Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

H12-891_V1.0 Questions and Answers

Question # 6

Huawei's SDN controller using VXLAN technology is fixed?

A.

Agile Controller-Campus

B.

Agile Controller-WAN

C.

Agile Controller-DCN

Full Access
Question # 7

What's wrong about vrrp timers is ?

A.

MASTER DOWN = (3*ADVER_ INTERVAL) + Skew_ time

B.

Skew Time= (255-Priority)/255

C.

By default, the time period for VRRP advertisement messages is 2 seconds

D.

By default, the VRRP preemption delay is I seconds

Full Access
Question # 8

In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of the router's links, as well as the RouteriD of the neighbor router.

A.

True

B.

False

Full Access
Question # 9

HW users are transferring a very large number of files via TFTP. What protocol does TFTP rely on for transmission?

A.

ICMP and UDP

B.

IP ?TCP

C.

UDP

D.

NFS E. FTP

Full Access
Question # 10

There are two Communily filters: ip comimuniy-lite lpemit 101201 ip community fiter 2permit101 ip commmuriyfilter 2pemit21 Regarding the above ommuniyfiter, the correct description is ?( Multiple choice questions).

A.

As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the BGP route matches the community-filterl

B.

As long as the group attribute value carried in the BGP route contains 100:1 or 200:1, or both, the BGP route matches community-filter2

C.

The BGP route matches community-filter 1 only if the community attribute values carried in the BGP route contain 100:1 and 200:1

D.

A BGP route matches community-filter2 only if the group attribute values carried in the BGP route include 100:1 and 200:1

Full Access
Question # 11

Router HW cannot access hosts in the remote network, router HW runs routing protocols and only pings the remote file server address 105401 on router HW with extensions through a default route remote network , the result of ping on the router HW is rendered as 'requ.' est time out', according to the above description, the error in the following analysis is ?

A.

The next hop router for router HW did not reach the destination address

B.

Router HW does not have a legitimate router to reach the destination address

C.

Ping is successful, but congestion occurs on the path to the destination address

D.

There is a firewall in the remote destination network, and the destination address can be reached without releasing ICMP traffic E. ICMP packets, but the destination device fails to reply

Full Access
Question # 12

In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?( Single choice questions).

A.

Register mechanism

B.

BSR/RP mechanism

C.

Assert mechanism

D.

Join/Prune mechanism

Full Access
Question # 13

The following statement about isis a route leak of ISIS is correct?

A.

Route leaks for ISIS must be deployed on Level-1 routers

B.

Route disclosure for ISIS is turned on by default.

C.

Route disclosure for ISIS avoids suboptimal paths.

D.

Route leaks for ISIS can only be applied to IPv4 environments.

Full Access
Question # 14

Host HW1 in the HW device network Wants to join a video conference, so what does that host do?

A.

Sends an IGMPv2 membership report to the default router unicast of the local network

B.

Sends a unicast IGMPv2 membership report to the RP

C.

The IGMPv2 membership report is sent over multicast in the local network, and the multicast address carried in the IGMPv2 membership report is the multicast address that you want to join

D.

The IGMPV2 membership report is sent over multicast in the local network, and the destination multicast address of the IGMPv2 membership report is "All PIM Routers" 224002 Multicast address

Full Access
Question # 15

The following description is correct regarding route control

A.

IBGP routes can be introduced using the impot-route BGP command

B.

AS-path-fiter is for AS-path, which affects the routing of paths.

C.

OSPF, ISIS, and BGP can issue default routes.

D.

In Node 10, if-match community-fiter1 and f-match as-pah-fiter1 are "and the relationship

Full Access
Question # 16

Which of the following routing tools is unique to BGP?

A.

Route-policy

B.

ACL

C.

IP-prefix

D.

AS-path-filter

Full Access
Question # 17

?BGP4+?,Update ????M IP_R EACH_NLRI ?????next hop network address ????? ?

A.

It can be just link-local address

B.

