Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

If the receive cache of a switch's gigabit Ethernet interface is full, what protocol does the switch use to know that the remote interface delays sending data frames for a period of time?

A.

8023af

B.

8021U

C.

8021D

D.

8023

E.

8023Z

Full Access
Question # 5

Router HW cannot access hosts in the remote network, router HW runs routing protocols and only pings the remote file server address 105401 on router HW with extensions through a default route remote network , the result of ping on the router HW is rendered as 'requ.' est time out', according to the above description, the error in the following analysis is ?

A.

The next hop router for router HW did not reach the destination address

B.

Router HW does not have a legitimate router to reach the destination address

C.

Ping is successful, but congestion occurs on the path to the destination address

D.

There is a firewall in the remote destination network, and the destination address can be reached without releasing ICMP traffic E. ICMP packets, but the destination device fails to reply

Full Access
Question # 6

LDP messages are exchanged between LDLRs running the LDP protocol, and LDP messages can be divided into four types according to function, which of the following is not an LDP message type ?

A.

Advertisement message

B.

Discover message

C.

Conversation message

D.

Label Exchange Information

Full Access
Question # 7

What is wrong with the following statement about digital certificates?

A.

Digital signatures guarantee the integrity of digital certificates.

B.

Digital certificates contain public key information.

C.

Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.

D.

Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.

Full Access
Question # 8

The correct description of the scene shown in the following figure is:

A.

LSDB

B.

R1, which exists in both Level-1 and Leve-2, can ping the interface address of R2 loopback0

C.

R there is a route to R2 loopback0 10022/32

D.

No neighbor relationship can be established between R1 and R2

Full Access
Question # 9

When DLDP detects the presence of a one-way link in the fiber, the default actions of Huawei equipment include: the DLDP state machine migrates to the Disable state, outputs Trap information, and automatically sets the interface to a blocked state.

A.

True

B.

False

Full Access
Question # 10

Man-in-the-middle attacks or IP/MAC spoofing attacks can lead to information leakage and other hazards, and are more common in the intranet, in order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, you can take the configuration method

A.

Enable DHCP snooping to check the chaddr field in a DHCP request message

B.

Configure the trusted/untrusted interface

C.

Configure DHCP snooping on the switch to interbolde with DAI or IPSG

D.

Limit the maximum number of MAC addresses allowed to be learned on the switch interface

Full Access
Question # 11

Which of the following default routing delivery methods does OSPF support?( Multi-select)

A.

It can be issued without force

B.

Can be issued on ABR

C.

Issuance can only be enforced

D.

Answer can be issued on ASBR

Full Access
Question # 12

IS-IS is a link-state routing protocol that uses the SPF algorithm for route calculations. As shown in the figure, at the same time, a certain area has IPV4 and IPV6 and runs IS-IS to achieve network interconnection, of which R2 only supports IPV4 Regarding the topology calculation of the network, which of the following statements is correct?

A.

By default, IPv6 is not supported because R2 Therefore, in the shortest path tree formed by the JPv6 network computation, the path where R1 accesses R4 is: R1-R3-R4

B.

If you want the IPv4 and IPv6 networks to compute the same shortest path tree. The IPv6-enable topology lpv6 command is required to enable the Russian force of IPv6 under the IS-IS process

C.

By default, in the shortest path tree formed by the IPv6 network calculation, R1 accesses R4 as R1-R2-R4, since R2 does not support IPv6 Therefore, R2 will directly drop the IPv6 packet after receiving it, and select the traffic loss

D.

By default, IPv4 and IIPV6 networks are computed separately to form different shortest path trees

Full Access
Question # 13

The network administrator is ready to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4 network, and the IPv4 address of the router interface is 1381485210, so the corresponding tunnel address is 2001:8a0e:55d2:1:230:65ff:fe2:9a6?

A.

True

B.

False

Full Access
Question # 14

If you run PIM-SM in a multicast network, you need to build a multicast forwarding tree between the multicast source and the receiver to enable the receiver to receive the multicast effect, so what are the following options for the correct tree sketch for the build?

A.

What is built between the multicast source and the RP is the SPT tree

B.

RP and the receiver is built between the RPT tree

C.

Built between the RPT tree

D.

RP and the swap is the SPT tree

Full Access
Question # 15

Which of the following statements about RADIUS is correct?( Single choice questions).

