H12-811 - HCIA-Datacom V1.0
H12-811 - HCIA-Datacom V1.0
Exam : H12-811_V1.0
Vendor : Huawei
Version : V12.35
1
IT Certification Guaranteed, The Easy Way!
NO.1 In the network as shown in the figure below, all routers run 0SPF protocol, which device is
ABR?
A. Router D
B. Router A
C. Router C
D. Router B
Answer: B D
NO.3 As shown in the following figure, the ports of switch A and switch B connecting to the host
belong to VLAN
10 and VL.AN 20, respectively. The switch interconnection port type is Trunk. PVID is 10 and 20
respectively. Which of the following statements are correct?
A. Host A and Host B belong to different VLANs and cannot ping each other
B. Host A and Host B can be pinged
C. Do not carry VLAN TAG when forwarding data frames sent by the host between switches
D. The ARP request from host A cannot be forwarded to host B
Answer: B C
NO.4 The CAPWAP protocol specifies the communication standard between AC and AP. Which of the
following statements about the CAPWAP protocol is correct?
A. CAPWAP is an application layer protocol based on TCP transmission
B. AP can encapsulate the user's data message in CAPWAPI and forward it to AC
C. In order to establish a CAPWAP tunnel, FIT AP can only discover AC through broadcast messages
D. In order to reduce the burden on A, CAPWAP uses a tunnel to transmit control messages and data
messages at the same time
Answer: B
NO.5 What kind of message does the OSPF protocol use to confirm the received LSU message?
A. LSU
B. LSA
C. LSR
D. LSACK
Answer: D
NO.6 When a switch receives a unicast data frame with a VLAN tag, but finds that the destination
MAC address of the data frame cannot be queried in its MAC address table, the switch's processing
behavior for the data frame is.
A. The switch will broadcast this data frame to all ports (except the receiving port) in the VLAN where
2
IT Certification Guaranteed, The Easy Way!
NO.7 In the following options, the necessary technology to enable a host with an IP address of
10.0.0.1 to access the Internet is.
A. NAT
B. Route import
C. Dynamic routing
D. Static routing
Answer: A
NO.8 Which of the following features does the default VLAN in the Layer 2 Ethernet switch have?
A. By default, all ports of the switch are member ports of the default VLAN
B. The default VLAN must be created before it can be assigned a port
C. The IP address configured on the switch will only be applied to the member ports of the default
VLAN
D. The default VLAN cannot be deleted manually
Answer: A D
NO.9 Virtualization is the foundation of NFV. Which of the following statements about the
characteristics of virtualization is correct?
A. Partition: Multiple virtual machines can be run on a single physical server at the same time.
B. Isolation: Virtual machines on the same physical server are isolated from each other.
C. Hardware independence: Virtual machines and hardware are decoupled, and virtual machines can
be migrated between servers.
D. Encapsulation: All virtual machines share the operating system, and the encapsulation is realized
through the namespace
Answer: A B C
NO.10 VRP operating system commands are divided into four levels: access level, monitoring level,
configuration level, and management level. Which level can run various business configuration
commands but cannot operate the file system?
A. Management level
B. Monitoring level
C. Configuration level
D. Access level
Answer: C
NO.11 In the RSTP protocol, when the edge port receives the configuration BPDU message, it loses
the edge port attribute.
3
IT Certification Guaranteed, The Easy Way!
A. True
B. False
Answer: A
NO.12 In order to ensure that the same data stream is forwarded on the same physical link, which
load sharing method does Eth-Trunk use?
A. Load sharing based on application layer information
B. Load sharing based on the inbound interface of the packet
C. Packet-based load sharing
D. Flow-based load sharing
Answer: D
NO.13 In the network shown in the figure below, when the 0SPF neighbor status is stable, what is
the neighbor status of Router B and Router C?
A. Full
B. 2-way
C. Down
D. Attempt
Answer: B
NO.14 Which of the following advantages does stacking and clustering technology have?
A. Simplify device management, just manage one logical device
B. Number of expansion ports
C. Can deploy link aggregation across physical devices
D. Effectively avoid single points of failure
Answer: A B C D
NO.15 If the ipv4 address of a host in the LAN is 192.168.1.1/30, which of the following IP addresses
will be processed by the host as the destination address?
A. 192.168.1.1
B. 255.255.255.255
C. 192.168.1.2
D. 192.168.1.3
Answer: A B D
NO.16 When Huawei switches run STP, the priority of the switch is () by default.
A. 4096
B. 32768
C. 16384
D. 8192
Answer: B
4
IT Certification Guaranteed, The Easy Way!
A. 2FFF:DAC0:ABEF:0000:0000:0000:CDAA:0732
B. 2FFF:0DAC:ABEF:0000:0000:0000:CDAA:7320
C. 2FFF: 0DAC: ABEF: 0000: 0000: CDAA: 0732
D. 2FFF:0DAC:ABEF:0000:0000:0000:CDAA:0732
Answer: D
NO.18 Which of the following port states does the RSTP protocol include?
A. Discarding
B. Forwarding
C. Listening
D. Learning
Answer: A B D
NO.20 The output information of a certain switch is shown in the figure. Which of the following
interfaces can forward data frames with VLAN-ID 40. And it does not carry tags when forwarding?
A. GE0/0/4
B. GE0/0/5
C. GE0/0/2
D. GE0/0/3
Answer: B
NO.22 The Tracert diagnostic tool records the () of each ICMP timeout message, so that it can
provide the user with the IP address through which the message reaches the destination.
A. Source IP address
B. Destination port
C. Source port
D. Destination IP address
Answer: A
5
IT Certification Guaranteed, The Easy Way!
NO.23 The wireless access controller (AC, Access Controller) is the overall management and control
device in the FIT AP architecture. What is wrong about the role of AC in the following description?
A. AP configuration delivery
B. User access authentication
C. User access control
D. Regardless of the data forwarding method, the user's data packets are forwarded by the AC
Answer: D
NO.24 In the broadcast network, which routers will a DRother router exchange link status
information with?
A. DR Other
B. BDR
C. All ospf neighbors
D. DR
Answer: B D
NO.25 Which of the following authentication methods do not need to enter a user name and
password.
A. uthentication-mode none
B. authentication-mode local
C. authentication-mode hwtacacs
D. authorization-mode hwtacacs
Answer: A
NO.26 The switch becomes a logical switch after stacking and clustering, and Eth-Trunk across
physical devices can be deployed to improve network reliability.
A. True
B. False
Answer: A
NO.27 In the network shown in the figure below, assuming that all routers enable OSPF at the same
time, which router is the DR in this network?
A. Router A
B. Router B
C. Router C
D. Router D
Answer: B
NO.28 Which bridge ID is unlikely to appear in the configuration BPDU sent by the switch?
A. 2048 00-01-02-03-04-CC
B. 8192 00-01-02-03-04-CC
C. 4096 00-01-02-03-04-CC
D. 0 00-01-02-03-04-CC
6
IT Certification Guaranteed, The Easy Way!
Answer: A
NO.29 Apply the ACL configured as follows in Telnet, only the device with the IP address of
172.16.105.2 is allowed to log in remotely. # acl number 2000 rule 5 permit source 172.16.105.2 0 #.
A. True
B. False
Answer: A
NO.31 Trunk type ports and Hybrid type ports handle the same way when receiving data frames.
A. True
B. False
Answer: A
NO.32 Which of the following statements about the Python language is wrong?
A. Python language supports automatic indentation, so you don't need to pay attention when writing
code.
B. Python generally executes code from beginning to end in order.
C. Pay attention to the use of comments when writing code to help readers understand the code.
Comments start with #.
D. The role of print is to output the content in the brackets.
Answer: A
NO.33 The network structure and OSPF partition are shown in the figure. In the figure, except for
RTA, the routers RTB, RTC and RTD are all ABR routers.
A. True
B. False
Answer: B
NO.34 The MAC address table of a certain switch is shown in the figure. If the switch receives a data
frame with a destination MAC of 5489 9811-0b49 from port Eth0/0/2, which of the following
statements is correct?
A. Forward this data frame from port Eth0/0/3
B. Forward this data frame from the Eth0/0/2 port
C. Discard this data frame
D. Flood out this data frame
Answer: A
7
IT Certification Guaranteed, The Easy Way!
NO.35 Complete the ACL configuration shown in the figure on the router RTA, the following
description is correct.
A. The VRP system will match the rule first in sequence numbering deny source 20.1.1.0 0.0.0.255
B. The VRP system will not adjust the sequence number, but will first match the rule permit source
20.1.1.0 0.0.0.255
C. Configuration error, the sequence number of the rules must be configured from small to large
D. The VRP system will adjust the sequence number of the first rule to 5 according to the
configuration sequence.
Answer: A
NO.36 If a windows host is started for the first time, if it uses DHCP to obtain an IP address, what is
the source IP address of the first packet sent by this host?
A. 169.254.2.33
B. 0.0.0.0
C. 127.0.0. 1
D. 255. 255. 255.255
Answer: B
NO.38 The administrator finds that the two routers stay in the 2-WAY state when establishing OSP
neighbors, then the following description is correct ().
A. The router is configured with the wrong Router ID
B. These two routers are DR0ther routers in the broadcast network
C. The router is configured with the same area ID
D. The router is configured with the same process ID
Answer: B
NO.39 Which of the following MAC addresses cannot be used as the MAC address of the host
network card?
A. 03-04-05-06-07-08
B. 01-02-03-04-05-06
C. 00-02-03-04-05-06
D. 02-03-04-05-06-07
Answer: A B
NO.40 In the network shown in the figure below, Router A uses manual mode link aggregation, and
adds G0/0/1 and G0/0/2 ports to aggregation group 1. What is wrong about the status of Router A's
aggregation port 1?
A. Only disable port G0/0/1 of Router B, and Eth-Trunk 1 protocol up
8
IT Certification Guaranteed, The Easy Way!
B. Turn off the G0/0/1 and G0/0/2 ports of Router B at the same time, and Eth-Trunk 1 protocol
down
C. Turn off the G0/0/1 and G0/0/2 ports of Router B at the same time, and Eth-Trunk 1 protocol up
D. Only close the G0/0/2 port of Router B, and Eth-Trunk 1 protocol up
Answer: C
NO.41 Which of the following cannot be the length of the IPv4 packet header?
A. 20B
B. 32B
C. 64B
D. 60B
Answer: C
NO.42 On Huawei AR G3 series routers, which authentication modes does AAA support?
A. HWTACACS
B. 802.1x
C. None
D. Local
Answer: A D
NO.43 For switches running the STP protocol, the port needs to wait for the forwarding delay in the
Learning state before it can be converted to the Forwarding state.
A. True
B. False
Answer: A
NO.44 Regarding the conflict domain and the broadcast domain, the correct description is ().
A. Devices connected to all ports on a HUB belong to a conflict domain
B. The devices connected to all ports of a Layer 2 switch with default configuration belong to a
conflict domain
C. The devices connected to all ports of a Layer 2 switch with default configuration belong to a
broadcast domain
D. The device connected to a router belongs to a broadcast domain
Answer: A C
NO.45 In the WLAN architecture, the FIT AP cannot work independently. It needs to be managed by
AC. Which of the following protocols are used to communicate between FIT AP and AC?
A. IPsec
B. WEP
C. CAPWAP
D. WAP
Answer: C
9
IT Certification Guaranteed, The Easy Way!
NO.46 Which of the following fields is not included in the HELLO packet of the OSPF protocol?
A. Network Mask
B. Neighbor
C. sysname
D. HelloInterval
Answer: C
NO.47 By default, what is the RouterDeadInterval of the OSPF protocol on the broadcast network?
A. 30s
B. 20s
C. 40s
D. 10s
Answer: C
NO.48 On the VRP platform, which of the following methods can be used to access the previous
history command?
A. Ctrl+U
B. Left cursor
C. Ctrl+P
D. Up cursor
Answer: D
NO.50 After the network administrator uses the TracertRoute function on the router device, in the
data packet sent by the router, the value of the Protocol field in the IPv4 header is?
A. 2
B. 6
C. 1
D. 17
Answer: C
NO.51 The CAPWAP control tunnel and data tunnel transmission adopt the same port number.
A. True
B. False
Answer: B
NO.52 How many bytes is the length of the basic IPV6 header?
A. 64
B. 40
10
IT Certification Guaranteed, The Easy Way!
C. 32
D. 48
Answer: B
NO.53 A DHCP server is deployed in the network, but the administrator found that some hosts did
not correctly obtain the address specified by the DHCP server. What are the possible reasons?
A. There is another DHP server in the network that works more efficiently
B. Some hosts cannot communicate with the DHCP server normally, and the client systems of these
hosts have automatically generated addresses in the range of 169.254.0.0
C. The address pool of the DHCP server has all been allocated
D. Some hosts cannot communicate with the DHCP server normally, and the client systems of these
hosts automatically generate addresses in the range of 127.254.0.0
Answer: A B C
NO.54 Network administrators use Ping to test the connectivity of the network. Which of the
following protocols may be used in this process?
A. TCP
B. ICMP
C. ARP
D. UDP
Answer: B C
NO.55 Which of the following commands can be used to view the CPU usage of the router?
A. display cpu-usage
B. display memory
C. display interface
D. display cpu-state
Answer: A
NO.56 The figure shows the routing table of router R1. If R1 sends a packet with a destination IP
address of 10.0.2.2, which interface needs to be sent from?
A. Ethernet 0/0/2
B. Ethernet 0/0/0
C. Ethernet 0/0/1
D. GigabitEthernet 0/0/0
Answer: C
NO.57 In the broadcast network shown in the figure, OSPF runs on four routers in the same area and
on the same network segment. OSPF will automatically elect one DR and multiple BDRs to achieve a
better backup effect.
A. True
B. False
Answer: B
11
IT Certification Guaranteed, The Easy Way!
NO.58 The only way for the STA to discover the wireless network is the beacon frame sent by the
AP.
A. True
B. False
Answer: B
NO.59 The port in the Discarding state in RSTP will discard the received data frame. However, the
MAC address table can be maintained according to the data frames received by the port.
A. True
B. False
Answer: A
NO.60 The ACL on AR G3 series routers supports two matching sequences. Configuration order and
automatic sorting.
A. True
B. False
Answer: A
NO.61 The output information of a certain device is shown in the figure. Which of the following
statements is correct?
A. The device name is Huawei
B. The standby main control board of the device is operating normally
C. The VRP operating version of the device is VRP5
D. The device has been running for 1 minute
Answer: A B C D
NO.62 The switch is connected to the host. What is the common port link type of the switch?
A. Hybrid chain link
B. Access link
C. Trunk link
D. Trunk link
Answer: B
NO.63 The router needs to modify the destination IP address in the data packet when forwarding
the data packet.
A. True
B. False
Answer: B
NO.64 The two switches shown in the figure below have both enabled the STP protocol. Which port
will eventually be in the Blocking state?
A. SWA's G0/0/2 port
B. G0/0/2 port of SWB
12
IT Certification Guaranteed, The Easy Way!
NO.65 Which of the following elements are included in the routing table?
A. Interface
B. Cost
C. Protocol
D. NextHop
Answer: A B C D
NO.66 When the switch receives a unicast data frame, it will look up the destination MAC address in
the MAC surface. Which of the following statements is wrong?
A. If the MAC address is found, and the port corresponding to the MAC address in the MAC address
table is not the port where the frame enters the switch, the switch performs the forwarding
operation
B. If the MAC address is found, and the port corresponding to the MAC address in the MAC address
table is the port where the frame enters the switch, the switch performs the discard operation
C. If the MAC address cannot be found, the switch performs flooding operation
D. If the MAC address cannot be found, the switch will discard it
Answer: D
NO.67 The MAC address table of a certain switch is shown in the figure. If the switch receives a data
frame with a destination MAC of 5489-985-18a8 from port Eth0/0/2, which of the following
statements is correct?
A. Forward this data frame from port Eth0/0/1
B. Discard this data frame
C. Forward this data frame from the Eth0/0/2 port
D. Flood out this data frame
Answer: B
13
IT Certification Guaranteed, The Easy Way!
D. 0x9100
Answer: B
NO.70 Which of the following commands can be used to check the session status of the PPPoE
client?
A. display pppoe-client session packet
B. display ip interface brief
C. display pppoe-client session summary
D. display current-configuration
Answer: C
NO.71 What is the total length of the interface identifier of the link-local unicast address in bits?
A. 64bit
B. 48bit
C. 96bit
D. 32bit
Answer: A
NO.73 The following description of the specified port of the spanning tree is correct.
A. The designated port can forward configuration BPDU packets to the network segment connected
to it
B. Each switch has only one designated port
C. The port on the root switch must be a designated port
D. The port on the root switch must not be a designated port
Answer: A
NO.74 The two switches shown in the figure below have both enabled the STP protocol. An engineer
made the following conclusions on this network. Which conclusion do you think is correct?
A. The G0/0/3 port of SWA is stable in Forwarding state
B. The G0/0/2 vertical port of SWB is stable in Forwarding state
C. Both ports of SWA are designated this port
D. The G0/0/2 port of SWA is stable in the Forwarding state
Answer: A B C D
NO.75 Since the TCP protocol uses a three-way handshake mechanism when establishing a
connection and closing a connection, TCP supports reliable transmission.
A. True
B. False
14
IT Certification Guaranteed, The Easy Way!
Answer: B
NO.76 Which of the following statements about the various versions of the SNMP protocol are
correct?
A. SNMPv3 messages have the functions of identity verification and encryption processing.
B. SNMPv1 uses UDP as the transport layer protocol, while SNMPv2c and SNMPv3 use TCP as the
transport layer protocol. Therefore, the reliability is higher.
C. SNMPv2c messages have the functions of identity verification and encryption processing.
D. SNMPv2c follows the 5 protocol operations defined in the v1 version and adds two additional
operations.
Answer: A D
NO.77 Network administrators use Ping to test the connectivity of the network. Which of the
following protocols may be used in this process?
A. TCP
B. UDP
C. ICMP
D. ARP
Answer: C,D
NO.79 As shown in the figure below, all hosts can communicate normally, is the corresponding
relationship between SWA MAC address and port correct?