Can only be a link-local address

C.

You can carry a link-local address and a global unicast address

D.

at the same time Can only be a global unicast address

Full Access
Question # 18

If you need to configure routing policies on one router. Which of the following parameters does an administrator use to route when deploying a routing policy?( Multiple select).

A Protocol B. Application

C. Size of the packet D. Throughput

E. Identification of a specific terminal system

Full Access
Question # 19

An advanced access control list is a sequence of rules consisting of permit |deny statements that can match IP messages based on which attributes ?(). Multiple select).

A.

Destination port number

B.

Source address

C.

Destination address

D.

Source port number

Full Access
Question # 20

A router receives a BGP route with the community attribute NO-Export , how will the router handle the BGP route?

A.

Drop the route directly.

B.

No more advertising to other BGP routers.

C.

Advertise only to IBGP neighbors.

D.

The route is advertised normally, but the route is not used to forward data.

Full Access
Question # 21

Regarding the BGP alliance, the following description is wrong? Radio

A.

The consortium divides an AS into sub-AS, and the alliance external AS still considers the consortium to be an AS

B.

Subsystems within a consortium can use private AS numbers. Huawei NE/AR routers, a consortium can be configured with up to 32 subsystems.

C.

Consortium can easily detect the routing loop within the AS because EBGP is running between the subAS

D.

The subas number of the federation, which by default is advertised to the BGP peer outside the federation

Full Access
Question # 22

Is the following correct statement for the VXLAN message?

A.

The outer destination IP address is the IP address of the VTEP at the far end of the VXLAN tunnel

B.

The source UDP port number is 4789

C.

The destination UDP port number is 4789

D.

VNI has 24 T bits to distinguish the VIAN segment

Full Access
Question # 23

The following statement about the Security Alliance SA in IPSec is wrong with ?

A.

SA is uniquely identified by a triple that includes the Security Parameter Inder ,Security Parameter Inder), the source IP address, and the Security Protocol Number (ASESP) used

B.

Use the display ipsec command to view information such as the encryption method used with another IPSEC peer, the traffic of interest, and so on.

C.

IPSec only supports encrypting data using the pair encryption algorithm.

D.

IpSec peers must be at a two-way SA to establish an IPSec VPN connection to

close

Full Access
Question # 24

In SSM, what version of IGMP is required?

A.

IGMPV3

B.

IGMPV4

C.

IGMPV2

D.

IGMPV1

Full Access
Question # 25

The following description of LDP reliability is incorrectly ?( Radio).

A.

LGP GR takes advantage of the high difference between the LS forwarding plane and the control plane to realize that the device forwards without interruption when the protocol is restarted or the master-standby is reversed

B.

Manually configured LDP FRR policies default to 32-bit backup routes that trigger LDP to establish backup LSPs

C.

LLDPFRR also allows LSPs to be generated for tag mappings from non-optimal next hops, and as a live LSP backup, supervising forwarding table entries

D.

LDP and IGP linkage, the need for IGP has been routed to release, to ensure that LDP and LGP path consistent

Full Access
Question # 26

Which IPV6 address would you ping to confirm that OSPFv3 is capable of pastoring unicast messages over the link?

A.

Site local Multicast

B.

Anycast Address

C.

Global Address of the link

D.

Unique Local Add

E.

Link Local Address

Full Access
Question # 27

Regarding BGP MED, which of the following descriptions is correct?

A.

In the BGP routing rules, MED has a lower priority than AS Path, Praferred-value, Local-Preference, etc Origin

B.

The default value for the B. BGP routing MED is 0

C.

By default, if there is no MED value in the route attribute, it is processed by 0 If the bestroute med-none-as-maximum command is configured, MED is processed as the maximum 4294967295

D.

By default, BGP routing rules can MED comparison of routes from different autonomous systems

Full Access
Question # 28

A company's two-layer phase network architecture as shown in the figure, when the engineer is configured to find that the business between departments can not communicate, through the command to view the status of the equipment as follows, please determine the possible causes?