A.

MAC authentication does not require a username password, so you cannot use RADIUS to authenticate the user.

B.

RADIUS supports both wired and wireless access modes.

C.

SEPARATION OF RADIUS PROTOCOL AUTHENTICATION, AUTHORIZATION, AND AUDIT.

D.

RADIUS authentication and Portal authentication cannot be used together because the Portal server can typically be used to authenticate users when portal authentication is deployed.

Full Access
Question # 16

The following description of VRRP load sharing is correct?( Multiple choice questions).

A.

When configuring priority, make sure that the same router acts as a master in the three VRRP backup groups

B.

You can create multiple VRRP backup groups on one interface of a router . The router can act as a master for one VRRP backup group and as a backup for other VRRP backup groups

C.

When you deploy load sharing, hosts in the same LAN are required to configure the IP addresses of different virtual routers as gateway addresses for missing provinces

D.

VRRP load sharing requires at least two virtual routers to provide forwarding services at the same time

Full Access
Question # 17

What is the following description of LDP reliability?

A.

LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed

B.

Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup ISP

C.

The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a forwarding table entry as a backup of the primary LSP

D.

LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and LGP paths are consistent

Full Access
Question # 18

The following statement about EVPN Type5 routing is wrong?( Single choice questions).

A.

Type5 routes carry Layer 3 VNI.

B.

Type5 routing carries both Layer 2 VWI and Layer 3 VNI

C.

The IP Prefix field can carry both host and network segment addresses.

D.

Type5 is an IP prefix route.

Full Access
Question # 19

What is the following description of MPLS BGPVPN incorrect?

A.

The TTL field in the label has the effect of preventing loops.

B.

IBGP PEes generally use the Loopback interface address to establish a stable BGP neighbor relationship

C.

BGP So0, which is used to prevent routes issued from a VPN site from passing through the MPLS backbone and back to that site. So0 is an extended group attribute that MP-BGP automatically generates.

D.

The routing exchange between D. PE-CE can be static routing, OSPF multi-instance, IS-IS multi-instance, EBGP

Full Access
Question # 20

A switch joins a running stacking system after powering up, a behavior known as heap overlay.

A.

TRUE

B.

FALSE

Full Access
Question # 21

There are routers as follows, according to which the compromise conclusion is wrong?

A.

R3 must be the DIS of some Level-1 link

B.

The R3 router is a Level-1-2 router

C.

R3 must be the DIS of some Level-2 link

D.

The system ID of the R3 router is 000300000000

Full Access
Question # 22

A routing tool can define multiple entries. Which tool will automatically add a deni-any entry at the end of the configuration?

A.

Route policy

B.

Community-tilter

C.

IP-prefix

D.

AS-path-filter

Full Access
Question # 23

DHCPv6 servers support additional configuration information such as DNS server addresses for hosts.

A.

TRUE

B.

FALSE

Full Access
Question # 24

The following statement about the application of BFD is correct?

A.

The one-arm echo function refers to the detection of the connectivity of the forwarding link through the loopback operation of the BFD packet

B.

BFD multi-hop detection means that BFD can detect arbitrary paths between two systems that may span many hops or overlap in some parts

C.

BFD and OSPF linkage is to associate BFD and OSPF, and notify OSPF through BFD's rapid sensing of link failures, thereby speeding up OSPF Response to changes in network topology

D.

BFD single-hop detection refers to the IP connectivity detection of two direct-connected systems

Full Access
Question # 25

Is the following description of the differences between IGMP name versions correct?

A.

IGMPv1/v2 cannot elect the queryer itself, while IGMPv3 can

B.

IGMPv1 does not support specific group queries, while IGMPv2 does

C.

IGMPv1/2/v3 cannot support the SSM model

D.

For members to leave, IGMPv2/v3 can actively leave, while IGMPvl cannot

Full Access
Question # 26

What are the ways to divide VLANs in Huawei switches? ( Multi-select) A Subnetting based on IP.

B. Division based on QoS

C. Partitioning based on port

D. Division based on protocol

E. Division based on MAC address.

Full Access
Question # 27

The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.

A.

True

B.

False

Full Access
Question # 28

The following is correct about the LSA of OSPFv3

A.

The Link State ID of inter-area prefix-SA, which contains prefix information

B.

