Month End Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Huawei H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Exam Practice Test

Page: 1 / 6
Total 60 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Question 1

The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?

Options:

A.

01-00-5E-00-01-64

B.

01-00-5E-00-01-03

C.

00-00-5E-00-01-64

D.

00-00-5E-00-01-03

Question 2

A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.

Options:

A.

TRUE

B.

FALSE

Question 3

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

Options:

A.

80

B.

50

C.

40

D.

30

Question 4

BFD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?

Options:

A.

4784

B.

3784

C.

5784

D.

2784

Question 5

Link aggregation is a common network technology. Which of the following are advantages of link aggregation?

Options:

A.

Load balancing

B.

Improved reliability

C.

Increased link bandwidth

D.

Route backup

Question 6

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

Options:

A.

TRUE

B.

FALSE

Question 7

OSPF has several types of special areas, which are used to reduce the LSDB size and improve device performance.

Which of the following LSAs cannot be in a totally stub area?

Options:

A.

Type 3 specific LSA

B.

Type 1 LSA

C.

Type 3 LSA that describes a default route

D.

Type 2 LSA

Question 8

Which of the following LSAs are advertised only within a single area?

Options:

A.

Network LSA

B.

Router LSA

C.

Summary LSA

D.

AS External LSA

Question 9

On an OSPF or IS-IS network, the filter-policy import command can be run on a router to filter out the LSAs forwarded by its neighbors.

Options:

A.

TRUE

B.

FALSE

Question 10

Which of the following routing protocols support the default route through command configuration?

Options:

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

Question 11

Compared with STP, RSTP defines the different port states. Which of the following statements regarding discarding and learning states are true?

Options:

A.

The port In discarding or learning state does not forward data frames.

B.

The port in discarding state does not learn MAC addresses table.

C.

The port in discarding or learning state does not learn MAC addresses

D.

The port In learning stole docs not learn MAC addresses table.

Question 12

BFD for OSPF is deployed on a directly connected link. If the physical link is disconnected, drag the following BFD processes to the corresponding sequence numbers.

Options:

Question 13

Hackers often obtain the login permissions of system administrators through various attacks.

Which of the following measures can be taken to enhance the security of administrator accounts?(Select all that apply)

Options:

A.

Periodically check whether unnecessary administrator accounts exist in the system. If such accounts exist, delete them to reduce the attack surface.

B.

Encrypt passwords before transferring them. Whenever possible, transfer passwords by email.

C.

Assign exclusive accounts for administrators with different maintenance roles to avoid account sharing.

D.

To ensure security and make the password easier to remember, you can set the password to be valid for a long time.

Question 14

TheBFD (Bidirectional Forwarding Detection) state machineimplements athree-way handshakefor BFDsession setup or teardown.Which of the following session states are involved in BFD session setup?

Options:

A.

Up

B.

AdminDown

C.

Init

D.

Down

Question 15

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Options:

Question 16

VRRP defines three states. Only the device in which state can forward packets destined for a virtual IP address?

(Write in full and capitalize the first letter.)

Options:

Question 17

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Question 18

On an STP network, only the designated port processes inferior BPDUs. On an RSTP network, a port with any role processes inferior BPDUs.

Options:

A.

TRUE

B.

FALSE

Question 19

On an OSPF network, an algorithm is used to prevent loops within an area, but loops may occur between areas. Therefore, OSPF defines a loop prevention mechanism for inter-area routes. Which of the following statements are true about the loop prevention mechanism?

Options:

A.

Inter-area routes cannot be directly transmitted between non-backbone areas.

B.

All non-backbone areas must be directly connected to area 0.

C.

Inter-area routes need to be forwarded through area 0.

D.

An ABR cannot inject Type 3 LSAs that describe routes to a network segment in an area back to thesame area.

Question 20

In IGMPv1, querier selection depends on a multicast routing protocol, such as PIM. In IGMPv2 and IGMPv3, the interface with the largest IP address acts as the querier.

