New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

H12-831_V1.0 Questions and Answers

Question # 6

The link status information between different S.4S processes of the routers around the Taiwan and Taiwan is considered to be sound insulation.

A.

True

B.

False

Full Access
Question # 7

Engineer Guan used two routers to test IPv6 services. By running the BGP4+ module to communicate with the branch, as shown in Juxin, an engineer captured packets to view the Updte packets sent by R1. Which of the following statements is true about the description of the message information?

A.

This message describes only oneBGPAttribute: Multi-protocol unreachableNLRIAttributes

B.

This message describes the current cancellationIPv6routing

C.

The maximum and the preceding length of the routing address described in this packet is:2001:db8:2345:l::l/128

D.

The next hop address of the route described in this packet is:2001:db8:2345:l::l\

Full Access
Question # 8

R1 and R2 use directly connected interfaces to establish an EBGP peer relationship. R1 imports 2000:: 1/128 to BGR By default, which of the following is the next hop of the route from R2 to 2000:: 1/128?

A.

2002: 12:: 1

B.

2001:12.1

C.

2003:12::1

D.

2000:12::1

Full Access
Question # 9

As shown in the figure, MPLS/BGP IPVPN is deployed on the network. The MP-BGP neighbor relationship is established between PE1 and PE2 through the LoopbackD interface. After the configuration is complete, it is found that CE1 and CE2 cannot learn routes from each other. Run the command to check the error on PE2. The neighbor information is shown in the figure, what is the most likely cause of the problem?

A.

PE1orPE2±ofVPNInstance parameter configuration error

B.

PE1andPE2not presentBGP-VPN4Enabling neighbors in unicast address family view

C.

PE1andPE2betweenLSPTunnel not established

D.

PE1orPE2with each otherCEMisconfigured routing protocol between

Full Access
Question # 10

Ethernet is a broadcast-enabled network, and once there are loops in the network, this simple factory broadcast mechanism can have disastrous consequences. Which of the following phenomena may be caused by loops?

A.

CPUOccupancy exceeds70%

B.

The device cannot log in remotely

C.

use on devicedisplay interfaceWhen commanding to view interface statistics, it is found that the interface receives a large number of broadcast packets

D.

pass throughpingSerious packet loss during network test with command

Full Access
Question # 11

When B, CPIMPLS TP VPN is deployeD. the OSPF VPN Route Tag (VPN Route Tag) is not transmitted in the extended community attribute of MP-BGP, but the local concept is only meaningful on PE routers that receive MP-BGP routes and generate OSPF LSAs.

A.

True

B.

False

Full Access
Question # 12

On a BGP/MPLS IP VPN network, which of the following are carried when a PE advertises VPNv4 routes?

A.

IPv4 prefix

B.

RD

C.

Export target

D.

Import target

Full Access
Question # 13

Which of the following statements about IPSG is false?

A.

IPSGcan preventIPaddress spoofing attack

B.

IPSGis a source based on a three-layer interfaceIPaddress filtering technology

C.

IPSGcan be turned onIPPacket inspection alarm function, linked with the network management to alarm

D.

able to passIPSGPrevent the host from changing privatelyIPaddress

Full Access
Question # 14

Part of the configuration of R1 is as follows. Which statement about IS-IS on R1 is correct?

3vpn-instarwce rr

level- 2

cost-style wide

-erntity 47.ccOa 3eft)btxlci-dael

A.

process2with process3The routing information is isolated

B.

process1Contains only global routing information

C.

process1Also contains global routing information. andVRFtt,rrrouting information

D.

process2with process3routing information will be shared

Full Access
Question # 15

Which of the following is included in the routine collection of basic equipment information?

A.

License information

B.

Patch information

C.

The software version the device is running

D.

Whether the configuration is saved

Full Access
Question # 16

The routing attributes of the three routing entries are shown in the figure. Assuming that the next hops of the three routing entries are all reachable, when these three routing entries are

After the entries arrive at the BP router in order, by default, BGP will finally call a route

entry?

A.

Route B

B.

Route C

C.

Route A

D.

slightly

Full Access
Question # 17

According to this picture, we can judge?

display ospf Isdb router self-originate OSPF Process 1 with Router ID 10.0.12J Area: 0.0.0.0

Type:Router

Lsid: 10.0.12 J

Adv rtr: 10.0.12.1

Ls age: 312

Len: 36

Options : A, BR E

\seq#:80000013

1chksum : 0xc61c

ILink count: 1

1* Link ID: 10.0.12.2

IData : 10.0.12.1

,Link Type: TransNet

.Metric : 1

A.

R1ofsystem IDYesee8c.a0c2.bafl

B.

R1existinglevel", andlevel-1-2Dimensional state information of

C.

R1onlylevel-2link state information

Ds level-2In the network, there are a total of8Tailu Electric

Full Access
Question # 18

Which of the following reasons may cause the hosts in the same VLAN of the LAN to fail to communicate with each other?

A.

switchMA, Caddress learning errors

B.

interface is artificialshutdownor the physical interface is damaged

C.

The wrong port is configured on the switch andMA, Caddress binding

D.

Port isolation is configured on the switch

Full Access
Question # 19

The device operating environment is crucial for stable device operating, including the equipment room, power supply, and heat dissipation. Maintenance personnel must be on site to maintain the device operating environment.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Deployment in a small and medium-sized networkOSPF,When viewing the routing table of a device, it is found that there are only directly connected routes.

It is not possible for the operation to cause the fault?

A.

Routing protocol configuration error

B.

Incorrect routing policy configuration

C.

Port address assignment problem

D.

The configured user permissions are too low

Full Access
Question # 21

What types of Link Types are included in the Router LSA in OSPF?

A.

Vlink

B.

Stub Net

C.

TransNet

D.

P-2-P

Full Access
Question # 22

OSPFV2 is an IGP running on an IPv4 network; OSPFV3 is an IGPo running on an IPv6 network. The basic working mechanism of OSPFv3 is the same as that of OSPFV2, such as the election of DR and B, DR. As shown in the figure, an engineer uses 3 routers to test IPv6 services. He wants to realize the interconnection of IPv6 networks by running OSPFV3.

Pass. Which of the following statements about the election of the network DR is correct?

A.

After the network converges, engineers modifyR1the priority is100,R2the priority is10,R3Keep the default value. When the network converges again,R1forDR, R2forB, DR

B.

After the network converges, a new device is added to the broadcast linkR4,R4the priority is150. When the network converges again,R4forDR

C.

After the network convergesR1Power off and restart, when the network converges again,R3forDR

D.

After the network converges,R1forDR

Full Access
Question # 23

In the absence of a header, the Domain ID of each OSPF process running on the router and the process ID of the process

Be consistent and can be modified under the process through the domain-id command

A.

True

B.

False

Full Access
Question # 24

A campus deploys both IPv4 and IPv6 networks for service testing, and runs IS-IS to realize network interconnection. The IS-IS routing protocol has good scalability and is widely used in the existing network. Which of the following statements is true about IS-IS scalability?

A.

IS-ISuseTLVstructure builds the message so thatIS-ISMore flexibility, flexibility and scalability

B.

forIS-ISIn terms of adding new features, only adding newTLVJust

C.

IS-ISto supportPV6to addTLVcarryPv6Address information

D.

N LPIDYesIS-ISto supportIPv6an addedTLV

Full Access
Question # 25

What are the wrong statements about OSPF's Router LSA and Network LSA?

A.

runDSPFThe router must generateNetwork LSA

B.

runOSPFThe router must generateRouter LSA

C.

OSPFmust exist in the networkRouter LSAandNetwork LSA

D.

Network LSA, Carry both topology and routing information

Full Access
Question # 26

On the OSPFv3 network shown in the figure, the IPv6 address of Loopback0 on R3 is 2000-3/128, and OSPFv3 is enabled. Which of the following statements are true?

A.

R2 definitely generates a Link-LSA.

B.

The Link-LSA generated by R2 does not exist in the LSDB of Rl.

C.

Rl definitely generates a Network-LSA.

D.

R3 definitely generates an Intra-Area-Prefix-LSA.

Full Access
Question # 27

As shown in the figure, the network has a loop because STP is not enabled. Which of the following phenomena may be bowed?

A.

Hostreceive a large number of broadcasts

B.

The device will generate a loop alarm

C.

equipmentCPUOccupancy is too high

D.

MA, CAddress table flapping

Full Access
Question # 28

the configuration file of the device. Is the following statement D wrong?

A.

Regardless of whether the device is configured with apricotBPDU Tunnel,neither will be correctMSTPmake an impact

B.

Port connected to user terminal equipmentMSTPWhether it is disabled or configured as an edge port

C.

Check port configuration to confirm enableMSTPWhether the port is enabled with the protocol packet sending command. Such as:bpdu enable

D.

Check if the port is added to the correct oneWLAN

Full Access
Question # 29

A campus deploys OSPF to implement network interworking. The LSDB of R2 is shown in the figure. From this LSDB. it is possible to

What information was obtained?

A.

ArealNone inType3 LSA. maybeR2in the area1In the correct directiontype3 LSAfiltered

B.

Area 1forNSSAarea

C.

R2WillType7 LSAThe default route is converted toType5 LSAdefault route for

D.

R2existOSPFThe default route is delivered in the process

Full Access
Question # 30

As shown in the figure, the operator's BGP/MPLS IP VPN backbone network builds SP through DP. If you want to implement user X

If the two sites communicate through the BGP/MPLS IPVPN network, PE1 and PE2 must use a 32-bit masked loopback interface address to establish an MP-IBGP peer relationship.

A.

True

B.

False

Full Access
Question # 31

About the site in the BGPIMPLS IP VPN network architecture. Which of the following descriptions is correct?

A.

in any case, belong to the sameVPNDifferent sites on the

B.

through the sameCETerminals connected to the operator's network may belong to different sites(MCE)

C.

site is a groupIPsystem, a network of hosts cannot be called a site

D.

The two geographically separated networks must belong to different sites

Full Access
Question # 32

As shown in the figure, Sitel and Site2 need to achieve mutual access through the operator's BGP/MPLS IPVPN. A known

The public network tunnel between PE1 and PE2 has been established (the label information is shown in the figure), and PF1 has

The 192.168.1.0/24 network segment route is advertised to PE2 through the MP.JIBGP neighbor relationship, and the route learning is normal. When grabbing between P and PE1, when Site2 accesses the 192.168.1.0/24 data of Sitel, the outermost label

What should the sign be?

FEC In/Out label

1.1.1.1/32 6662/3

A.

6661

B.

C.

6662

D.

8888

Full Access
Question # 33

What is the LSA whose flooding range is the entire autonomous system in SPFV3?

A.

Link-LSA

B.

As-external-LSA

C.

Inter-Area-Prefix-LSA

D.

Intra-Area-Prefix-LSA

Full Access
Question # 34

On the OSPFv3 network shown in the figure, OSPFv3 is enabled on the interfaces connecting R1, R2, and R3. The router ID of each router is 10.0.X.X, where X is the number of the router. If you check detailed information about an LSA on R3, the command output shows that the LSA is generated by R2 and describes the IPv6 prefix address associated with the Router-LSA.

A.

TRUE

B.

FALSE

Full Access
Question # 35

The OSPF protocol is run between CE and PE, when CE1 advertises the route of its site to CE2. Which of the following descriptions is incorrect?

A.

whenPE2receivePE1sentBGProutedDomain IDcorrect for all when different from localLSA.

PE2will generateType5LSAorType7 LSA

B.

whenPE2receivePE1sentBGProutedDomain IDWhen the same as local, forTypel LSAandType2LSA. PE2will generateType3 LSA

C.

whenPE2receivePEIsentBGProutedDomain IDSame as local forType3 LSA.

PE2will generateType5 LSA

D.

PEIconfiguredDomain IDcan be used asBGPThe extended community attribute of is sent with the route toPE2

Full Access
Question # 36

BFDLink state detection at the heart (millisecond) level can be achieved.

A.

right

B.

wrong

Full Access
Question # 37

In OSPF, the A, BR will convert all type 7 L SAs in the NSSA area to type 5 L SAs.

A.

True

B.

False

Full Access
Question # 38

On the network shown in the figure, EBGP peer relationships are established between neighboring routers through directly connected interfaces. The AS number is 6500X, where X is the number of the router. Both Rl and R4 have static routes to 192.168.1.0/24, which are imported to BGP through the import-route command. By default, in the routing table of R3, which of the following is the AS_Path attribute carried in the route to 192.168.1.0/24?

A.

65002, 65001

B.

65002, 65005, 65004

C.

65006, 65005, 65004

D.

65006, 65005, 65004, 65001

Full Access
Question # 39

Which of the following statements about LDP Label Retention - Free Way is true:

A.

Requires more memory and tab space

B.

Keep all labels distributed by neighbors

C.

Only keep labels from next-hop neighbors and discard all labels from next-hop neighbors

D.

Save memory and label space

Full Access
Question # 40

A campus has deployed IPv6 for service testing. There are 4 routers (R1, 22, R3 and R4) in this network, running 0SPFV3 to realize the interconnection of IPv6 network. A new router R5 needs to be connected to the network for testing. An engineer introduces a direct route in the OSPFVV3 process of R4 so that devices in the campus network can access the GE0/0/1 port address of R5. Which of the following statements about the scene is true of?

A.

R2will generate aType4 LSAonly inArea 0internal flooding

B.

R4will generate aType5 LSAdescribe bowIenteredIPv6routing prefix

C.

R2will generate aType4 LSAdescribeR4ofRouter ID

D.

R4will generate aType5 LSAonly inArea 1internal flooding

Full Access
Question # 41

As shown in the figure, SF is enabled on all interfaces of the router, the cost value of the link is marked in the figure, and the Loopback0 interface of R2 is advertised in area 1, then the cost value of R1 reaching 10.0.2.2/32 is?

A.

100

B.

150

C.

50

D.

200

Full Access
Question # 42

The following description of TL in PLSHeader is correct:

A.

Limit the LSR

B.

Control of upstream equipment for label distribution

C.

Similar to the TTL in the IP header, it is used to prevent packet loops

D.

To control label distribution

Full Access
Question # 43

According to the configuration shown in the figure below, you can know that R4 has an interface advertised into IS-IS?

A.

1

B.

3

C.

2

D.

0

Full Access
Question # 44

On the 05PFv3 network shown in the figure, each interface of R1 and R2 has two IPv6 addresses. Although the IPv6 address prefixes of R1 and R2 are different, they can still be used to establish an OSPFv3 neighbor relationship. If R2 is the DR, the Intra-Area-Prefix-LSA generated by R2 contains four prefixes.

A.

TRUE

B.

FALSE

Full Access
Question # 45

A campus has deployed IPv6 for service testing. There are 4 routers in the network, running 0SPFv3 to implement IPv6 network interconnection. As shown in the figure, an engineer checked the LSDB of R2 and intercepted one of the Link-LSAs. Which of the following statements is true about the description of this LSA?

A.

The router that generates this LSA is R2 port R2 connected

B.

IPv6 address prefix for GEO/0/0: 2001:DB8:2345:23::/64

C.

The link-local address of R2 interface GEO/0/0 is: FE80::2E0:FCFF:FEC, D:4F79

D.

The SA shows 2 does not support external routing, but participates in IPv6 routing calculation

Full Access
Question # 46

There is the concept of forwarding equivalence class FEC in MPLS. The following description is wrong:

A.

MPLSGrouping packets with the same forwarding processing method is calledFEC

B.

a forwarding equivalence classFECA unique label value is assigned on all routers

C.

sameFECgrouped inMPLSThere will be different processing in the network

D.

FECThe division is very flexible. Can be the source address, and the address, source port, destination port, protocol type or

VPNEqual to any combination of division basis

Full Access
Question # 47

To protect a device against the attacks of forged BGP messages, you can configure GTSM to check whether the TTL value in the IP message header is within the specified range. If the peer x.x.x.x valid-ttl-hops 100 command is configured on a device, the valid TTL value range of the detected message is [155, 255].

A.

TRUE

B.

FALSE

Full Access
Question # 48

When deploying MPLS/BGP IP VPN, which of the following descriptions is wrong about using BGP to exchange routing information between PEs and CEs?

A.

existCEIn the case of multi-homing, enableBGP ASThe number substitution function may cause routing loops that can be passed throughBGP SoDpreventVPNIntra-site routing loops

B.

whenPEandCEbetweenBGPWhen exchanging routing information, if twoVPNThe autonomous system the site is in uses the same privateASnumber, can be passed throughASThe number replacement function is to use any specifiedASreplace the received private network route with theASnumber to preventASRoutes are discarded due to duplicate numbers

C.

existHub&Spokescene, whenHub-CEandHub-PEuseIGPTimeSpoke-PEandSpake-CEcannot makeEBGP

D.

whenPEandCEbetweenBGPWhen exchanging routing information, you do not need toPEPerform private network route import on theBGPoperation

Full Access
Question # 49

The figure shows the LSP information of R1 and R3 on an MPLS network. An administrator runs the ping -a 1.1.1.1 3.3.3.3 command on R1. Given this, which of the following statements is true?

A.

The Echo Request packet received by R2 carries label 1025, and the Echo Reply packet received by R2 does not carry any label.

B.

The Echo Request packet received by R2 carries label 1025, and the Echo Reply packet received by R2 carries label 1024.

C.

Both the Echo Request and Echo Reply packets received by R2 do not carry any label.

D.

The Echo Request packet received by R2 does not carry any label, and the Echo Reply packet received by R2 carries label 1024.

Full Access
Question # 50

How many bits are there in the label field of PLS?

A.

1

B.

8

C.

3

D.

20

Full Access
Question # 51

From this picture, we can judge

A.

R1ofGE0/0/1definitely haveLevel-2ability

B.

R1ofGE0/0/0definitely haveLevel-2ability

C.

R1definitely existsLevel-2ofLSDB

D.