Router-LSA and Network-LSA do not contain routing information

C.

When the Referenced Link State Type-2 of the Intra-AreaPrefixLSA, referenced Link State ID Contains the interface ID of the DR

D.

Inter-Area PrefirLSA also contains LinkLocal Information

Full Access
Question # 29

Each DD message has a sequence number for data confirmation, and a DD sequence number is 2 bytes long

A.

True

B.

False

Full Access
Question # 30

If we have a VPN instance configured on a router, if we need to view the VPN route on a Huawei router, which of the following commands should we use?

A.

display ip routing-table vpn-instance vpn-instance-name

B.

display ip routing-table

C.

display vpn routing-table

D.

display ip vpn-instance

Full Access
Question # 31

When the IPv6 address of a host is configured with a stateless address configuration, and other parameters other than the address are obtained through DHCPv6, how to set the M and 0 bits in the RA message ?

A.

M=10=1

B.

M=10=0

C.

M=1 0=0

D.

M=00=1

Full Access
Question # 32

A router receives a BGP route with the community attribute NO-Export , how will the router handle the BGP route?

A.

Drop the route directly.

B.

No more advertising to other BGP routers.

C.

Advertise only to IBGP neighbors.

D.

The route is advertised normally, but the route is not used to forward data.

Full Access
Question # 33

The following description of BGP loop protection is correct: multi-select

A.

Any routing information from an IBGP peer is advertised to the other IBGP peers

B.

Any update information received from the EBGP peer that contains its own AS number in the AS-PATH attribute is discarded via the AS-PATH attribute

C.

Non-RR BGP routers do not announce any updates from IBGP peers to other IBGP peers

D.

BGP routers do not announce any slaves The EBGP peer comes to update the information to its EBGP peer

Full Access
Question # 34

As shown in the following figure, a part of the LSDB LSDB of a router LSDB is shown in the first one in the following figure. A new LSP has been received, the second one in the figure below, and the following statement is incorrect (single choice).

A.

this router will put the newly received LSP into the LSDB

B.

In the case of a broadcast network, DIS will include summary information for this LSP in the next CSNP message.

C.

This router ignores LSPs received from neighbors

D.

If it is a point-to-point network, the router will send PSNP

Full Access
Question # 35

The following statement about the Security Alliance SA in IPSec is wrong with ?

A.

SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter Inder), the source IP address, and the Security Protocol Number (ASESP) used

B.

Use the display ipsec command to view information such as the encryption method used with another IPSEC peer, the traffic of interest, and so on.

C.

IPSec only supports encrypting data using the pair encryption algorithm.

D.

IpSec peers must be at a two-way SA to establish an IPSec VPN connection to

close

Full Access
Question # 36

As shown in the figure, the overload bit of ISIS is set in the configuration of router R3, and the following statement is correct

A R3's direct route will be ignored by R1 and R2 because of the setting of the overload bit .

B. When the router runs out of memory, the system automatically sets the overload flag bit in the sent LSP packets. Irrelevant to whether the user has a set-overload command configured.

Routes introduced by C. R3 through import-route will not be published. The LSP of D. R3 will not be able to spread to R1 and R2

E. R3 initiates the load state, and R1 and RZ will not calculate the LSP of R3 cattle in the SP tree.

Full Access
Question # 37

A company network runs the OSPF protocol, an engineer in order to understand the OSPF mechanism in the network to perform packet capture operations, the following ospf message description is correct?

A.

LSUpdate message is sent only when an adjacency relationship is established

B.

LSUpdate messages synchronize the link state database by sending detailed LSA information

C.

The interface sends Hello packets as soon as it joins the OSPF area

D.

When an LS Update packet is received, the router must send an LSAck to acknowledge

Full Access
Question # 38

What are the wrong statements about OSTPF's Router LSA and Network LSA?

A.

There must be both Router LSA and Network LSA in the OSPF network

B.

Network LSA carries both topology and routing information

C.

A router running OSPF must produce a Network LSA

D.

A router running OSPF must produce a Router LSA

Full Access
Question # 39

Which of the following is incorrect about HTTPS?( Multiple Choice)

A.

HTTPS secures access to data by using SSLVPN.

B.

If the HTTPS traffic contains a virus, the router cannot detect the virus directly using IPS technology

C.

