1. A network administrator fails to access devices on the internal network through Telnet.
Which of the following causes is the most impossible?
A. The route is unreachable, and the client fails to establish a TCP connection with the server. B. The number of login users reaches the upper limit. C. An ACL is bound in the VTY user interface view. D. The protocol inbound all command is configured in the VTY user interface view. Answer: D 2. When EVPN carries L2VPN services, which of the following types of routes does not carry CE information? A. Ethernet A-D route B. MAC/IP advertisement route C. Inclusive multicast route D. Ethernet segment route Answer: C 3. The Huawei CloudCampus Solution supports various rate limiting modes for wireless users in small-and medium-sized campus scenarios. Which of the following modes is suitable for refined traffic control of each user? A. User-based rate limiting B. SSID-based rate limiting C. ACL-based rate limiting D. Radio-based rate limiting Answer: A 4. Which of the following is the drop probability of packets exceeding the upper threshold in WRED? A.0.2 B.0.5 C.0.8 D.1 Answer: D 5. MPLS performs different actions on labels. What is the meaning of the pop action? A. The top label is removed from the MPLS label stack. B. The top label is added to the MPLS label stack. C. The top label is replaced with another value. D. The top label is replaced with the label of another group. Answer: A 6. SR-MPLS is enabled on all routers. The label information encapsulated by R1 into a data packet is shown in the figure. Which of the following MPLS labels is carried in the data packet when it is sent from R2 to R4? A.2032 B. 2024 C.2046 D. No label Answer: B 7. Which of the following methods cannot be used to improve device reliability for effective network operation? A.1+1 active/standby protection for main control boards B. Load balancing among multiple microengines for interface boards C. Maximum backup for power supplies D. Periodic backup of device alarm logs Answer:D 8. Which of the following statements is incorrect about a sham link? A. To ensure that VPN traffic is forwarded through an MPLS backbone network the route cost of a sham link must be smaller than the OSPF route cost of a backdoor link B. A sham link is considered a link between two VPN instances. Each VPN instance must have an endpoint address of a sham link which must be a loopback interface address with a 32 bit mask in the VPN address space on a PE. C. The endpoint address of a sham link is advertised by BGP as a VPNv4 address. Routes that pass through a sham link can also be imported to BGP as VPNv4 routes. D. A sham link can be configured in any area and needs to be manually configured. In addition, a local VPN instance must have a route to the destination address of the sham link (the endpoint address of the sham link on the remote PE). Answer: D 9. In the topology shown in the following figure, OSPFv3 runs on the entire network. If no external routes are imported, which of the following types of LSAs will not be generated on R1? A. Inter-Area-Router LSA B. Link-LSA C. Intra-Area-Prefix-LSA D. Inter-Area-Prefix-LSA Answer: A 10. Which of the following tools cannot be used to match the number of BGP routes? A. Basic ACL B. Advanced ACL C. IP prefix-list D. Community filter Answer: B 11. In Huawei SD-WAN Solution, which of the following protocols is used by control channels? A. BGP4 B. BGP VPNv4 C. BGP EVPN D. Static route Answer: C 12. On a VXLAN network, which of the following is used by VXLAN to identify broadcast domains locally? A. BD B. VRF C. NVE D. VNI Answer: A 13. In the Huawei SD-WAN Solution, which of the following channels is established between CPEs and a standalone RR? A. Management channel B. Control channel C. Data channel D. Authentication channel Answer: B 14. Which of the following devices can be selected as the egress device in a multi-uplink scenario where advanced security functions, such as URL filtering, IPS, security protection, and antivirus required? A AP B.AR C AC D. Firewall Answer: D 15. Huawei OPS provides the Python script template. The code of the main method in the Python script template is as follows. Which of the following statements is incorrect? def main (): host = "localhost" try: ops. .conn = OPSConnection(host) rsp_ data = get _startup. info(ops. .conn) ops. .conn.close0 return except: errinfo = traceback.format, exc0) printerrinfo) return A. When a python script is run on the local PC, set the host to the IP address of the network device. B. ops_conn= OPSConnection(host) indicates that the instance ops .conn of the OPSConnection class is created. C. rsp_data=get. startup info(ops. conn) indicates that the get startup. jinfo methodis invoked. This method sends an HTTP request to the device and saves the response data of the device to rsp. _data. D. cops, connclose0 indicates that an HTTP connectionsclosed. Answer: D 16. Which of the following statements about DHCP principle is incorrect? A DHCP supports static IP address allocation, in which it assigns fixed IP addresses to specified terminals. B. When a DHCP client and a DHCP server are located on diferentLayer3 networks, a DHCP relay agent is needed for forwarding packets between the DHCP client and server. C. If only the gateway and DNS sever information needs to be delivered toa DHCP client the DHCP Offer message sent by the DHCP sever to the client does not carry the Options field. D. The Options field in DHCP messages uses the type-length-value (TLV) structure and can carry parameters such as the NTP server address, AC address, and log server address Answer: C 17. In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements is correct when BGP EVPN Type 2 routes are used to advertise host MAC addresses? A. The IP Address and IP Address Length feds do not carry specific content. B. BGP EVPN Type2 routes carry specific L2VNs and L3VNs. C. BGP EVPN Type 2 routes carry specific L3VNIs. D. The RT carried in the routes is the export RT of the IP VPN instance Answer: A 18. YANG is a data modeling language. Which of the following statements is incorrect about YANG? A. The YANG model is presented as a yang file. B. The YANG model can be converted to an XML syntax-based YANG Independent Notation (MIN) model without any loss. C. YANG is a modular language representing data structures in a hierarchical tree format. D. YANG only supports built-in data types, while extended data types are not allowed. Answer: D 19. Which of the following statements about OPS application scenarios is incorrect? A. When the OPS is used to automatically deploy unconfigured devices, a Python script is used to obtain the IP addresses of the software and configuration file server and download the system software and configuration file。 B. To enable a network device to automatically send a configuration file to the sever after the device configuration is saved, users can use the maintenance assistant to create a timer trigger condition and periodically run the Python script. C. The OPS can be used to automatically check the health status of devices. D. The OPS can reduce the impact of the network environment in some cases For example, when collected information is transmitted to a sever, the python script can be used to temporarily store the execution result to the device when the network is disconnected. Ater the network is reconnected, the execution result is transmitted to the server. Answer: B 20. In a MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct? A The penultimate hop removes the outer label before forwarding the data packet to a peer egress PE. B. The IP data packet received by egress LSR is without of labels. C The penultimate-hop device receives a packet withanouterlabelof3. D. The egress PE sends the data packet to the correct VPN based on the inner label. Answer: 21. Which of the following statements are correct about the MP. _REACH_ NLRI attribute of BGP4+? A. The length of the next hop address can be 16 or 32. B. When the length of the next hop address is 16, the Network Address of Next Hop field carries the link-local address. C. The NLRI field carries the IPv6 route prefix and mask. D. The value of the address family identifier (AFI) is 2, indicating IPv6. Answer: ACD 22. SR-MPLS uses the MPLS forwarding plane, and therefore requires MPLS to be enabled. Which of the following conditions must be met for MPLS to be automatically enabled on an interface? A. Segment routing is enabled for IGP, and IGP is enabled on the interface. B. The static adjacency label of the corresponding interface is configured in the segment routing view. C. Segment routing is enabled in the system view. D. The SRGB is configured for the IGP process Answer: A 23. Port security changes some MAC addresses learned by an interface into secure MAC addresses so that only hosts with secure MAC addresses can communicate with the device through the interface, thereby enhancing device security. Which of the following types of MAC address are secure MAC addresses? A Dynamic secure MAC address B. Static secure MAC address C. Sticky MAC address D. Protected MAC address Answer: ABC 24. OSPF isa mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct? A. A link works abnormally. B. The OSPF network types on both ends of the link are inconsistent. C. The OSPF MTU values of interfaces on both ends of the link are different. D. The router IDs of neighbors are the same. Answer: BC 25. In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about the functions of BGP EVPN Type 2 routes are correct? A BGP EVPN Type2 routes are used to a0vertise MAC addresses. B. Host ARP advertisement can be used to suppress ARP broadcast packets C ARP routes contain host route information. D.IRB routes contain ARP information. Answer: AC 26. Which of the following number sequences can be matched by the regular expression 100.$? A.100 B.1000 C.1001 D.10000 Answer: ABC 27. On a VXLAN campus network, which of the following resources can be invoked for VNs? A. Network service resource B. IP address segment and VLAN of terminal users belonging to the VN C. External network D. Wired access ports and/or wireless access devices Answer: ABCD 28. Which of the following are carried in an HTTP/1.1 response? A. Status line B. Response header C Empty line D. Response body Answer: ABCD 29. The architecture of the Huawei SD-WAN Solution consists of the management layer, control layer, and network layer. Which of the follwing devices are deployed at the network layer? A. RR B. EDGE C Firewall D. GW Answer: BD 30. On a VXLAN-based virtualized campus network, terminals communicate with each other through VXLAN tunnels. When the campus network needs to communicate with external networks, the data must pass through border nodes. A. True B. False Answer: A 31. Port isolation can be deployed on an Ethernet network to implement both Layer 2 communication and Layer 3 isolation, making the networking more flexible. A. True B. False Answer: B 32. To prevent hackers from attacking user devices or networks using MAC addresses, you can configure MAC addresses of untrusted users as blackhole MAC addresses to filter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet. A. True B. False Answer: A 33. iMaster NCE-Campus cannot manage devices through SNMP. A. True B. False Answer: B