A.

The BPDU interval between switches is not configured

B.

The Transition VLAN mapping between the handover machines is not configured to be caused

C.

The Revislon Level configuration is inconsistent between switches

D.

Inconsistent Registry Name configuration between text exchange machines

Full Access
Question # 29

The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration

A.

[Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quit

B.

[Qudway ineface gigabtethemnet /0'1

[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit

C.

Quidway inteface gigabiethenet ou0/1

[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut

D.

[Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20

E.

[Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit

Full Access
Question # 30

Is the following description of ospf virtual links correct?

A.

A virtual connection can be established in any area, after which it itself belongs to the region

B.

The virtual connection ip is used as the link address

C.

Virtual links can be used to solve the problem of zone 0 being segmented

D.

The cost of a virtual connection is zero and is the optimal link

Full Access
Question # 31

The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).

A.

The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.

B.

IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.

C.

IPv6 Over VLANs do not generate ND table entries.

D.

IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.

Full Access
Question # 32

The following statement about is the ISIS protocol LSP message is correct

A.

LSP fast diffusion feature, first diffuse less than the specified number of LSPs, to speed up the synchronization process of LSDB

B.

By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based on the frequency of changes in routing information

C.

When the link status information increases, the message length of the LSP can be increased so that each LSP can carry more information.

D.

Reducing the minimum time interval for sending LSPs per port can speed up the diffusion of LSPs.

Full Access
Question # 33

The value of OSPF and BFD linkage is ? Radio

A.

Any change in BFD status is realized by detecting the BFD at the millisecond level, which correlates the OSPF state and realizes the purpose of OSPF rapid sensing link state

B.

Does not affect OSPF neighbor status

C.

BFD packet transmission interval can reach the 100-second level, which is slower than the OSPF induction link state

D.

OSPF's hello send interval is seconds, which is faster than BFD inductive link state

Full Access
Question # 34

Traditional BGP-4 can only manage IP4 unicast routing information, and MP-BGP extends BGP-4 to provide support for multiple network layer protocols. Among them, MP-BGP's support feature for IPv6 unicast networks is called BGP4+, BGP4+ via NextHop The route next hop address information is carried by the attribute.

A.

TRUE

B.

FALSE

Full Access
Question # 35

To build a loopless Layer 2 network, which of the following schemes is optimal?( Single Choice)

A.

Stacking + Link Aggregation

B.

TRILL+MSTP

C.

??+MSTP

D.

Link Collection + MSTP

Full Access
Question # 36

What kind of scenario can use AS one path and one filter?

A.

Filter routes received from BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.X.x.x as path-filter import

B.

The apply clause in Routepolicy

C.

Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peerx. X.x.x as path-filter export

D.

If-natch clause answer in Route-policy.

Full Access
Question # 37

In the multi-level RR scenario, the first-level RR will be connected to a large number of second-level R, which may cause the BGP circuit of the first-level RR to overflow from the table Risk of R BGP routing table overflow?( Radio).

A.

ORF

B.

Route Control C. Route Aggregation

C.

Set the same Cluster-ID

Full Access
Question # 38

In the laboratory network, the network is built according to the following topology diagram, SWI is the default configuration, and SW2 disables the switch STP function.

A.

SG0/0/2 for WI enters the Discarding state

B.

SW2 and G0/0/1 enters the Discarding state

C.

SW2 G0/0/2 enters discarding state

D.

No interface is backed up for blocking

E.

SWI's G0/0/1 enters the Discarding state

Full Access
Question # 39

Each DD message has a sequence number for data confirmation, and a DD sequence number is 2 bytes long

A.

True

B.

False

Full Access
Question # 40

Man-in-the-middle attacks or IP/MAC spoofing attacks can lead to information leakage and other hazards, and are more common in the intranet, in order to prevent man-in-the-middle attacks or IP/MAC spoofing attacks, you can take the configuration method

A.

