Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

HCIE-Datacom V1.0 Question and Answers

HCIE-Datacom V1.0

Last Update May 4, 2024
Total Questions : 610

We are offering FREE H12-891_V1.0 Huawei exam questions. All you do is to just go and sign up. Give your details, prepare H12-891_V1.0 free exam questions and then go for complete pool of HCIE-Datacom V1.0 test questions that will help you more.

H12-891_V1.0 pdf

H12-891_V1.0 PDF

$35  $99.99
H12-891_V1.0 Engine

H12-891_V1.0 Testing Engine

$42  $119.99
H12-891_V1.0 PDF + Engine

H12-891_V1.0 PDF + Testing Engine

$56  $159.99
Questions 1

If all the public IP addresses are used by a company's intranet users to access the Internet using NAT's No-pat method, what will happen to subsequent intranet users who access the Internet?

Options:

A.  

automatically switch NAT to PAT after the Internet

B.  

Subsequent intranet users will not be able to access the Internet

C.  

Synchronize messages to other NAT conversion devices for NAT conversion

D.  

Squeeze out the previous user and force NAT conversion to go online

Discussion 0
Questions 2

Which of the following descriptions of MPLS header TTL are correct?

Options:

A.  

Copy IPTIL value is handled in such a way that the LSR of the MPLS domain is hidden, which plays a certain security role

B.  

Can prevent wireless circular forwarding of messages

C.  

MPLS has two ways of handling TTL, one is that the IP packet copies the PTTL of the MPLS header hen it enters the MPLS network Value; Another is to set the TTL of the MPLS header to 255 at the entrance LER

D.  

When copying TTL is disabled, tracert can see the LSR of the passing MPLS domain

Discussion 0
Questions 3

The following description of the TTL in the MPLS Header is correct:

Options:

A.  

A TTL that acts like an IP header and is used to prevent message loops

B.  

To control label distribution

C.  

Limit LSR

D.  

Control of upstream devices for label distribution

Discussion 0
Questions 4

The following statement about the NSSA area is correct (multiple choice).

Options:

A.  

In the NSSA area where the OSPF neighbor sends hello packets, the N position 0, E within the option field Position 1

B.  

The NSSA zone must automatically generate a default LSA to access the external network

C.  

The NSSA zone generates a Category VII LSA to advertise external routing, and the FA address in the Category VII LSA acts to prevent loops

D.  

In the OSPF neighbor in the NSSA region sends hello packets, position 1 within the option field , position E

Discussion 0
Questions 5

In a multicast network running PIM-SM mode, how does the router choose the upstream interface?

Options:

A.  

looks up the outgoing interface corresponding to the RP address in the unicast routing table

B.  

Interfaces to which multicast group members are directly connected

C.  

Find the outbound interface corresponding to the mapping proxy in the unicast routing table

D.  

The interface that is fast to the PIlM Join message

E.  

Interface for sending PIM Heilo messages.

Discussion 0
Questions 6

MQC, like PBR—can only be called under the device's Layer 3 interface.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 7

The following statement about OSPF route filtering is incorrect.( Single choice questions).

Options:

A.  

In the NSSA area, filtering for external route ingestion and advertisement can be configured on ASBR or ABR

B.  

Filtering for the three types of LSAs needs to be configured on the ABR across OSPF regions

C.  

Interface-based filtering of LSAs allows all LSAs in the inbound and outbound directions except grace LSAs

D.  

Based on the link state database, when calculating routes, the fiter-policy import command is used, which only affects the route addition in the route table, and has no effect on the OSPF link state database

Discussion 0
Questions 8

Which of the following attacks are DoS (Denial of servioe) attacks?( Multiple choice question)

Options:

A.  

Single packet attack

B.  

Source P address spoofing attack

C.  

Man-in-the-middle attack

D.  

Flood Attack

Discussion 0
Questions 9

To build a loopless Layer 2 network, which of the following schemes is optimal?( Single Choice)

Options:

A.  

Stacking + Link Aggregation

B.  

TRILL+MSTP

C.  

??+MSTP

D.  

Link Collection + MSTP

Discussion 0
Questions 10

What are the benefits of using WRED?( Multi-select)

Options:

A.  

Provides some low latency

B.  

Avoid TCP global synchronization

C.  

Avoid congestion completely

D.  

Provides a small bandwidth guarantee

E.  

Can avoid UDP occupying most of the bandwidth when congested

Discussion 0
Questions 11

What are the following statements about 8021x, RADIUS, and HWTACACS certification? ( Multiple choice questions).

Options:

A.  

Users can use 8021x authentication to access the network and complete identity authentication through RADIUS

B.  

RADIUS authentication and WTACACS authentication are mutually exclusive and cannot be two-factor authentication for the same user at the same time.

C.  

RADIUS authentication and HWTACACS authentication can perform two-factor authentication for the same user at the same time, which is more secure.

D.  

RADIUS authentication is mutually exclusive with 8021x authentication.

Discussion 0
Questions 12

The following statement about VXLAN gateways is incorrect

Options:

A.  

Layer 2 gateway: Used to solve the problem of tenant access to the VXLAN virtual network, it can also be used for subnet communication of the same VXLAN virtual network.

B.  

Layer 3 gateway: Used for cross-subnet communication of VXLAN virtual networks and access to external networks.

C.  

VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.

D.  

Layer 2 gateway and VPN instance binding.

Discussion 0
Questions 13

Regarding IPv6 over IP4(19) road, the following statement is correct

Options:

A.  

The 6to4 automatic tunnel requires the use of a specific IP6 address segment, and the assigned address segment is preceded by 3ffe::/16

B.  

When configuring manual tunneling on the VRP platform, a Tunnel interface is generally created; When configuring automatic tunneling, a Vrua-Template interface is usually created

C.  

The ISATAP tunnel determines the destination IPV4 address of the tunnel based on the destination IP6 address.

D.  

All automatic tunnels encapsulate data in the same way.

E.  

Automatic tunneling has great advantages over manual tunneling, and manual tunneling will be phased out

Discussion 0
Questions 14

ISlS protocol In broadcast networks and P2P networks, when the router receives LSP, it needs to use PSNP to confirm and ensure the synchronization of LSDB

Options:

A.  

True

B.  

False

Discussion 0
Questions 15

What is correct about the multicast message forwarding?

Options:

A.  

RPF check failure indicates that the multicast data packets are received from a suboptimal interface, but the interface still receives multicast traffic and forwards it downstream

B.  

IGMP snooping function can not control the range of multicast traffic in the Ethernet flood

C.  

In the multicast transmission mode, the destination address of the message can specify the location of the receiver

D.  

The source address of the multicast message is the unicast address

Discussion 0
Questions 16

Regarding how the device handles messages in the MPLS network model, what is the following description of the error? A. The label forwarding path LSP is determined and established by various protocols during the forwarding of messages. There is certainly no stripping of the label on the B. LSR.

Both C. LER and LSR are labeled.

D. For IP packets entering the MPLS domain, the device discards them.

Options:

Discussion 0
Questions 17

A router Router LSA is shown in the figure below, and the following statement is incorrect?

Options:

A.  

This router is a DR

B.  

This router has established an adjacency relationship

C.  

This router supports external route ingestion

D.  

The Router ID of this router is 100121

Discussion 0
Questions 18

The RSTP protocol provides a variety of protection functions, such as when the edge port is configured as a protection state, the edge port receives the BPDU packet processing method;

Options:

A.  

Directly discard the BPDU packet

B.  

Close the port

C.  

After parsing the BPDU message, the relevant information is obtained

D.  

Forward BPDU packets as required

Discussion 0
Questions 19

The CPU was attacked by malicious traffic. Here are some of the following ways to prevent an attack: Multi-select

Options:

A.  

USE CPCAR to rate limit messages sent up to the CPU according to the protocol type

B.  

Speed limiting of messages sent to the CPu on the soil.

C.  

Filter packets with AcL on the compromised router port

D.  

Turn off the remote login function of the router.

E.  

Analyze and count the packets sent to the CPU to find out the user of the attack source or the interface of the attack source.

Discussion 0
Questions 20

As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).

Options:

A.  

The 2::/64 route appears in the P route table

B.  

The 2019:/64 route appears in the IP routing table

C.  

2020::/64 The route appears in the IP routing table

D.  

The 2021/64 route will appear in the IP routing table

Discussion 0
Questions 21

Compared to IPV4 multicast, which of the following descriptions is the characteristic of IP6 multicast?

Options:

A.  

IPv6 multicast does not contain MSDP and dense mode

B.  

The first 8bit IPV6 multicast address is always FF(11111111).

C.  

IPv6 multicast clients use IGMPv3 to join multicast groups

D.  

