h12-261 v3.0 (218) - (Translated From Chinese To English)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

HCIE-R&S(H12-261)

Number: H12-261
Passing Score: 600
Time Limit: 900 min

Huawei HCIE exam service communication group: 956487714 (group name:


HCIE standby exam service group)
For
Colddetails
teacherabout
QQ:Huawei courses, contact:
2623640877
WeChat: 15335190892
Special thanks to the collection and
collation of the old Qin! !
Tips:
1. Update time: In May, 2019, please pay attention to your exam time and decide whether to use this document.
2. Because the content is constantly updated, the new topic is normal, and the 100% coverage is not guaranteed. If t
problem cannot be accepted, you can move to other channels.
Documentation
3. In line with the principles of collection and sharing, you are welcome to
provide the war report. Thank you very much!
Jiangsu Wanhe Computer
Training Center 2019.5

1. Inter-device link aggregation implements data flow transmission and mutual backup between stack member switches.
However, stack cables between stack devices are used.
Which of the following methods can be used to improve the forwarding efficiency?
A. Connectthe
B. Enable thestack
stackmulti-master
device through a stack card.
check function.
C. Configure MAC address switching
for the stack system.
D. Enable local preferential
forwarding of traffic.
2. Which of the following statements about CHAP authentication in the PPP protocol
are correct? (Multiple choices)
A. If the authentication party is not configured with a user name, the authentication
party interface can also be configured with a password.
B. Use the authentication sequence ID, random number, and key to calculate a hash
value using the MD5 algorithm.
C. Three times of packet exchange authentication are required, and only the user
3. A switch
name runs RSTP.
is transmitted onIfthe
thenetwork
networkbut
topology changes,
the password is Layer 2 forwarding entries automatically learned by the switch w
not transmitted.
sent.
D. The user name must be configured on the authenticated interface of CHAP
What
A. changes?
All entries are
authentication.
deleted.
B. Only the entries related to the port that receives the TC
message are deleted.
C. All entries except the entries related to edge ports are deleted.
D. If the aging time is set to 15 seconds, the entries that exceed the aging time are deleted.
E. In addition to the entries related to edge ports and the entries related to the ports that receive TC messages, all other
entries are deleted.

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
4. Which of the following statements about the MUX VLAN of
Huawei
A. In theswitches are correct?
same VLAN, MUX VLAN can be used together with Super VLAN.
B. MUX VLAN can be classified into Principal VLAN and Subordinate VLAN, Subordinate VLAN, and can be classified into Se
VLAN and Isolate VLAN.
C.
D. Each SeparatePort
The Principal VLANcancan be bound towith
communicate multiple PrincipalinVLANs.
all interfaces the
MUX VLAN.
5 When you troubleshoot a LAN where Huawei devices are deployed, you find that there are a large number of unicast fram
unknown
Which of source MAC addresses
the following on the LAN.
is the greatest harm to a switch caused by a
large number of unknown source MAC addresses?
A. The available
B. Increase bandwidth is consumed.
the power
consumption.
C. Memory occupied by
theThe
D. buffer
MACframe
address entries that are
available in the system are consumed.
E. The TCAM entry is occupied.
6. Which of the following statements about the process of sending and receiving data
frames in access mode on a switch interface are correct?
A. In Access
B. In access mode,
mode, the
onlysystem directly
untagged discards
frames are tagged data frames.
received.
C. When the data frame enters the switch interface, the switch learns the destination
MAC address in the data frame.
D. In access mode, the VLAN tag of the data frame is stripped when the data frame is sent.

7. In RSTP, which port can provide the backup path to the root node of the spanning tree? Indicates the status
of the port.
A. Alternate
B. Alternate port
port and
and forwarding
Learning status
status
C. Root port and Listening status
D. Designate port and Listening status
E. Alternate port and Discarding status

8. Which of the following options may affect the establishment


of IBGP peers? (Multiple choices)
A. The BGP
B. The authentication fails.
protocol versions
areIBGP
C. inconsistent.
–Multi-hop is not
configured.
D. The IGP route is unreachable.
9. Which of the following statements about the RD filter of BGP are
correct? (Multiple
A. If RD-filter choices)but the RD of the route does not match any RD defined in the rule, the default matching result
is configured
Permit.
B. The
C. If relationship
RD-filter is not between rules
configured butconfigured
RD-filter is on thefor
used RD-filter is "OR".
filtering, the matching result is deny.
D. Multiple rules are matched according to the configuration sequence.

10. IS-IS selects DIS in the broadcast multi-access network. Which of the following statements
about DIS is correct? (Multiple choices)
A. IS-IS selects the DIS by comparing the priorities. If the priorities are the same, the IS-IS
compares the MAC addresses.
C. In a broadcast multi-channel access network, DIS sends Hello PDU at a
B. The DIS periodically
frequency sends CSNP messages to ensure database synchronization.
of three times.
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
D. The DIS supports the preemption function. After the new DIS preempts the
resources, no LSP packets need to be flooded.
11. Which of the following statements about Filter-
policy
A. Runare
thecorrect?
Filter-Policy command on the ASBR in OSPF to filter the generation of type 5 LSA and type 7 LSA.
B. The prefix list can filter routes or filter packets.
C. The Filter-Policy can filter the received or advertised link status information and modify the attributes of the route
entry.
D. When the prefix list is used to filter routes, ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 indicates that only the default
route is matched.
12. The OSPFv3 protocol is a separate protocol. It is different from the OSPFv2 protocol. The OSPFv3 protocol is based on th
rather than the network.
Which of the following
A. The neighbor statements
relationship is incorrect?
can be established even if the two routers connected to the link have different IPv6
address prefixes.
B. The neighbor relationship can be established even if no unicast IPv6 address is configured for the two routers
connected to the link.
C. The OSPFv3 router uses the Link-local address of the neighbor as the next hop for forwarding packets.
D. In addition to virtual connections, all OSPFv3 interfaces use the Link-local address as the destination address of
packets.

13. Which of the following statements about the TCP sliding window are incorrect?
(Multiple choices)
A. After the retransmission timer expires, the transmit end does not receive any
acknowledgment and retransmits the unconfirmed data.
C. The TCP sliding window allows multiple data packets to be
B. The
sent transmit
before the end does not needisto
acknowledgment transmit complete window size packets.
received.
D. The
E. The transmit
sliding window size canthe
end declares only be increased or remained
unchanged.
initial window size.
14. In the IPv4 and IPv6 environments, the SEL field in the IS-IS NET address is always set to 00.

A. Correct
B. Error

15. If as shown in, a part of the LSP in the LSDB of a router is shown in the following figure. A new LSP is received, as shown
following
Which of figure.
the following
statements about the second
hop is incorrect?

A. The local router places the newly received LSP


in the LSDB.
B. The local router ignores the LSP received from
the neighbor.
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
C. If the network is a point-to-point network, the local
router
D. sends
In the caseaofPSNP message.
a broadcast network, the DIS will include the abstract information of the
LSP in the next CSNP packet.
17. Which of the following statements about the stub area and NSSA area of OSPF are
incorrect? (______)
A. Type 5 LSA cannot be injected into a stub area, but Type 5 LSA can be injected into an
NSSA.
C. In stub areas and NSSA areas, Type 4 LSA cannot be
B. Type 3 LSA can be injected in both stub areas and NSSA areas.
injected.
D. The Type7 LSA cannot be injected into the stub area, but the Type7 LSA can be
injected in the NSSA.
18. Which of the following statements about BGP route
filtering is incorrect?
A. Configure a routing policy for locally advertised routes. The policies take effect before the routes are added to the BGP
table.
B. The filtering relationship between nodes of the Route-Policy is "OR". That is, the Route-Policy can be used as long as a n
filtered.
C. When receiving a route from a BGP peer, the system executes the routing policy to filter out unnecessary BGP routes. T
D. In the same node of Route-Policy, multiple if-match clauses of different attributes are "OR".
routes are not added to the local BGP.
Routing table

19. If the Option field in the OSPFv3 Hello packet sent by the GigabitEthernet0/0/0 interface of router A is 0x000013,
Which of the following statements are correct? (Multiple choices)
A. The GigabitEthernet0/0/0 interface of router A belongs to the
NSSA area.
B. The GigabitEthernet0/0/0 of router A participates in IPv6 route
calculation.
D. The router A supports AS-external-LSA
C. Router A is an OSPFv3 device that has the forwarding capability.
flooding.
20. In the IPv6 environment, IS-IS is deployed. Which of the
following statements
A. On a broadcast are correct?
network, the DIS priorities of IPv4 and IPv6 can be set
separately.
B. The DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.
C. On the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6 must be the same
device.
D. If ISIS silent is configured on an IS-IS interface, the interface does not send IS-IS packets but receives IS-IS packets.
21. After BGP imports routes of other protocols, the next hop in the BGP routing table is the same as the next hop of
theCorrect
A. imported routing protocol.
B. Error

22. There is an AS-path-filter, ip as-path-filter 1 permit ^100(_100)*(_400)*. Which AS-PATH does not match the As-path-fil
Attribut
e
A. 100 400
B. 100 400 400 400
C. 100 200 900
D. 100

24. Which of the following statements about BGP


RRsThe
A. areRR
correct? (Multiple
can advertise thechoices)
routes learned from IBGP peers to all clients and non-clients.
B. When no RR is available, IBGP neighbor relationships need to be fully meshed. The introduction of RR can reduce the
requirement for full interconnection.
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
C. The route reflector can advertise the routes learned from the non-client to all
clients.
D. The route reflector can advertise routes learned from a client to other clients and non-
clients.
25. Which of the following statements about BGP is
incorrect?
A. The alliance divides an AS into several sub-ASs. The external AS of the confederation still considers that the alliance is a
B. Sub-AS number of the alliance, which is advertised to BGP peers outside the confederation by default
C. The sub-AS number in the confederation can use the private AS number. Huawei NE/AR router. A maximum of 32 sub-A
be configured for an alliance.
Unified number can easily detect the route selection loop in the AS because eBGP runs
D. The association
between sub-ASs.