Enable DHCP snooping to check the chaddr field in a DHCP request message

B.

Configure the trusted/untrusted interface

C.

Configure DHCP snooping on the switch to interbolde with DAI or IPSG

D.

Limit the maximum number of MAC addresses allowed to be learned on the switch interface

Full Access
Question # 41

If there is a switch running RSTP, which interface on that switch sends the BPDU with the Proposal logo??

A.

The specified port

B.

in the forwarding state. The specified port in a non-forwarding state

C.

Alternate port

D.

The root port in the Blocking state

Full Access
Question # 42

Which of the following sequences can be matched by the regular expression [^100|200]$?

A.

300200 100

B.

200 100 300

C.

100 200 300

D.

100,300,200

Full Access
Question # 43

Which address prefix in the following options indicates that the address is globally unique and globally routable among unicast addresses in IPv6, similar to a public address in IPv4?(). Single choice questions).

A.

::1/128

B.

FE80:/10

C.

FE80::/10

D.

2000:;/3

Full Access
Question # 44

If all the public IP addresses are used by a company's intranet users to access the Internet using NAT's No-pat method, what will happen to subsequent intranet users who access the Internet?

A.

automatically switch NAT to PAT after the Internet

B.

Subsequent intranet users will not be able to access the Internet

C.

Synchronize messages to other NAT conversion devices for NAT conversion

D.

Squeeze out the previous user and force NAT conversion to go online

Full Access
Question # 45

In the evolution from IPv4 networks to IPv6, some transition technologies have emerged, which of the following are common types of transition technologies?

A.

Dual-stack technology

B.

Tunneling Technology

C.

Compatible with Technology

D.

Conversion Technology

Full Access
Question # 46

You want only his telnet stream to be able to access the server (address 1011.100). Then, you add the following ACL to the routing ring: nule5pemit cp source ny destination 1011.100000destination-porteq 23 rule 1l0 deny ip source any destination any Then you apply that ACL to the ingress direction of the router's seial interface. What type of message is allowed to pass through the router?( Multiple choice questions).

A.

A non-sharded, port 21-accessing packet

B.

Non-first-sharded messages that use port 23 to access the server's message

C.

Non-first-of-sharded messages to access other hosts

D.

Non-first-of-its-kind packets that use port 21 to access the server

E.

Packet answer for the first sharded or non-sharded, using port 23 to access the server

Full Access
Question # 47

One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existing IP6 address is

2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions).

A.

2013:0:130F:0:0:09CO:876Answer: 130B

B.

2013:130F::9CO:876Answer: 130B

C.

2013:0:130F:0:0:9CO:876Answer: 130B

D.

213::13F::9C:876Answer: 13B

E.

2013:0:130F::9CO:876Answer: 130B

Full Access
Question # 48

In the VXLAN implementation, the mapping relationship between VNI and BD is

A.

1:N

B.

N:1

C.

1:1

D.

N: M

Full Access
Question # 49

What is the relationship between CIR, BC, and TC?

A.

CIR=TC/BC

B.

CIR=BE/TC

C.

TC=CIR/BC

D.

TC=BC/CIR

Full Access
Question # 50

As shown in the figure, all routing diagrams declare the loopback address in OSPF, where R2 does not return the address is 10022/32, it is advisable to tell AraD. The R3 loopback address is 10033/321001.1.0/24 external routing, in order to reduce the burden on the RI router, the configuration command is as follows:( Multiple choice questions)[Rlip ip-prefix 1 permit 001.1.024 [RLIJospfl [RL-ospf-1]filter-policy ip-prefix l import please ask the following description is correct?

A.

In the P route table of router R1, there is no external route to 1001.1.0/24

B.

In the IP routing table of router R1, there is an external route to 1001.1.0/24

C.

In the IP routing table of router R1, there is no loopback route to R2

D.

In the IP routing table of router RI, there is no loopback route to R3

Full Access
Question # 51

Is the following description of the BSR/RP mechanism correct?