IPv6 multicast load sharing extends the multicast routing rules and is completely independent of RPF check

Discussion 0
Questions 22

When you deploy BGP/MPLSIPVPN, when two VPNs have a common site, the common site must not use overlapping address spaces with the other sites of the two VPNs.

Options:

A.  

TRUE

B.  

FALSE ?:B

499The series description for configuring static lSPs in MPLS networks is correct?

C.  

When an LSR is Ingress LSR, only configure Out Label, which ranges from 16-1048575

D.  

When an LSR is a Transit LSR, you need to configure both In Label and Out label, both in the range of 16-1023

E.  

When an LSR is TransitLSR, you need to configure both ln Label and Out Label, both of which are 161023 The Out Label ranges from 16 to 1048575

F.  

When an LSR is An Egyptian LSR, only in Label needs to be configured, ranging from 16-1023

Discussion 0
Questions 23

What messages does an NMS (Network Management Station) running SNMPv1 send to the agent?

Options:

A.  

Trap,Get ? Set

B.  

Get,Set ? Getnext

C.  

Get,Set,Getnext ? GetBulk

D.  

Get,Set ? GetBulk

E.  

Get Trap

Discussion 0
Questions 24

As shown in the following topology, EBGP is running between AS100, AS200, AS300, AS400, and the neighbor relationship is established S400 When you receive a BGP route from ASI00 for a 1.1.1.1/32 network segment, is the path order recorded in the ASPath properties correct?

Options:

A.  

10,200,3

B.  

400,300,200,100

C.  

100, 200,300, 400

D.  

300, 200,100

Discussion 0
Questions 25

Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, then which class LSA Will it be aggregated?

Options:

A.  

1 Class LSA

B.  

2 kind LSA

C.  

3 kind LSA

D.  

4 kind LSA

E.  

5 Class LSA

Discussion 0
Questions 26

Which of the following IEEE standards is specific to Gigabit Ethernet?

Options:

A.  

8023z

B.  

8023ab

C.  

8023ad

D.  

8023af

Discussion 0
Questions 27

Regarding BGP route filtering, the following description is wrong?

Options:

A.  

The filtering relationship between Route-Policy's noodes is "or." ", that is, as long as a node filter is passed, it can pass through the Route-policyo

B.  

For routes published locally, configure a routing policy that takes effect before the route is added to the BGP route table.

C.  

In the same node of Route-Policy, multiple if-match clauses for different attributes are "or" relationships.

D.  

When a route to a BGP peer is received, a routing policy is enforced to filter unwanted BGP routes that are not added to the local BGP routing table.

Discussion 0
Questions 28

By default, which of the following security MAC address types lose table entries after the device restarts?

Options:

A.  

Sticty MAC address

B.  

Black hole MAC address

C.  

Secure static MAC address

D.  

Secure dynamic MAC address

Discussion 0
Questions 29

The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.

Options:

A.  

True

B.  

False

Discussion 0
Questions 30

As shown in the figure, an engineer uses four routers to test the interoperability of branch networks, where R1, R2, and R3 in branch 1 deploy OSPF Network interoperability is implemented, and R, R3, R4 in Branch 2 is deployed is-IS to achieve network interoperability. Now that the engineer wants to implement R1 access to R4's loopback address, which of the following actions will meet this requirement?

Options:

A.  

No configuration is required

B.  

Publish default routes only in the OSPF process for R2

C.  

In the OSPF process of R2 and the IS-IS process, the default routes are published separately

D.  

Publish the default route only in the IS-IS process of R2

Discussion 0
Questions 31

The data results of a router are as follows, and the analysis conclusion is correct (single choice).

Options:

A.  

The GEO/0/0 port of the

A.  

R3 is in a different region than the neighbor

B.  

The

B.  

R3 router's Eth0/0/1 enables both IPv4 and IPv6 ISIS

C.  

R3 is on the link where Eth0/0/0 is Eth0/ 1 of the LEVEL-1 and Level-2 DISC

D.  

R3 routers Circuit-level is Level-1-2

Discussion 0
Questions 32

In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of the router's links, as well as the RouteriD of the neighbor router.

Options:

A.  

True

B.  