Options:

A.

TRUE

B.

FALSE

Question 21

BFD can associate with multiple protocols to quickly detect faults.

Which of the following functions are supported?(Select all that apply)

Options:

A.

BFD for PIM

B.

BFD for static routes

C.

BFD for OSPF

D.

BFD for BGP

Question 22

During routineO&M, the administrator checks theIGMP configurationon a router interface. The configuration is as follows:

display igmp interface

Interface information of VPN-Instance: public net

GigabitEthernet0/0/1(192.168.1.1):

IGMP is enabled

Current IGMP version is 2

IGMP state: up

IGMP group policy: none

IGMP limit: -

Value of query interval for IGMP (negotiated): -

Value of query interval for IGMP (configured): 60 s

Value of other querier timeout for IGMP: 0 s

Value of maximum query response time for IGMP: 10 s

Querier for IGMP: 192.168.1.1 (this router)

Given this, which of the following statements aretrue?

Options:

A.

The IP address of the interface is 192.168.1.1.

B.

The IGMP version is IGMPv2.

C.

The maximum response time to Query messages is 10s.

D.

The interval for sending Group-Specific Query messages is 60s.

Question 23

In IPv6, to communicate with a destination host, a host must obtain the link-layer address of the destination host through ARP.

Options:

A.

TRUE

B.

FALSE

Question 24

The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?

Options:

A.

IGP > EGP > Incomplete

B.

Incomplete > IGP > EGP

C.

EGP > IGP > Incomplete

D.

Incomplete > EGP > IGP

Question 25

Which of the following statements regarding IGMPv1 and IGMPv2 are true?

Options:

A.

1GMPv2 supports only general query.

B.

1GMPv2 defines the Leave message type.

C.

IGMPv1 does not define the IGMP Leave message type.

D.

IGMPv1 supports general query.

Question 26

On an RSTP network, if a port receives an RST BPDU and finds that its buffered RST BPDU is superior to the received RST BPDU, the port discards the received RST BPDU without responding.

Options:

A.

TRUE

B.

FALSE

Question 27

In special scenarios, when advertising routes to an IBGP peer, a BGP device needs to set the next hop to its IP address to prevent blackhole routes. Which of the following commands can be run in this case?

Options:

A.

peer next-hop-local

B.

peer mpls-local-ifnet

C.

peer private-nexthop

D.

peer next-hop-invariable

Question 28

On a WLAN, engineers can use the VLAN pool mechanism to assign access users to different VLANs, which helps reduce the number of broadcast domains and improve network performance. VLAN pools support two VLAN assignment algorithms: even and hash. Drag the advantages and disadvantages to the two algorithms.(Token is reusable)

Options:

Question 29

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

Options:

A.

1

B.

128

C.

4096

D.

32768

Question 30

On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.

Options:

A.

TRUE

B.

FALSE

Question 31

SSHis a secure protocol that establishes tunnels for users on insecure networks.Which of the following statements is false about SSH login?

Options:

A.

The SSH server supports authentication. Only users who have passed authentication can log in to the device.

B.

When the SSH server function is enabled on a device, the socket obtaining service is also enabled on the device. This makes the device prone to scanning by attackers. As such, the SSH server function and the corresponding port can be disabled when the SSH server function is not required.

C.

An ACL rule can be configured for each VTY channel to control the IP addresses of clients that are allowed to log in to the device.

D.

By default, the port number of the SSH server is 23. You can change the port number of the SSH server to a non-well-known port number to reduce the probability of being scanned and attacked.

Question 32

OSPF neighbors have multiple states, such as Down, Init, 2-way, Loading, or Full. In which of the following states do OSPF routers negotiate the master and slave roles?

Options:

A.

Exchange

B.

Init

C.

2-way

D.

ExStart

Question 33

In addition to numerous normal service packets, the CPUs of devices on a network may also receive large numbers of attack packets. To ensure that the CPUs can properly respond to normal services, the devices provide the local attack defense function.

Which of the following statements are true about this function?(Select all that apply)

Options:

A.

The device can schedule the protocol packets to be sent to the CPU in the attack defense policy based on the protocol priorities so that the packets with higher priorities are processed preferentially.

B.

To ensure that session-based application-layer data runs properly during an attack, you can configure the dynamic link protection function.

C.

Regardless of the packet type, the same rate limit must be set to reduce the number of packets sent to the CPU.

D.

CPU attack defense can also take effect on the management interface of the device.

Question 34

After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?

Options:

A.

Multiple DHCP servers are configured.

B.

STP is enabled on the DHCP server.

C.

The DHCP function is disabled by default, and the administrator forgets to enable the DHCP function.

D.

DHCP clients and the DHCP server are on different network segments, and no DHCP relay agent is configured on the network.

Question 35

On an IS-IS network, all routers generate LSPs. Which of the following types of information isnotcontained in the LSPs generated by pseudonodes?

Options:

A.

Interface information

B.

Information about supported network protocols

C.

Route information

D.

Neighbor information

Question 36

See the command output of a router below. Which of the following statements is true?

display ospf interface GigabitEthernet 0/0/0 verbose

OSPF Process 1 with Router ID 10.0.2.2

Interface: 10.0.12.2 (GigabitEthernet 0/0/0)

Cost: 1 State: BDR Type: Broadcast MTU: 1500

Priority: 1

Designated Router: 10.0.12.1

Backup Designated Router: 10.0.12.2

Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1

Options:

A.

The router ID is 10.0.12.2.

B.

The interface cost is 1500.

C.

This router is a BDR.

D.

The interface IP address is 10.1.12.1.

Question 37

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

Options:

Question 38

AnIP prefix listis a common matching tool in routing policies. When anIP prefix listis configured on a Huawei router, which of the following parameters areoptional?

Options:

A.

Index of the prefix list

B.

Longest mask length to be matched

C.

Shortest mask length to be matched

D.

Mask length

Question 39

Match the following IPv4 multicast protocols with the corresponding functions.

Question # 39

Options:

Question 40

A switch runs MSTP. The configuration is shown in the figure. What is the role of this switch in MSTI 1?

Options:

A.

Uncertain

B.

Root switch

C.

Non-root switch

D.

Secondary root switch

Question 41

Which of the following statements is true about BGP?

Options:

A.

If the export routing policy applied to a BGP peer changes, manual intervention is required so that the device resends Update messages to the peer.

B.

IGP routes can be converted into BGP routes only through the network command.

C.

A router cannot be configured with multiple BGP processes.

D.

Open messages carry only the BGP header.

Question 42

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

Options:

A.

TRUE

B.

FALSE

Question 43

When receiving a packet, a router matches the packet againstACL rules. The ACL matching result is eitherMatchedorUnmatched. If the matching result isUnmatched, which of the following are possible causes?

Options:

A.

All rules are traversed but no matching rule is found.

B.

The packet matches an ACL rule with the deny action.

C.

No ACL is configured on the device.

D.

An ACL is configured but it does not contain any rules.

Question 44

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

Options:

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Question 45

Which of the following statements regarding the MED value in BGP are true?

Options:

A.

According to BGP route selection rules, the MED value has a lower priority than AS_Path, Preferred-Value, Local-Preference, and Origin.

B.

The default MED value of BGP routes is 0.

C.

By default, BGP can compare the MED values of routes from different ASs.

D.

By default, if there is no MED value in routes, the value 0 is used. If the bestroute med-none-as-maximum command is configured, the maximum MED value 4294967295 is used.

Question 46

Which of the following statements about BFD operating modes are true?

Options:

A.

In demand mode, once a BFD session is set up, the system no longer periodically sends BFD Control packets.

B.

Asynchronous mode does not support the Echo function.

C.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detectiontime, the BFD session is declared down.

D.

Asynchronous mode is the primary BFD operating mode.

