0% found this document useful (0 votes)
18 views

Datacom2 70 Questions

sdfghj

Uploaded by

boul3ezto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Datacom2 70 Questions

sdfghj

Uploaded by

boul3ezto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

31.

A switch floods unknown unicast frames and frames whose destination


MAC address is a broadcast MAC address.
Vrai
Faux
32. What type of MAC address is 01-00-5e-00-00-01?
Unicast MAC address
Broadcast MAC address
Multicast MAC address
Anycast MAC address
33. Which of the following actions does a switch take by default after it
receives an unknown unicast frame?
discards this data frame
floods this data frame
forwards this data frame based on the MAC address table
34. Which of the following ARP packets is used to request the MAC address
corresponding to an IP address?
ARP Request
ARP Reply
RARP Request
RARP Reply
35. Which of the following fields are contained in an Ethernet frame in the
IEEE 802.3 format?
Source MAC
Destination MAC
FCS
Length
36. An access interface cannot process VLAN-tagged data frames, and
immediately discards them upon receipt.
Vrai
Faux
37. What is the TPID value of an 802.1Q-tagged frame?
0x0806
0x8100
0x0800
0x8847
38. Which of the following is a valid VLAN ID?
0
4095
65536
4094
39. Based on which of the following cannot VLANs be assigned?
Interface
MAC address
Subnet
Transport-layer protocol
40. Which of the following interfaces can process data frames carrying
multiple VLAN tags?
Access
Trunk
Hybrid
Bridge
41. By default, a switch runs RSTP.
Vrai
Faux
42. What is the default Forward Delay value in STP?
15s
2s
43. In which of the following sequences does a switch compare these fields
(RPC/BPDU)?
Interface ID, root ID, bridge ID, and RPC
RPC, root ID, bridge ID, and interface ID
Root ID, bridge ID, interface ID, and RPC
Root ID, RPC, bridge ID, and interface ID
44. Which of the following fields are contained in a configuration BPDU?
Root ID
Port ID
Bridge ID
Forward Delay
45. The source and destination MAC addresses of a packet are changed
each time it passes through a Layer 3 device.
Vrai
Faux
46. which of the following commands needs to be configured for VLAN
termination on the sub-interfaces?
port trunk pvid vlan-id
port default vlan vlan-id
dot1q termination vid vlan-id
port link-type hybrid vlan-id
47. Which of the following statements about a Layer 3 switch is false?
A Layer 3 switch can forward packets only at Layer 3.
A Layer 3 switch can route packets through VLANIF interfaces.
A Layer 3 switch can forward packets at both Layer 2 and Layer 3.
A Layer 3 switch can route packets through Layer 3 physical interfaces.
48. Configuring the lower threshold of an Eth-Trunk ensures that the Eth-
Trunk has the minimum required bandwith.
Vrai
Faux
49. What is the default LACP interface priority?
4096
32768
8192
0
50. Which of the following configurations can be different on member
interfaces in an Eth-Trunk interface?
Spanning tree configurations
Interface rate
Duplex mode
VLAN configurations
51. Which of the following statements is false about selecting active links
in LACP mode?
Devices on both ends exchange LACPDUs to select the Actor.
The Actor selects active interfaces based on the LACP interface priority.
The Actor enables active interfaces and disables backup interfaces.
The Partner determines its active interfaces.
52. Which of the following fields in an LACPDU is used to select the Actor?
Interface priority
Device priority
Device MAC address
Interface number
53. An advanced ACL can match the source / destination port, enabling it
to filter TCP packets with a specified destination
Vrai
Faux
54. What is the default increment of ACL rule IDs?
20
15
10
5
55. What is the number range of advanced ACLs?
4000–4999
3000–3999
2000–2999
6000–6999
56. If the number of an ACL is 4010, which of the following fields can the
ACL match?
Source IP address
Source IP address and destination IP address
Source MAC address, destination MAC address, and Layer 2 protocol type
Packet header and offset
57. Which of the following roles is not included in the common AAA
network architecture?
User
Portal server
Network access server (NAS)
AAA server
58. What are the transport layer protocol and authentication port number
used by RADIUS?
TCP, 1812
UDP, 1812
TCP, 1813
UDP, 1813
59. Which of the following authorization modes is not supported by AAA?
Non-authorization
Local authorization
Mutual authorization
Remote authorization
60. Which of the following concepts are involved in AAA?
Authentication
Authorization
Accounting
Automation
61. NAPT translates only IP addresses but also port numbers to implement
1:N mappings between public and private addresses.
Vrai
Faux
62. Which of the following NAT technologies can only use an interface
address as the post-NAT public address?
Easy IP
Dynamic NAT
Static NAT
NAT Server
63. The following NAT technology can be deployed to enable external users
to access only a TCP port of an intranet server:
Static NAT
NAT Server
Dynamic NAT
NAPT
64. Which of the following are not translated by NAPT?
Source IP address
Source port number
Destination port number
Destination IP address
65. Which of the following NAT technologies can be used to enable external
users to proactively access an intranet server?
Static NAT
NAT Server
NAPT
Easy IP
66. FTP works in active or passive mode. TCP port 20 is used in both
modes.
Vrai
Faux
67. What is the level of the domain '.com' in the URL www.huawei.com?
Root domain
Second-level domain
Top-level domain
Host name
68. Messages sent by a DHCP server to carry the IP address assigned to a
client during DHCP interaction are...
DHCP Offer
DHCP Discover
DHCP Ack
DHCP Request
69. Which of the following is the default destination port number of the
FTP control channel?
20
22
23
21
7°. Which of the following parameters can be assigned by a DHCP server to
a DHCP client?
DNS server address
Gateway address
Local IP address
Mask
71. Two CAPWAP tunnels are established: data tunnel and control tunnel.
They are both kept alive using Keepalive messages.
Vrai
Faux
72. Which of the following 802.11 protocols works only on the 5 GHz
frequency band?
802.11g
802.11n
802.11ax
802.11ac
73. Which of CAPWAP message types is used by an AC to deliver
configuration files to APs?
Configuration Update Request
Image Data Request
Configuration Update Response
Image Data Response
74. Which of the following data frames is used by an AP to periodically
broadcast its SSID?
Probe Request
Probe Response
Association Request
Beacon
75. Which of the following modes are used by APs to dynamically discover
an AC?
DHCP mode
DNS mode
Broadcast mode
Manually specifying the AC IP address on the APs
76. During CHAP authentication, the password configured for a user is
carried by PPP packets in plaintext.
Vrai
Faux
77. Which of the following packet types is used by PPPoE to terminate a
session?
PADS
PADO
PADT
PADR
78. Which of the following authentication protocols are supported by PPP?
PAP
EAP-TLS
EAP-MD5
CHAP
79. Which of the following packet types are used during PPP negotiation?
LCP
PAP
CHAP
IPCP
80. The management process of an NMS interacts with the agent process
through SNMP packets.
Vrai
Faux
81. The following packet types is used by SNMPv2c to proactively send
traps to an NMS and requires a response from the NMS:
Response
Inform
Trap
Notification
82. Unlike SNMPv1, SNMPv2c uses which of the following packet types to
query OIDs in batches?
Get-Request
Get-Next-Request
GetBulk
GetContinue
83. Which of the following are attributes of managed devices defined in
the MIB?
OID of an object
Status of an object
Access permission of an object
Data type of an object
84. Which of the following new security features that SNMPv3 provides
over SNMPv1 and SNMPv2c?
Digital signature technology can be used to verify source of SNMP packets.
The MD5 algorithm is supported for user authentication.
DES is supported for data encryption.
RSA is supported for asymmetric data encryption.
85. Common IPv6 unicast addresses require the network prefix and
interface ID to be 64 bits.
Vrai
Faux
86. What is the length of an IPv6 address?
64
96
128
256
87. What is the abbreviated version of the IPv6 address
2001:0AF8:0000:1234:FB00:0000:5000:EF14?
2001:AF8:0000:1234:FB:0000:5000:EF14
2001:0AF8::1234:FB00::5000:EF14
2001:AF8:0:1234:FB00::5000:EF14
2001:0AF8:0000:1234:FB00:0000:5:EF14
88. Which of the following fields is used in a basic IPv6 header but not in
an IPv4 header?
Payload length
Hop limit
Next header
Flow label
89. Depending on the IPv6 address prefix, which of the following address
types can IPv6 addresses be classified into?
Unicast address
Multicast address
Broadcast address
Anycast address
90. In the OpenFlow architecture, which of the following packets are sent
from the controller to a switch?
Asynchronous
Symmetric
Controller-to-Switch
Switch-to-Controller
91. Which of the following are NFV features?
Encapsulation
Isolation
Hardware independence
Partition division
92. Statements in the same Python code block must have the same
number of indented spaces.
Vrai
Faux
93. Which of the following is used to describe a collection of objects with
the same attributes and methods?
init
def
class
function
94. Which of the following methods is used to write data to the telnetlib
module?
read_all ()
close()
write()
read_very_eager()
95. Which of the following characters can be used as Python identifiers?
Letters
@ signs
Underscores
Digits
96. Which of the following are compiled high-level programming
languages?
C
Java
Python
C++
97. Certain terminals, such as servers and printers, can be allocated fixed
IP addresses.
Vrai
Faux
98. To conserve IP addresses, what mask size is used on router to router
connections on an enterprise network?
28
24
30
29
99. Which of the following technologies can be used on a campus network
to improve network reliability?
CSS
VRRP
Link aggregation
iStack
100. Which of the following are stages in the lifecycle of a campus network
project?
Network optimization
Deployment and implementation
Network O&M
Planning and design

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy