Winter Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

The router is running both OSPFv3 and ISIS, and the OSPFv3 route needs to be introduced to ISIS, which of the following ingestion configurations is correct:( Multiple choice questions).

A.

Huawel ias 1 ltuawei-i- isHeveleve!. l Huave-s-1 networkenity 47001.0000020 Hawe -sis-1 ipv6enabletopolog standard Htuawer is-] pob impot.

B.

(Huawei isis l Huawei-si-1 s-levelve!-l Huavei- ti.-1] networkentiy

4 .001.00001. Huawei sis pob enable topogy s andard Hhuawelitis ]l p6 importroute ospfv3 1 [Hu

C.

[Huawei] sis 1 [Huawel-isis-1] networkentity47001.000000200 Huawe-ss 1 ipb6enable topologist standard Huawei is l p6 importroue esgp.31lese! [Huaweisis-1] quit [Huawei

D.

HuaweJ IsIS

[Huaweij isis 1 Huavei-isis-1]networkentity470001.000000020Huawei-sis- 1limpotroueosph31 ltuowe.is- ut tuawl sph 1 fhuwf spol Jronea d2222 [Huawei) isis 1 Huawe-sis-1] is level level-1 [Huavei-sis-1 etworkentity 47001.0000020 Huawel-d.-1[impotroteosph-1 le e. [tuawelts a ut ltunweospfv3 1 [Huawei

Full Access
Question # 5

The following link-LSA for OSPFv3 is correct?

A.

Contains both the link-local address of this interface and all IPV6 prefixes of the same area on this router.

B.

Contains both the link-local address of the interface and all IPv6 prefixes on the interface.

C.

?Link-LSA ???Prefix ?Prefixoptions ???Ox00,?? Prefix ????IPv6??????

D.

The Option field exists in the header of the LSA, not in the data area of the Link-LSA

Full Access
Question # 6

What is the following description of MPLS BGPVPN incorrect?

A.

The TTL field in the label has the effect of preventing loops.

B.

IBGP PEes generally use the Loopback interface address to establish a stable BGP neighbor relationship

C.

BGP So0, which is used to prevent routes issued from a VPN site from passing through the MPLS backbone and back to that site. So0 is an extended group attribute that MP-BGP automatically generates.

D.

The routing exchange between D. PE-CE can be static routing, OSPF multi-instance, IS-IS multi-instance, EBGP

Full Access
Question # 7

An existing router running BGP, HW1, has both IBGP neighbors and EBGP neighbors configured on the router. Are the IP Neighbors and EBGP Neighbors described below correctly?

A.

The router will be connected directly from its EBGP IBGP neighbor, otherwise, IBGP-Multi-hop must be configured

B.

The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors

C.

IBGP neighbors can establish neighbor relationships through Loopback engagements

D.

The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors

E.

EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must configure

Full Access
Question # 8

BGP routing policies can control the publication and acceptance of routes

A.

TRUE

B.

FLASE

Full Access
Question # 9

In EPIM-SM, the following description of the PIM Join message is correct?

APIM Join messages are sent every 3 minutes, and status B. PIM Join messages for the multicast tree are only sent when the multicast tree is first established

C. The PIM Join message is sent every 60 seconds to refresh the status of the upstream router mroute for the multicast tree

D. The upstream router sends a PIM Join acknowledgment in response to each PIM Join message received from the downstream router

Full Access
Question # 10

MACsec provides users with secure MAC layer data sending and receiving services. Which of the following is not a service available by ACsec?

A.

User data encryption

B.

Data source authenticity verification

C.

Integrity check

D.

Controllability check

Full Access
Question # 11

If you need to configure routing policies on one router. Which of the following parameters does an administrator use to route when deploying a routing policy?( Multiple select).

A Protocol B. Application

C. Size of the packet D. Throughput

E. Identification of a specific terminal system

Full Access
Question # 12

What is correct below about LDP synchronization in ISIS?

A.

