destination network is10.0.23.0/24

C.

ShouldLSAis of typeAS-extermal-LSA

D.

This device isA, BR

Full Access
Question # 65

LDP messages are exchanged between LSRs running the LDP protocol. LDP messages can be divided into four types according to their functions. Which of the following is not a message type of LDP?

A.

discovery message

B.

announcement message

C.

conversation message

D.

label exchange message

Full Access
Question # 66

A network engineer provides a troubleshooting report after rectifying a fault. The actual network is simplified into the one shown in the figure, where R1 and R2 both have OSPF enabled, and function as the gateways of PCI and PC2, respectively. Given this, which of the following statements is false?

A.

The OSPF routing table of R1 contains a route to 192.168.1.0/24.

B.

The router LSA generated by R1 contains information with the link ID being 192.168.1.0.

C.

R1 cannot ping 192.168.1.2.

D.

PC1 and PC2 cannot ping each other.

Full Access
Question # 67

According to this picture, cooked I'] can be judged?

A.

R1ofGE0/0/1Interface is not enabledIS-IS IPv6

B.

R1ofGE0/0/1interfaceIS-ISThe interface type isLeve-1

C.

R1ofGEO/O/OinterfaceIS-ISThe interface type isLevel-1-2

D.

R1ofGEO/O/Ointerface is enabledIS-IS IPv6

Full Access
Question # 68

Which of the following options is incorrect:

A.

Created by assigning labels staticallyLSPIt can also be dynamically adjusted according to changes in network topology, without administrator intervention.

pre

B.

The principle to be followed when manually assigning labels is: the value of the outgoing label of the upstream node is the value of the incoming label of the downstream node

C.

LSPstaticLSPand dynamicLSPtwo kinds. staticLSPManual configuration by administrator, dynamicLSPthen use

Dynamic establishment of label protocol

D.

dynamicLSPDynamically established through the label publishing protocol, such asMP-BGP, RSVP-TE, LDP

Full Access
Question # 69

The figure shows the debugging information on an OSPF router. Which of the following is the router ID of this router?

A.

10.0.2.2

B.

10.0.12.2

C.

10.0.12.1

D.

10.0.1.1

Full Access
Question # 70

During an attempt to log in to a NetEngine AR6120 through the console port, the network engineer finds that the password is incorrect and the login fails. If a Telnet account can be used to log in to the device and the account has the permission to change the console port password, the network engineer can log in to the device through Telnet to change the console port password.

A.

TRUE

B.

FALSE

Full Access
Question # 71

Which of the following reasons may cause the hosts in the same--VLAN LAN to fail to communicate with each other

A.

port isolation is configured on the switch

B.

the wrong port is configured on the machine, andMA, Caddress binding

C.

interface is artificialshutdownor the physical interface is damaged

D.

switchMA, Caddress learning errors

Full Access
Question # 72

OSPFV2 is an IGP running on an IPv4 network; OSPFV3 is an IGPo running on an IPv6 network. The basic working mechanism of OSPFv3 is the same as that of OSPFV2, such as the election of DR and B, DR. As shown in the figure, an engineer uses 3 routers to test IPv6 services. He wants to realize the interconnection of IPv6 networks by running OSPFV3.

Pass. Which of the following statements about the election of the network DR is correct?

A.

After the network converges, engineers modifyR1the priority is100,R2the priority is10,R3Keep the default value. When the network converges again,R1forDR, R2forB, DR

B.

After the network converges, a new device is added to the broadcast linkR4,R4the priority is150. When the network converges again,R4forDR

C.

After the network convergesR1Power off and restart, when the network converges again,R3forDR

D.

After the network converges,R1forDR

Full Access
Question # 73

When configuring the DHCP Relay function on the device, the VLAN ANIF interface of the relay connection client must be bound with a DHCP server group, and the IP address of the proxy DHCP server must be configured in the bound DHCP server group.

A.

True

B.

False

Full Access
Question # 74

After a fault occurs, you need to collect and back up various types of fault information in time as a reference for troubleshooting. In addition, when seeking emergency assistance from Huawei Technologies Co., Ltd.

A.

True

B.

