We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11
31.
A switch floods unknown unicast frames and frames whose destination
MAC address is a broadcast MAC address. Vrai Faux 32. What type of MAC address is 01-00-5e-00-00-01? Unicast MAC address Broadcast MAC address Multicast MAC address Anycast MAC address 33. Which of the following actions does a switch take by default after it receives an unknown unicast frame? discards this data frame floods this data frame forwards this data frame based on the MAC address table 34. Which of the following ARP packets is used to request the MAC address corresponding to an IP address? ARP Request ARP Reply RARP Request RARP Reply 35. Which of the following fields are contained in an Ethernet frame in the IEEE 802.3 format? Source MAC Destination MAC FCS Length 36. An access interface cannot process VLAN-tagged data frames, and immediately discards them upon receipt. Vrai Faux 37. What is the TPID value of an 802.1Q-tagged frame? 0x0806 0x8100 0x0800 0x8847 38. Which of the following is a valid VLAN ID? 0 4095 65536 4094 39. Based on which of the following cannot VLANs be assigned? Interface MAC address Subnet Transport-layer protocol 40. Which of the following interfaces can process data frames carrying multiple VLAN tags? Access Trunk Hybrid Bridge 41. By default, a switch runs RSTP. Vrai Faux 42. What is the default Forward Delay value in STP? 15s 2s 43. In which of the following sequences does a switch compare these fields (RPC/BPDU)? Interface ID, root ID, bridge ID, and RPC RPC, root ID, bridge ID, and interface ID Root ID, bridge ID, interface ID, and RPC Root ID, RPC, bridge ID, and interface ID 44. Which of the following fields are contained in a configuration BPDU? Root ID Port ID Bridge ID Forward Delay 45. The source and destination MAC addresses of a packet are changed each time it passes through a Layer 3 device. Vrai Faux 46. which of the following commands needs to be configured for VLAN termination on the sub-interfaces? port trunk pvid vlan-id port default vlan vlan-id dot1q termination vid vlan-id port link-type hybrid vlan-id 47. Which of the following statements about a Layer 3 switch is false? A Layer 3 switch can forward packets only at Layer 3. A Layer 3 switch can route packets through VLANIF interfaces. A Layer 3 switch can forward packets at both Layer 2 and Layer 3. A Layer 3 switch can route packets through Layer 3 physical interfaces. 48. Configuring the lower threshold of an Eth-Trunk ensures that the Eth- Trunk has the minimum required bandwith. Vrai Faux 49. What is the default LACP interface priority? 4096 32768 8192 0 50. Which of the following configurations can be different on member interfaces in an Eth-Trunk interface? Spanning tree configurations Interface rate Duplex mode VLAN configurations 51. Which of the following statements is false about selecting active links in LACP mode? Devices on both ends exchange LACPDUs to select the Actor. The Actor selects active interfaces based on the LACP interface priority. The Actor enables active interfaces and disables backup interfaces. The Partner determines its active interfaces. 52. Which of the following fields in an LACPDU is used to select the Actor? Interface priority Device priority Device MAC address Interface number 53. An advanced ACL can match the source / destination port, enabling it to filter TCP packets with a specified destination Vrai Faux 54. What is the default increment of ACL rule IDs? 20 15 10 5 55. What is the number range of advanced ACLs? 4000–4999 3000–3999 2000–2999 6000–6999 56. If the number of an ACL is 4010, which of the following fields can the ACL match? Source IP address Source IP address and destination IP address Source MAC address, destination MAC address, and Layer 2 protocol type Packet header and offset 57. Which of the following roles is not included in the common AAA network architecture? User Portal server Network access server (NAS) AAA server 58. What are the transport layer protocol and authentication port number used by RADIUS? TCP, 1812 UDP, 1812 TCP, 1813 UDP, 1813 59. Which of the following authorization modes is not supported by AAA? Non-authorization Local authorization Mutual authorization Remote authorization 60. Which of the following concepts are involved in AAA? Authentication Authorization Accounting Automation 61. NAPT translates only IP addresses but also port numbers to implement 1:N mappings between public and private addresses. Vrai Faux 62. Which of the following NAT technologies can only use an interface address as the post-NAT public address? Easy IP Dynamic NAT Static NAT NAT Server 63. The following NAT technology can be deployed to enable external users to access only a TCP port of an intranet server: Static NAT NAT Server Dynamic NAT NAPT 64. Which of the following are not translated by NAPT? Source IP address Source port number Destination port number Destination IP address 65. Which of the following NAT technologies can be used to enable external users to proactively access an intranet server? Static NAT NAT Server NAPT Easy IP 66. FTP works in active or passive mode. TCP port 20 is used in both modes. Vrai Faux 67. What is the level of the domain '.com' in the URL www.huawei.com? Root domain Second-level domain Top-level domain Host name 68. Messages sent by a DHCP server to carry the IP address assigned to a client during DHCP interaction are... DHCP Offer DHCP Discover DHCP Ack DHCP Request 69. Which of the following is the default destination port number of the FTP control channel? 