False

Discussion 0
Questions 33

The MAC address of a PC is 5489-98FB-65D8 The administrator wants this PC to get the specified P address 1921681.11/24 from the DHCP server So the administrator-configured command should be,

Options:

A.  

dhcp static-bind ip address 1921681.11 mac- address 5489-98FB-65D8

B.  

dhcp static-bind ip address 1921681.11 24 mac- address 5489-98FB-65D8

C.  

dhcp server static -bind ip address 1921681.112552552550 mac-address 5489-98FB-65D8

D.  

dhcp server static-bind ip-address 1921681. 11 mac- address 5489-98FB-65D8

Discussion 0
Questions 34

If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correct

Options:

A.  

The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute

B.  

Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone

C.  

Router A supports AS-An External-LSA flood

D.  

Router A is an OSPFv3 device with forwarding capability

Discussion 0
Questions 35

As a network administrator, which of the following protocols can I use for network device configuration?

Options:

A.  

SSH

B.  

NETCONF

C.  

LLDP

D.  

SNMP

Discussion 0
Questions 36

Regarding BGP MED, which of the following descriptions is correct?

Options:

A.  

In the BGP routing rules, MED has a lower priority than AS Path, Praferred-value, Local-Preference, etc Origin

B.  

The default value for the

B.  

BGP routing MED is 0

C.  

By default, if there is no MED value in the route attribute, it is processed by 0 If the bestroute med-none-as-maximum command is configured, MED is processed as the maximum 4294967295

D.  

By default, BGP routing rules can MED comparison of routes from different autonomous systems

Discussion 0
Questions 37

Which of the following scenarios is not suitable for deploying interface policy routing?

Options:

A.  

In the scenario of multiple ISP egresses of enterprise networks, different network segments of the intranet access the Internet through different ISP egresses

B.  

The traffic accessed by the intranet and the extranet to the side-mounted security detection device is pulled on the core switch

C.  

Modify the next hop of locally originating traffic

D.  

Pull the traffic of the intranet and the Internet accessing each other on the core switch to the AC device attached to the side

Discussion 0
Questions 38

Router RL and Router R2 run BGP both routers are in the AS65234 The router R2 route is present in the BGP routing table of router RI, but not in the P of router R1 road

Options:

A.  

With BGP, both routers are in the AS65234 Route cry PD is done by the right big worker

B.  

By the table, so what causes the problem to occur? A, synchronization is turned off

C.  

The B. BGP neighbor relationship is Down

D.  

Router R1 does not enable BGPMulti-hop D Routing is not optimal

Discussion 0
Questions 39

IPV6 multicast introduces the concept of multicast scope, which of the following ways is the multicast scope concept implemented? Multi-select

Options:

A.  

When the group shake source sends IP6 multicast data, the TTL value of the packet is set to limit the transmission range of the group shake

B.  

There is a special field in the IPv6 multicast address that specifies the propagation range of multicast.

C.  

Multicast scope is just a concept of spreading scope, and there is no specific technical implementation.

D.  

During network configuration, the administrator uses the configuration command at the edge of the network to limit the multicast scope.

Discussion 0
Questions 40

View the IGMP configuration of the interface on the router RTA as follows, and the information about the operation of the RTA is incorrect

Options:

A.  

The packet interval for a particular group query is 60 seconds

B.  

The interface IP address is 1921681.1

C.  

The maximum response time for query messages is 10 seconds

D.  

The IGMP protocol version is 2

Discussion 0
Questions 41

Regarding the BGP ring protection mechanism, the following description is correct?

Options:

A.  

A AS_PATH attribute is used between autonomous systems to prevent ring cats.

B.  

The Cluster List property is used for reflector cluster inner ring defense, and the router finds that the Cluster List of route entries contains its own Client lD The route is rejected

C.  

Routes learned from IBGP are not advertised to IBGP neighbors and are used to prevent routing loops inside the AS

D.  

You can use the AS_CONFED_SET attribute to prevent loops within a consortium:

Discussion 0
Questions 42

When DLDP detects the presence of a one-way link in the fiber, the default actions of Huawei equipment include: the DLDP state machine migrates to the Disable state, outputs Trap information, and automatically sets the interface to a blocked state.

Options:

A.  

True

B.  

False

Discussion 0
Questions 43

In a data communication session between two hosts, which level does the session layer of the oSI model of the host on one end communicate with the osl mode of the host on the other end?

Options:

A.  

Communicate with the conversation layer on the other end B Communicate with the application layer at the other end

B.  

Communicate with the data link layer at the other end

C.  

Communicate with the physical layer at the other end

D.  