A.

PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR that receives the C-RP Packets are collected C-one RP information

B.

BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding Bootstrap packets

C.

A C-BSR can also collect C-RP information by receiving C-RP packets

Full Access
Question # 52

Level-1-2IS transmits Level-2LSP to the Level-1 area if the AT location 1 in Level-2LSP is delivered It means that the Level-1lS in the area can be accessed to the outer area through Level-1-2IlS

A.

True

B.

False

Full Access
Question # 53

How many bits are there in the label field of MPLS ?

A.

3

B.

8

C.

1

D.

20

Full Access
Question # 54

If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correct

A.

The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute

B.

Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone

C.

Router A supports AS-An External-LSA flood

D.

Router A is an OSPFv3 device with forwarding capability

Full Access
Question # 55

The correct statement about the IGMP proxy is ? Multi-select

A.

The downstream interface of the IGMP proxy device generates multicast relay table items

B.

IGMP proxy can detect the link status with the linkage through the information of the member host joining/leaving the multicast group, and realize the rapid switching of the primary and standby device links

C.

IGMP proxy is typically deployed on devices between hosts that are members of the access device

The

D.

IGMP proxy device cannot send query messages to downstream member hosts in place of the IGMP queryer to maintain group membership

Full Access
Question # 56

OSPFv2 is an IGP running on an IPV4 network; OSPFV3 is an IGP running in an IPV6 network

IGP, OSPFv3 in the network has a similar LSA type compared to OSPFV2, but the functionality is slightly different, osPFv3LSA type does not include which of the following?

A.

Router-LSA

B.

Network-LSA

C.

Asbr-summary-LSA

D.

AS-external-LSA

Full Access
Question # 57

Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct?

A.

Under no circumstances can different sites that belong to the same VPN use overlapping address spaces

B.

Two geographically separated networks must belong to different sites

C.

Terminals connected to the carrier network through the same CE may belong to different sites

D.

A site is a set of IP systems, and a network of hosts cannot be called site

Full Access
Question # 58

If a router only needs to forward iPv6 packets, you do not need to configure any IPV4 agreements and addresses on that router.

A.

True

B.

False

Full Access
Question # 59

Deploying the ISIS protocol in an IPv6 environment is true in the following statement (radio).

A.

By default, the DIS priority of broadcast network interfaces at Level-1 and Level-2 is 1 B In broadcast networks, the DIS priority for IPV4 and IPV6 can be set separately

B.

In the same broadcast network. If each router supports both IPV4 and Pv6, the DISC of JPV4 and Pv6 must be the same device

C.

IS-IS sient is configured under the finger port, this interface will not send ISIS packets, but will receive ISIS packet

Full Access
Question # 60

Regarding the sliding window of TCP, what are the following descriptions that are enough to be wrong? ( Multiple choice question)

A.

The sender declares the initial window size

B.

The sender does not need to transmit messages of full window size

C.

The TCP sliding window allows multiple packets to be sent before an acknowledgment is received

D.

After the retransmission timer times out, the sender has not received an acknowledgment and will retransmit unacknowledged data

E.

The receiver needs to acknowledge the sender's packet

F.

Sliding window size can only be increased or remain unchanged

Full Access
Question # 61

In the topology shown in the figure. Running the OSPFv3 protocol over the entire network does not produce what type of LSA on R1 without external route introduction?

A.

Intra-Area-Prefix-LSA

B.

Inter-Area-RouterLSA

C.

Link-LSA

D.

Inter-Area-Prefix-LSA

Full Access
Question # 62

When troubleshooting a local area network, you notice a large number of frame alignment errors, FCS errors and LAG conflicts, and the possible cause of these problems is ?

A.

Switches and terminals are interconnected over 10/100/1000base-T Ethernet links, and switches and terminals operate in half-duplex mode

B.

There is a mode mismatch on the 1000base-LX/LH link

C.