26. What are the possible causes of a BGP connection failure after the
BGP connection is established?
A. Open
B. The packet negotiation
mandatory fails.
attribute in the route
update packet is lost.
C. After the BGP connection is established, no KeepAlive packet is received within
the negotiated holdtime time.
D. An incorrect BGP packet is received.
27. When IS-IS area authentication is configured, which of the following IS-IS
packets carries authentication information?
A. IS-IS
B. IS-IS Level-1
Level-1 Hello
SNP and LSP
packets
C. IS-IS Level-2 SNP and LSP
D. IS-IS Level-2 Hello packets

28. Type 5 LSAs in OSPF are used to transmit external routes. Which of the following statements about Type
5 LSAs is incorrect?
A. The router that is in the same area as the ASBR can calculate external routes through intra-area LSAs
and Type-5 LSAs.
C. Type 5 LSAs are advertised by ASBRs and flooded on OSPF networks in non-Stub/NSSA areas.
B. Type 5 LSAs can be filtered on the ABR and ASBR.
D. The FA address is contained in Type 5 LSAs. The FA address is 0.0.0.0, which is not used as a
reservation.
29. Which of the following statements about the domain-authentication-mode md5 hello command in the IS-IS process are
correct?
A. Routing domain authentication is used to carry authentication information during the transmission of SNPs and LSPs of
Level-1 and Level-2.
B. If the domain authentication mode of all routers in the same routing domain is MD5 and the password is hello, the ISIS
D. IS-IS authentication cannot be applied to
and LSP can be flooded normally.
the IPv6 environment.
C. This command is used to carry authentication information during the transmission of IS-IS Hello packets.
30. The Level-1-2 IS transmits the Level-2 LSP to the Level-1 area. If the value of ATT in the Level-2 LSP is 1, it indicates the L
the
Youarea.
can use this Level-1-2 IS to access
the
A. Correct area.
external
B. Error

31. On an OSPF broadcast network, there are four routers RTA, RTB, RTC, and RTD on the same network segment. The DR p
of RTA, RTB, RTC, and RTD are 2, 1, and 1.
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
And 0 and Router ID are 192.168.1.1, 192.168.2.1, 192.168.3.1, and 192.168.4.1., respectively. If they are enable
the four
OSPF: Therouters,
BDR elected by OSPF is ________.
A. RTB
B. RTC
C. RTA
D. RTD

32. Which AS_PATH can be matched by the ip as-path-filter 1 permit ^12.*74$


command?
A. AS_PATH (123
B. AS_PATH (32 1274 23) 2374)
621 743
C. AS_PATH (321 12 2374)
D. AS_PATH (125 328 74 23)
33. The OSPF protocol is running on a company's network. To learn about the OSPF mechanism, an engineer performs pack
capture on the network. The following is an example:
Which of the packets
A. LS Update followingare
statements about
synchronized toOSPF packets
the LSDB are correct?
by sending (Multiple
detailed LSA choices)
information.
B. After receiving the LS Update packet, the router must send LS Ack to confirm
the packet.
C. After an interface is added to an OSPF area, the interface immediately sends
Hello packets.
34. In the topology shown in the following figure, R1 can access the Internet through R2 and R3, R1 and R2, R1 and R3 estab
D. LS Update packets are sent only when the adjacency relationship is
eBGP
The connections,
same and R2,R3
AS advertises belongs
default to through BGP. The R1 accesses the Internet by using the R2. The followin
routes
established.
methods can be used to implement more than (of the default routes:
Select).

A. R2 Set the MED attribute of the peer R1 to 150 in the export


direction.
B. R1 Set the MED attribute of the peer R3 to 150 in the import
direction.
C. R2 Set the local priority of the peer R1 in the export direction. 150
D. R1 Set the local priority of the peer R2 to 150 in the import direction.
35. In addition to stateless address autoconfiguration, the IPv6 can obtain information such as the address,
gateway,
A. Correctand DNS through the DHCPv6.
B. Error

36. The network administrator prepares to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4 network. The IPv4 a
of the routerthe
Therefore, interface
tunnel isaddress
138.14.85.210,
is
2001:8a0e:55d2:1:230:65ff:fe2c:9a6..
A. Correct
B. Error

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
37. On the IPv6 network, the two nodes A and B are neighbors. If the node A sends an NS message to the node B, if the nod
receives
After thethe
NAmessage,
message is returned, check the neighbor status on A.
A. Reachable
B. Stale
C. Probe
D. Incomplete

38. Which of the following statements about


MPLS
A. Theislabel
incorrect?
space of dynamic signaling protocols such as LDP and MP-
BGP is 16-1023.
B. The MPLS
C. When the label is 20 bits long
TTL processing modeandin is used
Pipe for packet
mode is used,forwarding.
IP packets are transmitted on the MPLS network. The TTL value of
packets is only on the ingress node and egress node of the MPLS network.
The
D. value
MPLS is decreased
supports by 1.
multi-layer label nesting. The S bit of the inner
label is 1.
39. RD is used to distinguish the same IP address in different VPNs. How many
bits
A. 16does an RD contain?
B. 64
C. 32
D. 128

40. In Inter-AS VPN-OptionB packet forwarding, two ASBRs need to exchange LSP labels on the public network.
A. Correct
B. Error

41. Which of the following statements about MPLS labels is


incorrect?
A. The MPLS label is four bytes long and is encapsulated between the
link
B. Bylayer and the
default, the device
network layer. the PHP feature. The label value assigned by the egress node that supports PHP to
supports
the penultimate hop node is 3.
C. If S=0 is displayed in the label, it indicates that the label is a stack bottom label and directly forwards IP packets.
D. When the label value is 0, it indicates that the label should be popped up and the packet forwarding must be based
on IPv4.
42. Check the detailed information about all VPN instances on a network device. Which of the following statements
is incorrect? (Multiple choices)

A. The number of instances where the IPv6 address family is enabled


in the
B. The VPN configured
device allocateson the local
a label endroute
to each is 1. of the VPN-Instance vpna.

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
C. The VPN-Instance vpna does not receive the VPN route whose
RT is 2:1.
D. The GigabitEthernet1/0/0 interface is bound to the VPN-
Instance vpna.
43. Which of the following statements about LDP
reliability
A. The LDPisFRR
incorrect?
may also generate an LSP for the label mapping from the non-optimal next hop, and use the LSP as the bac
the primary LSP to establish a forwarding entry.
B. When LDP is associated with IGP, IGP needs to suppress route advertisement to ensure that LDP and IGP routes are con
C. The LDP FRR policy is manually configured. By default, a 32-bit backup route triggers LDP to establish a backup LSP.
D. The LDP GR(Graceful Restart) uses the separation of the MPLS forwarding plane from the control plane to implement pro
restart or active/standby switchover.
Forwarding is not interrupted.
44. What improvements have been made to the IGMPv2 protocol
compared with IGMPv1? (Multiple choices)
A. The
B. The outgoing
group-specific
packetquery packet is added.
is added.
C. The maximum response time
field
D. Addis added.
a Group-and-Source-Specific
Query message.
45. If multiple candidate RPS are configured in a multicast group, which of the following parameters need to be compare
selecting
A. Prioritythe RP from multiple candidate RPS? (Multiple choices)
of C-RP
B. Mask length of the group range of the C-RP service that matches the
group address to which the user joins
C.
D. IP address
Number ofof the
the C-RP interface
C-RP
interface
46. When the multicast router that runs the PIM-SM needs to elect a DR to receive and transmit multicast data from the so
or the member end, perform the following operations:
Which of the
A. Compare following
the statements
DR priorities. about DR
If the priorities areelection rules
the same, is correct?
compare the interface IP addresses of the
PIM routers to elect the DR.
B. The PIM
C. The PIM router
router with
with aa lower
long interface mask
DR priority is elected as the DR.
is elected
as the DR.
D. The router with a smaller IP address is
elected as the DR.
47. If PIM-SM is running on a multicast network, a multicast forwarding tree needs to be constructed between the multicas
and receiver so that the receiver can receive the multicast forwarding tree.
Which of the following statements about the multicast forwarding tree are correct? (Multiple choices)
A. The
B. The RPT
RPT is
is constructed
constructed between
between the
the RP and the receiver.
multicast
C. The SPTsource and the RP.
is constructed between the RP
and the receiver.
D. The SPT is constructed between the
multicast source
48. As shown andfigure,
in the the RP.
the branch and headquarters use redundant links to establish IPSEC VPN, and the traffic from br
enabled on Router_B.
Which of the following statements about URPF are correct? (Multiple choices)

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
A. When the IPSec active/standby link redundancy backup is used, URPF is enabled on the physical interface.
URPF loose mode is recommended.
B. When IPSec multi-link redundancy backup is used, URPF is enabled on the tunnel interface. URPF strict mode
can be used.
C. When the IPSec active/standby link redundancy backup is used, the URPF strict mode can be used when URPF
is enabled on the physical interface.
49. The HTTP protocol is based on TCP. Therefore, the TCP Flood attack defense method can be used to
D. When IPSec multi-link redundancy backup is used, URPF strict mode can be enabled on a physical interface
defend
A. against HTTP Flood attacks.
Correct
when URPF is enabled.
B. Error

50. Two IPv6 networks can access the IPv4 network, and two IPv6 networks need to establish an IPSec tunnel for communic
Which of the following encapsulation modes can
meet the preceding requirements?

A. ESP+ tunnel mode


B. None of the above
C. AH+ transmission
mode
D. AH+ tunnel mode
51. When the ACL in the VRP has multiple matching rules (rule), which of the following statements about the
matching sequence is correct?
A. In the casetoofthe
B. According confirmation,
principle ofmatch Rule-IDininthe
"depth-first" ascending
case of order.
default,
C. In thethe
casematching is performed
of confirmation, based
match on the first
the permit principle
and then the deny order.
of "depth-first".
D. There is only one matching order and cannot be modified.

52. The LAND attack means that the attacker sends a source address and destination address to the destination host, sourc
and
When destination end. with the same port is waiting for the final ACK packet from the sender, the connection is alwa
a SYN packet
the semi-connected
Waste of limited TCPstate. As a result, the connection is received.
resources at the end
A. Error
B. Correct

53. What is the relationship between CIR,


BC, and TC?
A. TC=CIR/BC
B. CIR=TC/BC
C. CIR=BE/TC
D. TC=BC/CIR

54. A family user has subscribed to a broadband service of 10Mb/s. To improve user experience, the user can be stable a
during the speed test,
Which of the following methods is optimal if we use the token bucket technology to implement this requirement?
A. cir 10000 pir 12000
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
B. cir 10000 cbs 10000 pbs 12000
C. cir 8000 pir 12000
D. cir 10000 cbs 12000 pbs 12000

55. Which of the following statements about the optimal route election of various
protocols are correct?
A. OSPFroutes
B. The placesthat
all the
are routing information
unreachable in thehop
to the next LSDP into the
of BGP are IP routing table.
also added
C. Learn to the IP
different routing
routes fromtable.
BGP and OSPF to the same destination network segment and select the optimal route based
preference value of the protocol.
Incoming IP routing
D. BGP selects tableroute to the same destination network segment by comparing the
the optimal
cost value of the route entry.
56. In the topology shown in the following figure, all interfaces on the router are enabled with IS-IS.
Which of the following statements are true? (Multiple choices)

A. If the GE0/0/0 interface of R3 is Down, R2 becomes the master device.


B. If the Ethernet 0/0/0 interface of R3 is Down, R2 becomes the master device.
C. If the Ethernet 0/0/0 interface of R1 is Down, R2 becomes the master device.
D. If the Ethernet 0/0/1 interface of R1 is Down, R2 becomes the master device.