Communicate with the presentation layer at the other end

Discussion 0
Questions 44

The correct description of the extended features of ISIS is ?

Options:

A.  

When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.

B.  

ISIS can choose whether to authenticate incoming SNP and LSP packets

C.  

If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices.

D.  

After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process.

Discussion 0
Questions 45

The following description of VRRP load sharing is correct?( Multiple choice questions).

Options:

A.  

When configuring priority, make sure that the same router acts as a master in the three VRRP backup groups

B.  

You can create multiple VRRP backup groups on one interface of a router . The router can act as a master for one VRRP backup group and as a backup for other VRRP backup groups

C.  

When you deploy load sharing, hosts in the same LAN are required to configure the IP addresses of different virtual routers as gateway addresses for missing provinces

D.  

VRRP load sharing requires at least two virtual routers to provide forwarding services at the same time

Discussion 0
Questions 46

Which of the following is the benefit of VLAN aggregation?

Options:

A.  

Implements isolation of broadcast domains between Sub-VLANs

B.  

Reduce the waste of IP addresses

C.  

Increased number of available VLANs

D.  

Increased flexibility in addressing

Discussion 0
Questions 47

What is the field that the IPv6 header has similar to the IPv4 header "Type of Service" field?

Options:

A.  

Version

B.  

Flow Label

C.  

Next Header

D.  

Traffic Class

Discussion 0
Questions 48

The following description of 8021S deployment characteristics is correct?( Multiple choice question)

Options:

A.  

All VLANs share a spanning tree instance

B.  

Multiple bridges share a spanning tree instance

C.  

Each VLAN has one spanning tree instance

D.  

Multiple VLANs share a spanning tree instance

Discussion 0
Questions 49

One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existing IP6 address is

2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions).

Options:

A.  

2013:0:130F:0:0:09CO:876Answer: 130B

B.  

2013:130F::9CO:876Answer: 130B

C.  

2013:0:130F:0:0:9CO:876Answer: 130B

D.  

213::13F::9C:876Answer: 13B

E.  

2013:0:130F::9CO:876Answer: 130B

Discussion 0
Questions 50

What designs in the router can improve the reliability of the router?

Options:

A.  

Dual power supply design

B.  

Module hot-swappable design

C.  

Issu Design

D.  

Dual-engine design

Discussion 0
Questions 51

The following description of the CHAP authentication function in the PPP protocol is correct?( Multiple choice questions).

Options:

A.  

The user name must be configured under the authenticated party interface for CHAP authentication

B.  

If the authenticator does not have a username configured, password

C.  

can also be configured without the authenticated party interface Using the authentication sequence ID, random number, and key, a Hash value

D.  

is calculated using the MD5 algorithm Three message interactions are required for authentication, and only the user name is transmitted on the network without the password

Discussion 0
Questions 52

Off-stem cross-domain VPN-Option B scenario, the following description is incorrect?

Options:

A.  

During the packet forwarding process, it is necessary to exchange the VPN's private network LSP on the

B.  

two ASBRs IP-EBGP neighbor relationships.

C.  

The cross-domain VPN-Option B scheme is not limited by the number of interconnection links between ASBRs

D.  

The outer layer tag is exchanged between two ASBRs to vpnV4 routes.

Discussion 0
Questions 53

What information does the BGP Open message carry as follows?

Options:

A.  

BGP Router ID

B.  

Route attributes

C.  

Local Autonomous System (AS) number

D.  

Hold time

Discussion 0
Questions 54

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is

Options:

A.  

The root protection feature is enabled for the specified port, and its port role can only remain as the specified port

B.  

When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable

C.  

after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performed

D.  

Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets. If the port does not receive a better RSTBPD for a period of time then automatically revert to the normal Forwarding state

Discussion 0
Questions 55

In route-policy, what are the BGP attributes that can be used for the apply clause?

Options:

A.  

AS-Path

B.  

MED

C.  

Local-Preference

D.  

Day

Discussion 0
Questions 56

In an Hw IP multicast network—which of the following multicast features are associated with (*, G) table entries? ( Multiple select)

Options:

A.  

Dense mode

B.  

Source tree

C.  

Sparse mode

D.  

PIM bidirectional E. Share the tree

E.  

Dense Tree

Discussion 0
Questions 57

An engineer performed the ingestion operation on an OSPF router in a network of the company, is the following statement about the introduction of the routing LSA correct?

Options:

A.  

The

A.  