A. MAC-A G0/0/1 MAC-B GO/0/1 MAC-C G0/0/3
B. MAC-A G0/0/1 MAC-B G0/0/2 MAC-C G0/0/3
C. MAC-AG0/0/1 MAC-B G0/0/2 MAC-C G0/0/1
D. MAC-A G0/0/2 MAC-B G0/0/2 MAC-C G0/0/3
Answer: B
NO.80 In the RSTP standard, in order to improve the convergence speed, the port that the switch is
directly connected to the terminal can be defined as.
A. Backup port
B. Fast port
C. Root port
D. Edge port
Answer: D
15
IT Certification Guaranteed, The Easy Way!
NO.81 Which of the following fields are present in both IPv6 and IPv4 packet headers?
A. Next Header
B. Version
C. Destination Address
D. Source Address
Answer: B C D
NO.82 The load sharing mode at both ends of the Eth-Trunk can be inconsistent.
A. True
B. False
Answer: A
NO.83 Which field in the IPv6 header is similar to the TTL field in the IPv4 header?
A. Next Header
B. Hop Limit
C. Traffic Class
D. Version
Answer: B
NO.84 The network administrator hopes to be able to effectively use the IP address of the
192.168.176.0/25 network segment. Now that the company's marketing department has 20 hosts,
which of the following address segments is best allocated to the marketing department?
A. 192.168.176.96/27
B. 192.168.176.0/25
C. 192.168.176.160/27
D. 192.168.176.48/29
Answer: A
NO.85 On Huawei AR G3 series routers, what authorization modes does AAA support?
A. Not authorized
B. Authorization after successful RADIUS authentication
C. HWTACACS authorization
D. Local authorization
Answer: B C D
NO.87 If the protocol used is telnet, then the value of the protocol field in the ipv4 header in the
16
IT Certification Guaranteed, The Easy Way!
section is?
A. 53
B. 17
C. 67
D. 6
Answer: D
NO.88 For multiple paths to the same destination network, the router needs to select by comparing
the size of the Preference value. If the Preference is the same, the selection is made according to the
size of the Cost value.
A. True
B. False
Answer: A
NO.90 In standard STP mode, which of the following non-root switches will forward the TC-set BPDU
generated by the root switch.
A. Backup port
B. Designated port
C. Root port
D. Preparation port
Answer: B
NO.91 Which of the following statements about RA and RS messages in IPv6 are correct?
A. RA is used to reply address prefix information
B. RS is used to request address prefix information
C. RA is used to request address prefix information
D. RS is used to reply address prefix information
Answer: A B
NO.92 A network administrator of a company wants to uniformly divide users who often access the
company network from different switches to VLAN 10 due to frequent changes of office locations.
Which of the following methods should be used to divide VLANs?
A. Divide VLAN based on subnet
B. Divide VLAN based on protocol
17
IT Certification Guaranteed, The Easy Way!
NO.93 What is the total length of the port ID in the spanning tree protocol?
A. 16
B. 4
C. 2
D. 8
Answer: A
NO.94 When the IPv4 protocol is used as the network layer protocol, which field is not included in
the network layer?
A. TTL
B. Sequence Number
C. Source IPv4 Address
D. Destination IPv4 Address
Answer: B
NO.95 The controller is the core component of SDN. The controller connects to the device through
the southbound interface. Which of the following belong to the controller southbound protocol?
A. SNMP
B. PCEP
C. OpenFlow
D. NETCONF
Answer: A B C D
NO.96 The Tracert diagnostic tool in Huawei routers is used to track the data forwarding path.
A. True
B. False
Answer: A
NO.97 Only the WPA2-PSK security policy supports the use of TKIP for data encryption.
A. True
B. False
Answer: B
NO.98 It is used to identify wireless networks in WLAN. What distinguishes different wireless
networks?
A. VAP
B. SSID
C. AP Name
D. BSSID
18
IT Certification Guaranteed, The Easy Way!
Answer: B
NO.99 The three layer switches are interconnected with one machine core, and all switches enable
the STP function.
Please refer to the figure below for the bridge ID setting of the switch STP. Others are the default
configuration. The following statement is.
A. Both ports of SWA are designated ports and are in the forwarding state
B. The G0/0/2 port of SWA is blocked
C. The G0/0/1 port of SWC is an alternative port and is in a blocking state
D. SWA is the root bridge in the simple network
Answer: A
NO.100 Refer to the single-arm routing configuration in the figure below, it can be judged that even
if the ARP proxy is not enabled on the sub-interface of R1, the administrative department and the
financial department can communicate with each other.
A. True
B. False
Answer: B
NO.102 There are multiple routing entries to the same destination network in the routing table.
What are these routes called?
A. Multipath routing
B. Default routing
C. Equal cost routing
D. Suboptimal routing
Answer: C
NO.104 The output information of the router R1 routing table is shown in the figure. Which of the
following statements is correct?
19
IT Certification Guaranteed, The Easy Way!
A. The router will forward data packets whose destination network is 12.0.0.0/8
B. The data packet whose destination network is 12.0.0.0/8 will be forwarded from the router's
Ethernet0/0/0 interface
C. The router will discard packets whose destination network is 11.0.0.0/8
D. The data packet whose destination network is 11.0.0.0/8 will be forwarded from the router's
Gigabitethernet0/0/0 interface
Answer: A D
NO.105 The function of telnet. read_very_eager in Telnet lib is to read data non-blockingly. Usually
need to be used with the time module.
A. True
B. False
Answer: A
NO.106 On the broadcast network, both DR and BDR use the multicast address 224.0.0.6 to receive
link state update messages.
A. True
B. False
Answer: B
NO.107 The device port running the STP protocol is in the Forwarding state. Which of the following
statements are correct?
A. This port port not only forwards user traffic but also processes BPDU packets
B. The port will build a MAC address table based on the received user traffic, but does not forward
user traffic
C. The port not only does not process BPDU packets, but also does not forward user traffic
D. The port only receives and processes BPDUs, and does not forward user traffic
Answer: A
NO.108 Which of the following descriptions about Trunk port and Access port are correct?
A. Trunk ports can only send tagged frames
B. Access ports can only send tagged frames
C. Trunk port can only send untagged frames
D. Access port can only send untagged frames
Answer: D
NO.109 What are the advantages of using dynamic host configuration protocol DHCP to assign IP
addresses?
A. Avoid IP address conflicts
B. Reuse of IP address can be realized
C. When the configuration information changes (such as DNS), only the administrator needs to
modify it on the DHCP server, which is convenient for unified management
D. Heavy workload and poor management
20
IT Certification Guaranteed, The Easy Way!
Answer: A C
NO.110 Network devices running the SNMP protocol run an agent process locally.
A. True
B. False
Answer: A
NO.111 In order to implement the FIT AP online, the FIT AP first needs to obtain the IP address of
the AC. Which of the following is not included in the method of obtaining the IP address of the AC by
the FIT AP?
A. DHCP Option
B. Static designation method on AP
C. Multicast mode
D. Broadcasting method
Answer: C
NO.112 Using the ACL shown in the figure on the router RTA to match routing entries, which of the
following entries will be matched?
A. 172.16.1.0/24
B. 172.16.1.1/32
C. 172.18.0.0/16
D. 192.17.0.0/24
Answer: B C
NO.113 Broadly speaking, the transmission medium that constitutes a wireless local area network
WLAN does not include?
A. Laser
B. Infrared
C. Radio waves
D. Ray
Answer: A
NO.114 Which of the following SNMP packets are sent to the NMS by the Agent on the managed
device?
A. Response
B. Get-Request
C. Set-Request
D. Get-Next-Request
Answer: A
NO.115 When using the ping command on the VRP platform, if you need to specify an IP address as
the source address of the echo request message, which of the following parameters should be used?
A. -s
21
IT Certification Guaranteed, The Easy Way!
B. -d
C. -n
D. -a
Answer: D
NO.116 About the correct description of the information as shown in the figure is.
A. The wrong cable is connected to the GigabitEthernet 0/0/0 interface
B. The GigabitEthernet 0/0/0 interface is not configured with an IP address
C. The dynamic routing protocol is not enabled on the GigabitEthernet 0/0/0 interface
D. The GigabitEthernet 0/0/0 interface was manually closed by the administrator
Answer: D
NO.117 As shown in the figure below, the MAC address table of SWA is as follows. The switch never
learns the MAC address of host A.
Which of the following is impossible?
A. The G0/0/1 port of the switch is set to ACCESS mode
B. SWA disables the MAC address learning function of the VLAN to which host A belongs
C. The G0/0/1 port of the switch has disabled MAC address learning
D. HOSTA did not send any data frames
Answer: A
NO.118 The router Radius information configuration is shown in the figure. Which of the following
statements are correct?
A. The IP address of the authentication server is 200.0.12.1
B. The IP address of the authorization server is 200.0.12.1
C. The source IP address of the Radius packet sent by the router is 200.0.12.2
D. The IP address of the accounting server is 200.0.12.1
Answer: A D
NO.119 In order to realize the network layer function on the VLANIF interface, it is necessary to
configure on the VIANIF interface?
A. IP address
B. Subnet mask
C. IP prefix
D. MAC address
Answer: A B
NO.120 When two switches are interconnected using link aggregation technology, which of the
following conditions must be met by each member port?
A. The physical ports connected at both ends use the same optical module model
B. The physical speeds connected at both ends are the same
C. The physical numbers connected at both ends are the same
D. The number of physical ports connected at both ends is the same
22
IT Certification Guaranteed, The Easy Way!
Answer: A B D
NO.122 In the network shown in the figure below, which of the following commands can be entered
on the router to enable host A to ping host B?
A. RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.2 RTB:: ip route-static 10.0.12.1
255.255.255.252 11.0.12.1
B. RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.1 RTB:: ip route-static 10.0.12.1
255.255.255.252 11.0.12.2
C. RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2 RTB:: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1
D. RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1 RTB:: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2
Answer: A C
NO.123 The router enables the FTP service, the user name and password are both huawei, and the
root directory of FTP is set to sh:/cp/, which of the following commands must be configured?
A. local-user huawei ftp-directory flash:/dhcp/
B. ftp server enable
C. local-user huawei service-type ftp
D. local-user huawei password cipher huawei
Answer: A B C D
NO.124 The figure shows the display startup information of the R2200 router, about these
information. What is wrong is.
A. The system file cannot be modified the next time the device is started
B. The system file used for this startup of the device is ar2220-v200r00300spc200.cc
C. The system file at the next startup of the device can be modified with the command "startup
system software <startup-software-name>"
D. The running configuration file is not saved
Answer: A
NO.125 By default, the root path cost of the root bridge in the STP protocol must be 0.
A. True
B. False
Answer: A
23
IT Certification Guaranteed, The Easy Way!
B. False
Answer: A
NO.127 In the network shown in the figure below, the host logs in to router A through Telnet, and
then obtains the configuration file of router B through FTP on the remote interface. How many TCP
connections exist on router A at this time?
A. 2
B. 4
C. 3
D. 1
Answer: C
NO.128 After the link authentication is completed, the STA will continue to initiate link service
negotiation. Which of the following messages is used to achieve the specific negotiation?
A. Handshake
B. Association
C. Join
D. Negotiate
Answer: B
NO.129 By default, what is the forward delay time of the STP protocol in seconds?
A. 5
B. 20
C. 10
D. 15
Answer: D
NO.130 Apply the ACL configured as shown in the figure in Telnet. Which of the following
statements is correct?
A. The device with IP address 172.16.105.3 can use Telnet service
B. The device with IP address 172.16.105.4 can use Telnet service
C. The device with IP address 172.16.105.5 can use Telnet service
D. The device with IP address 172.16.105.6 can use Telnet service
Answer: D
NO.132 The information shown in the figure is the port status information displayed on a switch
24
IT Certification Guaranteed, The Easy Way!
running STP.
According to this information, the following description is wrong.
A. This switch may be connected to 6 other switches
B. This switch is the root switch in the network
C. This network may only contain this switch
D. The priority of this switch is 0
Answer: D
NO.133 The administrator plans to implement route backup by configuring static floating routes, the
correct way to achieve this is.
A. The administrator needs to configure different protocol priority values ??for the main static route
and the standby static route
B. The administrator needs to configure different metric values ??for the main static route and the
standby static route
C. The administrator only needs to configure two static routes
D. The administrator needs to configure different TAGs for the main static route and the standby
static route
Answer: A
NO.134 There are hosts in a private network that need to access the Internet. In order to achieve
this requirement, which of the following configurations should the administrator do on the edge
router of the network?
A. DHCP
B. NAT
C. STP
D. Default routing
Answer: B D
NO.136 A company applies for a Class C IP address segment, which needs to be evenly distributed to
8 subsidiaries.
The largest subsidiary has 14 computers. Different subsidiaries must be in different network
segments, so the subnet mask should be set to.
A. 255.255.255.0
B. 255.255.255.240
C. 255.255.255.128
D. 255.255.255.192
25
IT Certification Guaranteed, The Easy Way!
Answer: B
NO.137 The bridge ID of the STP protocol in the switching network is as follows. Which of the
following bridge ID switches will become the root bridge?
A. 32768 00-01-02-03-04-CC
B. 4096 00-01-02-03-04-DD
C. 32768 00-01-02-03-04-AA
D. 32768 00-01-02-03-04-BB
Answer: B
NO.139 When OSPF protocol establishes adjacency, which of the following parameters must be
consistent.
A. Area ID
B. Router Dead Interval
C. Router ID
D. Router Priority
Answer: A B
NO.140 Which of the following subnet routes might be the route entry 10.0.0.24/29 aggregated
from?
A. 10.0.0.28/30
B. 10.0.0.24/30
C. 10.0.0.23/30
D. 10.0.0.26/30
Answer: A B D
NO.141 In order to distinguish different users and provide different network services on the AP,
which of the following can be configured?
A. VAP
B. VAC
C. VT
D. WAP
Answer: A
NO.142 In the network shown in the figure below, the host has an ARP cache. Which of the
following statements is correct?
26
IT Certification Guaranteed, The Easy Way!
A. The following entries exist in the ARP cache of host A: 11.0.12.1 MAC-B
B. The router needs to be configured with static routing, otherwise host A and soil machine B cannot
communicate in both directions
C. There may be the following entry 10.0.12.2MAC-C in the ARP cache of host A
D. host A and machine B can communicate in two directions
Answer: C D
NO.143 What is the port number used by the FTP protocol control plane?
A. 21
B. 22
C. 23
D. 24
Answer: A
NO.144 The link aggregation interface can only be used as a Layer 2 interface.
A. True
B. False
Answer: B
NO.145 In the campus network, network reliability can be improved by using link aggregation and
stacking technologies.
A. True
B. False
Answer: A
NO.146 When building a campus network, which of the following protocols can be used to avoid
Layer 2 loops?
A. SNMP
B. NAT
C. OSPF
D. RSTP
Answer: D
NO.147 By default, the lease period for the DHCP server to assign an IP address is?
A. 1h
B. 12h
C. 24h
D. 18h
Answer: C
27
IT Certification Guaranteed, The Easy Way!
C. 2000::2E0:FCFF:FEEF:FEC
D. FC00::2E0:FCFF:FEEF:FEC
Answer: A
NO.149 On which layer of the OSI reference model does the router work?
A. Network layer
B. Transport layer
C. Application layer
D. Data link layer
Answer: A
NO.150 Link aggregation is a common technology in enterprise networks. Which of the following
descriptions are the advantages of link aggregation technology?
A. Realize load sharing
B. Improve reliability
C. Improve safety
D. Increase bandwidth
Answer: A B D
NO.151 The LACP mode of link aggregation uses LACPDU to elect the active end. What information
in LACP is the basis for electing the active end of LACP?
A. Interface priority
B. Device priority
C. Interface number
D. MAC address
Answer: B D
NO.152 The administrator configures OSPF on a router, but the loopback interface is not configured
on the router. The following correct description of the Router ID is.
A. The IP address of the router's management interface will become the Router ID
B. The smallest IP address of the router's physical interface will become the Router ID
C. The largest IP address of the physical interface of the router will become the Router ID
D. The priority of the router will become the Router ID
Answer: C
NO.153 Which of the following statements about static routing in Huawei equipment is wrong is.
A. When the priority of a static route is 0, the route will definitely be preferred.
B. The range of the priority value of the static route is 1-255
C. The default value of the static route priority is 60
D. The cost value (Cost) of the static route cannot be modified.
Answer: A
28
IT Certification Guaranteed, The Easy Way!
NO.155 Which of the following statements about IPv6 anycast addresses are correct?
A. The packet whose destination address is the anycast address will be sent to the nearest network
interface in the sense of routing
B. Provide redundant functions for services
C. Realize the load sharing of services
D. Anycast address and unicast address use the same address space
Answer: A B C D
NO.156 The MAC address table of the existing switches is shown in the figure. Which of the
following statements are correct?
A. The data frame with the source MAC address of 5489-9811-0b49 and the destination MAC address
of
5489-989d-1d30 received from the port is forwarded from the Eth0/0/2 port
B. The data frame with the source MAC address of 5489-9885-18a8 and the destination MAC address
of
5489-989d-1d30 received from the port is forwarded from the Eth0/0/1 port
C. When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be
relearned
D. When the switch restarts, the MAC address learned by port Eth0/0/3 needs to be re-learned
Answer: B
NO.157 The configuration information of a certain port of the switch is shown in the figure, then this
port carries VLAN TAG9 when sending data frames carrying which VLAN.
A. 1, 2, 3, 4, 6,100
B. 2,3, 100
C. 2,3, 4,6.100
D. 1,2,3,100
Answer: B
NO.158 Which of the following attributes cannot be used as a parameter to measure Cost?
A. sysname
B. Bandwidth
C. Delay
D. Hop count
Answer: A
NO.159 In the switching network shown in the figure below, all switches are running the STP
protocol. When the topology is stable, modify the configuration of the BPDU sending cycle on which
29
IT Certification Guaranteed, The Easy Way!
NO.160 On the VRP operating platform, what is the command to display the current interface
configuration in the interface view?
A. display version
B. display this
C. display users
D. display ip interface brief
Answer: B
NO.161 The config mode is the default ACL matching order on Huawei devices.
A. True
B. False
Answer: A
NO.162 Layer 2 switches belong to the data link layer equipment. It can identify the MAC address
information in the data frame, forward data according to the MAC address, and record these MAC
addresses and corresponding port information in its own MAC address table.
A. True
B. False
Answer: A
NO.163 As shown in the figure below, in the MAC address table of SWA and SWB, what is the
correct correspondence between MAC address, ?AN and port?
A. SWB: MAC Address VLAN Port MAC-A 100 GE0/0/3 MAC-B 200 GE0/0/3 MAC-C 100 GE0/0/1
B. SWB: MAC Address VLAN Port MAC-A 10 GE0/0/3 MAC-B 20 GE0/0/3 MAC-C 100 GE0/0/1
C. SWA: MAC Address VLAN Port MAC-A 10 GE0/0/3 MAC-B 20 GE0/0/3 MAC-C 100 GE0/0/3
D. SWA: MAC Address VLAN Port MAC-A 10 GE0/0/1 MAC-B 20 GE0/0/2 MAC-C 100 GE0/0/3
Answer: B D
NO.164 As shown in the figure below, which port of the following switches will be blocked?
A. SWC's G0/0/2
B. G0/0/3 of SWA
C. G0/0/3 of SWB
D. SWC's G0/0/1
Answer: D
30
IT Certification Guaranteed, The Easy Way!
NO.165 Which of the following working modes does Huawei Enterprise AP support?
A. Local
B. CLoud
C. FAT
D. FIT
Answer: B C D
NO.166 The AC uses the CAPWAP control tunnel to transmit management messages to the FIT AP.
A. True
B. False
Answer: A
NO.167 The network administrator finds that a certain port of the switch has learned the MAC
address, but it cannot forward data frames. Which of the following working statuses is this port in?
A. Learning
B. Disabled
C. Listening
D. Blocking
Answer: A
NO.168 If the network address of a network is 192.168.1.0. Then its broadcast address must be
192.168.1.255.
A. True
B. False
Answer: B
NO.169 In an IPv4 network, AP supports static and DHCP methods to obtain IP addresses.
A. True
B. False
Answer: A
NO.170 Which of the following routing protocols are dynamic routing protocols?
A. static
B. OSPF
C. Direct
D. BGP
Answer: B D
NO.171 UDP cannot guarantee the reliability of data transmission, and does not provide functions
such as message ordering and flow control. It is suitable for traffic with low transmission reliability
requirements but high transmission speed and delay requirements.
A. True
B. False
31
IT Certification Guaranteed, The Easy Way!
Answer: A
NO.172 How to enter the view of OSPF area 0 in the VRP operating system?
A. ?Huawei-ospf-1?area 0
B. [Huawei-ospf-1] area 0 enable
C. [Huawei-ospf-1] area 0.0.0.0
D. ?Huawei?ospf area 0
Answer: A C
NO.175 Before the STA associates with the AP, it needs to exchange some messages to obtain the
SSID. What are these messages?
A. Probe Response
B. Discovery
C. Beacon
D. Probe Request
Answer: A D
NO.176 Now there are the following four network segments: 10.24.0.0/24, 10.24.1.0/24,
10.24.2.0/24, 10.24.3.0/24.
Which route can point to these four network segments at the same time?
A. 10.24.1.0/23
B. 10.24.0.0/22
C. 10.24 0.0/21
D. 0.0.0.0/0
Answer: B C D
NO.177 What does the command port trunk allow-pass vlan all do?
A. The connected peer device can dynamically determine which VLAN IDs are allowed to pass
B. The opposite port connected to the port must be configured with port trunk permit vlan all at the
32
IT Certification Guaranteed, The Easy Way!
same time
C. All VLAN data frames are allowed to pass on this port
D. If the port default vlan 3 command is configured for the connected remote device, the VLAN 3
between the two devices cannot communicate
Answer: C
NO.178 How many types of data flows with different service levels can be marked based on MPLS
labels?
A. 16
B. 4
C. 8
D. 2
Answer: C
NO.181 What is the data link layer MAC address of the VAP on the AP in the WLAN?
A. SSID
B. BSS
C. ESS
D. BSSID
Answer: D
NO.182 If the network administrator does not configure the backbone area, the router will
automatically create the backbone area.
A. True
B. False
Answer: B
NO.183 Which state does the OSPF protocol use to indicate that the adjacency relationship has been
established?
33
IT Certification Guaranteed, The Easy Way!
A. 2-way
B. Attempt
C. Down
D. Full
Answer: D
NO.184 As shown in the figure below, host A and host B cannot communicate.
A. True
B. False
Answer: A
NO.185 The transmission rate of an Eth-Trunk port in manual link aggregation mode is related to ().
A. Is the member port on the public network or on the private network
B. Is an IP address configured on the member port
C. Number of member ports
D. Bandwidth of member ports
Answer: C D
NO.186 Which of the following messages are used for IPv6 stateless address autoconfiguration?
A. RS
B. NS
C. RA
D. NA
Answer: A C
NO.187 An ACL is essentially a packet filter. Only when the ACL is applied to the service module can
the ACL take effect.
A. True
B. False
Answer: A
NO.188 As shown in the figure, the switch runs STP with default parameters. Which of the following
ports will be elected as the designated port?
A. G0/0/2 port of switch A
B. HUB's G0/0/2 port
C. HUB's G0/0/1 port
D. G0/0/1 port of switch A
Answer: D
NO.189 When planning a campus network, which of the following mask lengths is recommended for
device interconnection IP addresses?
A. 30
B. 32
34
IT Certification Guaranteed, The Easy Way!
C. 16
D. 24
Answer: A
NO.191 What kind of packets does the OSPF protocol use to discover and maintain neighbor
relationships?
A. LSR
B. LSU
C. DD
D. HELLO
Answer: D
NO.192 Which stage in the life cycle of campus network construction is the beginning of a project?
A. Planning and design
B. Network operation and maintenance
C. Network implementation
D. Network optimization
Answer: A
NO.193 In the network shown in the figure, the administrator wants all hosts to be unable to access
the Internet between 8:00-17:00 every day. In the G0/0/1 interface configuration, which ACL rule
needs to be bound to traffic-filter outbound?
A. time-range am9topm5 08:00 to 17:00 daily # acl number 2001 rule 5 deny time-range am9topm5
#
B. time-range am9topm5 08:00 to 17:00 off-day # ac1 number 2004 rule 5 permit time-range
am9topm5 #
C. time-range am9topm5 07:00 to 18:00 daily # acl number 2002 rule 5 permit time-range am9topm5
#
D. time-range am9topm5 08:00 to 17:00 working-day # acl number 2003 rule 5 deny time-range
am9topm5
#
Answer: A
NO.194 The priority of the LACP protocol is shown in the figure. Switch A and Switch B adopt LACP
mode link aggregation. And all interfaces join the link aggregation group. At the same time, set the
maximum number of active ports to 3. Then which port of switch A is not the active port?
35
IT Certification Guaranteed, The Easy Way!
A. G0/0/2
B. G0/0/0
C. G0/0/3
D. G0/0/1
Answer: C
NO.196 When planning a campus network, you can plan VLANs according to business types.
A. True
B. False
Answer: A
NO.197 Which version of the SNMP protocol below supports encryption features?
A. SNMPv2c
B. SNMPv1
C. SNMPv2
D. SNMPv3
Answer: D
NO.199 Telnetlib is a module that implements the Telnet protocol that comes with Python.
A. True
B. False
Answer: A
NO.200 The MAC address table of the existing switches is shown in the figure. Which of the
following statements are correct?
A. After the switch restarts, all MAC addresses need to be relearned
B. The MAC address 5489-9811-0b49 is manually configured by the administrator
C. The MAC address 5489-9894-1430 is manually configured by the administrator
36
IT Certification Guaranteed, The Easy Way!
NO.201 The origin of SDN is the separation of transfer and control. The separation of transfer and
control is a way to realize SDN, not the essence.
A. True
B. False
Answer: A
NO.202 When using FTP for file transfer, how many TCP connections will be established?
A. 4
B. 3
C. 2
D. 1
Answer: C
NO.203 What is wrong in the following statement about the main functions of the router?
A. Guide data forwarding according to the routing table
B. Forwarding according to the source IP address of the received data packet
C. Realize mutual communication between devices on the same network segment
D. Establish routing tables through multiple protocols
Answer: B C
NO.204 Which of the following protocols does the RA message used in IPv6 stateless
autoconfiguration belong to?
A. UDPv6
B. IGMPv6
C. ICMPv6
D. TCPv6
Answer: C
NO.205 Regarding the role of the ARP protocol and packet encapsulation, which one is correct?
A. The ARP cache on the network device can only be obtained through the ARP protocol
B. ARP protocol is based on Ethernet encapsulation
C. ARP protocol supports deployment on PPP link and HDLC link
D. The MAC address and UUID address of the destination can be obtained through the ARP protocol
Answer: A B
NO.206 Which of the following parameters is used in LCP negotiation to detect link loops and other
abnormal conditions?
A. PAP
B. Magic words
C. MRU
37
IT Certification Guaranteed, The Easy Way!
D. CHAP
Answer: B
NO.207 What is the default server port number used by the Telnet protocol?
A. 24
B. 21
C. 23
D. 22
Answer: C
NO.208 When we search for accessible wireless networks on our laptop, what is the actual network
name displayed?
A. BSSID
B. BSS
C. SSID
D. ESS
Answer: C
NO.209 What are the network types supported by the OSPF protocol?
A. Point-to- Point
B. Non-Broadcast Multi-Access
C. Broadcast
D. Point-to-Multipoint
Answer: A B C D
NO.210 The classic network forwarding method is based on the routing table routing table
forwarding. The forwarding method of OpenFlow switches is based on flow table forwarding. Which
of these two forwarding methods is correct?
A. The routing table has a fixed length. A device can only have one public routing table.
B. The matching method of the routing table is to match the route of the destination network
segment with the longest mask.
C. The matching method of the flow table is to match the MAC address and IP address of the flow at
the same time.
D. The flow table is variable length. A network device can only have one flow table.
Answer: A B
NO.211 In the network shown in the figure, which of the following descriptions is correct.
A. The network between SWA and SWC is the same conflict domain
B. The network between SWA and SWC is the same broadcast domain
C. The network between RTA and SWC is the same conflict domain
D. The network between SWA and SWB is the same broadcast domain
Answer: A B
38
IT Certification Guaranteed, The Easy Way!
NO.212 A company has 50 private IP addresses. The administrator uses NAT technology to connect
the company's network to the public network, but the company has only one public network address
and is not fixed. Which of the following NAT conversion methods meets the requirements?
A. NAPT
B. Basic NAT
C. Static NAT
D. easy-ip
Answer: D
NO.213 Which state does the OSPF protocol use to indicate that the neighbor relationship has been
established?
A. Attempt
B. 2-way
C. Completed
D. Down
Answer: B
NO.214 What is the command for configuring the data forwarding mode on the AC as direct
forwarding?
A. forward-mode turnel
B. forward-mode direct- forward
C. forward mode capwap forward
D. forward-mode direct
Answer: B
NO.215 Which of the following fields does the MPLS header include?
A. Label
B. TTL
C. EXP
D. Tos
Answer: A B C
NO.216 What is the full name of the general routing platform VRP?
A. Versatile Routing P1atform
B. Versatile Redundancy Platform
C. Virtual Routing Platform
D. Versatile Routing Protocol
Answer: C
NO.217 What kind of packets does the OSPF protocol use to describe its LSDB?
A. HELLO
B. LSR
C. DD
39
IT Certification Guaranteed, The Easy Way!
D. LSU
Answer: C
NO.218 What is the length of the Ethernet II frame containing the Ethernet header?
A. 60-1560B
B. 64-1518B
C. 46-1500B
D. 64-1500B
Answer: B
NO.219 What command line views exist on the VRP operating platform?
A. Agreement view
B. Interface view
C. System view
D. User view
Answer: D
NO.220 Which of the following types of addresses are not included in IPv6 addresses?
A. Multicast address
B. Anycast address
C. Unicast address
D. Broadcast address
Answer: D
NO.222 The following statement about the TTL field in the IP packet header is correct.
A. TTL defines the number of packets that the source host can send
B. Every time an IP packet passes through a router, its TTL value will be increased by 1
C. TTL defines the time interval at which the source host can send data packets
D. Every time an IP packet passes through a router, its TTL value will be reduced by 1
Answer: D
NO.223 As shown in the figure, if host A has the ARP cache of host B, host A can ping host B.
A. True
B. False
Answer: B
40
IT Certification Guaranteed, The Easy Way!
B. Application layer
C. Network layer
D. Presentation layer
Answer: C
NO.225 The Layer 2 Ethernet switch generates entries in the MAC address table according to the ()
of the Ethernet frame received by the port.
A. Destination MAC address
B. Source MAC address
C. Destination IP address
D. Source IP address
Answer: B
NO.226 As shown in the figure, when the switch needs to forward the frame with the destination
MAC address of
5489-98ec-f011, the following description is correct.
A. The switch will flood the frame on all ports except the port that received the frame
B. The switch needs to send a request to discover the device with the MAC address of 5489-98ec-
f011
C. The switch will send a message that the destination is unreachable to the source device
D. The switch does not find a matching entry in the MAC address table, so the frame will be
discarded
Answer: A
NO.227 In the RSTP protocol, when the root port fails, () will quickly convert to the new root port
and immediately enter the forwarding state.
A. Backup port
B. Forwarding port
C. Alternate port
D. Edge port
Answer: C
NO.228 By default, in the SNMP protocol, which port number does the agent process use to send
alarm messages to the NMS?
A. 164
B. 162
C. 163
D. 161
Answer: B
NO.229 Based on ACL. rules. Which of the following categories can ACL be divided into?
A. Basic ACL
B. Layer 2 ACL
41
IT Certification Guaranteed, The Easy Way!
C. User ACL
D. Advanced ACL
Answer: A B C D
NO.230 Which of the following IEE802.11 standards support operation in the 2.4GH and 5GH
frequency bands?
A. 802.11ac
B. 802.11n
C. 802.11g
D. 802.11ax
Answer: B D
NO.233 The FIT AP can obtain the IP address of the AC through the DHCP option to establish a
CAPWAP tunnel.
Which option needs to be configured on the DHCP server for this?
A. Option 82
B. Option 10
C. Option 55
D. Option 43
Answer: D
NO.234 The configuration information of a certain interface of the switch is shown in the figure.
When the data frame of which VLAN TAG is carried by this port, the VLAN TAG is stripped?
A. 30
B. 10
C. 40
D. 20
Answer: B
42
IT Certification Guaranteed, The Easy Way!
B. By viewing the number of specified dynamic MAC address table entries, you can get the number of
users communicating under the interface
C. After the device restarts, the previous dynamic entries will be lost
D. The dynamic MAC table entries obtained through the source MAC address learning in the message
will age
Answer: B C D
NO.236 Which of the following levels is not a common network level in mid-sized campus network
architecture?
A. Core layer
B. Network layer
C. Access layer
D. Convergence layer
Answer: B
NO.237 The administrator has configured the router as shown in the figure, and the administrator
wants to assign a shorter lease period to the DHCP address. Which of the following commands should
be used, Ip pool pool1 network 10.
A. lease 0
B. dhcp select relay
C. lease day 0 hour 10
D. lease 24
Answer: C
NO.238 The output information of the sub-interface of a router aggregate port 1 is shown in the
figure. Based on this information, which of the following statements are correct?
A. There are two links on the aggregation port
B. The sub-interface of the aggregate port carries VLAN TAG 100 when forwarding data frames
C. The IP address of the sub-interface of the aggregate port is 10.0.12.2/24
D. The sub-interface number of the aggregate port is 100
Answer: A C D
NO.240 Trunk port can allow multiple vlans to pass, including vlan 4096.
A. True
B. False
Answer: B
43
IT Certification Guaranteed, The Easy Way!
NO.241 The login timeout period in the VRP system can only be set under the VTY interface.
A. True
B. False
Answer: B
NO.242 In the figure below, all switches have enabled the STP protocol, assuming that the path cost
of all ports is 200.
What is the root path cost value contained in the configuration BPDU message received on the
G0/0/4 port of the SWD?
A. 400
B. 0
C. 200
D. 600
Answer: C
NO.243 The data link layer adopts PPP encapsulation, and the IP addresses at both ends of the link
may not be in the same network segment.
A. True
B. False
Answer: A
NO.245 The Backup port in RSTP can replace the failed root port.
A. True
B. False
Answer: B
NO.246 Which of the following statements about link aggregation in LACP mode is correct?
A. There can only be a maximum of 4 active ports in LACP mode
B. The number of active ports cannot be set in LACP mode
C. In LACP mode, devices at both ends of the link send LACP packets to each other
D. All active interfaces in LACP mode participate in data forwarding and share load traffic
Answer: C
NO.247 In PPP, when the two ends of the communication detect that the physical link is activated,
they will switch from the link unavailability stage to the link establishment stage. At this stage, the
link parameter negotiation is mainly carried out through the () protocol.
44
IT Certification Guaranteed, The Easy Way!
A. LCP
B. DHCP
C. IP
D. NCP
Answer: A
NO.248 How many bits are there in the VLAN ID in the VLAN frame format defined by IEEE802.1Q?
A. 10
B. 6
C. 8
D. 12
Answer: D
NO.250 Which of the following types of ACL can match the transport layer port number?
A. Intermediate ACL
B. Advanced ACL
C. Layer 2 ACL
D. Basic ACL
Answer: B
NO.251 In the network shown in the figure below, the network administrator hopes that the data
packets sent from host A to host B pass through the G0/0/3 interface between routers, and the data
packets sent from host B to host A pass between the routers. G0/0/4 interface, which of the
following commands can achieve this requirement?
A. RTA: ip route-static10.0.12.5 255.255.255.252 11.0.12.2 RTB: ip route-static10.0.12.1
255.255.255.252
11.0.12.5
B. RTA: ip route- static0.0.0.0 0.0.0.0 11.0.12.6 RTB: ip route- statIc0.0.0.0 0.0.0.0 11.0.12.1
C. RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2 RTB: ip route-static 0.0.0.0 0.0.0.0 11.0.12.5
D. RTA: ip route- static10.0.12.5 255.255.255.252 11.0.12.6 RTB: ip route- static10.0.12.
1 255.25.255.252
11.0.12.1
Answer: A C
45
IT Certification Guaranteed, The Easy Way!
B. False
Answer: B
NO.253 Which of the following IPv4 addresses does the host use to directly access the Internet?
A. 200.1.1.1
B. 10. 1.1.1
C. 50.1.1.1
D. 100.1.1.1
Answer: B
NO.254 What level of encapsulation format does the PPP protocol define in the OSI reference
model?
A. Network layer
B. Presentation layer
C. Application layer
D. Data link layer
Answer: D
NO.256 Which of the following is not an open interface for Huawei controllers?
A. OpenFlow
B. RESTful
C. NETCONF
D. AAA
Answer: D
NO.258 VLAN4095 cannot be created on Huawei switches, and VLAN1 cannot be deleted.
A. True
B. False
Answer: A
NO.259 The network administrator has captured a data frame in the network, and its destination
MAC address is
01-00-5E-A0-B1-C3. What is correct about the MAC address is.
46
IT Certification Guaranteed, The Easy Way!
NO.260 Which of the following statements about VLANIF interfaces are correct?
A. The VLANIF interface does not have a MAC address
B. Different VLANIF interfaces can use the same IP address
C. VLANIF interface does not need to learn MAC address
D. The VLANIF interface is a Layer 3 interface
Answer: D
NO.261 When AP and AC are on different Layer 3 networks, what method is recommended for AP to
discover AC?
A. Broadcasting method
B. Manually specified on AP
C. DHCP
D. DNS
Answer: C
NO.262 In the network shown in the figure below, all routers run the OSPF protocol. The link cost
value is as shown in the figure. What is the cost value of the route entry in the RTA routing table to
reach network 10.0.0.0/8?
A. 60
B. 20
C. 70
D. 100
Answer: A
NO.263 Which of the following statements about OSPF neighbor status are correct?
A. After the router LSDB synchronization is completed, it is converted to Full state
B. In the Exchange state, routers send each other DD packets containing a summary of link state
information, describing the contents of the local LSDB
C. The sequence number of the DD message is determined in the Exchange state
D. The master-slave relationship of OSPF is formed in the ExStart state
Answer: A B
NO.264 Which of the following statements are correct about the VLAN design and planning of the
campus network?
A. It is recommended to assign VLAN numbers consecutively to ensure the rational use of VLAN
resources
B. The most commonly used method of division is based on MAC
47
IT Certification Guaranteed, The Easy Way!
NO.265 The network administrator hopes to be able to effectively use the IP address in the same
segment of
192.168.176.0/25. Now the company's marketing department has 20 mainframes. Which of the
following address segments is best allocated to the marketing department?
A. 192.168.176.96/27
B. 192.168.176.0/25
C. 192.168.176.160/27
D. 192.168.176.48/29
Answer: A
NO.266 The output information of a certain router is shown in the figure. Which of the following
statements is wrong?
A. The effective Router ld of this device is 10.0.1.1
B. The effective Router id of this device is 10.0.12.1
C. The device is faulty, and the configured Router ld is inconsistent with the actual effective Router ID
D. This router has enabled regional authentication
Answer: A D
NO.269 The output information of a certain switch is shown in the figure. Which of the following
statements is correct?
A. The GE0/0/1 port of the switch does not carry VLAN TAG when sending VLAN20 data frames
B. When the switch GE0/0/1 text port sends VLAN10 data frames, it does not carry VLAN TAG
C. The user manually created 4 VLANs
D. The GEO/0/2 port of the switch carries VLAN TAG when sending VLAN20 data frames
Answer: B C
48
IT Certification Guaranteed, The Easy Way!
NO.270 Which of the following is not included in the VRP system login method?
A. Web
B. Telnet
C. SSH
D. Netstream
Answer: D
NO.271 In the MAC address table of the switch, which of the following entries will not age?
A. Port MAC address table entry
B. Static MAC address table entry
C. Dynamic MAC address table entry
D. Device MAC address table entry
Answer: B
NO.272 Which of the configurations in the following options belong to a Layer 2 ACL?
A. rule 15 permit vlan-id 100
B. rule 20 permit source-mac 0203-0405-0607B
C. rule 10 permit 12-protocol arp
D. rule 25 permit source 192.168.1.1 0.0.0.0
Answer: A B C
NO.273 Which of the following statements about link aggregation in manual load balancing mode is
correct?
A. There can only be 4 active ports in manual load sharing mode
B. In manual load sharing mode, devices at both ends of the link send LACP packets to each other
C. The number of active ports can be configured in manual load sharing mode
D. In manual load sharing mode, all active interfaces participate in data forwarding and share load
traffic
Answer: D
NO.274 Which of the following descriptions of OSPF DD packets and LSAs are correct ().
A. The header of the LSA can uniquely identify an LSA
B. DD packet contains detailed information about LSA
C. DD packets only contain LSA header information
D. The LSA header is only a small part of the LSA
Answer: A C D
49
IT Certification Guaranteed, The Easy Way!
NO.276 In the network shown in the figure, which of the following configurations can realize that
Host A and Host B cannot communicate with each other?
A. acl number2000 rule 5 deny source 100.0.12.0 0.0.0.255 # interface GigabitEthernet0/0/1 traffic-
filter outbound acl 2000 #
B. acl nuber2000 rule 5 deny source 100.0.12.0 0.0.0.255 # interface GigabitEthernet0/0/1 traffic-
filter inbound acl 2000 #
C. acl number2000 rule 5 deny source 100.0.12.0 0.0.0.255 # interface GigabitEthernet0/0/3 traffic-
filter inbound acl 2000 #
D. acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 # interface GigabitEthernet0/0/2 traffic-
filter inbound acl 2000
Answer: A D
NO.277 For the network shown in the figure below, which of the following statements is correct?
A. The sub-interface of Router B cannot learn the MAC address of the sub-interface of Router A
B. The sub-interface of Router A cannot learn the MAC address of the sub-interface of Router B
C. 10.0.12.1 can ping 10.0.12.2
D. Because the sub-interface numbers of Router A and Router B are inconsistent, so Router A and
Router B cannot communicate
Answer: C
NO.278 Which encryption algorithm used by WLAN has the highest security strength?
A. DES
B. CCMP
C. TKIP
D. WEP
Answer: B
NO.279 Which of the following information is not included in the MAC address table of the switch?
A. VLAN
B. IP address
C. Port number
D. MAC address
Answer: B
NO.280 By default, it takes at least 30s for the port status in the STP protocol to change from
Disabled to Forwarding.
Multiple choice
A. True
B. False
Answer: A
50
IT Certification Guaranteed, The Easy Way!
B. TFTP
C. FTP
D. HTTP
Answer: C D
NO.282 On the switch, which VLANs can be deleted by using the undo command?
A. vlan1024
B. v1an1
C. vlan4094
D. vlan2
Answer: A C D
NO.283 The election of the root switch in STP only compares the priority of the switch, while in
RSTP, the priority of the switch and the MAC address are compared at the same time.
A. True
B. False
Answer: B
NO.284 A company applies for a Class C IP address segment, but it must be allocated to 6
subsidiaries. The largest subsidiary has 26 computers. Different subsidiaries must be in different
network segments. The netmask should be set to ().
A. 255.255.255.224
B. 255.255.255.128
C. 255.255.255.0
D. 255.255.255.192
Answer: A
NO.285 Which of the following port states does not include the RSTP protocol?
A. Learning
B. Forwarding
C. Discarding
D. Blocking
Answer: D
NO.286 The LCP negotiation phase of the PPP protocol. If you completely follow the parameters
sent by the other party. Which of the following messages is sent?
A. Configure-Reject
B. Configure-Ack
C. Configure-Nak
D. Configure-Request
Answer: B
NO.287 The Router ID of OSPF must be the same as the IP address of a certain interface of the
51
IT Certification Guaranteed, The Easy Way!
router.
A. True
B. False
Answer: B
NO.288 If the broadcast address of a network is 172.16.1.255, then its network address may be.
A. 172.16.2.0
B. 172.16.1.1
C. 172.16.1.128
D. 172.16.1.253
Answer: C
NO.290 For the description of the PPP link establishment process, the following statement is wrong
().
A. In the Network phase, the PPP link performs NCP negotiation. Select and configure a network
layer protocol through NCP negotiation, and negotiate network layer parameters
B. After the NCP negotiation is successful, the PPP link will maintain the communication state and
enter the Terminate phase
C. PPP link supports half-duplex and full-duplex modes
D. In the Establish phase, the PPP link conducts LCP parameter negotiation. The negotiation content
includes the maximum receiving unit MRU, authentication method, magic word and other options
Answer: B C
NO.291 On the VRP platform, the priority of the default protocol for direct routing, static routing,
RIP, and OSPF routing in the area is from high to low.
A. Direct routing, RIP, static routing, OSPF
B. Direct routing, OSPF, static routing, RIP
C. Direct routing, static routing, RIP, OSPF
D. Direct routing, OSPF, RIP, static routing
Answer: B
NO.292 Which information of the data frame is used by the VLANIF interface to determine whether
to forward Layer
2 or Layer 3 forwarding?
A. purpose MAC
B. source IP
C. destination port
D. source MAC
52
IT Certification Guaranteed, The Easy Way!
Answer: A
NO.293 The switch receives a unicast data frame. If the destination MAC of the data frame can be
found in the MAC surface, the data frame will be forwarded from the corresponding port of the MAC.
A. True
B. False
Answer: B
NO.295 If the Length/Type of an Ethernet data frame is equal to 0x8100, what might be the payload
of this data frame?
A. ARP packet
B. TCP data segment
C. UDP data
D. ICMP message
Answer: A B C D
NO.296 If the Length/Type of an Ethernet data frame is 0x8100, which of the following statements is
correct?
A. There must be an IP header in the upper layer of this data frame
B. There must be a UDP header in the upper layer of this data frame
C. This data frame must carry VLAN TAG
D. There must be a TCP header in the upper layer of this data frame
Answer: C
NO.297 There is a TTL field in the IP packet header. The correct statement about this field is.
A. This field is used for packet loop prevention
B. The field length is 7 bits
C. This field is used to indicate the priority of the data packet
D. This field is used for packet fragmentation
Answer: A
NO.298 Which of the following stages is not included in the PPPoE session establishment and
termination process?
A. Discovery phase
B. Session termination stage
C. Data forwarding stage
53
IT Certification Guaranteed, The Easy Way!
D. Session phase
Answer: C
NO.299 In the network shown in the figure below, all links are Ethernet links, and all interfaces of all
routers run OSPF protocol, how many DRs are elected in the entire network?
A. 1
B. 3
C. 2
D. 4
Answer: D
NO.300 Which of the following options does not belong to the SDN network architecture?
A. Device layer
B. Chip layer
C. Application collaboration layer
D. Controller layer
Answer: B
NO.301 Which of the following are not characteristics of a small campus network?
A. Simple network requirements
B. Wide coverage
C. Fewer users
D. Simple network level
Answer: B
NO.302 The output information of a certain router is shown in the figure. Which of the following
statements are correct?
A. The Router ID of the router is 10.0.1.1
B. The interface address of this router is 10.0.12.2
C. Router II is 10.0.2.2
D. This router is a DR
Answer: C
NO.303 How many port states does the RSTP protocol have?
A. 3
B. 4
C. 2
D. 1
Answer: A
NO.304 If the configured ACL rule has an inclusion relationship, it should be noted that the rule
numbers of strict conditions need to be sorted first, and the rule numbers of loose conditions need to
be sorted later, so as to prevent packets from hitting the rules of loose conditions and stop
54
IT Certification Guaranteed, The Easy Way!
NO.305 In the network shown in the figure below, host A is not configured with a gateway, and host
B has the ARP cache of the gateway. Use the command ping 11.0.12.1 on host A.
Which of the following statements is correct?
A. No data packets will be sent from host A
B. The destination MAC address of the data frame sent by host A is MAC C
C. The destination MAC address of the data frame sent by host A is MAC B
D. The destination IP address of the data packet sent by host A is 11.0.12.1
Answer: A
NO.306 According to the command output as shown in the figure, the correct one in the following
description is ().
A. GigabitEthernet0/0/1 allows VlAN1 to pass
B. If you want to change the GigabitEthernet/0/1 port to an Access port, you first need to use the
command
"undo port trunk allow-pass vlan 2 to 4094
C. GigabitEtheret0/0/1 does not allow VlAN1 to pass
D. If you want to change the GigabitEthernet0/0/1 port to an Access port, you first need to use the
command "undo port trunk allow-pass vlan all"
Answer: A B
NO.307 The output information of a certain router is shown in the figure. Which of the following
statements is correct?
A. This router is BDR
B. The Router ID of the router is 10.0.1.1
C. The DR priority of this routing interface is 10
D. The cost value of this interface is 1
Answer: A B D
55
IT Certification Guaranteed, The Easy Way!
C. Broadcast
D. Network
Answer: C
NO.311 The AC can manually specify the source address or source interface for creating the
CAPWAP tunnel.
A. True
B. False
Answer: A
NO.312 When using the SNMPv1 protocol to manage network devices, which of the following
commands is used by the network management system to complete the configuration of the network
devices?
A. Set Request
B. Response
C. Get- Next Request
D. Get- Request
Answer: A
NO.313 The DHCP OFFER message can carry a DNS address, but it can only carry one DNS address.
A. True
B. False
Answer: B
NO.314 The network administrator configures the RTA on the Huawei router as shown in the figure.
If a user needs to be authenticated in the authentication domain "huawei", the following description
is correct.
A. "authenti cati on-scheme aul" authentication will be used, if "aul" is deleted, "au2" authentication
will be used
B. "authenti cati on-scheme au2" authentication will be used, if "au2" is deleted, "aul" authentication
will be used
C. Will use "authenticati on-scheme aul" authentication
D. Will use "authentication-scheme au2" authentication
Answer: D
NO.315 What kind of packets does the OSPF protocol use to request LSAs that are missing locally?
A. LSU
B. LSACK
56
IT Certification Guaranteed, The Easy Way!
C. HELLO
D. LSR
Answer: D
NO.316 The last option field (option) of IPv4 is variable-length optional information. The maximum
length of this field is?
A. 10B
B. 20B
C. 40B
D. 60B
Answer: C
NO.317 According to the command shown in the figure, which of the following descriptions is
correct:
A. The PVID of GigabitEthernet0/0/1 port is 1
B. The PVID of GigabitEthernet0/0/2 port is 10
C. The PVID of GigabitEthernet0/0/2 port is 1
D. The PVID of GigabitEthernet0/0/1 is 10
Answer: C D
NO.318 When configuring the Telnet login user interface. The authentication method must be
configured, otherwise the user cannot successfully log in to the device.
A. True
B. False
Answer: A
NO.319 As shown in the figure below, all hosts can communicate normally. Which of the following
statements is correct?
A. G0/0/3 of swA learned 2 MAC addresses
B. G0/0/3 of swB learned 2 MAC addresses
C. G0/0/3 of sWA learned 3 MAC addresses
D. G0/0/3 of SwA learned 1 MAC address
Answer: B D
NO.320 As shown in the figure below, are the following statements correct?
A. Host A can ping host B
B. The IP address masks of host A and host B are different, so host A and host B cannot communicate
C. The broadcast address of host A and host B are the same
D. Only when the masks of host A and host B are set to be the same, host A and host B can
communicate
Answer: B
NO.321 In order to realize the network layer function on the VLANIF interface, it is necessary to
57
IT Certification Guaranteed, The Easy Way!
NO.322 The AP obtains the version from the AC to upgrade the mode:
A. AC mode
B. SFTP mode
C. TFTP mode
D. FTP mode
Answer: A B D
NO.323 As shown in the figure, the network administrator creates VLAN2 on the SWA and SWB, and
configures the ports connecting the hosts on the two switches as Access ports and assigns them to
VLAN2.
Configure G0/0/1 of SWA and G0/0/2 of SWB as trunk ports to allow all VLANs to pass. To achieve
normal communication between the two hosts, you also need.
A. Configure G0/0/1 on SWC as a trunk port and allow VLAN2 to pass through, set G0/0/2 as an
access port, and set the PVID to 2.
B. Create VLAN2 on SWC, configure G0/0/1 and G0/0/2 as trunk ports, and allow VLAN2 to pass
C. Create VLAN2 on SWC
D. Configure the G0/0/1 Trunk port on SWC and allow VLAN2 to pass through
Answer: B
NO.324 If the administrator wants to update the VRP version of Huawei routers, the correct method
is ().
A. The administrator configures the router as a TFTP client and transmits VRP software through TFTP
B. The administrator configures the router as an FTP server and transfers the VRP software through
FTP
C. The administrator configures the router as an FTP client and transfers the VRP software through
FTP
D. The administrator configures the router as a TFTP server and transmits VRP software through TFTP
Answer: A B C
NO.325 The administrator needs to configure the IP address on the G0/0/0 interface of the router.
So which one of the following addresses is correct?
A. 237.6.1.2/24
B. 127.3.1.4/28
C. 192.168.10.112/30
D. 145.4.2.55/26
Answer: D
58
IT Certification Guaranteed, The Easy Way!
NO.326 If the Ethernet data frame Length/Type=0x0806, which of the following statements is
correct?
A. This data frame is an IEEE802.3 frame
B. The destination MAC address of this data frame may be FFFF-FFFF-FFFFF
C. The source MAC address of this data frame must not be FFFF-FFFF-FFFFF
D. This data frame is EthernetII frame
Answer: B C D
NO.328 The switch G0/0/1 port configuration information is shown in the figure. Which VLAN data
frame does the switch carry when forwarding the VLAN TAG?
A. 10
B. 20
C. 30
D. 40
Answer: A
NO.329 An AR2200 router needs to restore the initial configuration, which of the following
operations are necessary?
A. Re-specify the configuration file to be loaded at the next startup
B. Restart the AR2200 router
C. Reset the saved configuration
D. Clear current configuration
Answer: B C
NO.330 All interfaces of routers running OSPF must belong to the same area.
A. True
B. False
Answer: B
NO.331 The configuration information of a certain port of the switch is shown in the figure. Which of
the following statements is wrong?
A. The port type is Trunk type
B. This port cannot send data frames carrying VLAN TAG 200
C. If the VLAN TAG carried in the data frame is 100, the switch will strip off the VLAN TAG and send it
out
59
IT Certification Guaranteed, The Easy Way!
D. If the port receives data frames without VLAN TAG, the switch needs to add VLAN TAG 200
Answer: C
NO.332 An existing switch is connected to a designated port through a port, but the port does not
forward any packets, but can monitor network changes by receiving BPDUs. Then the role of the port
should be.
A. Disable port
B. Alternate port
C. Root port
D. Designated port
Answer: B
60