The operating mode does not match

D.

on a 10/1000/1000base-T Ether link This type of error occurs in most environments

Full Access
Question # 63

The firewall has created some security zones by default, which of the following security zones does not exist by default on the firewall?( Radio).

A.

Internet

B.

Local

C.

Trust

D.

DMZ

Full Access
Question # 64

In route-policy, what are the BGP attributes that can be used for the apply clause?

A.

AS-Path

B.

MED

C.

Local-Preference

D.

Day

Full Access
Question # 65

There is a new HW office that needs to use their router as a DHCP server. When configuring the DHCP server to provide DHCP services to the current office, what of the following items need to be configured?

A.

Exclude unused IP addresses from the DHCP server

B.

Configure the timeout period for ping packets

C.

Configure the startup file for the DHCP server

D.

Configure manual binding

E.

Configure dhcp address pool

Full Access
Question # 66

When running OSPFv3 on a Huawei router, the OSPFv3 process automatically selects an interface address as the process router id

A.

True

B.

False

Full Access
Question # 67

Regarding the certification of the ISIS protocol, there is a correct statement

A.

Connection authentication can realize the authentication of the hello messages of Leve-1 and Leve-2

B.

After configuring the connection authentication, the IIH issued by the router must carry the authentication TLV

C.

After configuring zone authentication, the router issues an IIH, SNP, LSP—strap-to-tape authentication TLV

D.

The two routers are configured for area authentication and interface authentication, and the passwords are the same, so the two can establish an isocopied relationship

Full Access
Question # 68

In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN network

A.

NVE interface

B.

VXVAN L2 Gateway

C.

VXLAN L3 Gateway

D.

VLANIF interface

Full Access
Question # 69

The following description of the characteristics of Huawei device Eth-trunk link aggregation is correct?

A.

Link aggregation enables load balancing based on data TCP or UDP ports

B.

Link aggregation cannot be deployed across devices

C.

Link aggregation can be applied to Both Layer 2 and Layer 3 devices

D.

Link aggregation can only be applied to Layer 2 devices.

Full Access
Question # 70

The following description of CBWFQ is correct?

A.

CBwFQ can be configured with MQC and service-policy is applied to the exit direction

B.

CBwFQ can be used for both egress and inbound interfaces

C.

CBwFQ is delayed, jittered and bandwidth guaranteed for traffic catch

D.

CBWFQ can only be configured in hierarchical policies-maps. The parent policy-map performs supervision and the child policy-map performs

Full Access
Question # 71

What improvements have been made to the IGMPv2 protocol compared to IGMPv1? ( Multiple Choice)

A.

Added maximum response time field

B.

Added high group messages

C.

Added specific group query message

D.

Added a specific source group query packet

Full Access
Question # 72

The BSR/RP mechanism described below describes the correct determination ?( Multiple choice questions).

There can be multiple C-BSRs in the

A.

PIM-SM domain, but only one BSR can be elected.

B.

BSR collects C-RP information by receiving packets of C-RP

C.

BSR advertises BSR and C-RP information to all routers in the PIM-SM domain via flood bootstrap messages

D.

A C-BSR can also collect C-RP information by receiving C-RP packets

Full Access
Question # 73

If four routers run ISIS and have established an adjacency relationship, and the area code and router rank are marked as shown in the figure, what is the cost value of R4 reaching 10022/32?

A.

10

B.

20

C.

30

D.

40

Full Access
Question # 74

CMPv6 uses the Type field to identify the message type, and according to the value of the type field, we can divide the ICMPv6 message into two categories, one is the error message and the other is the information message

A.

True

B.

False

Full Access
Question # 75

If you delete a declared route entry on a BGP router, the BGP routing ring is triggered to send an Update message for route scattering, which carries the accepted mandatory attribute of the route entry that was discarded.

A.

True

B.

False

Full Access
Question # 76

Which SNMP message type sent to NMS reports events that are reliable? ( Single choice questions).

A.