57. Which of the following statements about the BFD single-arm


echo
A. Thefunction are correct?
BFD single-arm echo(Multiple
functionchoices)
must be configured with the local and remote
discriminators.
B. The default destination IP address of the protocol packets of the BFD one-arm echo
function is 224.0.0.184.
C. The BFD single-arm echo function applies to the scenario where one device supports
BFD and the other device does not support BFD.
58. Which of the following does not belong to the
D. After the BFD one-arm echo function is enabled, the destination IP address and source
EVPN Type2 routing function?
IP address of BFD packets are the same.
A. Host MAC address advertisement
B. Host ARP
C. BUM notification
packet
forwarding
D. Host IP route
advertisement
59. The mainstream Layer 2 technologies include VXLAN, trill, NVGRE,
and MPLS.
A. Correct
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
B. Error

60. A BD in a VXLAN can correspond to multiple


VNIs.
A. Correct
B. Error

61. Which of the following solutions is optimal for constructing a


loop-free Layer 2 network?
A. Stack + link aggregation
B. TRILL+MSTP
C. Stack +MSTP
D. Link aggregation
+MSTP
62. The MAC address table of the switch with the default configuration is empty. The host A connected to the switch sends
unicast data frame.
What
A. Theoperations will the
switch discards switch perform after receiving the data frame?
the data
frame.
B. The switch forwards the data frame to an interface according to the destination
MAC address of the data frame.
C.
D. The
The switch
switch records the data
buffers the source MACand
frame address
waits of
forthe
thedata frame and
destination hostfloods the
to send
data frame.
the data frame for forwarding.
63. Three switches SW1, SW2, and SW3 are shown in the figure. SW1 is the root bridge, and link congestion occurs betwe
and SW2. SW2
What kind of spanning tree protection mechanism does the administrator need to configure to prevent link conges
caused by the failure to receive configuration BPDUs from the root bridge?

A. Loop
protection
B. Root
C. TC-BPDU
protection
protection
D. BPDU protection
64. Which of the following commands can be used to determine whether
a loop fault occurs on a switch?
A

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
C

D (correct answer)

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
65. In the VLAN (802.1Q) data encapsulation, the total number of priority fields
is 6bit.
A. True
B. False

66. IS-IS is running on the four routers R1, R2, R3, and R4. The IS-IS router type is marked. Check the routing table on R1. Th
does not arrive.
10.34.34.4 The cause of the route is as follows:

A. Configure a routing policy on R2 to filter out


default routes.
B. The system-ID of the R2 conflicts with the
R3.
D. The system-ID of the R2 conflicts
C. The
with area
the R1.planning of R3 and R4 is incorrect.
67. The Option field of OSPFv3 appears in all LSAs.
A. Yes
B. Error

68. Which of the following statements about the Link-LSA of


OSPFv3 are true?
A. The Option field exists in the LSA header rather than the Link-lsa
data area.
B. Both the link-local address of the interface and all IPv6 prefixes of the interface are included.
C. If the Prefix Option field of a prefix of the Link-LSA is 0x00, the prefix is not included in the IPv6 unicast
calculation.
D. Both the link-local address of the local interface and all Ipv6 prefixes of the same area on the local router
69. The following topology is available. Which of the following
statements are correct?

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
A. Because the route aggregation is performed on the R2, only the 10.0.0.0/16 routing entry
exists in the IP routing table of the R1.
B. The 10.0.2.2/32 and 10.0.3.3/32 routes exist in the IP routing table of the R1.
C. The IP routing table of R1 contains both 10.0.3.3/32 and 10.0.0.0/16.
D. The 10.0.2.2/32 and 10.0.0.0/16 routes exist in the IP routing table of the R1.
70. Which type of prefix is advertised by a BGP router to its own IBGP peer (assuming that the router is not configured as an
A. The prefix is learned by the eBGP peer, or the prefix is learned from the RR.
B. The prefix is learned by other BGF peers or the prefix is learned through network or route import.
C. The prefix is learned by other IBGP peers, or the prefix is learned from the eBGP peer, or the prefix is learned through ro
import.
Arriving
D. Prefix that exists in the
routing
E. exhibition
The prefix is learned by the eBGP peer, or the prefix is learned through the network or route import on the
local device.
71. As shown in the figure, there are two paths between AS100 and AS400. By default, the route from AS200 is the optimal
Now, AS300 is known.
The bandwidth of the path to AS400 is better. Therefore, perform the following configurations on R2. After the
configuration is complete, the optimal route does not change. Which of the following operations are performed?
Can the configuration
take
[R2]ipeffect?
as-path-filter 1 permit ^400$
R2]route-policy med permit node 10
r2-route-policy]if-match as-path-filter 1
Ir2-route-policy]apply cost 20

A. Configure deterministic-med in the BGP process of R1.


B. Configure compare-different-as-med in the BGP process of R2.
C. Configure deterministic-med in the BGP process of R2.
D. Configure compare-different-as-med in the BGP process of R1.

72. A network consisting of router R1, router R2, router R3, and router R4. The four routers are connected through a LAN.
Basic OSPF is deployed on all four routers. When you run the display ospf peer command on the router R2, you
find
The that R2ofand
status router R3 is 2way. So what do you get from this output?
On?
A. Router R4 is the DR.
B. The router R2 is the DR or BDR.
C. Router R2 is not a DR.
D. Router R3 is not a DR or BDR.
E. The router R2 does not form a full adjacency with the router
R3.
73. Which of the following statements about the NSSA area are
correct?
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
A. In the Hello packet sent by the OSPF neighbor in the NSSA, the value of N in the 1,E field in the option
field is 0.
B. The NSSA area generates Type 7 LSAs to advertise external routes. The FA address in Type 7 LSAs is used
to prevent loops.
D. In the he1lo message sent by the OSPF neighbor in the NSSA, the value of N in the option-field is
C. The NSSA area automatically generates a default LSA to access the external network.
1.
74. Run the aggregate ipv4-address {mask | mask-length} [as-set | attribute-policy route-policy-name1 | command.
In detail-suppressed | origin-policy route-policy-name2 | suppress-policy route-policy-name3], multiple parameters can
This affects the summarization route and its results. Which of the following statements about this command is cor
A. If Suppress policy is configured, aggregated routes are also generated. The if-match clause of Route-policy is used to sel
specific routes to be suppressed,
The detailed routes
B. If Origin-policy matching only
is configured, Route-policy
the specificare still advertised
routes to other BGP
matching Route-policy can peers.
be aggregated.
C. If Attribute-policy is configured, you can change the attributes of the aggregated route.
D. If As-set is configured, the AS_ATH of summarization route contains the AS path information of all specific
routes to prevent routing loops.
75. There are currently two Community-filter
ip Community-filter 1 permit 100: 1 200:1
ip community-filter 2 permit 100: 1
ip Community-filter 2 permit 200:1
Which of the following statements about
Community-filter is correct?
A. The BGP route matches 2 only when the community attribute carried in the BGP route contains 100:1 and 200:1.
B. The BGP route matches 1 only when the community attribute carried in the BGP route contains 100:1 and 200:1.
C. If the community attribute carried in the BGP route contains 100:1, 200:1, or both, the BGP rou
matches the BGP route.
community-filter1
D. If the community attribute carried in the BGP route contains 100:1, 200:1, or both, the BGP rou
matches the BGP route.
community-filter2
76. community-filter has two types: Basic community attribute filter and advanced community attribute filter. Which of the
following filter
Is the body tools makes
attribute a high-level
filter more group?
flexible than the
basic group attribute filter?
A. Regular-expression
B. ACL
C. AS-path-filter
D. IP-prefix

77. Command ip ip-prefix ip-prefix-name [index index-number] {permit | deny} ipv4-address mask-length
The [match-network] [greater-equal greater-equal-value] [less-equal less-equal-value] command is used to configure the ip
If
Theone1ess -equal-of the prefix list has been specified, but the
greater-equal4- does not.
If this parameter is specified, what is the range of the prefix?
A, [mask-length ,less-equal-value]
B. [less-equal-value,32]
C. No
restrictions
D. [0, less-equal-value]

78. The interface Serial0 of a router is in OSPF process 1, and the interface Serial0 is set to the Silent interface. In this case, t
setting takes effect.
What kind of influence?
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
A. OSPF does not establish any adjacency on the interface.
B. OSPF does not add the routes learned from the interface to the local
routing table.
C. OSPF
D. OSPF updates
uses thisroutes from
interface to neighbors.
establish an
available adjacency.
79. When the router HW is enabled with OSPF and the router HW role is ABR and abr -surmnary is configured, which types
LSAs are4summarized?
A. Type LSAs
B. Type 5 LSAs
C. Type 2 LSAs
D. Type 1 LSI
E. Type 3 LSAs

80. IS-IS CSNP packets and OSPF DD packets are on the MA network and describe the functions of the link state database su
Which of the following are the comparison between the two types of packets?
That's
A. Two right.
types of packets need to be confirmed by the peer router after being sent. Otherwise, the packets
need to be retransmitted.
C. The master/slave relationship in the DD packet exchange of the OSPFA is not bound to the DR/BDR.
CSNP packets are generated only by DIS.
D. After the adjacency is established, CSNP and DD packets are stopped.
E. Two types of packets do not need to be confirmed by the peer router.
81. If the default route does not exist in the local IP routing table, run the default route-import command to advertise the ro
to the BGP
(Group) peer. the
Advertise
default route,
True
False

82. Which of the following scenarios can be


used for AS-path
A. Apply -filter??
clauses in Route-policy
B. if-match clause in Route-policy
C. Filter the routes sent to BGP peers based on the AS_PATH attribute carried in the routes. For example, run the peer
x.x.x.x as-path-filter export command.
D. Filter the routes received from the BGP peer based on the AS_PATH attribute carried in the route. For example, run the
peer x.x.x.x as-path-filter import command.
82. Which of the following statements about BGP
is incorrect?
A. The alliance divides an AS into several sub-ASs. The AS considers that the AS is an
AS.
B. The
C. Sub-AS number
sub-ASs of the
in the alliance, which
confederation is advertised
can use private AStonumbers.
BGP peers outside
Huawei the routers can be configured with a maximum
NE/AR
confederation
of 32 sub-ASs. by default
D. The alliance can easily detect route selection loops in ASs because eBGP runs between sub-ASs.
83. Which of the following statements about IS-IS
route leaking are correct?
The IS-IS route leaking on the interface can be
used in the IPv6 environment.
In IS-IS route leaking on an interface, the route before
The IS-IS route
infiltration cannotleaking
be an on the interface
aggregated does not
route.
cause the peer flapping.
Is-is route leaking can be deployed on Level--1 routers.
Is-is route leaking is used to prevent routing loops.
84. When two eBGP peers are connected through two parallel cables, which of the following methods can be used to imple
the two parallel serial cables?
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
Bidirectional load balancing between two
eBGP
A. peers?
Set up an eBGP peer relationship between the loopback interface and EBGP Multi--hop, configure the loopback interfac
the update source, and then use the loopback interface.
IGPYou
B. is used to implement
do not need to useload
any balancing among
method. BGP equal-cost paths
automatically between
implements addresses.
load balancing among different
ASs on available links.
C.
D. Run the ebgp-load-balance
Configure commandwith
an eBGP peer relationship on both ends. interface as the update source. The IGP in each AS must have two
the loopback
to the loopback interface address of the eBGP peer.
Price path; In
E. Configure anaddition,
eBGP peeryou need to run
relationship the
with thenext-hop-local command.
loopback interface as the update source. Two routes to the loopback inter
address of the eBGP peer need to be imported to the IGP in each AS.
Equivalent path; In addition, you need to run the ebgp-max-hop and next-hop-local commands.
85. When OSPFv3 and IS-IS are running on the router, you need to import the routes of OSPFv3 to IS-IS. Which of the
following are introduced?
The configuration
A. [Huawei] isis 1 is correct. (Multiple choices)
[Huawei-isis-1] is-level level-1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] ipv6 enable topology standard
[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1
[Huawei-isis-1] quit
[Huawei] ospfv3 1
[Huaweiospfv3-1] router-id 2.2.2.2