When using HTTPS to access a website, the website cannot be accessed if the user's browser does not recognize the website's digital certificate.

D.

HTTPS protocol uses TCP port 443 by default

Full Access
Question # 40

As shown in the topology diagram, all interfaces of the router in the figure are enabled with the ISIS protocol, and the following statement is correct.

A.

If the RI's Ethernet0/0/0 interface goes down, R2 becomes the master device

B.

If the Ri's Ethernet0/0/1 interface goes down, R2 becomes the master device

C.

If R3's G E0/0/0 interface goes down, R2 becomes the master device

D.

If R3's Ethernet0/0/0 interface goes down, then R2 becomes the master device

Full Access
Question # 41

The following statement about IPSec VPN is correct ?qo

A.

Two routers establish an IPSec VPN in brutal mode, so that the two devices can interact with a minimum of 4 messages to establish a tunnel.

B.

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

C.

The two routers can establish OSPF neighbor relations and exchange intranet routes through the IPSec VPN tunnel

D.

The two routers establish IPSecVPN in main mode, and from the 5th packet (included), the payload's data will be encrypted.

Full Access
Question # 42

In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN network

A.

NVE interface

B.

VXVAN L2 Gateway

C.

VXLAN L3 Gateway

D.

VLANIF interface

Full Access
Question # 43

Port isolation technology deployed in Ethernet can realize Layer 2 interoperability and Layer 3 isolation, making networking more flexible.

A.

TRUE

B.

FALSE

Full Access
Question # 44

Huawei's two switches SWA and SWB are connected together by 7 Ethernet cables, and static link clustering is configured, and the corresponding port on the switch SWA is Ethernet 1/0/1 ?Ethernet1/0/2?Ethernet 1/0/3?Ethernet 1/0/4?Ethernet 1/0/5, Ethernet1/0/6, Ethernet 1/0/7, configured in order of port if the switch SWA, SWB supports only 6 ports per aggregation group

A.

In the case of consistent configuration of each port, Ethernet 1/0/6 port is an aggregate group Unselected port

B.

In the case of consistent configuration of each port, the Ethernet1/0/1 port is an aggregate group Unselected port

C.

With the same configuration of each port, the Ethernet 1/0/7 port is the aggregate group Unselecte port

D.

With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselecte port

Full Access
Question # 45

What kind of scenario can use AS one path and one filter?

A.

Filter routes received from BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.X.x.x as path-filter import

B.

The apply clause in Routepolicy

C.

Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peerx. X.x.x as path-filter export

D.

If-natch clause answer in Route-policy.

Full Access
Question # 46

When the ABR is a type 5/7 LSA switch router for the NSSA zone, then the ABR can be paired to Category 7 LSA is a derivative of 5 LSAs for aggregation.

A.

True

B.

False

Full Access
Question # 47

In which of the following cases, RSTP refreshes the MAC address table?( Multi-select)

A.

When the port state transitions from Forwarding to Disking

B.

Only when the port state transitions from Listening to Disccarding

C.

When a topology change notification is received

D.

When the status of a port changes

E.

CE when the port state transitions from Disking to Forwarding

Full Access
Question # 48

Router RL and Router R2 run BGP both routers are in the AS65234 The router R2 route is present in the BGP routing table of router RI, but not in the P of router R1 road

A.

With BGP, both routers are in the AS65234 Route cry PD is done by the right big worker

B.

By the table, so what causes the problem to occur? A, synchronization is turned off

C.

The B. BGP neighbor relationship is Down

D.

Router R1 does not enable BGPMulti-hop D Routing is not optimal

Full Access
Question # 49

ICMPv6 has two types: Error Messages and Information Messages.

A.

TRUE

B.

FALSE

Full Access
Question # 50

The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000

A.

True

B.

False

Full Access
Question # 51

Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct?

A.

Under no circumstances can different sites that belong to the same VPN use overlapping address spaces

B.

Two geographically separated networks must belong to different sites

C.

Terminals connected to the carrier network through the same CE may belong to different sites

D.

A site is a set of IP systems, and a network of hosts cannot be called site

Full Access
Question # 52

Regarding the WRR (Weight Round Robin) description of the error is ?( Multiple select).

A.

WRR avoids congestion in the network

B.

WRR guarantees that various queues are allocated to a certain amount of bandwidth

C.

WRR is a congestion management technique

D.

WRR can no longer use

E.

WRR on GE interfaces to ensure that critical services are prioritized for

Full Access
Question # 53

The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks using the TCP Flood attack prevention method.

A.

True

B.

False

Full Access
Question # 54

Is the following information about BGP4+ described correctly?

A.

BGP4 can use dampening commands to suppress oscillations on IBGP routes.

B.

Modifying the RouterID of BGP causes the BGP connection between routers to be re-established.

C.

The Next Hop attribute in BGP4+ is represented by an IPv6 address, which can be the link-local address of the next hop.

D.

BGP4+ does not support route auto-aggregate

Full Access
Question # 55

Regarding MP-BGP, the following description is wrong?

A.

Radio A. MP-BGP needs to assign a private label to the VPNv4 route

B.

PE and CE are routed through BGP interaction, you need to create a BGP process on ce for each VPN instance

C.

The message type and VPNv4 routing publishing policy for MP-BGP are the same as for BGP-4

D.

MP-BGP advertises VPNv4 through two attributes, MP_REACH_NLRI and MP_UNREACH_NLRI Route

Full Access
Question # 56

In addition to stateless address autoconfiguration, IPV6 devices can also obtain addresses, gateways, DNS, and other information through DHCPv6

A.

True

B.

False

Full Access
Question # 57

Regarding the difference between NSR and NSF, the correct one is?

A.

The NSR must rely on a neighbor router to complete

B.

Both NSR and NSF require a neighbor router to complete

C.

NSF must rely on neighbor routers to complete

D.

NSF does not require a neighbor router to complete

Full Access
Question # 58

Auto-negotiate mode is to obtain the maximum interface rate and operating mode, the network administrator configures all Ethernet interface rates of a working switch to 10OMbps, and the operating mode is configured as Full-duplex, when a network card is configured After the auto-negotiate workstation is connected to the switch, the negotiation result is that the interface rate is 10OMbps and the working mode is half-duplex, which of the following explanations is the most reasonable for this phenomenon?

A.

The problem is on the workstation's NIC, mostly due to the aging of the NIC driver on the workstation , which causes the workstation NIC to learn the interface rate and operating mode configured on the switch

B.

Port rate negotiation is negotiated through the initial port sending FLP , and the operating mode is not negotiated through FLP

C.

STP initializes the port into the blocking state, causing auto-negotiation to fail, so the port should be configured as an edge port

D.

At higher port rates and operating modes, the workstation's network interface card cannot be configured as auto-negotiate

E.

Auto-negotiation is not configured on the switch, resulting in the switch not being able to send FLP messages to the workstation, causing the workstation to set its own operating mode to Half-duple

Full Access
Question # 59

In a multicast network, what causes multicast traffic to not forward properly?

A.

The router does not have an RPF route

B.

PIM is not enabled on the RPF interface

C.

The upstream router will receive the PIM Join message dropped

D.

Multi-router egress network, this router is not DR

Full Access
Question # 60

The MAC address of a PC is 5489-98FB-65D8 The administrator wants this PC to get the specified P address 1921681.11/24 from the DHCP server So the administrator-configured command should be,

A.

dhcp static-bind ip address 1921681.11 mac- address 5489-98FB-65D8

B.

dhcp static-bind ip address 1921681.11 24 mac- address 5489-98FB-65D8

C.

dhcp server static -bind ip address 1921681.112552552550 mac-address 5489-98FB-65D8

D.

dhcp server static-bind ip-address 1921681. 11 mac- address 5489-98FB-65D8

Full Access
Question # 61

Which nationality meets the following two conditions: 1] BGP Router A can choose whether the Ulpdate message is based on the nationality. ( ) If Router B receives a Updae message containing a cross-hatch, run-by B does not have an identified solidity, but will also contain a multifaceted] Ulpdate retracts the advertisement to Router C. Router C may recognize and apply this attribute. (Multiple choice questions).

A.

Aggregator

B.

Local_Pref

C.

Multi_Exit_Disc

D.

Community

Full Access
Question # 62

Link state information is isolated by default between different IS-IS processes on the same router.

A.

TRUE

B.

FALSE

Full Access
Question # 63

When troubleshooting a local area network, you notice a large number of frame alignment errors, FCS errors and LAG conflicts, and the possible cause of these problems is ?

A.

Switches and terminals are interconnected over 10/100/1000base-T Ethernet links, and switches and terminals operate in half-duplex mode

B.

There is a mode mismatch on the 1000base-LX/LH link

C.

The operating mode does not match

D.

on a 10/1000/1000base-T Ether link This type of error occurs in most environments

Full Access
Question # 64

As shown in the following topology, EBGP is running between ASI0O0, AS.203, AS.30, AS8400, and the neighbor relationship has been established as RECEIVed by AS4O0 When AS1OO issues a 1..11/2 CIDR segment BGP route, the path order recorded in the ASPath attribute is correct

A.

10,200,3

B.

400,300,200,100

C.

100,200,300,400

D.

300,200,100

Full Access
Question # 65

OSPFv3 uses the same route advertisement method as OSPFv2: advertising is done through the network command in the OSPFv3 area view.

A.

TRUE

B.

False

Full Access
Question # 66

The following description of the Lsp shard extension for ISIS is correct?

A.

Enables is routers to generate more LSP shards to carry more ISIS information.

B.

Isis' shard extension is equally valid for Hello packets.

C.

Shard scaling for ISIS is achieved by adding virtual systems, up to 1000 virtual systems.

D.

The isis router can produce a maximum of 1024 shards.

Full Access
Question # 67

Regarding the DSCP field, the following statement is incorrect: single selection

A.

The DSCP value can be 0, and packets use the default forwarding mechanism when 0

B.

When the value of DSCP is EF, it indicates that the data belongs to the accelerated forwarding class.

C.

In addition to indicating the priority of the data, DSCP can also indicate the probability of data being discarded. The CS class in D. DSCP divides data into 8 priorities.

Full Access
Question # 68

Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways?

A.

Enable traffic to be forwarded locally first

B.

Connect the stacking device via a stacking card

C.

Configure the stacking system MAC address switching

D.

Enables the stacking multi-master check function

Full Access
Question # 69

Regarding the description of the hello message in the PIM-SM message, the error is ?

A.

Hello messages are sent to multicast address 224005

B.

Elect dr in multiple router segments with hello messages

C.

Routers periodically use hello messages to stay in touch

D.

In a PIM-SM network, a newly started multicast router needs to use hello messages to discover neighbors and maintain neighbor relationships

Full Access
Question # 70

XLAN uses BGP EVPN to establish a tunnel, what type of message is used? ( Single choice questions).

A.

Typel

B.

Type2

C.

Type3

D.

Type4E. Type5

Full Access
Question # 71

Is the following GR description of ISIS correct?

A.

The GR feature of AISIS is turned on by default.

B.

ISIS's GR has a total of four timers.

C.

ISIS's GR notifies of events and maintains neighbor relationships through CSNP messages.

D.

ISIS's GR defines a new TLV structure to support this feature.

Full Access
Question # 72

: :1/128 is the IPV6 loopback address

A.

TRUE

B.

False

Full Access
Question # 73

The following statement about the concept of multicast is wrong?

A.

Multicast Source: The sender of the message needs to join the multicast group to provide forwarding of multicast group messages

B.

Multicast router: A router or layer-three switch that supports layer-3 multicast functionality

C.

Multicast Group Members: Multicast group members can be widely distributed anywhere in the network

D.

Multicast Groups: A collection identified by ip multicast addresses

Full Access
Question # 74

The following description of the LDPLSP establishment process is correct?

A.

By default, LSRs are for the same FEC, and the received tag mappings can only come from the optimal next hop, not from the non-optimal next hop.

B.

When a network topology change causes the next hop neighbor to change, the free label keep method is used. LSR can quickly rebuild the LSP by directly using the labels sent by the original non-optimal next-hop neighbor. Liberal needs more memory and tag space.

C.

In the DoD mode of label publishing, for a specific FEC, the LSR does not need to obtain a label request message from upstream to distribute the label.

D.

The process of establishing a D. LSP is actually to bind the FEC to the tag and advertise this binding to the LSP upstream LSR process.

Full Access
Question # 75

The link quality of a company's network is poor, often failures lead to route oscillation, and even occasionally there are routing loops, in order to prevent the recurrence of these phenomena, the network administrator decided to deploy URPF in the whole network to improve the stability of the network

A.

True

B.

False

Full Access
Question # 76

The authentication types of ISIS include interface authentication, zone authentication, and routed domain authentication

A.

True

B.

False

Full Access
Question # 77

The firewall has created some security zones by default, which of the following security zones does not exist by default on the firewall?( Radio).

A.

Internet

B.

Local

C.

Trust

D.

DMZ

Full Access
Question # 78

Two routers, connected together through the serial port, but can not ping between each other , now check the port status as follows: Can the following information determine what the cause is?

A.

Insufficient link bandwidth

B.

The IP addresses on both ends are not on the same network segment

C.

The link layer protocols on both ends are inconsistent

D.

Subnet mask does not match the

Full Access
Question # 79

What commands are related to BGP route reflectors?( Multiple select).

A.

reflect between-clients

B.

group 1 internal

C.

peer reflect-client

D.

reflector cluster-id

Full Access
Question # 80

As shown in the figure, in the context of IPv4 and IPv6, the SEL field in the NET address of isis always takes a value of 00 ?

A.

Right

B.

Wrong

Full Access
Question # 81

As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).

A.

The 2::/64 route appears in the P route table

B.

The 2019:/64 route appears in the IP routing table

C.

2020::/64 The route appears in the IP routing table

D.

The 2021/64 route will appear in the IP routing table

Full Access
Question # 82

The data results of a router are as follows, and the analysis conclusion is correct (single choice).

A.

The GEO/0/0 port of the A. R3 is in a different region than the neighbor

B.

The B. R3 router's Eth0/0/1 enables both IPv4 and IPv6 ISIS

C.

R3 is on the link where Eth0/0/0 is Eth0/ 1 of the LEVEL-1 and Level-2 DISC

D.

R3 routers Circuit-level is Level-1-2

Full Access
Question # 83

The interface Serial0 of an existing router is in OSPF area 1, and the interface Serial0 is set to Silent interface. So what kind of impact will this setting have

A.

OSPF establishes available adjacencies through this interface

B.

OSPF does not add routes learned from the interface to the local routing table

C.

OSPF does not establish any neighboring relationships through this interface D. OSPF receives routing updates from neighbors

Full Access
Question # 84

You want to set the DSCP value of VolP traffic in HW network devices to EF. According to the differentiated service model RFC, traffic token EF should be set to:

A.

DSCP is set to decimal 36

B.

IP ToS is set to OXEF

C.

IP Experimental ECN

D.

DSCP is set to decimal 5

E.

Bitstream 101110

Full Access
Question # 85

The following statements about the VRRP protocol are correct (multiple choice).

A.

Both VRRPv2 and VRRPv3 support authentication

B.

VRRPv3 does not support authentication, while VRRPV2 does

C.

VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks

D.

The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254

Full Access
Question # 86

In an MPLS domain, depending on how the LSR handles the data, the LSR can be divided into Ingress LSR, Transit LSR, and Transit LSR Egress LSR? For the same FEC An LSR can be an Iningress LSR for that EC or a Transit for that FEC LSR.

A.

TRUE

B.

FALSE

Full Access
Question # 87

/R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration, the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then the possible cause is the question).

A.

This router does not have an OSPF process number configured

B.

This router is configured with a different zone ID than its neighbor router's zone ID

C.

This router does not have authentication features configured, but neighbor routers configure authentication features

D.

The declared network address of this router does not match the interface mask

Full Access
Question # 88

The multicast protocol that can generate multicast distribution trees is ?

A.

IGMPv2

B.

BGP

C.

OSPF

D.

PIMV2

Full Access
Question # 89

Which of the following LSAs propagate in a single region only?

A.

Router LSA

B.

Summary LSA

C.

Network LSA

D.

AS External LSA

Full Access
Question # 90

Which of the following options is correct?

A.

Unicast and broadcasting cannot effectively achieve data transmission between one source and multiple destinations on P2MP, but multicast technology can

B.

Multicast technology is able to reduce redundant traffic, so network bandwidth can be saved C. Multicast technology is used for "-to-many" applications

C.

Since multicast is based on TCP to establish a connection, multicast technology can ensure the reliable transmission of data

Full Access
Question # 91

HW users are transferring a very large number of files via TFTP. What protocol does TFTP rely on for transmission?

A.

ICMP and UDP

B.

IP ?TCP

C.

UDP

D.

NFS E. FTP

Full Access