False

Full Access
Question # 75

As shown in the figure, all interfaces of the router enable DSPF. The cost value of the link is marked in the figure. R2

The LoopbackD interface is advertised in area 1, then the cost of R1 reaching 10.2/32 is? 

A.

200

B.

150

C.

50

D.

100

Full Access
Question # 76

In the multi-level RR scenario, a large number of secondary RRs will be connected to the primary RR, which may lead to BGP of the primary RR. The routing table overflows, what method can be used to reduce the risk of overflowing the routing table of the advanced RR BGP?

A.

ORF

B.

route aggregation

C.

routing control

D.

set the sameCluster-ID

Full Access
Question # 77

SFFv2 is an IGP running on an IPv4 network: 0SPFV3 is an IGP running on an IPv6 network. Compared with 0SPFV2, SPFV3 has a similar LSA type, but has slightly different functions. Which of the following is not included in the LSA type of 0SPFV3?

A.

AS-External-LSA

B.

Router-LSA

C.

ASBR-Summary-LSA

D.

Network-LSA

Full Access
Question # 78

[According to this picture, Peimen can judge?

cR3>display ipv6 routing-table protocol isis

A.

R3The device type must beLevel-1-2

B.

unable to judgeR3type of device

C.

R3The device type must beLevel-1

D.

R3The device type must beLevel-2

Full Access
Question # 79

All routers in a network run IS-IS, and all are in Area 49.0001, where the L SDB of R1 is shown in the figure

According to this, it is judged that the DIS of Level-2 is. (Please fill in the device name, such as R1)

| displayisisisdb

DatabaseinformationforISIS (1)

Level-1Link State Database

LSPIDO Seq Num ChecksumbHoldtime Length ATT/P/OL

0001.0000.4004.00-00 0x00000008 0xb701 1186 68 0/0/0

0001.0000.2002.00-00Ox 0000008 0xb701 1186680/0/0

0001.0100.1001.00-00*0x00000050x2f9d1187 680/0/0

0001.0100.1001.01-00*0x00000001 0xa79e1110550/0/0

Level-2 Link State Database

LSPIDAN> Seq Num Checksum., Holdtime Length ATT/P/OL

0001.00002002.00-00 0000000080xb7011188 6S0/0/0

0001.0100.1001.00-00* 0x00000060x2d9e 1187 680/0/0

0001.0100.1001.01-00* 0x00000005OxdObO 1191 660/0/0

0100.0000.3003.00-00 000000005 0xfe53 1185 560/0/0

0

Full Access
Question # 80

Which of the following actions may affect the normal operation of the customer's network?

A.

Device naming

B.

software upgrade

C.

Hardware expansion

D.

Routing Protocol Configuration Changes

Full Access
Question # 81

On the OSPFv3 network shown in the figure, OSPFv3 is enabled on the interfaces connecting R1, R2, and R3. The router ID of each router is 10.0.X.X, where X is the number of the router. If you check detailed information about an LSA on R3, the command output shows that the LSA is generated by R2 and describes the IPv6 prefix address associated with the Router-LSA.

A.

TRUE

B.

FALSE

Full Access
Question # 82

About the site in the BGPIMPLS IP VPN network architecture. Which of the following descriptions is correct?

A.

in any case, belong to the sameVPNDifferent sites on the

B.

through the sameCETerminals connected to the operator's network may belong to different sites(MCE)

C.

site is a groupIPsystem, a network of hosts cannot be called a site

D.

The two geographically separated networks must belong to different sites

Full Access
Question # 83

On a stable network that requires fast route convergence, you can change the value of the interval at which OSPF LSAs are updated to 0 so that topology or route changes can be immediately advertised on the network through LSAs, which speeds up route convergence.

A.

TRUE

B.

FALSE

Full Access
Question # 84

On the OSPFv3 network shown in the figure, the IPv6 address of Loopback0 on R3 is 2000-3/128, and OSPFv3 is enabled. Which of the following statements are true?

A.

R2 definitely generates a Link-LSA.

B.

The Link-LSA generated by R2 does not exist in the LSDB of Rl.

C.

Rl definitely generates a Network-LSA.

D.

R3 definitely generates an Intra-Area-Prefix-LSA.