LDP synchronization can be turned on globally.

B.

LDP establishes neighbors faster than ISIS, so LDP synchronization is turned off by default

C.

LDP synchronization avoids traffic loss when the active-standby link is switched.

D.

LDP synchronization can be deployed on the Loopback interface.

Full Access
Question # 13

Huawei's two switches SWA and SWB are connected together by 7 Ethernet cables, and static link clustering is configured, and the corresponding port on the switch SWA is Ethernet 1/0/1 ?Ethernet1/0/2?Ethernet 1/0/3?Ethernet 1/0/4?Ethernet 1/0/5, Ethernet1/0/6, Ethernet 1/0/7, configured in order of port if the switch SWA, SWB supports only 6 ports per aggregation group

A.

In the case of consistent configuration of each port, Ethernet 1/0/6 port is an aggregate group Unselected port

B.

In the case of consistent configuration of each port, the Ethernet1/0/1 port is an aggregate group Unselected port

C.

With the same configuration of each port, the Ethernet 1/0/7 port is the aggregate group Unselecte port

D.

With the same configuration of each port, SWA randomly selects one of the 7 ports as the aggregate group Unselecte port

Full Access
Question # 14

Run the SSM across the entire HW IP multicast network. The following about SSM understands correctly?( Multiple choice question)

A.

No RP is required

B.

SSM uses only shared trees

C.

SSM uses only the SPT tree

D.

Ideal for 1-to-many applications

E.

SSM is recommended when you have multiple sources and expect to minimize the state of mroute in your network Ideal for many-to-many applications

Full Access
Question # 15

If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an LSA with an LS ID of 0000, and what type of LSA is the LAS to?

A.

LSA5

B.

LSA2

C.

LSA1

D.

LSA3

Full Access
Question # 16

Which levels are common in the OSI reference model and the ICP/IP model? ( Multiple choice question)

A.

Session layer

B.

Data link layer

C.

Transmission layer

D.

Presentation Layer

E.

Physical Layer

F.

Application Layer

Full Access
Question # 17

The following statement about IPSG technology is correct (single choice).

A.

The ip source checkuser-bind check-item command is used to configure VLAN- or interface-based IP packet checks, which take effect for both dynamic and static table entries.

B.

If an interface is configured as the OKCP Scooing Tust interface, the interface can normally receive DHCP ACK and DHCPNAK responded to by the OHHNP server and DHCPOffer packets, other untrusted ports cannot receive these packets properly.

C.

On Huawei routers, ipSG functions can be configured in Vlanif.

D.

The IPSG can perform binding table match checks on IP packets entering and leaving the interface.

Full Access
Question # 18

When the load is an ICMPv6 message, what is the numeric value of the Next Header field in the IPv6 header if the presence of an extended header is not taken into account?

A.

58

B.

78

C.

55

D.

68

Full Access
Question # 19

BGP can only automatically aggregate routes whose source is Incomplete.

A.

True

B.

False

Full Access
Question # 20

The router port to which the policy is applied has been idle for about 10 seconds, and there is a huge burst of c1 type coming in an instant, so how many bytes will the packets that are colored green?

A.

256K bytes

B.

48128 bytes

C.

32K bytes

D.

80128 bytes

Full Access
Question # 21

What are the benefits of using WRED?( Multi-select)

A.

Provides some low latency

B.

Avoid TCP global synchronization

C.

Avoid congestion completely

D.

Provides a small bandwidth guarantee

E.

Can avoid UDP occupying most of the bandwidth when congested

Full Access
Question # 22

When the ACL in the VRP has multiple matching rules (rules), the matching order is about Which of the following statements is true?( Confirmed).

A.

By default, matching is based on the principle of "depth first"

B.

By default: Match in the order in which the perfect is matched first, then deny is matched.

C.

By default, rule-ID is followed Match from small to large

D.