B. [Huawei] isis 1
[Huawei-isis-1]is-level level-1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] ipv6 enable topology standard
[Huawei-isis-1] ipv6 import-route ospfv3 1
[Huawei-isis-1] quit
[Huawei] ospfv3 1
[Huawei-ospfv3-1] router-id 2.2.2.2

C. [Huawei] isis 1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] ipv6 enable topology standard
[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1
[Huawei-isis-1] quit
[Huawei] ospfv3 1
[Huaweiospfv3-1] router-id 2.2.2.2

D. [Huawei] isis 1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] import-route ospfv3 1
[Huawei-isis-1] quit
[Huawei] ospfv3 1
[Huawei-ospfv3-1] router-id 2.2.2.2

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
E. [Huawei] isis 1
[Huawei-isis-1]is-level level-1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] import-route ospfv3 1 level-1
[Huawei-isis-1]quit
[Huawei] ospfv3 1
[Huawei ospfv3-1] router-id 2.2.2.2

86. If the router only needs to forward IPv6 packets, no IPv4 protocol and address need to be configured on the
router.
True
False

87. In an intra-domain MPLS BGP VPNF network, when a data packet is forwarded on the public network, two MPLS labels a
encapsulated. The following two labels are used.
Which of the allocates
A. The router followingthe statements
same labelisvalue
incorrect?
to all VPNv4 routes destined for the peer
PE.
B. The private network label is delivered by the MP-BGP when the route is transmitted.
The public network label is distributed by the LDP protocol.
D. Two layers of labels are used in MPLS BGP VPN: Public network labels (also called outer labels) and private
C. The egress
network labelsPE(also
usescalled
the inner
innerlabel to determine the egress CE to which the packet is
labels)
sent.
88. Which of the following statements about the LDP session
establishment
A. After the TCP process are correct?
connection is set up, the active party sends an initialization message to negotiate
the parameters related to the establishment of the LDP session.
B. The
C. The Hello
party message
with the larger transmission
discovered address
by the LDP acts uses
neighbor as thethe
active party and
TCP packet initiates
with the a TCP
connection setup.
destination address being the multicast address 224.0.0.2.
D. After the two ends receive the KeepAlive message from each other, the LDP session
is established successfully.
89. The router HW1 functions as the MPLS LSR router and exists on the network of the carrier HW. The router receives a pa
carrying a label, but
The label entry does not exist in its LFIB. How does the router process the packet?
A. The router HW1 uses LDP to create an LSP and creates a new path for the label carried in the packet in the LFIB.
B. The router
C. The router HW1
HW1 uses
discards
the the packet.
default label to forward
theThe
D. packet.
router HW1 strips the label and searches the FIB for the
destination IP address.
90. Which of the following statements about cross-domain
MPLS
WhenVPN onlyisLDP
incorrect?
is used as the public network label of an interface, Layer 3 labels are required for packet forwardi
in Inter-AS vp –Option-c scheme 2.
In Inter-AS vPN-OptionB mode, two ASBRs need to establish MP-EBGP neighbor relationships.
In Inter-AS vPn -OptionA mode, the routes between two ASBRs are common IPv4 routes.
In Inter-AS vPN -OptionB mode, two ASBR-Es are interconnected through multiple interfaces (including sub-
interfaces). Each interface is associated with a VPN.
The ASBR-PE considers the peer end as a CE.
91. If multiple receivers exist in a multicast group, the administrator enables the IGMP-Snooping function on the switch con
the receiver.
How Do Multiple Recipients Respond After the Switch Receives a General Query Message from the querier?
A. After
B. All receivers respond
the IGMPv1 with Report
command is run,messages.
all receivers respond to Report
messages.
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
C. The receiver that receives the first response times out and sends a Report
message. Other receivers do not send the Report message.
D. After the IGMPV2 command is run, all receivers respond to Report messages.
92. Which of the following statements about the process of registering the source
DR on the PIM-SM with the RP is correct?
A. The registration
B. After packet
receiving the encapsulates
registration the the
message, multicast service
RP sends a data.
registration stop packet.
C. The registration packet is used to construct the RPT
between the source DR and the RP.
D. Register packets are multicast packets.
93. On a shared network, which of the following mechanisms is used by the
PIM-SM to prevent duplicate traffic?
A. Register
mechanism
B. BSR/RP
mechanism
D. Join/Prune
C. Assert mechanism
mechanism
94. Which of the following statements about 802.1x authentication, RADIUS authentication, and
HWTACACS authentication are correct?
A. RADIUSi authentication and HWTACACS authentication can be used to authenticate the same
user at the same time, which is more secure.
B. Users can access the network in 802.1x authentication mode and perform identity
authentication through the RADIUS server.
C. RADIUS authentication and HWTACACS authentication are mutually exclusive. The same user
95. Which
cannot be of the followingatstatements
authenticated about
the same time.
RADIUS
A. is correct?
D. MAC
RADIUSaddress authentication
authentication does not
and 802.1x require the are
authentication usermutually
name and password. Therefore, the RADIUS authentication user
exclusive.
be used.
B. RADIUS authentication and Portal authentication cannot be used together because the Portal server can be used to
authenticate users when Portal authentication is deployed.
C. RADIUS authentication, authorization, and
Copy.
audit
D. Theare separated.
RADIUS server supports two access modes:
Wired and wireless.
96. To configure the AAA, you need to define the XRADIUS server as follows:
[Huawei]radius-server template EXAM
[Huawei-radius-EXAM]radius-serve shared-key cipher HUAwei123
[Huawei-radius-EXAMJradius-se authentication 10.7.66.66 1812
[Huawei-radius-EXAMJradius-se authorization 10.7.66.661812
[Huawei radius -EXAM]radius-server retransmit 27. 1813
[Huawei-radius-EXAM]radius-serv accounting 10
A. True
B. False

97. Which of the following is not


included
A. Public in the digital certificate?
key
information
B. digital
envelope
C. Digital
signatures
D. Issuers
98. The network administrator can use the CAR technology in traffic policing. Which of the following
technologies can be applied to CAR?
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
Double barrel
double speed
Single-bucket
single-rate
port
Three-bucket
single-rate
99.
portRouter A has an IP route whose destination network segment is 10.0.0.1/32 and the outbound interface is
Gigabitethernet0/0/1. Add the following configuration:
Double bucket
acl
rulenumber
single
10 speed 2000
permit source 10. 0.1.1 0
traffic classifier test
if-match acl 2000
traffic behavior test
remark dscp cs3
traffic policy test
classifier test behavior test
interface Gigabitethernet0/0/1
ip address10.0.12.1255.255.255.0
traffic-policy test outbound
Assume that the router A receives the data packet whose destination IP address is
10.0.0.1. Which of the following statements are correct?
A. If the source IP address of the packet is 10.0.1.2, the packet can be forwarded and the
dscp field remains unchanged.
B. If the source IP address of the packet is 10.0.1.2, the packet can be forwarded and the
dscp field is marked as CS3.
C. If the source P address of the packet is 10.0.1.2, the packet cannot be forwarded.
100. Which of the following SNMP message type reporting events sent
D. If the source IP address of the packet is 10.0.1.1, the packet can be forwarded and the
toA.the NMS is reliable?
dscpResponse
field is marked as cS3.
B. Trap
C. Inform
D. Get
E. Get Bulk

101. Continuous forwarding NSF(Non-Stopping-Forwarding) and uninterrupted routing NSR (Non-Stopping Routing) are tw
highly reliable ones.
Which
A. of the following
NSR capabilities need statements about
to be negotiated the solution
between are correct?
NSR routers
through
B. specific
After the packets.
NSF is enabled, a master/slave main control board switchover is performed, and the routing table
and forwarding table remain unchanged. Therefore, traffic is not lost within the GR period.
C. After NSR is enabled, if the service batch backup is not complete and the main control board is faulty, the
NR switchover cannot be performed.
D. NSF routers do not need to negotiate the NSF capability through specific packets.
102. An E-BGP neighbor relationship is established between R1 and R2, and BFD is enabled.
Which of the following statements are true? ()

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
A. The BFD packet detection time of R2 is 800
ms.
B. The BFD packet detection time of R2 is 600
ms.
C. The detection time of R1 BD packets is 660
ms.
103. Which of the following statements about IPv6 Over VXLAN is incorrect?
D. The BFD packet detection time of R1 is 1280
A.
ms.IPv6 over VXLAN indicates that the overlay network of Vxlan is an IPv6
network.
B. IPv6 over VXLAN can solve the problem of insufficient IP address resources
for terminal tenants.
C. The tunnel between Layer 2 and Layer 3 VXLAN gateways is an IPv4
network.
104. Which of the following statements about EVPN Type5 routes is
D. The IPv6 Over VXLAN does not generate entries.
incorrect?
A. The IP Prefix field can carry either the host IP address or the network
segment address.
C. Type5 routes carry both Layer 2 and Layer 3
B. Type5 is an IP prefix route.
VNIs.
D. Type5 routes carry Layer 3 VNIs.
105. When VXLAN uses BGP-EVPN to establish tunnels, which
types of packets are used?
A. Type3
B. Type5
C. Type4
D. Type2
E. Type1

106. Which of the following advanced functions


are supported by the BGP-EVPN?
A. ARP broadcast
B. VRRP suppression
over VXLAN
C. Multi-active gateway
D. VXLAN Qos

107. Which of the following statements about


VXLAN
A. packets
The outer are correct?
destination IP address is the IP address of the
remote VTEP on the VXLAN tunnel.
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
B. The source UDP port
number
C. is 4789. UDP port number is
The destination
4789.
D.VNI has 24 bits, which are used to
differentiate VLAN segments.
Which of the following packets is required to implement VM migration in the 108 and BGP-EVPN
distributed
A. Type3 gateway scenarios?
B. Type5
C. Type4
D. Type2
E. Type1

109. Which of the following statements about


VRRP
A. Bothare correct?
VRRPv2 and VRRP v3 support
authentication.
B. The VRRPv3 does not support the authentication function, but the VRRPv2 supports the
authentication function.
C. The VRRPv2 applies only to the IPv4 network. The VRRPv3 applies only to the IPv6 network.
D. The VRRP priority of the Mater IP address owner is 255. Therefore, the priority range can be set
to 0-254.
110. Huawei users are transmitting a large number of files through TFTP. Which protocol is
used forand
A. IcmP TFTPUDP
transmission?
B. iP and TCP
C. UDP
D. NFS
E. FTP

111. When LLQ is deployed, bandwidth parameters need to be


configured.
A. Provide aWhat is the
built-in meaning
policy of bandwidth
controller to limit theparameters?
maximum available bandwidth of a low-latency queue when
congestion occurs.
B. The value of this parameter should be as small as possible. It indicates that the bandwidth is always reserved. Even if
LLQ is used, this parameter also reduces the available bandwidth of the interface.
D. This parameter is optional because LLQ always takes
C. It indicates
precedence thatother
over the CBS calculates the burst size of the built-in policy bucket based on the CR.
queues.
112. Assume that the shaping rate of a port is 100Mbps. The input bandwidth and PIR of each service on the port are as fo
Then, after the first round of scheduling,
What is the bandwidth allocated to the EF queue?

A. 30M
B. 15M

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
C. 90M
D. 25M

113. Which of the following statements about the SA in the


IPsec
A. TheisSA
incorrect?
is uniquely identified by a triplet, including the security parameter SP(Security Parameter Index), source IP addre
usage.
Specifies
B. Run the the security
display ipsec protocol
commandnumber
to view(AH or ESP)such
information of the.
as the encryption algorithm used between the and another
PSec peer.
C.
D. and
The IPSec
Ipsec support only thecan
VPN connection symmetric encryption
be established onlyalgorithm to encryptSAs
when bidirectional data.
exist between IPSec peers.
114. Router HW1 and router HW2 are connected to network A and network B respectively. As shown in the following
figure, if you want to be on the router HW1
Establish
Which ACLanneeds
IPsecto
VPN between the
be configured onand
the the router
router HW1 HW2.
to enable the transmitted traffic from the
LAN to the LAN to pass through the encrypted VPN tunnel?

A. rule permit ip source 192.168.1.10 destination 192.168.1.2 0


B. rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0
C. rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
D. rule permit ip source 192.168.1.10 destination 10.1.2.0 0.0.0.255
E. rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255

115. Which of the following statements about the assertion mechanism


is correct?
A. The IP address size is not used as an election condition during the
winner election.
B. In the assertion mechanism, the winner forwards multicast data to
D. The interface connecting the loser shut down to the broadcast
the broadcast network segment.
network in the assertion mechanism.
C. The assertion mechanism is used for DR election.
116. Which of the following statements
about
A. The the BSR mechanism
PIM-SM domain canarehavecorrect?
multiple C-BSRs, but only one BSR can
be elected.
B. The BSR
C. The BSR notifies
collects all
C-RP information
routers throughdomain
in the PIM-SM the received
of BSRC-RP data
information and C-RP information by
packets. Bootstrap packets.
flooding
D. A C-BSR can also collect C-RP information through the received C-RP data packets.
117. The association between LDP and IGP means that IGP can suppress the advertisement of reachable routes to ensure
and IGP can
Supports work
path together toto
consistency implement
minimizenetwork convergence,
traffic loss ensuring IGP and LDP protection.
and improve
reliability of the entire network.
True
False

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
118. Which of the following statements about the MPLS TTL
processing
A. modewhen
In Pipe mode, are correct?
an IP packet passes through an MPLS network, the value of IP TTL decreases by 1 in the ingress nod
and is mapped to the MPLS TTL field.
B. The TTL of the MPLS label is the same as the TTL in the IP header. This prevents routing loops on the MPLS network (bas
on A).
C. In uniform mode, when an IP packet passes through an MPLS network, the value of IP TTL is decreased by 1 on the ingre
node, and the value of the MPLS TTL field is fixed.
119. In the MPLS VPN network, different CE devices can exchange routing information with the same PE device using diffe
D. In MPLS VPN, if the structure of the MPLS backbone network needs to be hidden, the uniform mode can be used on the
routing protocols,
The routing and different
protocols used withCEthe
devices.
same
ingress
device for
areprivate networkofpackets.
independent each other.
True
False

120. Which of the following technologies use the tunneling technology to


implement
A. communication between IPv6 addresses?
Dual Stack
B. 6to4
C. ISATAP
D. NAT64

121. Check whether the process of parsing the link-layer


address by NDP is correct.

A. True
B. False

122. Run the BGP 4+ command between the two routers. The neighbor relationship is normal. However, the BGP routing t
the localthe
What's router does not contain the routing entry of the neighbor.
possible
reason?
A. The route entries in the peer BGP routing
table are not optimal.
B. The next hop address of the BGP route is
unreachable.
D. Active-route-advertise is configured on
C. Peer
the peerignore
end. is configured on the peer end.
123. Which of the following information can be included in a basic network layer data
packet? (Multiple
A. Data link layer choices)
header
B. Upper-layer
C. Network data
layer
header
D. Network
E. Path record
layer
tail

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
124. Which of the following statements about configuring
BGP4+ are correct? (Multiple choices)
A. The Router-ID of the BGP4+ is the same as the Router-ID
of the BGP4.
B. BGP4+ When a peer is specified, the Link-Local address
D. BGP4+ When a reflector is configured, the role of the reflector and client must be the same as that
must be used.
configured on the BGP4.
C. The next hop of the BGP4+ route does not use the Link-
E. BGP4+ does not support route reflectors.
Local address.
125. Which of the following statements about the stub area in
OSPF are correct?
A. The virtual
B. The ASBR cannot exist in
link cannot the stub area.
traverse
the stub LSA
C. type7 area.cannot be injected in the
stub area.
D. The backbone area cannot be
configured as a stub area.
126. There is no type of LSA in the OSPF stub area.
A. Type-7
B. Type-5
C. Type-4
D. Type-3

127. A router running OSPF is connected to area 0 and area 1. You have configured area 1 as a stub area.
What are the types of LSAs that are
operated only in area 1?
A. Type
B. Type 17 LSAs
LSAs and Type 2
LSAs
C.1 LSAs, Type 2 LSAs, and Type 5 LSAs
D.3 LSAs and Type-4 LSAs
E.1 LSAs, Type 2 LSAs, and Type 3 LSAs

128. An engineer performs the import operation on an OSPF router on a network of the company. Which of the following
statements about importing route LSAs are correct?
A. Advertising
B. Set netmaskRoute
to 0. is set as the router-id of the ASBR.
C. link state id is set to the destination
network
D. segment
Use link state idaddress.
and advertising Router to uniquely identify an LSA.

129. The broadcast network starts the DIS election only after the neighbor
relationship
A. True is established.
B. False

130. Which of the following statements about ISS route


aggregation are correct?
A. Route aggregation can be configured and takes effect on all
types of routers.
B. Route aggregation can take effect only on the level--1 router.
C. Route aggregation can take effect only on the level--2 router.
D. Route aggregation can take effect only on the level--1-2 router.

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
131. IS-IS does not send CSNP packets on the P2P network during IS-IS neighbor
relationship
A. True establishment.
B. False

132. The Router-LSA of the OSPFv3 is generated on each router. It describes the interface address and cost of each link on
router,
Router asIDwell as the
of the neighbor relationship.
router
A. True
B. False

133. Which of the following statements about


ISS GR are correct?
A. IS-IS
B. IS-IS GR
GR has
is enabled by default.
four timers.
C. IS-IS GR uses CSNP packets to notify events and maintain
neighbor relationships.
D. ISis GR defines a new TLV structure to support this feature.
134. As shown in the figure, R1, R2, and R3 run OSPF at the same time and advertise their respective
loopback interfaces. Which of the following statements is false?

On the A.R2, you can run the filter-policy export command to filter the
loopback interface routes of the R3.
On the B.R2, run the filter export command in the Area1 to filter the loopback
interface routes of the R3.
On the C.R2, run the filter import command in the Area0 to filter the loopback
interface routes of the R3.
135. Which of the following statements about route
On D.R1, you can use filter-policy import to filter the loopback interface routes
import
The is incorrect?
A.bgp supports the import and Network2 modes when generating routes. The network mode is more accurate.
of R3.
B. The default metric of external routes imported by OSPF is 1, and the type of imported external routes is Type2.
After the level-2 network route of C.isis is imported to level-1, if the import policy is not manually configured, a routing
loop occurs.
D. Importing IBGP routes in OSPF may cause routing loops.
136. Which of the following statements about IS-IS LSP fragment extension are
correct?
A. Enable the IS-IS router to generate more LSP fragments to carry more IS-IS
information.
C. IS-IS fragment extension is implemented by adding virtual systems. A maximum of 1000
B. IS-IS fragment
fragments can beextension
extended.is also valid for Hello packets.
Virtual system. number of fragments that an IS-IS
D. The maximum
router can generate is 1024.
137. The existing Route-policy is as follows:
ip community-filter 1permit 100:1
ip as-path-filter 2 permit^100$
route-policytest permit node 10
if-match community-filter 1

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
if-match as-path-filter 2
apply as-path 200
Which of the following
statements
A. When theabout
BGP the preceding
route carries the community attribute 100:1 or the AS_PATH is 100, the BGP route matches the
configurations
previous one. are correct?

Indicates the route-policy. The AS-PATH attribute of the matched route is changed to 200.
B. When the BGP route carries the community attribute 100:1 and the AS-PATH is 100, the BGP route matches the
previous one.
The AS_PATH attribute of the matched route is
Indicates
changed the200.
to route-policy.
C. If the AS-PATH of a BGP route is 100, the BGP route matches the route-policy. AS_PATH matching the route
The attribute is changed to 200.
D. If the BGP route carries the community attribute 100:1, the BGP route matches the route-policy. Route matching
The AS_PATH attribute is changed to 200.

138. During the synchronization of the IS-IS broadcast network database,


which of the following statements are correct?

A. When the R2 functions as the DIS, it


periodically sends CSNPs.
B. The R2 functions as a DIS, and the Hello time is three times that of a
common router.
C. The R2 functions as the DIS and does not receive PSNP requests from
other routes.
D. The R1 and R3 periodically send PSNP requests to maintain database
139. The Layer 2 network architecture of a company is shown in the following figure. After the configuration is complet
consistency.
services cannot be transmitted between departments. Run the following command to check the device status:
The possible causes are as follows:
(It is not shown in the figure. Because the three factors are different, the
master port is displayed in the entry.)
A. The Revision Level configurations of switches are inconsistent.
B. The BPDU interval configured on the switch is
different
C. fromName
The Region that configured on the
configurations of switch.
switches
areThe
D. inconsistent.
Instance VLAN mappings between switches are
inconsistent.
140. Two routers are connected through serial interfaces. However, the interconnection interfaces cannot be pinged.
The
(No status
pictureofisthe interfaces
attached. is asPPP
One follows:
link has one HDLC link.
Therefore, the cause can be found only when the eye is not
blind.)
B. The IP addresses are not
A.
in The link bandwidth is insufficient.
C. the
The same network
link layer protocol is
segment.
inconsistent.
D. The subnet mask does
not match.
141. When DLDP detects a unidirectional link in an optical fiber, Huawei devices perform the following operations by defa
The DLDP
State; statetrap
Output machine is switched
information. Thetointerface
the Disable
is state.
automatically blocked.
A. Correct
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
B. Error
142. What is the main reason why RSTP is faster than
STP?
A.RSTP The type of the port status is added.
B.RSTP has a not
C.RSTP does smaller overhead.
converge
based on timers.
D.RSTP has a smaller timer.
143. Which of the following statements about Inter-AS vpn –
Option C are true?
A.
TheA B.ASBR
maximum ofnot
does twosave
labels can be
VPNv4 usedand
routes during
doespacket
not advertise VPNv4 routes to each other.
forwarding.
C.VPN routes are directly exchanged between the ingress PE and egress PE. Intermediate devices do not
need to store or advertise VPN routes.
D. Inter-AS VPN –Option-c is not applicable to multiple ASs.
144. Which of the following operations can implement fast fault detection on a
multicast network? (Multiple choices)
A. Shortenthe
B. Reduce theinterval
Holdtime of the Hello
at which Join/Prune message.
messages
are sent.
C.
D. Establish
Reduce the a PIM BFDfor
interval session between
sending Join/Prune
neighboring
messages. cells.
145. If the PM-SM protocol is running on the multicast network, you need to configure the RP,RP in the following modes: D
RP and static RP.
Which
A. Whenofconfiguring
the following statements
a dynamic areneed
RP, you correct?
to
configure
B. the BSR asathe
When configuring backup
static of the
RP, you RP.to
need
configure
C. the BSR to aadvertise
When configuring static BP,RPyou
information.
need to specify the RP
information on all PIM routers.
D. When configuring a dynamic RP, you do not need to configure a BSR.
146. On a multicast network, what causes multicast traffic to fail to be forwarded?
(Multiple choices)
A. The router
B. PIM does not
is not enabled onhave the RPF route.
the RPF
interface.
C. The upstream router discards the received PIM
Join message.
D. The router is not a DR.
147. IPSG can be configured with a static binding table, or DHCP-snooping can be used
together
A. True to form a binding table.
B. False

148. As shown in the figure, routers work in load balancing mode between branch network 1 and branch network 2. In thi
configure the router on the physical interface of the router.
URPP defense against source P address spoofing attacks must be in loose mode.

A. True

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
B. False

149. Which of the following is a


single-packet attack?
A. Special control packet attacks
B. Scanning
C. DDoS detection attacks
attacks
D. Malformed packet
attack
150. Which of the following statements about
digital certificates
A. Digital signaturesis incorrect?
ensure the integrity of
digital certificates.
B. The digital certificate contains
public
C. The key information.fails if the received peer certificate is within the validity period but the device time is
authentication
incorrect and is not within the validity period of the certificate.
D. Two PRI entities can be authenticated even if they are not in the same CA system.
151. Wred is configured on the newly deployed router HW.
Underneath
Which
A. Wredofcan
the set
following statements
different about wred
drop thresholds are loss rates for packets with
and packet
correct? priorities.
different (Multiple choices)
B. When the traffic exceeds the minimum threshold, wred starts to discard all
incoming traffic (tail drop).
D. Low bandwidth traffic is more likely to be
C. Selectively
discarded thandiscard multiple
traffic with high TCP flows to avoid global synchronization.
bandwidth.

152. Which of the following statements about the FTP


protocol
A. In FTP isPassive
correct?
mode, the client completes the initialization of the control and data TCP sessions.
B. In FTP Active mode, the server uses the PORT command to tell the client which port it expects to send data.
C.FTP always uses a TCP session to transmit control information and data information.
D.FTP always uses TCP port 20 to establish data sessions and uses ICP port 21 to establish
control.
Session E.FTP always uses TCP port 21 to establish a data session and uses TCP
port 20 to establish a control session.
153. If a Huawei switch runs RSTP, what is the aging time of BPDUs on a port of the switch? (confirmed)?
A. On the interface, RSTP does not
age. BPDU.
B. After
C. After MaxAge
6 seconds expires
D. After Hold time expires
E. After Forward Delay expires

154. When the LACP protocol is used, which of the following statements are
correct? (?()
A. Run the following command to prevent frequent flapping of the Eth-Trunk
interface due enable
lacp preempt to physical link faults:
interface eth-trunk 1
lacp preempt delay delay-time
B. Run the following command to configure load balancing for source IP addresses in an enabled
LAG:
interface eth-trunk
load-balance 1
src-dst-ip
C. Run the following command to delete a member interface from an
enabled LAG:
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
interface Gigabitethemnet0/0/0
Shutdown
interface Gigabitethernet0/0/1
undo eth-trunk 1
interface Gigabitetheret0/0/
undo shutdown
D. Add member interfaces to the LAG that is enabled by running the
following command:
interface Gigabitethernet0/0/1
Shutdown
interface Gigabitethernet0/0/1
trunkport Gigabitethernet0/0/
interface Gigabitethernet0/0/1
undo shutdown

155. In the lab network, the network is set up according to the following topology. The SW1 is the default configuration,
and the STP function is disabled on the SW2. Which of the following statements is correct?

The G0/0/2 of A.Sw1 enters the Discarding


state.
The G0/0/1 of B.sw2 enters the Discarding
state.
The G0/0/2 of C.sw2 enters the Discarding
The G0/0/1 of E.SW1 enters the Discarding
state.
state.
D. No interface is blocked.
156. Which of the following are used in Ethernet?
(Multiple choices)
A. MAC address in non-standard format
B. CSMA/CD in multi-channel access
C. The MAC address in the standard format
D. 802.5 encapsulated
E. 802.3 encapsulated frame
frame

157. When determining the old and new LSAs, the system uses the sequence number and age parameters.
Which of the following statements about the two parameters are correct?
A. When
B. The the router
sequence receives
number and anageLSA with the age
parameters setused
can be to 360s, it indicates
to determine that
the oldthe
andLSA
newis LSAs.
unavailable.
The
router preferentially compares the sequence parameters. The larger the value, the better.
C.
D. When the routernumber
If the sequence receives
of two LSAsreaches
the LSA with the same
the end sequence number
value 0x7FFF, and the
the router same checksum,
advertises
the smaller the age,
the lsa of the 3600s. the better.

158. IS-IS is deployed on a broadcast network or a P2P network. When a router receives an LSP, it needs to use the PSNP f
confirmation to ensure LSDB synchronization.
A. True
B. False

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
159. Which of the following statements about the attributes of
IS-ISA.LSP
The LSP packets are correct?
fast flooding feature enables the LSDB synchronization process to be accelerated when the number
of LSPs is smaller than the specified number.
B. Configure the intelligent timer generated by the LSP. The timer can automatically adjust the delay according
to the change frequency of the route information.
C. When the link state information increases, the packet length of the SP may be increased, so that each LSP
may carry more information.
160. Run BGP on router R1 and router R2. The two routers are in AS 65234. The route of router R2 exists on the route.
D. The minimum interval for sending LSPs on an interface can be reduced to speed up LSP flooding.
The BGP routing table of the R1 is not in the IP routing table of the router
R1.
What causes the problem?
A.
B. The
The synchronization is disabled.
BGP peer relationship is
Down.
C. BGP Multi-hop is not enabled on the router
R1.
D. The route is not optimal.
161. Which of the following statements
about R2 routing entries are correct?

A The 2020::/64 router is displayed in the IP


routing table.
The B.2022::/64 router is displayed in the IP
routing table.
The C.2019::/64 router is displayed in the IP
routing table.
The D.2021::/64
162. Which of therouter is displayed
following in the
statements IP the OSPFv3 protocol is
about
routing table.
incorrect?
A. When a router is shared, each OSPFv3 process runs
independently.
B. Multiple instances can run in the same OSPFv3 process on the
same
D. Theinterface.
OSPFv3 packet header contains the
Instance IDinstances
C. Multiple field. can be run on a single link.
163. Which of the following statements about
OSPFv33 LSAs are correct?
Link State id of the A.Inter-Area Prefix-LSA, which contains the prefix
information.
B. Router-LSA and Network-LsA do not contain routing information.
C. When Referenced Link State Type-2 of Intra-Area Prefix LSA, Referenced Link State id contains DR.
Indicates the interface ID.
D. Inter-Area-Prefix LSA also contains Link-Local
information.

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
164. A company sets up an OSPF network. As shown in the following figure, all links form an OSPF neighbor relationsh
devices advertise their loopback interface addresses.
Which of the following statements about the S1-R2 and S2-R1 links are incorrect? (Area 0 is separated.)

A.R5 can learn the route to the loopback


interface of R2.
The B.R3 cannot learn the route to the
C.R1 can interface
loopback learn the of
route
the to
R2.the loopback
interface of R2.
D.R3 can learn the route to the loopback
interface of R2.
165. On Huawei devices, IS-IS does not need to modify the Metric type when importing external routes and setting the
external route
Retain the tag for routing information.
default
value.
A. Correct
B. Error

166. Which of the following statements about BGP4+


are correct?
A.Bgp4+ can suppress IBGP routes by using the dampening command.
B. After the Router ID of the BCP is modified, the BGP connection between routers is
re-established.
The Next Hop attribute in C.BCP4+ is represented by the Pv6 address, which can be
the link-local address of the next hop.
D.bGP4+ does not support automatic route aggregation.
167. Set up the peer relationship as shown in the following figure. The AS400 receives the 1.1.1.1/32 network route from
AS100. The AS-Path attribute is?