R1have2indivualIS-ISNeighbor

Full Access
Question # 52

As shown, all routers run OSPF. Which of the following statements is correct?

A.

R2in the area1and area0will generateRouter LSA

B.

R2WillR3GeneratedRouter LSAforward toR1

C.

R2WillR1GeneratedRouter LSAforward toR3

D.

R2only in area0generated inRouter LSA

Full Access
Question # 53

LDP messages are exchanged between LSRs running the LDP protocol. LDP messages can be divided into four types according to their functions. Which of the following is not a message type of LDP?

A.

discovery message

B.

announcement message

C.

conversation message

D.

label exchange message

Full Access
Question # 54

As shown in the figure, OSPF is deployed in a campus, and Area 1 is deployed as an NSSA area. In the case of missing header, R2 will automatically generate a missing header route of Type 7 LSA and flood it in the NSSA area

A.

True

B.

False

Full Access
Question # 55

On the OSPFv3 network shown in the figure, area 1 is a stub area. Which of the following statements are true?

A.

Default routes exist in the routing tables of R1 and R2.

B.

Both R1 and R2 generate Network-LSAs.

C.

Both R1 and R2 generate Inter-Area-Prefix-LSAs.

D.

Both R1 and R2 generate Intra-Area-Prefix-LSAs.

Full Access
Question # 56

A network engineer enters dir on the device to obtain the following file names. Which is most likely to be the version file of the device?

A.

V300R022C00SPC100.cc

B.

startup_vl.rdb

C.

Ca.cer

D.

V300R022C00SPC100.cfg

Full Access
Question # 57

If the temperature of the device is found to be too high, it can be concluded that the fan has failed

A.

True

B.

False

Full Access
Question # 58

Regarding BGP/MPLS IPVPN routing interaction, which of the following descriptions is wrong?

A.

ExportPEable to passBGP,IGPor static routing to the remoteCEsendIPv4routing

B.

ExportPEupon receiving the entrancePEpostedVPNv4After routing, according to the route carriedRTproperty, yes

VPNv4route to filter

C.

PEandCEthe interaction isIPv4routing information

D.

EntrancePEwill be fromCEreceivedIPv4route becomesVPNv4routing, and vary according toVPNsave the instance

Full Access
Question # 59

In addition to virtual connections, what type of IPv6 address is the source IPv6 address of OSPFv3's Hello text?

A.

IPv6anycast address

B.

unique local address

C.

Global Unicast Address

D.

link-local address

Full Access
Question # 60

Part of the configuration of R1 is as follows. Which statement about OSPF on R1 is correct?

ospf 1 router-id 172.16.1.1

area 0.000

network 10.1.12.1 0.0.0.0

network 10.1"3"0.0.0.0

network 172.16/1 1 0.0.0.0

ospf 2 vpn-instance tt

area QQO.O

network 10J J 1 0.000

A.

VRF ttThe routing information will appear inOSPFprocess1in the routing table

B.

process1and process2ofOSPF LSD8within its areaLSAinconsistent

C.

process1and process2ofOSPF-LSDBits area0InsideLSAexactly the same

D.

VRFttThe routing information will not be available nowOSPFprocess1in the routing table

Full Access
Question # 61

Deploying port isolation technology in Ethernet can realize Layer 2 intercommunication and Layer 3 isolation, making networking more flexible.

A,correct

B,mistake 

Full Access
Question # 62

There are multiple types of MAC address entries on a switch. Which of the following entries are manually configured and cannot be aged out?

A.

MUX MAC address entries

B.

Static MAC address entries

C.

Dynamic MAC address entries

D.

Blackhole MAC address entries

Full Access
Question # 63

Configured on an interface: isis timer hello 5 level-2, which of the following statements is correct?

A.

the interfaceLevel-2ofhelloThe packet sending interval is5s

B.

the interfaceLevel-1andLeva 1-2ofhell. The packet sending interval is3s

C.

the interfaceLevel-2ofCSNPThe packet sending interval

Full Access
Question # 64

During an attempt to log in to a NetEngine AR6120 through the console port, the network engineer finds that the password is incorrect and the login fails. If a Telnet account can be used to log in to the device and the account has the permission to change the console port password, the network engineer can log in to the device through Telnet to change the console port password.

A.

TRUE

B.

FALSE

Full Access
Question # 65

Please pair the following DHCP attack types with corresponding explanations.

A.

DHCPstarvation attack-3 DHCPPhishing attack man-in-the-middle attack-2 DHCPPacket flood attack-4

B.

DHCPstarvation attack-2 DHCPPhishing attack-3man-in-the-middle attack-1 DHCPPacket flood attack-4

C.

DHCPstarvation attack-1 DHCPPhishing attack-3man-in-the-middle attack-2 DHCPPacket flood attack-4

D.

DHCPstarvation attack-4 DHCPPhishing attack-3man-in-the-middle attack-2 DHCPPacket flood attack-1

Full Access
Question # 66

Which of the following reasons may cause the hosts in the same--VLAN LAN to fail to communicate with each other

A.

port isolation is configured on the switch

B.

the wrong port is configured on the machine, andMA, Caddress binding

C.

interface is artificialshutdownor the physical interface is damaged

D.

switchMA, Caddress learning errors

Full Access
Question # 67

On the network shown in the figure, IS-IS runs on R1, R2, R4, and R5, and the area ID is 49.0001. IS-IS runs on R3 and R6, and the area ID is 49.0002. The import-route isis level-2 into level-1 command is configured on R2 and R5. In AS 65000, R1, R3, R4, and R6 each establish IBGP peer relationships with R2 and R5. R2 and R5 are RRs, and R1, R4, R3, and R6 are clients. The IBGP peer relationships are established using Loopback0. The IP address of Loopback0 on each router is 10.0.X.X/32, and the router ID is 10.0.X.X, where X is the number of the router. R1 and R4 import the external route 192.168.1.0/24 to BGP through the import-route command, and R3 and R6 import the external route 192.168.2.0/24 to BGP through the import-route command. Which of the following statements are true?

A.

The routing table of R4 contains two equal-cost default routes.

B.

The route 192.168.2.0/24 in the routing table of R4 has two different outbound interfaces.

C.

The routing table of R1 contains the route 192.168.2.0/24.

D.

The routing table of R1 contains two equal-cost default routes.

Full Access
Question # 68

Assuming that the neighbor relationship between BGP routers has been established successfully, the configuration on R1 is shown in the figure. ask for R1

Which router can the route entry 10.10.10.0/24 be delivered to the farthest?

AS 200

bgp 100

peer 13.X3 as-number 300

peer B3.33 connect * interface LoopBackO peer 3.33.3 route-policy COMMUNITY e»porx peer 3333 next >hop-local

peer Xl.3.3 advertise-cofnmunity

network 10.10.T0.0 24

route^poktcy COMMUNITY permit node 10 prefix COMMUNITY spply cocYWTUiiMty route-policy COMMUNITY permit node 20 «p ip prefix COMMUNITr index 10 permit

A.

R1

B.

R2

C.

R3

D.

R4

Full Access
Question # 69

IPSG is a source IP address filtering technology based on Layer 3 interfaces. It prevents malicious hosts from forging authorized hosts' IP addresses to access authorized network resources.

A.

TRUE

B.

FALSE

Full Access
Question # 70

Which of the following are advantages of VLAN aggregation?

A.

decreasedIPwaste of address

B.

added availableM LANquantity

C.

Increased addressing flexibility

D.

accomplishSub-VLANIsolation between broadcast domains

Full Access
Question # 71

BFD for OSPF refers to the association of BFD with OSPF to speed up OSPF's response to network topology changes. The OSPF neighbor relationship can enter the Full state only after the BFD session goes up. The OSPF neighbor relationship can go down only after the BFD session goes down.

A.

TRUE

B.

FALSE

Full Access
Question # 72

For high reliability purposes, the following LDP messages are transmitted through TCP: discovery messages, session messages, advertisement messages, and notification messages.

A.

TRUE

B.

FALSE

Full Access
Question # 73

MPLS is called Multi-Protocol Label Switching. Regarding the label description in MPLS, the correct one is:

A.

MPLSThe system has a variety of label publishing protocols, such asLDPis a label publishing agreement

B.

Labeled byMIPLSheader of messageBIt has global significance, that is, the label values of all routers cannot be repeated.

C.

A label is a fixed-length identifier with only local significance, which is used to uniquely identify the group to which a group belongs.FEC

D.

MPLSSupports single-layer labels as well as multi-layer labels

Full Access
Question # 74

If the BFD session goes down, the direct link will fail.

A.

True

B.

False

Full Access
Question # 75

R1 executes the operation ping -a lO.l.Ll 10.5.16.2, what is the meaning of this command?

A.

pingpackage sourceIPaddress isR1any direct interface address of

B.

pingpackage sourceIFPaddress isR1direction10.5.16.2the optimalIPThe outgoing interface address of the route, and is not

10.1.1.1

C.

pingpackage sourceIPaddress is10.1.1.1

D.

pingPurpose of the packageIPaddress is10.1.1.1and10.5.16.2

Full Access
Question # 76

Which of the following is not a hardware preparation for cutover?

A.

Test the operation of the board

B.

Power-on test

C.

Device version check

D.

Cable Continuity Test

Full Access
Question # 77

As shown in the figure, an engineer uses 4 routers to test branch network interoperability. Among them, R1, R2, and R3 in branch 1 deploy OSPF to implement network interoperability. R2, R3, and R4 in branch 2 deploy IS-S to implement network interoperability. Now the engineer wants to implement R1 to access the loopback interface address of R4. Which of the following operations can meet this requirement?

A.

existR2ofOSFFprocess neutralizationIS-ISDuring the process, the default route is advertised separately

B.

No configuration required

C.

only atR2ofIS-ISDuring the process, the default route is advertised

D.

only atR2ofOSPFDuring the process, the default route is advertised

Full Access
Question # 78

A company consists of a head office and two branch offices, and uses MPLS VPN technology to transmit private network routes. In the networking mode of HuB&Spoke. Branches can only send and receive routes to and from the head office, and branches cannot directly send and receive routes to each other. In order to achieve the above requirements, which of the following schemes can the setting of RT be?

A.

head office:Import Target 12:3; Export Targetr 3:12OBranchl:Import Target,3:12;Export Target 12:3OBranch2:Import Target: 3:12: Export Target: 12:3

B.

head officeImport Target:l:l;Export Target: 3:3OBranchl:Import

Targeta:3:3;Export Target: l:loBranch2:Import Target: 3:3; Export Target:2:2

C.

head office:Import Target 1:1, 2:2;Export Target: 3:3OBranchl:Import Target:3:3;

Export Target: l:loBranch2:ImportTarget:3:3; Export Target:2:2

D.

head office:Import Target: 2:2;Export Target:3:3oBranchl:Import Target:

3:3.Export Target: l:loBranch2:ImportTarget: 3:3; Export Target.2:2

Full Access
Question # 79

In the DU label distribution mode, if the Liberal retention mode is adopted, the device will retain the labels distributed by all LDP peers, regardless of whether the LDP peer is the optimal next hop to the destination network segment.

A.

True

B.

False

Full Access
Question # 80

Which of the following statements about MUX VLANs are true?

A.

eachGroup VLANmust bind aPrincipal VLAN

B.

Separate VLANscan andMUX VLANall withinVLANcommunication

C.

eachSeparate VLANsmust bind aPrincipal VLAN

D.

Principal VLANcan andMUX VLAIall withinVLANcommunication

Full Access
Question # 81

0SPFV2 is an IGP running on an IPv4 network; 0SPFvV3 is an ICPO running on an IPv6 network the packet types of OSPFV3 and OSPFV2 are the same, including .Hall. message, DD message, LSU message, LSU packets and SAck packets. Which of the following statements is correct about 0SPFV3 packets?

A.

0SPFv3Complete packet authentication using the authentication field in the packet header

B.

OSPFV3The link-local address is used as the source address of the sent packet, and the packet can be forwarded outside the range of the originating link

C.

OSPFv3useIPv6multicast addressFFO2::5heheFFO2:.6sendOSPFv3message

D.

0SPFV3ofHelloThe packet carries the router interfaceIPv6address prefix list

Full Access
Question # 82

The rules of RR advertising routes violate the rules of IBGP split horizon, so it may cause loops in the AS

road. Which routing attributes does RR use to prevent loops?

A.

Cluster List

B.

Originator ID

C.

Nexthop

D.

AS-PATH

Full Access
Question # 83

Since BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors.

The routing policy deployed between IBGP neighbors is invalid.

A.

True

B.

False

Full Access
Question # 84

From this picture, we can judge

A.

If not configured aboutAS_Pathrouting strategy, then3002:-4/128 —must not originate fromAS

65001

B.

R1does not have3002:3/128and3002.-4/128routing

C.

R1have3002.-3/128and3002:.4/128routing

D.

If not configured aboutAS_Pashrouting strategy, then3002:4/28must have originated fromAS 65001

Full Access
Question # 85

On the network shown in the figure, EBGP peer relationships are established between neighboring routers through directly connected interfaces. The router ID of each router is 10.0.X.X, and the AS number is 6500X, where X is the number of the router. Both Rl and R4 have static routes to 192.168.1.0/24, which are imported to BGP through the import-route command. R3 is configured with the peer y.y.y.y as-path-filter 1 import command for all peers. Which of the following sets of commands enables R3 to select the route with the longest AS_Path to 192.168.1.0/24?

A.

jp as-path-filter 1 deny .*6500 ip as-path-filter 1 permit .*

B.

ip as-path-filter 1 deny A65002 ip as-path-filter 1 deny A65005 ip as-path-filter 1 permit .*

C.

ip as-path-filter 1 permit .* ip as-path-filter 1 deny 65001s ip as-path-filter 1 deny A65005

D.

ip as-path-filter 1 deny 65001s ip as-path-filter 1 permit .*

Full Access
Question # 86

According to this picture, cooked I'] can be judged?

A.

R1ofGE0/0/1Interface is not enabledIS-IS IPv6

B.

R1ofGE0/0/1interfaceIS-ISThe interface type isLeve-1

C.

R1ofGEO/O/OinterfaceIS-ISThe interface type isLevel-1-2

D.

R1ofGEO/O/Ointerface is enabledIS-IS IPv6

Full Access
Question # 87

Which of the following statements about the OSPFV3 packet format is correct?

A.

HelloPackets no longer carry address informationInterface ID

B.

OSPFversion number from2became3

C.

removedAuthentication,AuthTypefield

D.

HellotelegramoptionNo changes to the field

Full Access
Question # 88

As shown in the figure, OSPF is enabled on all interfaces of the router, in which R4 and R5 can establish OSPF virtual connections.

A.

True

B.

False

Full Access
Question # 89

As its network scale expands, an enterprise plans to move scattered servers to the same equipment room for unified management. During hardware migration, network engineers do not need to perform device commissioning and therefore do not need to work out a migration solution.

A.

TRUE

B.

FALSE

Full Access
Question # 90

What is wrong with this configuration description is:

[Huawei]dhcp enable

[Huaweijinte GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0/1 ]dhcp option82 insert en [Huawei-GigabitEthernet0/0/1 ]dhcp snooping enable [Huawei-GigabitEthernet0/0/1]dhcp snooping trusted

A.

ifGigabitEthemnetOIO/1received by the interfaceDHCPIn the request message, there is noOption82of

SutOptioninformation, the device will generateOption82,and insert it into the message

B.

turn onDHCP Snoopingconfiguration can be used to preventDHCP ServerCounterfeiter Attack

C.

configureGigabitEthernetO/0/lThe interface is a trusted interface

D.

turn onDHCP Snoopingconfiguration can be used to preventARPspoofing attack

Full Access
Question # 91

In the VLAN aggregation technology, multiple Sub-VLANs are used to isolate wide-open domains, and these Sub-VLANs are aggregated.

Synthesizing a logical Super-VLAN, a company divides different departments into different Sub-VLANs, because

Sub-VL AN not only includes physical connection, but also can establish three-layer VLAN ANIF interface, which can directly carry out three-layer communication with external network.

A.

True

B.

False

Full Access
Question # 92

What characteristics must a high-risk operation plan have?

A.

with verification

B.

Strong operability

C.

accurate

D.

can return

Full Access
Question # 93

In intra-domain MPLS VPN networks, data packets will be encapsulated with two layers of MPLS when they enter the public network and are forwarded.

Label, a description of the two-layer label in the following options. What is wrong is:

A.

MPLS VPNThe outer label is made byLDPprotocol or statically assigneD. the inner label is assigned by the correct end

MP-BGPassigned by neighbors

B.

By default, the outer label is popped before the packet is forwarded to the last hop device

C.

M PLS VPNThe outer layer is labeled as a private network label, and the inner layer label is called a public network label.

D.

Layer labels are used inPEThe device sends the packet correctly to the correspondingVPNmiddle

Full Access
Question # 94

Which of the following statements about 1S-IS (IPv6) is true?

A.

to supportIPv6Processing and counting of routesBJS-ISexist129 TLVadded inNLPID

B.

IS-ISWorking at the data link layer only needs to add newTLVready to supportPv6

C.

to supportIPv6Processing and calculation of routesIS-ISnewly addedTLV232236

D.

by defaultJS-ISTurn on the multi-topology feature

Full Access
Question # 95

Service routes of an enterprise are transmitted on the network. Some configurations of PE1 and PE2 are shown in the figure. Which of the following LSAs may CE2 receive?

A.

Type 5 LSA

B.

Type 1 LSA

C.

Type 3 LSA

D.

Type 7 LSA

Full Access
Question # 96

An interface of a switch is in error-down state. A possible cause is that the average rate of broadcast packets received by the interface exceeds the upper threshold set by the administrator for storm control.

A.

TRUE

B.

FALSE

Full Access
Question # 97

CutoverThe previous information collection can be used to determine whether the services before and after the cutover are normal.

A.

right

B.

wrong

Full Access