There is only one matching order and cannot be modified

Full Access
Question # 23

Dual-bucket, two-speed is used in traffic governance, where the number of tokens in a C bucket is TC and the number of tokens in a P bucket is TP. When a message of length B enters, which of the following sentences is correctly described? (Multiple choice questions).

A.

If TP-B~O and TC-B < 0, the message is marked green

B.

If TP-B<0 and TC-B-0, the message is marked in red

C.

If TP-B>0 and TC-B < 0, the message is marked yellow

D.

If TP-B >O and TC-B > 0, the message is marked as a green

Full Access
Question # 24

Protocols with TCP ports 443, 179, 137, 110, and 23 are, in order: radio

A.

Finger,DHCP Server,NetBios Name Server,POP3,TelnetB

B.

LDAP,SNMP,TFTP,POP3,Telnet

C.

HTTPS,SNMP,POP3,DNS ,Telnet

D.

HiPS,BGP, NetBios Name Server ,POP3,TelnetE. BGP,POP3,SNMP,TFTP,Teinet

Full Access
Question # 25

When you deploy BGP/MPLSIPVPN, when two VPNs have a common site, the common site must not use overlapping address spaces with the other sites of the two VPNs.

A.

TRUE

B.

FALSE ?:B

499The series description for configuring static lSPs in MPLS networks is correct?

C.

When an LSR is Ingress LSR, only configure Out Label, which ranges from 16-1048575

D.

When an LSR is a Transit LSR, you need to configure both In Label and Out label, both in the range of 16-1023

E.

When an LSR is TransitLSR, you need to configure both ln Label and Out Label, both of which are 161023 The Out Label ranges from 16 to 1048575

F.

When an LSR is An Egyptian LSR, only in Label needs to be configured, ranging from 16-1023

Full Access
Question # 26

There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct?

A.

When HW1 injects a default route into Zone 1, HW1's local route table can not contain a single default route

B.

HW1 injects a Type 7 default route into Zone 0

C.

HW1 injects a type 7 default route into zone 1

D.

HW1 injects a Type 3 default route into Zone 1

E.

When HW1 injects a default route into zone 1, HW1's local route table needs to answer the default route

Full Access
Question # 27

Which of the following LSAs propagate in a single region only?

A.

Router LSA

B.

Summary LSA

C.

Network LSA

D.

AS External LSA

Full Access
Question # 28

The OSPF3 protocol is a separately developed protocol that differs somewhat from OSPF2 in that OSPFv3 is link-based rather than network segmented, and the following statement is incorrect?(). Single choice questions).

A.

Two OSPF routers connected to the link can establish a neighbor relationship even if their IPv6 address prefixes are different

B.

The routing information obtained by the B. OSPFv3 router from the neighbor uses the neighbor's Link-Local address as the next hop in the forwarded packet

C.

For two OSPF routers connected to the link, you can establish a neighbor relationship even if you do not configure a unicast IPv6 address

D.

All OSPFv3 interfaces use the Link-Local address as the destination address of the message

Full Access
Question # 29

The address resolution feature for NDP in the following description is incorrect?

A.

When sending a neighbor request packet, the source address—is set as the link-local address

B.

of the local interface Two types of ICMPv6 messages,

C.

are used in the address resolution process, neighbor request and neighbor advertisement Address resolution implements the ability to resolve from IPv6 addresses to link-layer addresses

D.

When sending a neighbor request packet, the destination address must be the multicast address of the neighbor's requested node

Full Access
Question # 30

The following is the correct description of the aggregation of BGP (radio).

A.

After you configure the Aggregate ipv4-address mask, only aggregate routes are published, not detail routes.

B.

For IPv6 routing, BGP supports manual aggregation and automatic aggregation.

C.

BGP enables automatic aggregation by default.

D.

Routes in the BGP local route table can be manually aggregated.

Full Access
Question # 31

The following message about the Register in PIM-SM describes the correct ?( Multiple choice questions).

A.

The Register message enables the RP to learn the multicast source information

B.

The Register message is sent by the receiver router

C.

Register messages are sent to RPv via unicast instead of multicast

D.

The Register message is sent by the source DR

Full Access
Question # 32

When configuring AS-Path-Filter, ip as-path-filter 10 permit_100$ indicates a matching route received from the A5100 but not from the AS100

A.

TRUE

B.

FALSE

Full Access
Question # 33

Configure the ipv6 preference under the IS-IS protocol view, the role of this command is to configure the priority of the Ipv6 protocol generated by the IS-IS protocol

A.

TRUE

B.

FALSE

Full Access
Question # 34

The following statement about the concept of multicast is wrong?

A.

Multicast Source: The sender of the message needs to join the multicast group to provide forwarding of multicast group messages

B.

Multicast router: A router or layer-three switch that supports layer-3 multicast functionality

C.

Multicast Group Members: Multicast group members can be widely distributed anywhere in the network

D.

Multicast Groups: A collection identified by ip multicast addresses

Full Access
Question # 35

What is wrong with the following statement about digital certificates?

A.

Digital signatures guarantee the integrity of digital certificates.

B.

Digital certificates contain public key information.

C.

Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.

D.

Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.

Full Access
Question # 36

Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test#

interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct:

A.

If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3

B.

If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3

C.

If the packet source IP address is 1001.2, it cannot be forwarded

D.

If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains unchanged

Full Access
Question # 37

QinQ technology is a technology that extends the VLAN space by adding a layer of 8021Q tag messages to the extended VLAN. The function of space, the following statement about QInQ is mispronounced?

A.

basic QinQ is implemented based on the interface orientation

B.

QinQ increases the number of VLANs to 4095*4095

C.

Flexible QinQ can be based on different inner layerS Tag and different outer layers of Tag, for user VL The division of AN is more granular

D.

QinQ technology enables private VLANs to pass through the public Network

Full Access
Question # 38

What is the following description of MPLS incorrect?

A.

The length of the MPLS tag is 20 to 20 for packet forwarding.

B.

The tag space range of dynamic signaling protocols such as LDP, M P-BGP is 16 to 1023

C.

When using the TTL processing method of Pipe mode, the IP packet transmits the TTL of the IP packet over the IPLS network. The value is only minus 1 for the MPLS in and out nodes.

D.

MPLS supports multi-layer label nesting, and the S bit value of the innermost label is 1.

Full Access
Question # 39

A campus deployed both IPv4 and IPv6 networks for service testing, and ran IS-S to interconnect the networks. (The S-S routing protocol has good scalability and is widely used in the live network.) Regarding IS-IS extensibility, which of the following statements is true?

A.

In order to support IPv6, IS-IS needs to add TLV to carry IPv6 address information

B.

IS-IS uses the TLV structure to build messages, making lS-IS more flexible and extensible

C.

NLPID is a new type of TLV added by IS-IS to support IPv6

D.

For IS-IS, adding new features simply adds a new TLV to

Full Access
Question # 40

What is the relationship between CIR, BC and TC? (single select)

A.

CIR=TC/BC

B.

CIR=BE/TC

C.

TC=CIR/BC

D.

TC=BC/CIR

Full Access
Question # 41

The following statement about EVPN Type5 routing is wrong?( Single choice questions).

A.

Type5 routes carry Layer 3 VNI.

B.

Type5 routing carries both Layer 2 VWI and Layer 3 VNI

C.

The IP Prefix field can carry both host and network segment addresses.

D.

Type5 is an IP prefix route.

Full Access
Question # 42

Assuming that the shaping rate of a port is 10OMbps, the input loans and RIP of P configurations of each service of the interface are as follows: Then after the first round of scheduling, EF How many loans are allocated by the queue?( Single choice questions).

A.

A. 30M

B.

15M

C.

90M

D.

25M

Full Access
Question # 43

The following statement about IPSec VPN is correct ?qo

A.

Two routers establish an IPSec VPN in brutal mode, so that the two devices can interact with a minimum of 4 messages to establish a tunnel.

B.

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

C.

The two routers can establish OSPF neighbor relations and exchange intranet routes through the IPSec VPN tunnel

D.

The two routers establish IPSecVPN in main mode, and from the 5th packet (included), the payload's data will be encrypted.

Full Access
Question # 44

OSPFV is the GP running on the P4 network) OSPF3 is the KGP running on the IP6 network. OsPFV works the same basic way as OSPF2, such as elections for DR and BDR. As shown in the figure, an engineer uses three routers for IP6 service testing, and he wants to interconnect the IPv6 network by running OSPFv3 Which of the following statements is correct regarding the election of the network DR?

A.

After the network converges, R1 is DR

B.

After the network converges, the engineer modifies the priority of R1 to 100, the priority of R2 to 10, and R3 to the default value. When the network converges again, Rl is DR and R2 is BDR

C.

After the network converges, the broadcast link adds a device, R4, with a priority of 150 When the network converges again, R4 is DR

D.

After the network converges, R1 is powered off and restarted, and when the network converges again, R3 is DR

Full Access
Question # 45

As shown in the following topology, EBGP is running between AS100, AS200, AS300, AS400, and the neighbor relationship is established S400 When you receive a BGP route from ASI00 for a 1.1.1.1/32 network segment, is the path order recorded in the ASPath properties correct?

A.

10,200,3

B.

400,300,200,100

C.

100, 200,300, 400

D.

300, 200,100

Full Access
Question # 46

When two devices with the same priority compete for the master role at the same time, the device on which the interface with the smaller IP address resides should be selected as the master device

A.

True

B.

False

Full Access
Question # 47

What mechanisms or techniques can VRRP combine with to monitor uplink connectivity?

A.

IP-link

B.

BFD

C.

NQA

D.

Interface trace

Full Access
Question # 48

If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correct

A.

The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute

B.

Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone

C.

Router A supports AS-An External-LSA flood

D.

Router A is an OSPFv3 device with forwarding capability

Full Access
Question # 49

Which of the following attacks are DoS (Denial of servioe) attacks?( Multiple choice question)

A.

Single packet attack

B.

Source P address spoofing attack

C.

Man-in-the-middle attack

D.

Flood Attack

Full Access
Question # 50

As shown in the figure, all routers declare the loopback address in OSPF where the R storage does not return address is 1022 [2 declares 10033[ at the Ael.R3 ring E port[ 92101102A External routing in order to win light R win L away from the negative cut.

The noodle command is as follows: (multi-select) [BIppprefixt permlt 1001.1.024 [R1] ospf1

A.

router RI of the IP routing table, there is no external route to 1001.1.0/24 of

B.

router R1 In the IP route table, there is an external route to 1001.1.0/24

C.

In the IP routing table of Router R1, there is no loopback route to

D.

In the IP routing table of Router R1, there is no loopback route to R3

Full Access
Question # 51

VrRP priority is not configured as O, devices that issue VRRP priority of 0 stop participating in the VRRP backup group, notifying the backup device to become a laster device as soon as possible without having to wait until the Master_Down_Interval timer times out

A.

True

B.

False

Full Access
Question # 52

LDP messages are exchanged between LDLRs running the LDP protocol, and LDP messages can be divided into four types according to function, which of the following is not an LDP message type ?

A.

Advertisement message

B.

Discover message

C.

Conversation message

D.

Label Exchange Information

Full Access
Question # 53

As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).

A.

The 2::/64 route appears in the P route table

B.

The 2019:/64 route appears in the IP routing table

C.

2020::/64 The route appears in the IP routing table

D.

The 2021/64 route will appear in the IP routing table

Full Access
Question # 54

Regarding the FTP protocol, which of the descriptions below is correct?

A.

In FTP Passive mode, the client completes the initialization of the TCP session for control and data

B.

In FTP Active mode, the server tells the client which port it expects to send data on by commanding "PORT"

C.