Advertising Router report is set to as the Router ID of ASBR

B.  

Net Mask is set to all 0

C.  

Link State lD is set as the destination network segment address

D.  

Using the Link State ID and Advertising Router, you can uniquely identify an LSA

Discussion 0
Questions 58

You expect to deploy multicast video applications on your private, on-premises network. To achieve this, you need to have a private multicast IP address in your network . So which range of IP addresses can be used?( Single choice questions).

Options:

A.  

239000-239255255255

B.  

241.000-241.255255255

C.  

224000-224255255255

D.  

240000-254255255255 E. 226000-226255255255

Discussion 0
Questions 59

As shown in the figure, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division can only communicate with the headquarters, the division can not communicate with each other When setting up RT, which of the following scenarios is this?( Radio).

A???:import Target:12:3EpodTarget:12:3

B. Headquarters: importTarget:1:1EpodTarget:3:3

C. Headquarters: Impot Target:2:2; Expor Target:3:3 D. Headquarters: importTarget: 12:3EpodTarget: 3:12

Options:

Discussion 0
Questions 60

As shown in the figure, SWA, SWB runs the PSTP protocol, and Cost of Path remains the default without modification, so the following statement is correct

Options:

A.  

GEO/0/1 on ASWB is Alternative port

B.  

GE0/0/2 on SWB is Alternative port

C.  

SWA On GEO/0/1 for backup port

D.  

SWB will become the root bridge

Discussion 0
Questions 61

The following description of the attributes of BGP is correct?( Single choice questions).

Options:

A.  

The AS deficit of the adjacent AS is ranked at the far right of the list of AS_Path in the BGP route entry.

B.  

When the

B.  

BGP Speaker publishes a route learned from an EBGP peer to an IBGP peer, it does not change the next hop attribute of that routing information.

C.  

Local_Pref is valid only between EBGP peers and is not advertised to third-party AS.

D.  

A route can have only one community attribute value.

Discussion 0
Questions 62

If the OSPP protocol is running in the network , after configuring the non-backbone area in the OSPP area as the Totally Stub region, the ABR router sends a message to Totally. The Stub region issues an LSA with an LS ID of 0000, and what type of LSA is the LAS to?

Options:

A.  

LSA5

B.  

LSA2

C.  

LSA1

D.  

LSA3

Discussion 0
Questions 63

As shown in the figure, three switches SI, SN2, and SN3, where SN1 is the root bridge between S1 and SN2 Now that link support SN2 cannot receive the configuration BPDU sent by the root car, the administrator needs to configure which spanning tree protection mechanism to prevent the problem of link congestion?

Options:

A.  

root protection

B.  

Anti-TC-BPDU attack

C.  

BPD protection

D.  

Loop protection

Discussion 0
Questions 64

Which levels are common in the OSI reference model and the ICP/IP model? ( Multiple choice question)

Options:

A.  

Session layer

B.  

Data link layer

C.  

Transmission layer

D.  

Presentation Layer

E.  

Physical Layer

F.  

Application Layer

Discussion 0
Questions 65

A routing tool can define multiple entries. Which tool will automatically add a deni-any entry at the end of the configuration?

Options:

A.  

Route policy

B.  

Community-tilter

C.  

IP-prefix

D.  

AS-path-filter

Discussion 0
Questions 66

Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, so which class LSA Will it be aggregated?( Multi-select) (confirmed).

Options:

A.  

1 ?LSA

B.  

2 ?LSA

C.  

3 ?LSA

D.  

4 ?LSA

E.  

5 ?LSA

Discussion 0
Questions 67

When the load is an ICMPv6 message, what is the numeric value of the Next Header field in the IPv6 header if the presence of an extended header is not taken into account?

Options:

A.  

58

B.  

78

C.  

55

D.  

68

Discussion 0
Questions 68

The following statement about IPSec VPN is correct ?qo

Options:

A.  

Two routers establish an IPSec VPN in brutal mode, so that the two devices can interact with a minimum of 4 messages to establish a tunnel.

B.  

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

C.  

The two routers can establish OSPF neighbor relations and exchange intranet routes through the IPSec VPN tunnel

D.  

The two routers establish IPSecVPN in main mode, and from the 5th packet (included), the payload's data will be encrypted.

Discussion 0
Questions 69

The following message about OSPFV3 is correct?

Options:

A.  

The Option field of the Hello and DD packets extends to 24-bit

B.  

LSR packets containing the full LSA header information for requesting an update to the LSA

C.  

The LSACK message contains LSA header information to confirm receipt of the LSU message

D.  

The Hello message must contain the interface ID of the sending interface

Discussion 0
Questions 70

What categories can ACLs be divided into? A. Advanced ACLs

B. Two-layer ACL

C. User-defined ACLs

D. Basic ACL

Options:

Discussion 0
Questions 71

What check frames can IPSG set?

Options:

A.  

Out of the interface

B.  

MAC address

C.  

IP address

D.  

VLAN ID

Discussion 0
Questions 72

?? ipIp- prefoi p prefierame lndeindeoxrunmber)( pemit demy)ip+4adrssmasklengh gratrequa grater-cqual abel]lescqualesequl ole) for • Pprefofiier? If a pre-list of tooequal has been specified, but the greater-equal has not been specified, then how much of the prefix's range is sufficient?(). Radio neck).

Options:

A.  

[0, less-equal-value]

B.  

[mask-length, less-equal-value]

C.  

[less-equal-value,32]

D.  

No limit

Discussion 0
Questions 73

Why is BGP an enhanced distance vector routing protocol?

Options:

A.  

According to the routing rules of BGP routing, the route with lower MED is preferred

B.  

BGP uses the ASPATH attribute to record all autonomous system numbers that a route passes through into an AS list, and based on that attribute, routes with shorter AS-PATH are preferred

C.  

NEXT_HOP is a recognized mandatory attribute

D.  

BGP cannot accept routes that carry a local AS number in the AS_PATH

Discussion 0
Questions 74

In an MPLS IBGP VPN environment, if tags are distributed only through BGP, LDP, the MPLS tags for a message can be up to two layers of tags.

Options:

A.  

True

B.  

False

Discussion 0
Questions 75

In addition to stateless address autoconfiguration, IPV6 devices can also obtain addresses, gateways, DNS, and other information through DHCPv6

Options:

A.  

True

B.  

False

Discussion 0
Questions 76

The duplicate address detection feature for NDP in the following description is incorrect?

Options:

A.  

IPv6 unicast address is called a tentative address after it is assigned to an interface and before it is detected by duplicate addresses

B.  

Duplicate address detection is implemented via RS and RA messages

C.  

IPv6 duplicate address detection technology is similar to free ARP in IPv4

D.  

The interface needs to perform duplicate address detection before enabling any of the unicast IPv6 addresses

Discussion 0
Questions 77

Regarding BGP4+, the following statement is correct?

Options:

A.  

BGP4+ carries the next hop address of the route through the Network Address of Next Hop in the NLRI properties MP_REACH

B.  

BGP4+ carries the next hop address of the IPv6 route through the NEXT_HOP attribute

C.  

The NEXT_HOP attribute does not exist in BGP4+

D.  

BGP4+ carries the prefix and mask length of the IPv6 route through the NLRI attribute

Discussion 0
Questions 78

Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways?

Options:

A.  

Enable traffic to be forwarded locally first

B.  

Connect the stacking device via a stacking card

C.  

Configure the stacking system MAC address switching

D.  

Enables the stacking multi-master check function

Discussion 0
Questions 79

In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correct

Options:

A.  

ASBR-Sunmary-LSA is allowed to be published to the NSSA region

B.  

AS-External-LSA is allowed to be published to the Stub region

C.  

Any OSPF zone can be configured as a special zone

D.  

Zone can be equipped with zhiyi

Discussion 0
Questions 80

If the OSPF protocol is running in the network, after configuring the non-osseous thousand region in the OSPF region as the Totally Stub region, the ABR router sends a message to Totally The Stub area issues an LSA with an LSID of 0000, which category the LSA belongs to LSA?( Single choice questions).

Options:

A.  

LSA3

B.  

LSA1

C.  

LSA5

D.  

LSA2

Discussion 0
Questions 81

What is the following description of LDP reliability?

Options:

A.  

LGP GR (Graceful Restart) takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed

B.  

Manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to establish a backup ISP

C.  

The LDP ERR can also generate an ISP for a tag map from a non-optimal next hop, and create a forwarding table entry as a backup of the primary LSP

D.  

LDP and LGP linkage, the need for IGP to suppress the release of routes, to ensure that LDP and LGP paths are consistent

Discussion 0
Questions 82

Although the STP protocol can solve the loop problem, it affects the quality of user communication due to the slow convergence of the network topology. RSTP has made many improvements to STP, which of the following is not an improvement of RSTP to STP?