A. 100 200 300


B. 400 300 200 100
C. 100 200 300 400

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
D. 300 200 100
168. Which of the following statements about
OSPF virtual links are correct?
A. The virtual link can be established in any area. After being
established, the virtual link belongs to the virtual link.
B. The virtual link uses the outbound interface P as the link
C. The virtual link can be used to solve the
address.
problem that area 0 is divided.
D. The cost of the virtual link is,
which is the optimal link.
169. Which of the following statements about the link state routing protocol are correct when no
area is divided?
A. Each router establishes a topology of the entire flood domain.
B. Each router learns routes from the route update and adds the routes to the routing table.
C. The router in the flood domain may receive the same link status information repeatedly.
D. The routers in the entire flood domain have the same error state database.
E. The router sends all the error status information sent by a neighbor to all other neighbors to
ensure the synchronization of the database.
170. If OSPF is running on the network, configure the non-backbone area in the OSPP area as the ls-id in the Totally S
Totally Stub area.
LSA of the 0.0.0.0 type. Which type of
LSA? is the LSA?
A.LSA5
B.LSA2
C.LSA1
D.LSA3

171. When the administrator wants to manage certain routes on the router during O&M, which of the following tools can
used to mark these routes for management?
What is the configuration policy of the administrator?
A. If BGP is running, use the community attribute to mark
routes.
B. Use an ACL to mark routes on the router.
C. Use the tag value to mark the route
on the router.
D. Use ip-prefix to mark routes on the router.

172. Which of the following statements about IBGP peers and eBGP peers are correct? (Multiple choices)
A. The router sends BGP updates learned from its IBGP peers to other IBGP peers and eBGP peers.
B. The router sends BGP updates learned from its eBGP peers to other IBGP peers and eBGP peers.
C. IBGP peers must be directly connected. Otherwise, IBGP-Multi-hop must be configured.
D. eBGP peers must be directly connected. Otherwise, EBGP-Multi-hop
must be configured.
E. IBGP peers can establish neighbor relationships through
loopback interfaces.
F. The eBGP neighbor relationship establishes a neighbor
relationship through the directly connected physical interface
address.
173. In the MPLS-BGP-VPN environment, if only BGP and LDP are used to distribute labels, the MPLS label
of packets can contain a maximum of two labels.
A. True
B. False

174. Which of the following statements about the Inter-AS VPN Option-B
solution is incorrect?
A. During packet forwarding, two ASBRs need to exchange VPN LSPs.
B. Two ASBRs need to establish MP-EBGP neighbor relationships.
C. The Inter-AS VPN-option-B solution is not limited by the number of
links between ASBRs.
D. Two ASBRs exchange outer labels for VPNv4 routes.

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
175. Two Huawei switches SWA and SWB are connected through seven Ethernet ports, and static link aggregation is
configured. The corresponding ports on the switch SW are as follows:
Ethernet1/0/2, Ethernet1/0/3, Ethernet1/0/4, Ethernet1/0/5, Ethernet1/0/6, Ethernet1/0/7, configuration
The mode is configured according to the port sequence. If the switches SWA and SWB are configured, each aggregatio
supports only six ports.
B.
A. When
When the
the port
port configurations
configurations are
are consistent,
consistent, the
the Ethernet1/0/6
Ethernet1/0/7 Unselected port is used.
Unselected port is used.
C. When the configuration of each port is the same, the SWA randomly selects one of the seven ports
as the Unselected port of the aggregation group.
D. When the port configurations are consistent, the Ethernet1/0/1 Unselected port is used.

176. You need to configure policy-based routing on the router so that specific traffic can be
forwarded through an interface.
When policy-based routing is used, which two types of typical information can be used to
forward traffic along a specific path?
B. Source IP address and
A. TTL and source IP address of the data packet
Layer 2 source
C. Source address
IP address and specific protocol (such as FTP
and HTTP)
D. Service type header and packet length

177. As shown in the figure, the IS-IS neighbor relationship between R1 and R2 has just been established. Which of the
following statements about the database synchronization between R1 and R2 is correct?
- Yeah?

A. The R1 sends a PSNP packet to the R2.


B. The R1 sends a CSNP packet to the R2.
C. The R1 sends an LSP to the R2.
D. The R1 sends Hello packets to the R2.

178. If the link between R1 and R2 is a PPP link, and the directly connected interfaces are not on the same network seg
the directly connected interfaces of R1 and R2 can communicate with each other but the same IP address.
Which of the following is the reason why Ethernet
links cannot communicate with each other?

A. The POS interface connected to R1 and R2 learns the 24-bit subnet route
of the directly connected interface through IPCP.
B. The POS interface connected to R1 and R2 learns the 32-bit host route of the directly
connected interface through IPCP.
C. The POS interface connected to R1 and R2 learns the MAC address of the peer interface
through LCP and does not need to request the MAC address.
D. Data packets on the POS interfaces between R1 and R2 do not need to be encapsulated with
Ethernet
179. Whichheaders, and ARPcommands
of the following requests are
cannot
berequired
used to for MACusers
prevent addresses.
from accessing
multiple devices through a hub on the access port of the switch? (Single choice)
A. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernetO/0/1]port link type trunk

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
[Huawei-GigabitEtherneto/0/1]port trunk allow pass vlan 10
B. [Huaweiinterface GigabitEthernet 0/0/1
[Huawei-GigabitEthernetO/0/1]port link type access
[Huawei GigabitEtherneto/0/jipsg enable
C. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernet0/O]port link-type access
[Huawei-GigabitEthernet0/O]port-security enable
D.[Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernet0/O]port link-type access
[Huawei-GigabitEthernet0/O]port-isolate enable

180. Which of the following statements are


correct?

A.R3 must be the DIS of an level-1 link.


The B.R3 router is an level-2 router.
C.R3 must be the DIS of an level-2 link.
The system ID of the D.R3 router is
0003.0000.0000.

181. Run the display ip routing-table" command on ""R1 to check the routing table of router R1. Router R1 runs OSPF.
Protocol.
Which of the following statements about OSPF
information in the
A. In the routing routing
table, table isentry
the routing correct?
marked with "O_ASE" indicates that the entry is learned through Type 1 LSA or Type
LSA.
B. In the routing table, the routing entry marked with "O_ASE" indicates that the entry can only be learned through route
import.
C. In the routing table, the routing table marked with "O_IA" indicates that the route is an intra-area route.
D. In the routing table, the routing entries marked with "OSPF" are learned by the type 7 LSAs imported from other processes
OSPF.
181.
E. In Which of the
the routing following
table, statements
all types of LSAs about
correspond to a unique destination address.
IS-IS authentication are correct?
A. Interface authentication can authenticate Hello packets of Level-1 and Level-2.
B. After interface authentication is configured, the IIH sent by the router must carry the authentication
TLV.
C. After the area authentication is configured, the IIH, SNP, and LSP sent by the router must carry
authentication.
D. Area authentication and interface authentication are configured on the two routers. If the passwords
are the
182. same,
Which two routers
of the following can establish
statements aboutneighbor
the relationships.
BGP anti-loop mechanism are correct?

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
A. The AS-PATH attribute is used between ASs to
prevent loops.
B. The Cluster List attribute is used to prevent loops in the reflector cluster. The router finds that the Cluster List of the
entry contains its own cluster ID.
The route is rejected.
C. Routes learned from IBGP are not advertised to IBGP peers to prevent
routing loops in the AS.
D. The AS-CONFED-SET attribute can be used to prevent loops in the alliance.

183. Which of the following statements about Route Policy


are correct? (Multiple choices)
A. Advanced ACLs can be applied to route-policy to filter
routes.
B. Entry permit ::0 less-equal 128 indicates that all IPv6 routes are allowed to pass.
C. If more than one node is defined in Route-policy, the matching mode of at least one node must be permit.
D. Route-Policy can filter only default routes.

184. Which of the following route selection tools is unique to B6P?


(Single choice) (Confirmed)
A. Route-policy
B. ACL
C. IP-prefix
D. AS-path-filter

185. In the scenario shown in the following


figure, which of the following statements is
correct?

A.R1 The LSDBs of Level-1 and Level-2 coexist.


The B.R1 can ping the IP address of the R21
1oopbapk0 interface.
C.R1 There is a route to R2 1oopback0 10.0.2.2/32.
The neighbor relationship cannot be established
between D.R1 and R2.
186. The configuration of two routers in a company is as follows. Which of the
following statements about the R1 routing table are correct?

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
A. If the priority of the R2 ISIS protocol is changed to 5, the P route entries whose destination network
segment is 10.0.2.2/32 are generated by OSPF.
B. If the IS-IS priority of R1 is changed to 5, the P route entry whose destination network segment is
10.0.2.2/32 on R1 is generated by OSPF.
C. If the priority of the R1 ISIS protocol is changed to 5, the P route whose destination network segment is
10.0.2.2/32 on the R1 is generated by IS-IS.
D. If the
187. priority
Which of following
of the the R2 ISIS protocol about
statements is changed to 5, the P route
BGP aggregation whose destination
are correct? (Single network segment is
10.0.2.2/32 on the R1 is generated by IS-IS.
choice)
A. After Aggregate ipv4-address mask is configured, only aggregated routes are
advertised and detailed routes are not advertised.
B. For IPv6 routes, BGP supports manual aggregation and automatic aggregation.
D.
C. You can manually
Automatic aggregateisroutes
BGP aggregation in the
enabled local
in the case of default configurations.
BGP routing table.

188. Which of the following statements about BGP route


selection is incorrect? (Single choice)
A. Non-aggregated routes take
precedence over aggregated
B. If the values of Pref-Val and local_preference are the same, if the local routes, IBGP routes, and BGP preference o
routes.
routes are generated,
If they are the same, the locally generated valid routes are preferred.
C. The following entries are displayed in the BGP routing table: * 172.16.1.11/32 0.0.0.0 10 0? indicates that the
route is available and not optimal.
D. The route whose nexthop is unreachable is invalid and does not participate in the preference.

189. Many transition technologies occur when the P4 address used in the network is changed to the Pv6 address. Thes
techniques are divided into two categories:
The PV4/IPv6 coexistence technology is the v4/P6 interworking technology. Which of the following
technologies belong to the Pv4/IP6 coexistence technology? (multiple choices)?
A.NAT64
B.IPv6 over IPv4
C.Dual-Stack
D.ISATAP

190. Which of the following statements about the LDP LSP


establishment process are correct?
A. By default, the label mapping received by an LSR for the same FEC can only come from the optimal next hop and c
be from the non-optimal next hop.
B. When the network topology changes, the next hop neighbor changes. In this mode, the LSR can directly use the or
non-optimal next hop neighbor to send packets.
C.
TheInlabel
the label advertisement
quickly reconstructsDoD mode, the LSR allocates and distributes labels for a specific FEC without
the LSP.
obtaining the label request message from the upstream.
D. The LSP establishment process is to bind the FEC and the label and advertise the binding to the upstream
LSR of the LSP.
191. In the hub&spoke multicast mode of the MPLS bgp VPN, the branches cannot communicate with each other so th
branch can communicate with the headquarters only,

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
Which of the following solutions can
be used to set RT?