FTP always uses a TCP session to transmit control information and data information

D.

FTP always uses TCP port 20 to establish a data session, and ICP port 21 to establish control will always use E. FTP TCP port 21 to establish a data session, TCP port 20 to establish a control session

Full Access
Question # 55

Which of the following options uses an alternate channel to enable communication between IPV6 addresses?

A.

DualStack

B.

6to4

C.

ISATAP

D.

NAT64

Full Access
Question # 56

Command IP as-path-filter1 permit^12,*74$ can match to which AS_PSTH?

A.

AS_PATH(321122374)

B.

AS PATH Q236217 ? 2374)

C.

AS_PATH(125 328 74 23)

D.

AS_PATH(32127423)

Full Access
Question # 57

In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of the router's links, as well as the RouteriD of the neighbor router.

A.

True

B.

False

Full Access
Question # 58

If all the public IP addresses are used by a company's intranet users to access the Internet using NAT's No-pat method, what will happen to subsequent intranet users who access the Internet?

A.

automatically switch NAT to PAT after the Internet

B.

Subsequent intranet users will not be able to access the Internet

C.

Synchronize messages to other NAT conversion devices for NAT conversion

D.

Squeeze out the previous user and force NAT conversion to go online

Full Access
Question # 59

Is the following information about BGP4+ described correctly?

A.

BGP4 can use dampening commands to suppress oscillations on IBGP routes.

B.

Modifying the RouterID of BGP causes the BGP connection between routers to be re-established.

C.

The Next Hop attribute in BGP4+ is represented by an IPv6 address, which can be the link-local address of the next hop.

D.

BGP4+ does not support route auto-aggregate

Full Access
Question # 60

The following statement about IPSec VPN is correct

A.

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

B.

The two routers establish IPSecVPN in main mode, and from the 5th message (included), the payload's data is often encrypted.

C.

Two routers establish an IPSec VPN in brutal mode, so that the tunnel is built with a minimum of 4 messages interacting between the two devices.

D.

The two routers can establish an OSPF neighbor relationship through the IPSec VPN (19) channel and exchange intranet devices by

Full Access
Question # 61

Regarding the Stub region in the OSPF protocol, the following statement is correct.

A.

Virtual connections cannot traverse the Stub region

B.

Backbone zones cannot be configured as Stub zones

C.

ASBR cannot exist in the Stub zone

D.

Type7 LSA injection is not allowed in the Stub zone

Full Access
Question # 62

The following statement about ISIS (IPv6) is correct?

A.

In order to support the processing and calculation of IPV6 routes, IS-IS has added TLV232, 236

B.

By default, IS-IS has the multi-topology feature turned on

C.

IS-IS works at the data link layer and only needs to add a new TLV to support IPv6

D.

To support the processing and computation of IPv6 routes, IS-IS has added NLPID to the 129TLV

Full Access
Question # 63

In the use of the CP protocol, the following description is correct?

A.

The Eth-Trunk interface can be avoided by frequent oscillation interfaceeth-trunkllacppreemptenablelacppreemptdelaydelay-time by following command

B.

Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip

C.

A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown

D.

The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport

Full Access
Question # 64

The Layer 3 logical interface on XLAN L3 Gateway that enables communication between different VXLAN virtual networks is ?

A.

Layer 2 sub-interface

B.

NVE interface

C.

VBDIF interface

D.

VLANIF interface

Full Access
Question # 65

A.

When sending a packet with a destination address of 4444, it is sent without labeling.

B.

When the router receives a packet with the label 1024, it replaces the label with 1027 and sends it.

C.

When a packet with a destination address of 2222 is sent , it is sent without labeling.

D.

When sending a packet with a destination address of 3333, label 1026 and send it.

Full Access
Question # 66

Which of the following VPN technologies may have two IP message headers in one message?

A.

GOES

B.

SSL VPN

C.

IPsec VPN

D.

L2TP

Full Access
Question # 67

Regarding route introduction, the following description is correctly ?( Multiple choice questions).

A.

OSPF introduces two types of external routes, with the first type of external route taking precedence over the second type of external route.

B.

Use the default-route imported command in BGP only to introduce default routes that already exist in the local IP routing table.

C.

When ISIS introduces an external route, if you do not specify the route type that is introduced, the Level-1 route is introduced by default on the L1/2 router

D.

When ISIS introduces an external route, if you do not specify the type of route that is introduced, the Leve1-1 route is introduced by default on the L1 router .

Full Access
Question # 68

Level-1-2IS transmits Level-2LSP to the Level-1 area if the AT location 1 in Level-2LSP is delivered It means that the Level-1lS in the area can be accessed to the outer area through Level-1-2IlS

A.

True

B.

False

Full Access
Question # 69

What are the common ways to learn routing in BGP? ( Multi-select)

A.

receives neighbor routing information

B.

Introduce static routes

C.

BGP routing for other AS is introduced

D.

Introduced Direct Route

Full Access
Question # 70

The following description of the process of sending and receiving data frames in switch interface Access mode is correct? ( Single choice questions).

A.

In Access mode, labeled data frames are discarded directly when they are received.

B.

Access mode strips off the VLAN tag of the dataton when sending .

C.

Access mode receives only unlabeled data frames.

D.

When a data frame enters the switch interface, the switch learns the destination MAC address in the data frame.

Full Access
Question # 71

In broadcast networks, elections to DIS begin only after a neighbor relationship has been established

A.

True

B.

False

Full Access
Question # 72

A bookstore provides a wired network for customers to learn online. However, one day, it was found that some users could not access the network, and after inspection, it was found that the IP resources of the DHCP address pool had been exhausted. Which of the following is the best way to solve the problem of the moment? ( Single choice questions).

A.

Configure the static ARP binding table

B.

Configure the IPSG

C.

Limits the maximum number of DHCP Snooping binding table entries that the interface allows to learn

D.

Configuration DAI

Full Access
Question # 73

MQC, like PBR—can only be called under the device's Layer 3 interface.

A.

TRUE

B.

FALSE

Full Access
Question # 74

As shown in the figure, PC1 and PC2 are hosts that belong to the same network segment, below about between PC1 and PC2 What are the correct descriptions of IPv6 neighbor states?

A.

If the MAC address information of PC2 can be queried on PC1, the neighbor relationship may be Stale

B.

If pc2's MAC address information can be queried on PC1, the neighbor relationship may be Probe

C.

There are five possible neighbor states between PC1 and PC2: Incomplete, Reachable, and Stale , Delay, Probe

D.

If the MAC address information of PC2 can be queried on PC1, the neighbor relationship must be Reachable

Full Access
Question # 75

Regarding the difference between NSR and NSF, the correct one is?

A.

The NSR must rely on a neighbor router to complete

B.

Both NSR and NSF require a neighbor router to complete

C.

NSF must rely on neighbor routers to complete

D.

NSF does not require a neighbor router to complete

Full Access
Question # 76

There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute?( Confirmed).

A.

300 4200

B.

1234 1400

C.

3100

D.

100

Full Access
Question # 77

The correct statement about the VRRP protocol version is ?

A.

VRRPv2 is only available for IPv4

B.

VRRPv3 does not support authentication

C.

VRRPv2 supports authentication

D.

VRRPv3 is only available for IPv6

Full Access
Question # 78

The multicast IP address is 2291301301, and its corresponding MAC address is :(Multilist)

A.

01-00-5E-O2-82-01

B.

01-00-5E-82-82-01

C.

00-00-5E-02-82-01

D.

00-00-5E-82-82-01

Full Access
Question # 79

As shown in the following topology, EBGP is running between ASI0O0, AS.203, AS.30, AS8400, and the neighbor relationship has been established as RECEIVed by AS4O0 When AS1OO issues a 1..11/2 CIDR segment BGP route, the path order recorded in the ASPath attribute is correct

A.

10,200,3

B.

400,300,200,100

C.

100,200,300,400

D.

300,200,100

Full Access
Question # 80

Router R1 runs the OSPF protocol, use the "display ip routing-table" command to view the routing table of the router R1, the following about the OSPF in the routing table Is the information described correctly?

A.

In the routing table, route table entries identified by the "OSPF" identifier can only be learned through LSAs of Type 3

B.

In the routing table, the routing table entries identified by the "OSPF" identifier can only pass Class 1 LSA

C.

In the routing table, the routing table entries identified by the "OSPF" identifier can be learned through the 1/2/3/5 LSA

D.

In the routing table, the routing table entry identified with the "O_ASE" identifier can only be learned by routing introduction

Full Access
Question # 81

The command to adjust the LINK cost value for the IS-IS interface is ?( Radio)

A.

ISIS cost

B.

ISIS timer hello

C.

lSIS circuit type

D.

ISIS circuit level

Full Access
Question # 82

There is an existing switch running the RSTP protocol. If the network topology changes, what happens to the Layer 2 forwarding table that is automatically learned by the switch?

A.

All table entries are dropped

B.

Except for the table entry related to the edge port that is not deleted, all other table entries are deleted

C.

Only table entries related to the port that received the TC message are dropped

D.

If the aging time is set to 15 seconds, entries that exceed the aging time are deleted

E.

Table entries are dropped except for table entries related to edge ports and table entries related to ports that receive TC messages

Full Access
Question # 83

There are three port roles defined in RSTP, with alternative ports and backup ports flags in STP messages The port role values within the fields are consistent, all of which are 01

A.

TRUE

B.

FALSE

Full Access
Question # 84

ICMPv6 has two types: Error Messages and Information Messages.

A.

TRUE

B.

FALSE

Full Access
Question # 85

In an MPLS VPN network, different CE devices exchange routing information with the same PE device using different routing protocols, and different CE devices use routing protocols that are independent of each other

A.

True

B.

False

Full Access
Question # 86

Regarding IPv6 over IP4(19) road, the following statement is correct

A.

The 6to4 automatic tunnel requires the use of a specific IP6 address segment, and the assigned address segment is preceded by 3ffe::/16

B.

When configuring manual tunneling on the VRP platform, a Tunnel interface is generally created; When configuring automatic tunneling, a Vrua-Template interface is usually created

C.

The ISATAP tunnel determines the destination IPV4 address of the tunnel based on the destination IP6 address.

D.

All automatic tunnels encapsulate data in the same way.

E.

Automatic tunneling has great advantages over manual tunneling, and manual tunneling will be phased out

Full Access
Question # 87

The following description is correct regarding route control

A.

IBGP routes can be introduced using the impot-route BGP command

B.

AS-path-fiter is for AS-path, which affects the routing of paths.

C.

OSPF, ISIS, and BGP can issue default routes.

D.

In Node 10, if-match community-fiter1 and f-match as-pah-fiter1 are "and the relationship

Full Access
Question # 88

Regarding Policy Routing, the following description error is ?( Single choice questions).

A.

When configuring local policy routing, if two next hop and two outbound interfaces are set in the policy at the same time, packet forwarding only distributes the load between the two outbound interfaces.

B.

Interface policy routing is only supported for application in the inbound direction of an interface.

C.

Interface policy routing only takes effect for forwarded packets, but has no effect on packets sent locally.

D.

If the message matches the permit table entry in the interface policy route , the message must be forwarded according to the next hop specified by the interface policy route

Full Access
Question # 89

The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000

A.

True

B.

False

Full Access
Question # 90

Each DD message has a sequence number for data confirmation, and a DD sequence number is 2 bytes long

A.

True

B.

False

Full Access
Question # 91

Is the following statement about the multicast address used by 0SPFv3 correct?

A.

RD routers use FF02: :6

B.

The DR router uses FF08::6

C.

All OSPF routers use FF02::5

Full Access