Full Access
Question # 85

Regarding the label space of MPLS, the description is wrong:

A.

penultimate jumpLSRWhen performing label exchange, if the exchanged label value is found to be3,By default, the label is popped and the message is sent to the last hop

B.

1024Above areLDP,RSVP-TE. MP-BGPLabel space shared by other dynamic signaling protocols

C.

16~1023is staticLSPand staticCR-LSPshared tab space

D.

If the out tag value is0,The router will directly discard the packet

Full Access
Question # 86

Deployment in a small and medium-sized networkOSPF,When viewing the routing table of a device, it is found that there are only directly connected routes.

It is not possible for the operation to cause the fault?

A.

Routing protocol configuration error

B.

Incorrect routing policy configuration

C.

Port address assignment problem

D.

The configured user permissions are too low

Full Access
Question # 87

In an MPLS VPN network, data packets are forwarded when they enter the public network. will be encapsulated with two layers of MPLS labels

sign. Which of the following options describes the processing of the packet correctly:

A.

The data packet is forwarded toEgress PEequipment

B.

Egress PEThe device correctly sends the data packet to the correspondingVPNmiddle

C.

the outer label of the packet received by the penultimate hop device is3

D.

Egress PEDevice received untaggedIPdata pack

Full Access
Question # 88

To ensure security, authentication can be configured in the OSPFV3 process area view.

A.

True

B.

False

Full Access
Question # 89

If the display ospfv3 peer verbose command is run to check OSPFv3 neighbor information, the command output contains information such as the peer router ID, global unicast address of the peer interface, and neighbor status.

A.

TRUE

B.

FALSE

Full Access
Question # 90

BFDLink state detection at the heart (millisecond) level can be achieved.

A.

right

B.

wrong

Full Access
Question # 91

There is a concept of forwarding equivalence class (FEC-Fowarding Equivalence Class) in MPLS, so FEC does not

Can the allocation be made based on which of the following criteria?

A.

Service type(Class of Service)

BsFragment offset (Fragment office)

B.

Application protocol(Application Protocol)

C.

target address(Destination Addess)

Full Access
Question # 92

A campus has deployed IPv6 for service testing. In the early stage of deployment, engineers wanted to achieve network interoperability through IPv6 static routes. When creating an IPv6 static route. You can specify both the outbound interface and the next hop, or only the outbound interface or only the next hop.

A.

True

B.

False

Full Access
Question # 93

A router's Network LSA is shown in the figure. Which of the following statements is correct?

display ospf Isdb network self-originate OSPFProcess1 with Router ID 10.0.12.2

Area: 0.0.0.0

Type: Network

Lsid: 10.0.122

Advrtr: 10.0.12.2

Ls age: 824

Len: 32

Options : E

\seq#:80000002

1chksum : 0x8970

INet mask: 255.255.255.0

IPriority : Low

IAttached Router 10.0.12.2

.Attached Router 10.0.12.1

A.

by the routerDRpriority is100

B.

of this routerRouter IDfor10.0.12.2

C.

The network segment where the router is located is10.0.12.0 24

D.

This router isDR

Full Access
Question # 94

Which of the following community attributes can ensure that the propagation scope of BGP routing entries is only within the AS?

A.

No_Export 

B.

No_Export_Subconfed

C.

Internet

D.

No_Advertise

Full Access
Question # 95

In the absence of a header, the Domain ID of each OSPF process running on the router and the process ID of the process

Be consistent and can be modified under the process through the domain-id command

A.

True

B.

False

Full Access
Question # 96

Does the role of Link-LSA in OSPFv3 not include?

A.

To the other road on the link Tiandikou noon-

B.

Advertise this router's interface to other routers on the linkID

C.

Advertise the link-local address of this interface to other routers on the link

D.

Advertise to other routers on the link the originatingNetwork-LSAOptions set in

Full Access
Question # 97

On the 05PFv3 network shown in the figure, each interface of R1 and R2 has two IPv6 addresses. Although the IPv6 address prefixes of R1 and R2 are different, they can still be used to establish an OSPFv3 neighbor relationship. If R2 is the DR, the Intra-Area-Prefix-LSA generated by R2 contains four prefixes.

A.

TRUE

B.

FALSE

Full Access