20 22 23 21 7°. Which of the following parameters can be assigned by a DHCP server to a DHCP client? DNS server address Gateway address Local IP address Mask 71. Two CAPWAP tunnels are established: data tunnel and control tunnel. They are both kept alive using Keepalive messages. Vrai Faux 72. Which of the following 802.11 protocols works only on the 5 GHz frequency band? 802.11g 802.11n 802.11ax 802.11ac 73. Which of CAPWAP message types is used by an AC to deliver configuration files to APs? Configuration Update Request Image Data Request Configuration Update Response Image Data Response 74. Which of the following data frames is used by an AP to periodically broadcast its SSID? Probe Request Probe Response Association Request Beacon 75. Which of the following modes are used by APs to dynamically discover an AC? DHCP mode DNS mode Broadcast mode Manually specifying the AC IP address on the APs 76. During CHAP authentication, the password configured for a user is carried by PPP packets in plaintext. Vrai Faux 77. Which of the following packet types is used by PPPoE to terminate a session? PADS PADO PADT PADR 78. Which of the following authentication protocols are supported by PPP? PAP EAP-TLS EAP-MD5 CHAP 79. Which of the following packet types are used during PPP negotiation? LCP PAP CHAP IPCP 80. The management process of an NMS interacts with the agent process through SNMP packets. Vrai Faux 81. The following packet types is used by SNMPv2c to proactively send traps to an NMS and requires a response from the NMS: Response Inform Trap Notification 82. Unlike SNMPv1, SNMPv2c uses which of the following packet types to query OIDs in batches? Get-Request Get-Next-Request GetBulk GetContinue 83. Which of the following are attributes of managed devices defined in the MIB? OID of an object Status of an object Access permission of an object Data type of an object 84. Which of the following new security features that SNMPv3 provides over SNMPv1 and SNMPv2c? Digital signature technology can be used to verify source of SNMP packets. The MD5 algorithm is supported for user authentication. DES is supported for data encryption. RSA is supported for asymmetric data encryption. 85. Common IPv6 unicast addresses require the network prefix and interface ID to be 64 bits. Vrai Faux 86. What is the length of an IPv6 address? 64 96 128 256 87. What is the abbreviated version of the IPv6 address 2001:0AF8:0000:1234:FB00:0000:5000:EF14? 2001:AF8:0000:1234:FB:0000:5000:EF14 2001:0AF8::1234:FB00::5000:EF14 2001:AF8:0:1234:FB00::5000:EF14 2001:0AF8:0000:1234:FB00:0000:5:EF14 88. Which of the following fields is used in a basic IPv6 header but not in an IPv4 header? Payload length Hop limit Next header Flow label 89. Depending on the IPv6 address prefix, which of the following address types can IPv6 addresses be classified into? Unicast address Multicast address Broadcast address Anycast address 90. In the OpenFlow architecture, which of the following packets are sent from the controller to a switch? Asynchronous Symmetric Controller-to-Switch Switch-to-Controller 91. Which of the following are NFV features? Encapsulation Isolation Hardware independence Partition division 92. Statements in the same Python code block must have the same number of indented spaces. Vrai Faux 93. Which of the following is used to describe a collection of objects with the same attributes and methods? init def class function 94. Which of the following methods is used to write data to the telnetlib module? read_all () close() write() read_very_eager() 95. Which of the following characters can be used as Python identifiers? Letters @ signs Underscores Digits 96. Which of the following are compiled high-level programming languages? C Java Python C++ 97. Certain terminals, such as servers and printers, can be allocated fixed IP addresses. Vrai Faux 98. To conserve IP addresses, what mask size is used on router to router connections on an enterprise network? 28 24 30 29 99. Which of the following technologies can be used on a campus network to improve network reliability? CSS VRRP Link aggregation iStack 100. Which of the following are stages in the lifecycle of a campus network project? Network optimization Deployment and implementation Network O&M Planning and design