Question 47

The Internet Assigned Numbers Authority (IANA) allocates Class D addresses to IPv4 multicast. An IPv4 address is 32 bits long, and the four most significant bits of a Class D address are 1110.

Options:

A.

TRUE

B.

FALSE

Question 48

IGMPV3 not only supports IGMPv1 General Query and IGMPv2 Group-Specific Query, and also IGMPv3 Source/Group-Specific Query.

Options:

A.

TRUE

B.

FALSE

Question 49

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

Options:

A.

TRUE

B.

FALSE

Question 50

Which of the following statements regarding an IP prefix are true?

Options:

A.

An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time.

B.

An IP prefix filter cannot be used to filter data packets.

C.

An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time.

D.

An IP prefix filter can be used to filter data packets.

Question 51

After IPsec is deployed on an enterprise network, services are interrupted. The administrator finds that no data flow triggers IKE negotiation.

Which of the following are possible causes?(Select all that apply)

Options:

A.

Configuration error of an interzone security policy

B.

An unreachable route

C.

The IPsec policy is not correctly applied to the related interface.

D.

A mismatch between the ACL and protected data flow

Question 52

Which Of the following IEEE 802.11 standards is also known as Wi-Fi 6?

Options:

A.

802.11ac

B.

802.11n

C.

802.11ax

D.

802.11b

Question 53

Which of the following is the default interval at which the DIS on a broadcast IS_IS network sends CSNPs.

Options:

A.

30

B.

3.3

C.

10

D.

40

Question 54

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

Options:

A.

TRUE

B.

FALSE

Question 55

Regarding the route-policy set-cost configuration below, which of the following statements is true?

Question # 55

Options:

A.

The route 11.1.0.0/16 is permitted by node 10, and its tost Is set to 300.

B.

The cost of all routes is set to 200.

C.

All the routes that are not permitted by node 10 will be denied.

D.

The route 11.1.0.0/16 will continue to match node 20 after permitted by node 10, and (he final cost is set to 200.

Question 56

An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?

Options:

A.

Configure the remote discriminator of a BFD session.

B.

Configure the local discriminator of a BFD session.

C.

Configure a multicast IP address for BFD.

D.

Enable BFD globally.

Question 57

This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?

[RTA] ospf 100

[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0

Options:

A.

RTA cannot establish a neighbor relationship with the neighbor that this interface is directly connected to.

B.

GigabitEthernet 1/0/0 is prohibited from sending OSPF packets.

C.

Direct routes of GigabitEthernet 1/0/0 can still be advertised.

D.

This interface cannot send Hello packets.

Question 58

In VRRP networking, devices assume the Master and Backup roles after election. Match the two roles with their working mechanisms.(Token is reusable)

Options:

Question 59

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 60

During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.

Options:

Question 61

Compared with RSTP, which of the following port roles are added to MSTP?

Options:

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Question 62

Which of the following statements regarding routing policy and policy-based routing are true?

Options:

A.

A routing policy is used to control import, advertisement, and receiving of routing information.

B.

Policy-based routing is used to control import, advertisement, and receiving of routing information.

C.

Policy-based routing is used to control packet forwarding without following routes in the routing table.

D.

A routing policy is used to control packet forwarding without following routes in the routing table.

Question 63

On an OSPF network, interfaces are classified into four types based on link layer protocols. Which of the following types can interfaces on an IS-IS network be classified into based on physical links?

Options:

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Question 64

As shown in the figure, data traffic is forwarded in tunnel mode along the path of STA -> HAP -> HAC -> upper-layer network before roaming. What is the flow direction of data traffic after Layer 3 roaming?

Options:

A.

STA -> FAP -> FAC -> HAC -> HAP -> HAC -> Upper-layer network

B.

STA -> FAP -> FAC -> HAC -> Upper-layer network

C.

STA -> FAP -> FAC -> Upper-layer network

D.

STA -> FAP -> FAC -> HAC -> HAP -> Upper-layer network

Question 65

Route attributes are specific descriptions of routes. BGP route attributes can be classified into four types. Which of the following are well-known discretionary attributes?

Options:

A.

Atomic_Aggregate

B.

Local-Preference

C.

Community

D.

MED

Question 66

What is the correct procedure for a VLAN pool to assign terminals to VLANs.

Question # 66

Options:

Question 67

VRRP is implemented based on thepriority and preemption functionsof VRRP routers.Which of the following statements is false about the VRRP solution?

Options:

A.

When preemption is enabled, a backup device preempts the master role if it has a higher priority than the current master.

B.

When preemption is disabled, a backup device does not preempt the master role even if it has a higher priority than the current master, provided that the current master is working properly.

C.

The master periodically sends VRRP Advertisement packets in the VRRP group to advertise its configurations such as the priority.

D.

Even if the VRRP device is the IP address owner, it still needs to participate in the election and does not directly transition to the Master state when receiving a message indicating that the interface goes Up.

Question 68

InIP multicast transmission, packets are transmitted from a source to agroup of receivers. Which of the following statements aretrueabout IP multicast technologies?

Options:

A.

Compared with broadcast, IP multicast prevents information flooding.

B.

Compared with broadcast, IP multicast effectively conserves network bandwidth.

C.

Compared with unicast, IP multicast improves information transmission security.

D.

Compared with unicast, IP multicast increases the load of information sources.

Question 69

An enterprise uses OSPF to implement network communication. To ensure data validity and security, all authentication modes supported by OSPF are enabled on routers. In this case, interface authentication is preferentially used by the routers.

Options:

A.

TRUE

B.

FALSE

Question 70

In addition to a route reflector, the confederation is another method that reduces the number of IBGP connections in an AS.

Which of the following statements are true about the confederation technology? (Choose all that apply)

Options:

A.

This technology is applicable to large-scale networks.

B.

Special EBGP connections are established among sub-ASs in a confederation, and the sub-ASs need to be fully meshed.

C.

All member devices in a confederation need to be reconfigured.

D.

The logical topology does not need to be changed when a confederation is used.

Question 71

An engineer sets the CAPWAP heartbeat detection interval to 20 of the active link before an active/standby switchover occurs?

Options:

A.

75s

B.

20s

C.

60s

D.

90s

Question 72

R1, R2, R3, and R4 run IS-IS, and the DIS priorities of their interfaces are shown in the following figure. Ifall these devices are started simultaneously, will be elected as the DIS. (Enter the device name, for example, R1.)Question # 72

Options:

Question 73

A forwarding information database (FIB) can directly guide packet forwarding on a router.

Options:

A.

TRUE

B.

FALSE

Question 74

Which of the following PIM protocol packets have unicast destination addresses.

Options:

A.

Register Stop

B.

Bootstrap

C.

Graft

D.

Assert

Question 75

GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.

Options:

A.

TRUE

B.

FALSE

Question 76

Route summarization is a mechanism that combines multiple routes.BGP supports automatic summarization and manual summarization on IPv6 networks.

Options:

A.

TRUE

B.

FALSE

Question 77

GRE is a VPN encapsulation technology that is widely used to transmit packets across heterogeneous networks. Which of the following statements is false about GRE?

Options:

A.

GRE supports encryption and authentication.

B.

GRE supports multicast transmission.

C.

GRE is a Layer 3 VPN encapsulation technology.

D.

GRE can work with other VPN protocols to better ensure data security.

Question 78

Which of the following is used as the destination port for single-hop BFD?

Options:

A.

UDP port 3784

B.

UDP port 4784

C.

TCP port 3784

D.

TCP port 4784

Question 79

On an OSPF network, there are multiple types of packets, each with a different function. Which of the following are the main functions of Hello packets?

Options:

A.

Neighbor relationship maintenance

B.

Neighbor discovery

C.

Neighbor deletion

D.

Neighbor relationship establishment

Question 80

IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?

Options:

A.

Group-Specific Query message

B.

Leave message

C.

Report message

D.

Specifying a multicast source

Question 81

Which of the following statements regarding the stateful inspection firewall is true?

Options:

A.

When the stateful inspection firewall checks packets, packets of one same connection are not correlated.

B.

Because UDP is a connectionless protocol, so the stateful inspection firewall cannot match UDP packets with the status table.

C.

The stateful inspection firewall only needs to match the first data packet against a rule, and the subsequent packets of the connection are matched directly in the state table.

D.

The stateful inspection firewall needs to match the rules for each incoming packet.

Question 82

To prevent inter-area routing loops, OSPF does not allow advertising routing information between two non-backbone areas and allows sing routing information only within an area or between the backbone area and a non-backbone area. Therefore, each ABR must be connected to the backbone area.

Options:

A.

TRUE

B.

FALSE

Question 83

By default, a router interface sends PIM Hello messages at an interval of __________ seconds.

Options:

Question 84

OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?

Options:

A.

Non-authentication

B.

MD5 authentication

C.

Plaintext authentication

D.

Hash authentication

Question 85

To overcome the disadvantages ofSTP,RSTPchanges the format ofconfiguration BPDUs. Which of the following fields inSTP BPDUsis used to specify theport role?

Options:

A.

Flags

B.

BPDU Type

C.

PID

D.

PVI

Question 86

The following figure shows the BGP state switching mechanism. Drag the following BGP states to the corresponding sequence numbers.

Question # 86

Question # 86

Options:

Question 87

On an OSPF network, an IR in area 0 must be a BR, but an ASBR may not be an ABR.

Options:

A.

TRUE

B.

FALSE

Question 88

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

Options:

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Question 89

On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?

Options:

A.

The HTTP or HTTPS protocol can be used as the Portal access or authentication protocol.

B.

By default, the access device processes Portal protocol packets through port 2000.

C.

By default, the device uses the destination port number 50100 to proactively send packets to the Portal server.

D.

Portal protocol packets are transmitted over TCP.

Question 90

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

Options:

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicastdata properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Question 91

A large enterprise deploys WLAN in VRRP HSB mode to ensure network reliability.

In this networking mode, which of the following data backup modes are supported?(Select all that apply)

Options:

A.

Real-time backup

B.

Scheduled synchronization

C.

Batch backup

D.

Cloud backup

Question 92

By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.

Options:

A.

TRUE

B.

FALSE

Question 93

An edge port is a new port role added to RSTP to overcome the disadvantages of STP. Which of the following statements is false about this port role?

Options:

A.

The port does not participate in RSTP calculation.

B.

The port can directly enter the Forwarding state from the Discarding state.

C.

After receiving a configuration BPDU, the port is still in the Forwarding state.

D.

The Up and Down states of the port do not cause network topology changes.

Question 94

As shown in the figure, SWA, SWB, and SWC run the Rapid Spanning Tree Protocol (RSTP). What are the roles of SWB's GE0/0/2 and SWC's GE0/0/1?

Options:

A.

Backup port, alternative port

B.

Alternative port, backup port

C.

Backup port, root port

D.

Root port, designated port

Question 95

A non-client is an IBGP peer that functions as neither an RR nor a client. A non-client must establish fully meshed connections with the RR and all the other non-clients.

Options:

A.

TRUE

B.

FALSE

Question 96

In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

Options:

A.

TRUE

B.

FALSE

Question 97

An OSPF AS-external LSA describes a route to an AS external network. When the field in the LSA is 0.0.0.0, the traffic destined for the external network is sent to the ASBR that imports this external route. (Enter the acronym in uppercase.)

Options:

Question 98

Which of the following statements is false about BFD?

Options:

A.

The asynchronous mode is the primary BFD operating mode.

B.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection interval, the BFD session is declared down.

C.

The asynchronous mode does not support the echo function.

D.

In demand mode, after a BFD session is set up, the system does not periodically send BFD Control packets.

Page: 1 / 6
Total 60 questions