Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The description of the V300R022C10 version of NetEngine AR6300 SRG33X0 series enterprise routers is incorrect

A.

The maximum number of XSIC slots can reach 4.

B.

The maximum number of WSIC slots can reach 4.

C.

4 SIC slots.

D.

Dual master control and double forwarding

Full Access
Question # 5

The following statements about MAC routing are incorrect ()

A.

If the Flag value of the migration attribute in the MAC address route is 1, it indicates a static MAC address, and the static MAC address is preferred.

B.

When a MAC address route is migrated, the large sequence number in the MAC migration attribute is preferred.

C.

and MAC address routes are filled with two labels (that is, both mplslable1 and mplslable2 are valid in packets).

D.

The Route Distinguisher value (RD value) of the MAC route is generated by the value configured by the evpn source-address

Full Access
Question # 6

Campus virtualization solution, the networking topology that is not supported by underlay routing automation is ()

A.

Core transparent transmission ring networking

B.

Tree networking

C.

Convergence ring networking

D.

Access to ring networking

Full Access
Question # 7

The alias function of EVPN is mainly realized by that route ()

A.

per EVIAD route

B.

per ES AD route

C.

Inclusive Multicast Ethernet Tag Route

D.

Ethernet Segment Route

Full Access
Question # 8

iMaster NCE-Campus V300R022C00 version, the difference between V5 and Spruce is incorrect.

A.

Monitoring: V5 is based on http 2.0 channel, and Spruce is based on telemetry channel (GRPC). O&M: Based on the SSH channel, V5 is different from Spruce.

B.

O&M: Based on the SSH channel, V5 is different from Spruce.

C.

Acceptance: Based on the netconf channel, V5 is no different from Spruce.

D.

Configuration/alarm: Carried on the netconf channel, the yang model is different, and the spruce adopts the yang 2.0 model.

Full Access
Question # 9

In the WLAN scenario, the four types of service flows in EDCA have the highest priority

A.

AC_VI

B.

AC_bk

C.

AC_BE

D.

AC_VO

Full Access
Question # 10

When using the planning and design tool, adjust the board position of the service board in the modular switch on which page of the tool ()

A.

BOQ management

B.

Cabinet layout design

C.

Network equipment connection design

D.

Equipment selection

Full Access
Question # 11

In which delivery link is the planning and design tool mainly used ()

A.

Pre-sales configuration

B.

After-sales delivery planning and design

C.

Installation, deployment and testing

D.

Operation and maintenance

Full Access
Question # 12

For the description of the WLAN network planning scheme in the dormitory/hotel one-in-two scene with a bathroom at the door, the correct one is ()

A.

Select butterfly wing wave AP wall-mounted bathroom corner, height 2.2~2.5m, a single AP covers the left and right 2 rooms

B.

The AP fixes the radio power and configures the maximum EIRP to improve the downlink coverage of the room through the wall, with the worst 5G downlink RSSI being -65dBm and the worst uplink RSSI being -80dBm

C.

Indoor omnidirectional APs (2*2 models such as 5761-11) are deployed separately in the corridor to ensure roaming continuity

D.

The bathroom relies on 5G for coverage and turns off 2.4G

Full Access
Question # 13

In the government unified construction mode of SDN-WAN solution, the SRv6 tunnel design description is incorrect ()

A.

Service slices must use SRv6 Policy tunnels, which can be strictly explicit or loose.

B.

The whole network uses NCE-P to calculate the path of the slice network based on the affinity attribute to ensure the optimal path of the whole network and make full use of the link bandwidth while ensuring the service quality.

C.

SRv6Policy tunnels are vertically deployed between districts, counties, cities, and provincial WANs to optimize traffic to improve bandwidth utilization and ensure service quality.

D.

SRO6fPolicy tunnels can be carried in the default slice network or in a non-default slice network. For default slices, SRv6BE is preferred. Services with special requirements can also be carried through SRv6 policy tunnels.

Full Access
Question # 14

In the CloudCapmus solution, NETCONF/YANG does not support the management of Huawei devices

A.

CloudEngine S series switches

B.

CE series switches in data centers

C.

WLAN AP

D.

AR series routers

E.

USG series firewalls

Full Access
Question # 15

Regarding the description of tunnel planning, it is incorrect ()

A.

SRv6 Policy Group, SRv6 Policy, and SRv6-BE tunnels are delivered and deployed through the iMaster NCE-IP.

B.

VPN services in the backbone network can be carried by SRv6 Policy Group, SRv6 Policy, and SRv6-BE tunnels.

C.

For L2EVPN services, SRv6Policy tunnels are used first, followed by SRv6-BE for escape.

D.

For L3EVPN services, it is recommended to use SRr6Policy Group tunnels for DSCP traffic diversion and SRv6-BE tunnels for escape if the SRv6 Policy tunnel fails to iterate routes.

Full Access
Question # 16

Regarding the behavior of END, the wrong statement is ()

A.

end. DT4: EVPN VPLS unicast meteor

B.

end.dx2: the L2AC interface used to divert traffic to the egress PE

C.

end. X SID: A link used to direct traffic to a specific node

D.

end SID: Redirects traffic to nodes based on the IP routing table

Full Access
Question # 17

Which of the following protocols does the iMaster NCE Campus controller use to register devices and deliver configurations?

A.

Netconf

B.

HTTP

C.

HTTP2.0

D.

HTTPS

Full Access
Question # 18

segment-routing ipv6 encapsulation source-address 1::1 locator SRv6_locator ipv6-prefix A1::64 static 32 static function allocation range is ()

A.

A1::1-A1::FFFF:FFFF

B.

A1::1-A1:-FFFF

C.

A1:1-A1.. FFFF:FFFF:FFF

D.

A1::1:0:0-A1::FFFF:FFFF:FFFF:FFFF

Full Access
Question # 19

Ethernet Segment Route(Type4)

A.

Multicast tunnel endpoint auto-discovery & multicast type auto-discovery

B.

Elastic search for ES members

C.

IPPrefix announcement

D.

MAC address learning Xi notice

Full Access
Question # 20

Endpoint SID of PE type, which is used to identify an lPv4 VPN instance in the network

A.

End.DX4 SID

B.

End.X SID

C.

End.OP SID

D.

EnDT4 SID

Full Access
Question # 21

The maximum MCS supported by WIFI6 is:

A.

MCS7

B.

MCS9

C.

MCS11

D.

MCS13

Full Access
Question # 22

The following description of business-oriented VAP is correct

A.

Provide wireless terminal access function

B.

Establish a MESH connection

C.

Each radio can be configured with multiple radio resources, and the number is unlimited

D.

Each radio can be configured with only one

Full Access
Question # 23

The description of the new AirEngine 5762-16W is incorrect ()

A.

Super wall penetration, one AP covers up to four rooms

B.

Unique built-in butterfly wing intelligent antenna

C.

USB expansion of external Internet of Things

D.

Dedicated to multi-partition scenarios in dormitories and hotels

Full Access
Question # 24

In the fabric network of dual-border node networking of the campus distributed gateway scheme, cross-networking is recommended between the core device and the aggregation device, so that a L3VXLAN tunnel will be created between the two border nodes and the edge node.

A.

and the two upstream traffic paths of the edge form ECMP load balancing

B.

Different source CIDR blocks choose different main exits

C.

Different EDGE devices choose different main outlets

D.

Different upstream network segments choose different main exits

Full Access
Question # 25

Which of the following does not belong to network reliability protection technology ()

A.

Load sharing

B.

VPN FRR

C.

PCEP

D.

TE HSB

Full Access
Question # 26

When SDN-IWAN is designing BGP routing control, the entire Guqian network structure is adouble-plane structure, which increases the reliability of the network, and the PE of the same plane is preferred when the BGP routing of PE equipment is selected, which is realized through ().

A.

ORIGIN

B.

MED

C.

LocalPre

D.

AS_PATH

Full Access
Question # 27

The description of the main functions of the configuration generation tool is correct

A.

Through this tool, you can restore the user's existing network networking and service characteristics

B.

It is mainly used to generate configuration scripts in batches

C.

It is mainly used to specify the relocation plan and design the networking structure of the new network

D.

The above statements are correct

Full Access
Question # 28

Which of the following descriptions is wrong about the MPLS tuning scheme ()

A.

It is recommended to deploy two-way tunnels to pass through the common road, which is convenient for maintenance and more reliable tunnel BFD detection

B.

When optimizing and calculating routes, priority is given to ensuring the creation of high-priority tunnels, and high-priority tunnels can preempt low-priority tunnel resources

C.

RSVP-TE, SR-TE, and LDP tunnels can be tuned

D.

When multiple load-balancing tunnels are deployed between two PE nodes, we recommend that you deploy a detached group.

Full Access
Question # 29

The virtualization scenario network architecture has multiple node roles, which of the following nodes can be used as both L2 gateway and L3 gateway?

A.

Router Node

B.

FW Node

C.

Border Node

D.

Edge Node

Full Access
Question # 30

The types of cloud devices that the cloud management solution supports management do not include?

A.

FW

B.

S switches

C.

AR router

D.

CE switches

E.

AP

Full Access
Question # 31

In the campus SDN solution, the statement about the distributed gateway solution is wrong ()

A.

Distributed gateway - VxLAN to access, independent AC scenario, for wireless traffic, local forwarding mode is not recommended.

B.

Distributed gateway - VxLAN to access, independent AC scenario, from the edge to the VN, on the edge to execute the service accompanying policy (the edge needs to subscribe to the IP-Group service), the current solution has supported automatic deployment.

C.

The VTEP device is both an L2 gateway and an L3 gateway. The non-gateway node is not aware of the VXLAN tunnel and acts only as the forwarding node for VXLAN packets.

D.

Distributed gateway - VxLAN to aggregation, AC on the board, the wireless traffic service accompanying policy is executed on the edge, and tunnel forwarding is recommended.

Full Access