Options:

A.  

In addition to the 3 port states, RSTP vice adds 2 new port roles

B.  

Non-root switches running RSTP send configuration BPDUs at intervals specified by Hello Timer, a behavior that is entirely autonomous for each device

C.  

RSTP port state specification is divided according to whether the port forwards user traffic and learns the MAC address, reducing the original 5 port states to 3

D.  

If a port does not receive a configuration BPDU sent by the upstream device for 4 consecutive Hello Time, the device considers the negotiation with this neighbor to fail

Discussion 0
Questions 83

As shown in the following figure, a part of the LSDB LSDB of a router LSDB is shown in the first one in the following figure. A new LSP has been received, the second one in the figure below, and the following statement is incorrect (single choice).

Options:

A.  

this router will put the newly received LSP into the LSDB

B.  

In the case of a broadcast network, DIS will include summary information for this LSP in the next CSNP message.

C.  

This router ignores LSPs received from neighbors

D.  

If it is a point-to-point network, the router will send PSNP

Discussion 0
Questions 84

The following description of the Layer 6 functionality in the OSI reference model is correct?

Options:

A.  

Synchronous communication

B.  

Establishing, maintaining, and terminating communication sessions

C.  

Provides a common data compression and encryption scheme

D.  

Determines the availability of resources

Discussion 0
Questions 85

Is the following information about BGP4+ described correctly?

Options:

A.  

BGP4 can use dampening commands to suppress oscillations on IBGP routes.

B.  

Modifying the RouterID of BGP causes the BGP connection between routers to be re-established.

C.  

The Next Hop attribute in BGP4+ is represented by an IPv6 address, which can be the link-local address of the next hop.

D.  

BGP4+ does not support route auto-aggregate

Discussion 0
Questions 86

As shown in the figure, Department A of Branch 1 has access to the Internet, but Department B can only use an encrypted VP to access headquarters resources, and NAT can be configured on the egress device The policy enables Department A to access the Internet, while the PSecVPN (ESP Protocol) + Tunnel mode method configured for Department B gives it access to headquarters.

B. Right

C. Wrong

Options:

Discussion 0
Questions 87

There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct?

Options:

A.  

When HW1 injects a default route into Zone 1, HW1's local route table can not contain a single default route

B.  

HW1 injects a Type 7 default route into Zone 0

C.  

HW1 injects a type 7 default route into zone 1

D.  

HW1 injects a Type 3 default route into Zone 1

E.  

When HW1 injects a default route into zone 1, HW1's local route table needs to answer the default route

Discussion 0
Questions 88

What is wrong with the following statement about digital certificates?

Options:

A.  

Digital signatures guarantee the integrity of digital certificates.

B.  

Digital certificates contain public key information.

C.  

Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.

D.  

Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.

Discussion 0
Questions 89

What are the common ways to learn routing in BGP? ( Multi-select)

Options:

A.  

receives neighbor routing information

B.  

Introduce static routes

C.  

BGP routing for other AS is introduced

D.  

Introduced Direct Route

Discussion 0
Questions 90

You want only his telnet stream to be able to access the server (address 1011.100). Then, you add the following ACL to the routing ring: nule5pemit cp source ny destination 1011.100000destination-porteq 23 rule 1l0 deny ip source any destination any Then you apply that ACL to the ingress direction of the router's seial interface. What type of message is allowed to pass through the router?( Multiple choice questions).

Options:

A.  

A non-sharded, port 21-accessing packet

B.  

Non-first-sharded messages that use port 23 to access the server's message

C.  

Non-first-of-sharded messages to access other hosts

D.  

Non-first-of-its-kind packets that use port 21 to access the server

E.  

Packet answer for the first sharded or non-sharded, using port 23 to access the server

Discussion 0
Questions 91

As shown in the figure, a company sets up an OSPF network. The links in the figure all form OSPF adjacencies, and all OSFP devices declare their own loopback addresses. One day SIR2 The two links of the S2AR1 suddenly failed, and in order to detect if the network was operating properly, the engineers performed a device status check, which is correct as described below

Options:

A.  

R5 can normally learn the loopback route to R2

B.  

R3 can not learn the loopback route to R2

C.  

R1 can normally learn the loopback route

D.  

R3 of R2 The loopback route of R2 can be learned normally

Discussion 0