A. Headquarters: Import Target: 12:3 Export Target:12:3


Branch 1: Import Target:12:3 Export Target:12:3
Branch 2: Import Target:12:3 Export Target:12:3

B. Headquarters: Import Target: 1:1 Export Target:3:3


Branch 1: Import Target:3:3 Export Target:1:1
Branch 2: Import Target:3:3 Export Target:2:2

C. Headquarters: Import Target: 2:2 Export Target:3:3


Branch 1: Import Target:3:3 Export Target:1:1
Branch 2: Import Target:3:3 Export Target:2:2

D. Headquarters: Import Target:12:3 Export Target:3:12


Branch 1: Import Target:3:12 Export Target:12:3
Branch 2: Import Target:3:12 Export Target:12:3

192. Which of the following attacks are DoS(Denial of service)


attacks?
A. Single
packet attack
B. Source IP address
spoofing attack
C. Man-in-the-middle
attacks
D. Flood attack
193. Which of the following statements about IPSec
VPN are correct? (Multiple choices)
A. The aggressive mode supports NAT traversal while the
master mode does not support NAT traversal.
B. Two routers establish IPSec VPN in master mode. Starting from the fifth packet (including), the
payload data is often encrypted.
c. Two routers establish the IPSec VPN in aggressive mode. Then, the two devices exchange at least
four packets to establish a tunnel.
D. The two routers can establish OSPF neighbor relationships through the IPSec VPN tunnel and
exchange
194. internal
Configure network routes.
queue-based traffic shaping. If the queue length exceeds the buffer size, tail
drop is performed by default.
A. True
B. False

195. Which of the following statements


are correct?

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
A. If the R2 Ethernet0/0/1 interface goes Down, the R1 BFD session can quickly detect the fault and notify the
R1 to enable the OSPF neighbor relationship to go Down.
The BFD session is Up only when the B.OSPF status changes to FULL.
C. If the R2 Ethernet0/0/0 interface goes Down, the next hop of the route from R1 to 10.0.2.2 is
changed to 10.0.21.2.
D. If the BFD function is disabled on the R2, the BFD session of the R1 goes Down. As a result,
the OSPF neighbor relationship becomes Down.
E. If the R2 Ethernet0/0/1 interface goes Down, the next hop of the route from R1 to 10.0.2.2 is
changed
196. Which to of
10.0.12.2.
the following statements about Layer
2 VPN are true?
A. VPLS is a widely used technology on the live network. It can transparently transmit
Layer 3 packets and implement multi-point access.
B. The VPLS configuration is complex, and the Layer 2 network transparently
C. BGP-EVPN
transmits BUM supports
packets. tenant isolation, multi-homing, and broadcast
suppression.
D. BGP-EVPN solves the problem that VPLS cannot support MAC
address flapping and multi-tenant.
197. If a local area network (LAN) runs the 802.1D spanning tree protocol, which of the following parameters is not
received by the non-root switch from the root switch?
A.MaxAge
B.Root cost
C.Forward delay
D.Hold time
E.Hello time

198. Which of the following statements about 802.1s


deployment are correct?
A. Multiple bridges share a spanning tree instance.
B. All VLANs share a spanning tree
instance.
C. Each VLAN shares a spanning tree
instance.
D. Multiple VLANs share a spanning
tree
199. instance.
After the shutdown command is run on two directly connected devices that establish IBGP peer relationships, the
connection is not interrupted immediately.
Open.
A True
B False

200. To reduce the number of OSPF routes in some end areas, the OSPF protocol has developed the special area func
The following describes the features of the special OSPF areas.
Is it true?
A. A router in a special area cannot establish an OSPF neighbor
relationship with a router in a normal area.

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
B. Any OSPF area can be configured as a special
area.
C. As -External-lsa is advertised to the stub area.
D. ASBR-Summary-LSA can be advertised to the
NSSA.
201. An engineer sets up the network topology for studying the working mechanism of the OSPFv3 protocol. The config
of R1 and R2 is as follows. Exchange between R1 and R2.
What are the types of LSAs?

R1
Configura
ospfv3
tion 1
router-id 1.1.1.1
interface Gigabitethernet0/0/0
ipv6 enable
ipv6 address auto link-local
ospfv3 1 area 0
R2 Configuration
ipv6
ospfv3 1
router-id 2.2.2.2
interface Gigabitethernet0/0/0
ipv6 enable
ipv6 address auto link-local
ospfv3 1 area 0. 0 0.0
A Router-lsa
B Link-LSA
C Network-LSA
D Inter-area-prefix-lsa

202. The topology and configuration are as follows. Currently, the R1 routing table does not contain the detailed routing
of 10.0.3.3/32. Which of the following statements can be used to meet this requirement?

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
A Configure route summarization on R3 and summarize the
route to 10.0.0.0/16.
B Configure route summarization on R2 and summarize the
route to 10.0.0.0/16.
C Configure filter-policy on R2, match 10.0.3.3/32 with ACL, and apply the ACL to expot.
D Configure filter-policy on R1, match 10.0.3.3/32 with ACL, and apply the ACL to the import
direction.

203. As shown in, the administrator configures OSPF on R1 but R1 cannot learn routes from other routers. The
possible cause is ().
[R1]ospf
[Rl-ospf-1]area 2
[R1-ospf-1-area-0.0.0.2]network 10.0.13.1 0.0.0.0

A The area ID configured for the router is different from the area
ID of its neighbor router.
B The OSPF process ID is not configured on the router.
C The advertised network address of the router does not match the
interface mask.
D The router is not configured with the authentication function, but the
neighbor router is configured with the authentication function.
204. Configure AS-path-Filter ip as-path-filtr 10 permit_100$ to match the routes received from the AS100.
A True
B False

205. Which of the following statements about the


topology and configuration are correct?

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
The route whose destination network segment is
10.0.3.3/32 does not exist on A R1.
The route whose destination network segment is
10.0.2.2/32 does not exist on B R1.
The route whose destination network segment is
10.0.3.3/32 exists on C R1.
The
206. route
Whichwhose
of thedestination network
following routes aresegment is
learned by
10.0.2.2/32 exists on D R1.
R2?

A R2 can learn all routes of R1.


B R2 can learn the route of 10.1.1.0/24.
C R2 can learn two routes: 10.1.2.0/24 and 10.1.3.0/24.
D R2 can receive the LSP from R1 but cannot join the routing
table.

207. What is the role of RT in MPLS VPN? (Multiple


choices)
A. Allow the peer PE to determine which VPNv4 routes to be
imported to a specific VRF.
B. Allow the peer PE to determine which VPNv4 routes are not
imported to a specific VRF.
C. Allow the peer CE to determine which VPNv4 routes to be
imported into a specific VRF.
D. Allow
208. theofpeer
Which the CE to determine
following which
statements VPNv4
about routes are
the packet not
processing mode in the
imported
MPLS to a specific
network model is VRF.
incorrect?
A The label forwarding path LSP is determined and established by various
protocols during packet forwarding.
The
The label
B LERis and
not stripped on
LSR distribute labels.
the C LSR.
D The device discards the IP packets entering the
MPLS domain.

209. Which of the following statements about


MPLS BGP VPN is incorrect?

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center
A IBGP Set up a stable BGP peer relationship between the ALoopback interface
addresses.
The B PE-CE can use static routes, OSPF multi-instance, IS-iS multi-instance, and
eBGP.
The
C TheD BGP Sooincommand
TTL field the label is
is used
used to
to prevent
prevent routes
loops. from a VPN site from passing through the MPLS backbone networ
returning to the site. Soo is an extended group automatically generated by MP-BGP.
Body attribute.

210. Which of the following technologies are used to


improve MPLS BGP VPN reliability?
A VPN GR
B VPN FRR
C Configure CE dual-homing
networking at the access layer.
Private IP route FRR between D
PE and CE
211. Which of the following statements about the
VPNv4 address is incorrect?
A When BGP advertises reachable and unreachable VPNv4 routes,
it carries the RD attribute.
B The PE does not perform vpn-target filtering on received VPNv4 routes.
The C VPNv4 address has 12 bytes, including the 8-word route identifier RD(Route Distinguisher) and 4-byte IPv4 addr
prefix.
D After the local PE advertises the VPNv4 route learned from the directly connected site to other PES, the local PE sets
Target attribute for these routes and performs the following operations:
The extended community attribute of BGP is advertised along with the route.
212. Which of the following statements about the basic
MPLS forwarding process is incorrect?
A When the IP packet enters the MPLS domain, check the Tunnel ID corresponding to the destination IP address. If the
value of TunnelID is 0x0, enter the MPLS forwarding process.
B By default, the label value assigned by the Egress1 node that supports PHP to the penultimate hop node is 3.
C When the packet is forwarded in the MPLS domain, the label of the MPLS packet is replaced by the label allocated b
the next hop according to the label forwarding table.
D When an IP packet enters the MPLS domain, the MPLS boundary device inserts a new label between the packet
header and
213. The the IP header.
multicast IP address is 229.130.130.1, and the
corresponding MAC address is:
A 00-00-5E-02-82-01
B 00-00-5E-82-82-01
C 01-00-5E-82-82-01
D 01-00-5E-02-82-01

214. Which of the following statements about


IPSG are correct?
The A IPSG command can be used to check the binding entries of the P
packets that enter the interface and leave the interface.
B On a Huawei router, you can configure IPSG on the VLANIF interface.
C If an interface is configured with DHCP Snooping Trust HCP ACK, DHCP NAKHCP, or Offerf packets, other untruste
interfaces cannot be connected.
Receive these packets.
The D ip source check user-bind check-item command configures an IP packet check item based on VLAN or interface
command applies to both dynamic and static IP packets.
All entries take effect.

215. Which of the following statements


about HTTPS is incorrect?
The A HTTPS protocol uses TCP
port 443 by default.
B HTTPS uses SSL VPN to ensure data security.
C When HTTPS is used to access a website, if the user's browser cannot identify the digital certificate of
the website, the website cannot be accessed.
D If the HTTPS traffic contains viruses, the router cannot directly detect viruses using the IPS
technology.
--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877
Huawei Ten Best Entitlement Center
216. Use dual-bucket dual-rate in traffic policing. The number of tokens in the C bucket is TC, and the number of token
P bucket is TP. When a packet whose length is B enters, the following information is displayed:
Which statement is correct?
A. If TP-B>0 and TC-B>0, the packet is marked green.
B. If TP-B>0 and TC-B<0, the packet is marked yellow.
C. If TP-B<0 and TC-B<0, the packet is marked red.
D. If TP-B>0 and TC-B<0, the packet is marked
green.

217. The network administrator defines a traffic policing


policy as follows:

The router port that uses the policy has been idle for about 10 seconds. In this case, a large amount of burst
traffic
How manyof thebytes
c1 type occurs
does instantaneously,
a green data packet have?
A.256K bytes
B. 32K bytes
C. 48128 bytes
D. 80128 bytes

218. Which of the following routes is used to advertise


external routes in the BGP-EVPN?
A Type4
B Typel
C Type2
D Type3
E Type5

--- Jiangsu Wanhe Computer Training Center, QQ: 2623640877


Huawei Ten Best Entitlement Center

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy