Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)

Full Access
Question # 5

An IP prefix list is a common matching tool used in routing policies. Which of the following cannot be configured as matching conditions in an IP prefix list on a Huawei router?

A.

Port number

B.

Mask

C.

Action

D.

Index

Full Access
Question # 6

After which of the following parameters are modified does an IS-IS neighbor relationship need to re-established?

A.

The cost of an IS-IS interface is changed.

B.

The IP address of an ISIS interface is changed.

C.

The level of an ISIS interface is changed.

D.

The interval at which an IS-IS interface sends IIH packets is changed.

Full Access
Question # 7

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

A.

TRUE

B.

FALSE

Full Access
Question # 8

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

A.

TRUE

B.

FALSE

Full Access
Question # 9

On a WLAN, MAC address authentication controls network access rights of a user based on the user's access interface and terminal MAC address.

Which of the following statements is false about MAC address authentication?

A.

User passwords can be processed using PAP or CHAP.

B.

By default, the MAC address of a terminal is used as the user name and the last 6 hexadecimal digits of the terminal MAC address are used as the password for MAC address authentication.

C.

No client software needs to be installed on user terminals.

D.

A MAC address authentication system consists of three types of entities: terminal, access device, and authentication server.

Full Access
Question # 10

An enterprise uses OSPF to implement network communication. To ensure data validity and security, all authentication modes supported by OSPF are enabled on routers. In this case, interface authentication is preferentially used by the routers.

A.

TRUE

B.

FALSE

Full Access
Question # 11

On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.

Full Access
Question # 12

Which of the following statements is false?

A.

If the current DR fails, the current BDR automatically becomes a new DR, and a BDR will be elected again.

B.

A device with a higher router priority has a higher election priority.

C.

When a router with the highest router priority joins an OSPF network, this router will become the new DR.

D.

If two devices have the same router priority, the device with a larger router ID has a higher election priority.

Full Access
Question # 13

As shown in the following figure, a new AP is deployed In dual link MSB networking (load balancing mode). Which AC will the connect to?

A.

AC1

B.

Random access

C.

None

D.

AC2

Full Access
Question # 14

VRF, also called VPN instance, is a network virtualization technology that helps VPN technology to isolate users. In normal cases, multiple VPN instances can be created on a physical device, and each VPN instance has independent entries. Which of the following resources can be independently owned by a VPN instance?

A.

Interface

B.

Routing table

C.

MAC address table

D.

Routing protocol process

Full Access
Question # 15

A firewall receives a packet that PC1 sends to PC2. Which of the following statements are true?

A.

The packet does not match any security policy.

B.

The packet matches security policy rule 1, and the firewall forwards the packet.

C.

No source or destination security zone is specified in security policy rule 2, indicating that any security zone is a match.

D.

The packet matches security policy rule 1, and the firewall discards the packet.

Full Access
Question # 16

Which of the following is the default dead time of an interface on an OSPF P2P or broadcast network?

A.

40s

B.

120s

C.

60s

D.

10s

Full Access
Question # 17

On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?

A.

LSP Number

B.

Pseudonode ID

C.

System ID

D.

IS Type

Full Access
Question # 18

Which of the following statements regarding Local-Preference in BGP is true?

A.

Local-Preference affects traffic that enters an AS.

B.

Local-Preference can be transmitted between ASs.

C.

The default Local-Preference value is 100.

D.

Local-Preference is a well-known mandatory attribute.

Full Access
Question # 19

A switch runs MSTP. The configuration is shown in the figure. What is the role of this switch in MSTI 1?

A.

Uncertain

B.

Root switch

C.

Non-root switch

D.

Secondary root switch

Full Access
Question # 20

On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.

A.

TRUE

B.

FALSE

Full Access
Question # 21

After HSB is configured, the HSB channel fails to be established and cannot back up information on the active device to the standby device. What are the possible causes for this HSB function failure?

A.

The TCP channel is not established.

B.

The retransmission count and interval for HSB service packets are different on the two devices.

C.

The two ACs have the same priority.

D.

The source IP address and port number of the local end are different from the destination IP address and port number of the remote end.

Full Access
Question # 22

STP ensures a loop-free network but has a slow network topology convergence speed, affecting communication quality. RSTP has made some improvements based on STP. Which of the following improvements is not included?

A.

If a port does not receive configuration BPDUs from the upstream device within four Hello intervals, the switch considers that the negotiation with the neighbor fails.

B.

The non-root switch running RSTP sends configuration BPDUs at the interval specified by the Hello timer, which is performed independently by each device.

C.

RSTP reduces five port states to three port states based on user traffic forwarding and MAC address learning.

D.

RSTP deletes three port states and adds two port roles.

Full Access
Question # 23

OSPF networks are classified into four types of networks by link layer protocol. Drag the following link layer protocols to the corresponding network types.(Token is reusable)

Full Access
Question # 24

Typically, a protocol that occupies two ports during communication is called a multi-channel protocol. For such protocols, the ASPF function must be enabled on the firewall to ensure smooth setup of the data channel and reduce the risk of attacks. Which of the following protocols is not a multi-channel protocol?

A.

FTP

B.

SIP

C.

SMTP

D.

H.323

Full Access
Question # 25

Which of the following messages are sent when BGP establishes peer relationships?

A.

Keepalive

B.

Hello

C.

Update

D.

Open

Full Access
Question # 26

As shown in the figure, R1 imports the direct route 10.1.1.0/24 to OSPF. An engineer enables bidirectional route re-advertisement on R2 and R3, and configures the following commands on R3. After the network becomes stable, which of the following is thePrevalue of the route 10.1.1.0/24 in the routing table of R4?

[R3]acl 2000

[R3-acl-basic-2000] rule permit source 10.1.1.0 0

[R3-acl-basic-2000] quit

[R3]route-policy hcip permit node 10

[R3-route-policy-10] if-match acl 2000

[R3-route-policy-10] apply preference 14

[R3-route-policy-10] quit

[R3]ospf 1

[R3-ospf-1] preference ase route-policy hcip

A.

150

B.

14

C.

10

D.

15

Full Access
Question # 27

Match the following IPv4 multicast protocols with the corresponding functions.

Full Access
Question # 28

In BGP, the AS_Path attribute records the numbers of all ASs that a route passes through from the local end to the destination in the vector order.

Which of the following statements is false about the attribute change during route transmission?

A.

When advertising the route to an IBGP peer, the BGP speaker creates an empty AS_Path in the Update message.

B.

When advertising the route to an EBGP peer, the BGP speaker adds the local AS number to the end of the AS_Path.

C.

When advertising the route to an EBGP peer, the BGP speaker creates an AS_Path carrying the local AS number in the Update message.

D.

When advertising the route to an IBGP peer, the BGP speaker does not change the AS_Path attribute of the route.

Full Access
Question # 29

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

A.

232.0.0.0 to 232.255.255.255

B.

239.0.0.0 to 239.255.255.255

C.

224.0.0.0 to 224.0.0.255

D.

224.0.1.0 to 231.255.255.255

Full Access
Question # 30

A campus network uses OSPF for network communication. The display ospf peer command is run on a router, and the command output is as follows:

vbnet

Copy

Edit

display ospf peer

OSPF Process 1 with Router ID 10.0.2.2

Area 0.0.0.0 interface 10.0.235.2 (GigabitEthernet0/0/1)'s neighbors

Router ID: 10.0.5.5 Address: 10.0.235.5

State: Full Mode: Nbr is Master Priority: 1

DR: 10.0.235.5 BDR: 10.0.235.3 MTU: 0

Dead timer due in 40 sec

Area 0.0.0.0 interface 10.0.24.2 (Serial1/0/1)'s neighbors

Router ID: 10.0.4.4 Address: 10.0.24.4

State: Full Mode: Nbr is Master Priority: 1

DR: None BDR: None MTU: 0

Dead timer due in 35 sec

Which of the following statements are true about the device?

A.

The IP address of the DR on the network where R2 and its neighbor 10.0.5.5 reside is 10.0.235.5.

B.

R2 has established adjacencies with 10.0.5.5 and 10.0.4.4.

C.

The DR/BDR election fails on the network where R2 and its neighbor 10.0.4.4 reside.

D.

Router IDs of the two OSPF neighbors of R2 are 10.0.5.5 and 10.0.4.4.

Full Access
Question # 31

Which of the following statements regarding the stateful inspection firewall is true?

A.

When the stateful inspection firewall checks packets, packets of one same connection are not correlated.

B.

Because UDP is a connectionless protocol, so the stateful inspection firewall cannot match UDP packets with the status table.

C.

The stateful inspection firewall only needs to match the first data packet against a rule, and the subsequent packets of the connection are matched directly in the state table.

D.

The stateful inspection firewall needs to match the rules for each incoming packet.

Full Access
Question # 32

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

A.

TRUE

B.

FALSE

Full Access
Question # 33

Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?

A.

Telnet

B.

SNMP

C.

Login through the Console port

D.

FTP

Full Access
Question # 34

BFD for OSPF is deployed on a directly connected link. If the physical link is disconnected, drag the following BFD processes to the corresponding sequence numbers.

Full Access
Question # 35

IGMPv2 uses the timeout mechanism for group members leaving a group. Group members can only leave a group silently. Before the timeout period expires, multicast traffic is still forwarded by the multicast router, and this is a defect.

A.

TRUE

B.

FALSE

Full Access
Question # 36

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

A.

TRUE

B.

FALSE

Full Access
Question # 37

ACLs are a common tool for matching routes. ACLs are classified into multiple types based on ACL rule functions. An ACL can be identified by a number, and the number range for each type of ACLs is different. Which of the following type of ACLs are numbered from 4000 to 4999?

A.

User-defined ACL

B.

Basic ACL

C.

Layer 2 ACL

D.

Advance ACL

Full Access
Question # 38

On an OSPF or IS-IS network, the filter-policy import command can be run on a router to filter out the LSAs forwarded by its neighbors.

A.

TRUE

B.

FALSE

Full Access
Question # 39

As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?

A.

Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree.

B.

After a port is Configured as an edge port, the port can quickly enter the Forwarding state.

C.

You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state.

D.

You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state.

Full Access
Question # 40

The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?

A.

If URPF is enabled on the peer end, BFD packets may be incorrectly discarded on the peer end.

B.

In the BFD Echo function, the device uses the IP address of the outbound interface as the source IP address by default.

C.

The BFD Echo function applies only to single-hop BFD sessions.

D.

When configuring a BFD session supporting the BFD echo function, you need to configure both the local and remote discriminators.

Full Access
Question # 41

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicastdata properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Full Access
Question # 42

Which of the following attribute must be carried in an Update message?

A.

Local-pref

B.

Prefval

C.

MED

D.

AS-Path

Full Access
Question # 43

In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.

A.

TRUE

B.

FALSE

Full Access
Question # 44

By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.

A.

TRUE

B.

FALSE

Full Access
Question # 45

Which of the following scenarios is not suitable for deploying interface PBR?

A.

A core switch needs to forward traffic between the intranet and extranet to an AC device that connects to the core switch in off-path mode.

B.

A core switch needs to forward the traffic between the intranet and extranet to a security detection device that connects to the core switch in off-path mode.

C.

A device needs to modify the next-hop IP address for locally originated traffic.

D.

On an enterprise network with multiple ISP outbound interfaces, each internal network segment accesses the Internet through a particular ISP outbound interface.

Full Access
Question # 46

On the network shown in the following figure, the management VLAN is VLAN 10, and the AP isconfigured to obtain an IP address on the network segment 10.1.1.0/24 through DHCP. The AP, AC, and AR function as the DHCP client, DHCP relay agent, and DHCP server, respectively. Which of the following configurations for the DHCP relay agent and DHCP server are correct?

A.

[AC] dhcp server group AP[AC-dhcp-server-group-AP] dhcp-server 172.21.1.2[AC-dhcp-server-group-AP] quit[AC] interface Vlanif 10[AC-Vlanif 10] dhcp select relay[AC-Vlanif 10] dhcp relay server-select AP[AC-Vlanif 10] quit

B.

[AR] ip pool AP[AR-ip-pool-AP] network 10.1.1.0 mask 24[AR-ip-pool-AP] gateway-list 10.1.1.2[AR-ip-pool-AP] excluded-ip-address 10.1.1.1[AR-ip-pool-AP] quit[AR] interface GigabitEthernet 0/0/1[AR-GigabitEthernetO/O/1] dhcp select global[AR-GigabitEthernet0/0/l] quit[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

C.

[AR] ip pool AP[AR-ip-pool-AP] network 172.21.1.0 mask 24[AR-ip-pool-AP] gateway-list 172.21.1.2[AR-ip-pool-AP] excluded-ip-address 172.21.1.1[AR-ip-pool-AP] quit[AR] interfaceGigabitEthernet 0/0/1[AR-GigabitEthernetO/0/1] dhcp select global[AR-GigabitEthernetO/0/1] quit[AR] ip route-static 10.1.1.0 255.255.255.0 172.21.1.1

D.

[AC] dhcp server group AP[AC-dhcp-server-group-AP] dhcp-server 10.1.1.2[AC-dhcp-server-group-AP] quit[AC] interface Vlanif 10[AC-Vlanif 10] dhcp select relay[AC-Vlanif 10] dhcp relay server-select AP[AC-VlaniflO] quit

Full Access
Question # 47

GRE is a VPN technology that can implement packet transmission over heterogeneous networks. Which of the following statements are true about GRE?

A.

GRE is a Layer 2 VPN encapsulation technology.

B.

GRE enables encapsulated data packets to be transmitted over another network layer protocol, butcannot encapsulate multicast data.

C.

GRE tunnels can work with IPsec to ensure the security of multicast services such as voice and video.

D.

GRE tunnels can extend the working range of network protocols with hop limits.

Full Access
Question # 48

Which of the following routing protocols support the default route through command configuration?

A.

BGP

B.

IS-IS

C.

OSPF

D.

ICMP

Full Access
Question # 49

Which of the following statements about the forwarding plane of a switch is false?

A.

Provides high-speed and non-blocking data channels.

B.

Can encapsulate and decapsulate packets.

C.

Can collect packet statistics.

D.

Consists of main control boards and interface boards.

Full Access
Question # 50

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

A.

TRUE

B.

FALSE

Full Access
Question # 51

A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?

A.

Voltage monitoring

B.

Temperature monitoring

C.

Fan control

D.

System power-on and power-off control

Full Access
Question # 52

When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?

A.

Local AS number

B.

Router ID

C.

NLRI

D.

Hold time

Full Access
Question # 53

When two BGP peers support different Hold Time, they will negotiate to support the shortest Hold Time interval they can support.

A.

TRUE

B.

FALSE

Full Access
Question # 54

The IP prefix list configuration on a Huawei router is shown below. Which of the following routes can match this IP prefix list?

bash

Copy

[huawei] ip ip-prefix test index 10 permit 10.0.0.0 8 less-equal 32

A.

10.1.1.1/32

B.

10.1.1.0/6

C.

10.1.1.0/24

D.

10.0.0.0/16

Full Access
Question # 55

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Full Access
Question # 56

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

A.

TRUE

B.

FALSE

Full Access
Question # 57

After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?

A.

Multiple DHCP servers are configured.

B.

STP is enabled on the DHCP server.

C.

The DHCP function is disabled by default, and the administrator forgets to enable the DHCP function.

D.

DHCP clients and the DHCP server are on different network segments, and no DHCP relay agent is configured on the network.

Full Access
Question # 58

NETCONF is a network configuration protocol that automates network configuration in a programmable manner, simplifying and accelerating network service deployment. Which of the following operations can be performed by using this protocol?

A.

Modifying configurations

B.

Deleting configurations

C.

Restoring configurations

D.

Backing up configurations

Full Access
Question # 59

A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.

A.

TRUE

B.

FALSE

Full Access
Question # 60

Which command is used to configure the VRRP preemption delay?

A.

vrrp vrid 1 timer delay 20

B.

vrrp vrid 1 preempt-delay 20

C.

vrrp vrid 1 preempt-mode timer delay 20

D.

vrrp vrid 1 preempt-timer 20

Full Access
Question # 61

An enterprise uses Huawei routers to deploy an IS-IS network for network-wide communication. An engineer wants to change the interface cost to control route selection. By default, which of the following values is the maximum cost that can be configured?

A.

67

B.

63

C.

64

D.

68

Full Access
Question # 62

On an OSPF network, routers learn routing information on the entire network by exchanging LSAs. Which of the following values is the LS Age in the LSA header when an LSA is deleted?

A.

1800s

B.

3600s

C.

1200s

D.

600s

Full Access
Question # 63

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements isfalseabout BFD optimization?

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Full Access
Question # 64

IGMPV3 not only supports IGMPv1 General Query and IGMPv2 Group-Specific Query, and also IGMPv3 Source/Group-Specific Query.

A.

TRUE

B.

FALSE

Full Access
Question # 65

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Full Access
Question # 66

In an MST region, MSTP independently calculates an MSTI for each VLAN based on mappings between VLANs and MSTIs.

Which of the following statements is false about the characteristics of MSTIs?

A.

A port must have the same spanning tree parameter settings for different MSTIs.

B.

The spanning tree calculation method of each MSTI is similar to that in STP.

C.

Spanning trees of MSTIs can have different roots and topologies.

D.

Each MSTI sends BPDUs only on its own spanning tree.

Full Access
Question # 67

Which of the following statements regarding OSPF is true?

A.

OSPF does not have an acknowledgement mechanism. Therefore, OSPF relies on the upper-layer protocol, TCP, for acknowledgement.

B.

OSPF performs LSDB update every 30 minutes.

C.

OSPF uses the Bellman-Ford algorithm, and each router independently runs this algorithm.

D.

OSPF floods a LSU packet at an interval of 5s.

Full Access
Question # 68

OSPF has multiple types of routes with varying priorities. Which of the following types of routes has the lowest priority when they have the same prefix?

A.

Type 1 external route

B.

Inter-area route

C.

Type 2 external route

D.

Intra-area route

Full Access
Question # 69

BFD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?

A.

4784

B.

3784

C.

5784

D.

2784

Full Access
Question # 70

In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.

A.

TRUE

B.

FALSE

Full Access
Question # 71

Compared with RSTP, which of the following port roles are added to MSTP?

A.

Backup port

B.

Master port

C.

Edge port

D.

Regional edge port

Full Access
Question # 72

Which of the following statements regarding the OSPF protocol is false?

A.

Each OSPF router uses only one Router-LSA to describe the local active connection status of an area.

B.

Routing information can be advertised only between backbone and non-backbone areas and cannot be advertised directly between non-backbone areas.

C.

Router-LSA describes four connection types: P2P, TransNet, SubNet, and virtual link.

D.

Link State ID in a Type 3 LSA indicates the router ID of an ABR.

Full Access
Question # 73

On an IS-IS network, each router can generate LSPs. Which of the following events trigger the generation of a new LSP?

A.

Related IS-IS interfaces go up or down.

B.

Periodic updates occur.

C.

Inter-area IP routes change.

D.

The IS-IS interface cost is increased.

Full Access
Question # 74

By default, a router interface sends PIM Hello messages at an interval of __________ seconds.

Full Access
Question # 75

Which of the following statements are true about theLocal_Prefattribute in BGP? (Choose all that apply)

A.

The default Local_Pref value is 0.

B.

The Local_Pref attribute can be transmitted to all BGP peers.

C.

The Local_Pref value remains unchanged during transmission unless it is affected by a routing policy.

D.

The greater the value of the Local_Pref attribute, the higher the priority.

Full Access
Question # 76

After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.

A.

TRUE

B.

FALSE

Full Access
Question # 77

The following figure shows the BGP state switching mechanism. Drag the following BGP states to the corresponding sequence numbers.

Full Access
Question # 78

What is the default sending interval of BFD packets?

A.

10s

B.

5s

C.

100ms

D.

1000ms

Full Access
Question # 79

When creating a single-hop BFD session for the first time, bind the single-hop BFD session to the peer IP address and the local address. To modify a configured BFD session, delete it and create a new one.

A.

TRUE

B.

FALSE

Full Access
Question # 80

Which of the following protocols are multi-channel protocols?

A.

H.323

B.

FTP

C.

Telnet

D.

SMTP

Full Access
Question # 81

On a broadcast IS-IS network, a DIS needs to be elected to create and update pseudonodes. Which of the following values is the default DIS priority of an IS-IS interface?

A.

200

B.

64

C.

1

D.

100

Full Access
Question # 82

BGP confederations are widely used because they can reduce the number of IBGP connections in an AS. Which of the following statements is false about confederations?

A.

The ASs outside a confederation still consider the confederation as one AS.

B.

After a confederation is configured, the original IBGP attributes can be retained.

C.

After a confederation is configured, the original AS number is used as the confederation ID of each router.

D.

A confederation divides an AS into several sub-ASs, and EBGP full-mesh connections are established in each sub-AS.

Full Access
Question # 83

Which of the following statements regarding the summary automatic command and BGP route summarization is false?

A.

After this command is configured, BGP sends only the summarized routes to peers

B.

This command is used to implement automatic summarization. Automatic summarization takes precedence over manual summarization

C.

This command enables automatic summarization for the locally imported routes

D.

After this command is configured, BGP summarizes routes based on natural network segments

Full Access
Question # 84

After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.

A.

TRUE

B.

FALSE

Full Access
Question # 85

ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?

A.

If the firewall security policy permits packets to pass, the session table is created.

B.

By default, when status detection is disabled and the permit policy is configured packets can pass.

C.

Packets must pass the firewall, and a session table is established.

D.

If the firewall security policy permits packets to pass, the packets can pass the firewall.

Full Access
Question # 86

Which of the following statements about multicast packet forwarding is true?

A.

If a multicast data packet fails the RPF check, the packet must have been received through a sub-optimal interface. However, this interface still receives and forwards the multicast traffic downstream.

B.

IGMP snooping cannot control the scope of multicast traffic flooding on a Layer 2 network.

C.

The source address of a multicast packet is a unicast address.

D.

In multicast transmission, the destination address of a packet can be the unicast address of a host.

Full Access
Question # 87

An enterprise administrator views the following details about a BGP route during routine O&M:

yaml

CopyEdit

display bgp routing-table 192.168.1.1

BGP local router ID: 10.1.1.1

Local AS number: 100

Paths: 2 available, 0 best, 0 select

BGP routing table entry information of 192.168.1.1/32:

From: 10.1.1.2 (10.1.1.2)

Route Duration: 00h01m31s

Relay IP Nexthop: 0.0.0.0

Relay IP Out-Interface: --

Original nexthop: 172.16.1.2

AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable

Not advertised to any peer yet

Which of the following statements are true about the BGP route?

A.

The original next hop of the route is 172.16.1.2.

B.

The local BGP router ID is 10.1.1.1.

C.

The local AS number is 100.

D.

The route is preferentially selected because its Local_Pref has a higher priority.

Full Access