Inform

B.

Get

C.

Response

D.

Trap

E.

Get Bulk

Full Access
Question # 77

The network administrator defines a traffic policing policy as follows:

A.

256K bytes

B.

48128 bytes

C.

32K bytes

D.

80128 bytes

Full Access
Question # 78

The following description of IGMPv1 and IGMPv2 is correct?( Multiple select).

A.

IGMPv2 message types include member departure packets

B.

IGMPv2 does not support specific group queries

C.

IGMPv1 supports universal group queries

D.

The IGMPv1 message type does not contain members leaving the packet AD

Full Access
Question # 79

The following description of the characteristics of cross-domain VN-Optionc is correct?

A.

A maximum of two layers of tags need to be used in the message forwarding process.

B.

VPMV4 routes are not saved on the ASBR, and VPNv routes are not advertised to each other.

C.

VPN routes are exchanged directly between the ingress PE and egress PE and do not require an intermediate device to secure a circular VPN route.

D.

Cross-domain VN-Optionc, which is not suitable for use when spanning multiple AS.

Full Access
Question # 80

The following statement about EVPN Type5 routing is wrong?( Single choice questions).

A.

Type5 routes carry Layer 3 VNI.

B.

Type5 routing carries both Layer 2 VWI and Layer 3 VNI

C.

The IP Prefix field can carry both host and network segment addresses.

D.

Type5 is an IP prefix route.

Full Access
Question # 81

The correct description about the prefix list is:

A.

The prefix list is used to filter P prefixes and can match both prefix numbers and prefix lengths

B.

The prefix list is used to filter IP prefixes, and cannot match both the prefix number and the prefix length

C.

The prefix list cannot be used for packet filtering

D.

The prefix list can be used to filter packets

Full Access
Question # 82

Dual-bucket, two-speed is used in traffic governance, where the number of tokens in a C bucket is TC and the number of tokens in a P bucket is TP. When a message of length B enters, which of the following sentences is correctly described? (Multiple choice questions).

A.

If TP-B~O and TC-B < 0, the message is marked green

B.

If TP-B<0 and TC-B-0, the message is marked in red

C.

If TP-B>0 and TC-B < 0, the message is marked yellow

D.

If TP-B >O and TC-B > 0, the message is marked as a green

Full Access
Question # 83

ION NO: 272

The rules for RR to publish routes break the rules for horizontal segmentation of IBGP, so it is possible to cause loops within the AS. What routing attributes does RR use to prevent loops?

A.

Nexthop

B.

Originator ID

C.

AS-PATH

D.

Cluster List

Full Access
Question # 84

How do.8021w and 8021D handle BPDUs?( Single choice questions).

A.

The 8021D bridge only forwards BPDU packets received from the root bridge

B.

8021D bridges do not forward BPDU packets

C.

The 8021w bridge only forwards BPDU packets received from the root bridge

D.

8021w Bridge does not forward BPDU packets

Full Access
Question # 85

The following about BGP routing, what is the wrong description?

A.

Non-aggregate routes take precedence over aggregate routes.

B.

In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.

C.

See the following entry in the BGP routing table: • *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal.

D.

For next_hop unreachable routes are invalid cat by and do not participate in the preference. Flogging case

Full Access
Question # 86

Is the following information about BGP4+ described correctly?

A.

BGP4 can use dampening commands to suppress oscillations on IBGP routes.

B.

Modifying the RouterID of BGP causes the BGP connection between routers to be re-established.

C.

The Next Hop attribute in BGP4+ is represented by an IPv6 address, which can be the link-local address of the next hop.

D.

BGP4+ does not support route auto-aggregate

Full Access
Question # 87

There are three port roles defined in RSTP, with alternative ports and backup ports flags in STP messages The port role values within the fields are consistent, all of which are 01

A.

TRUE

B.

FALSE

Full Access
Question # 88

A.

When sending a packet with a destination address of 4444, it is sent without labeling.

B.

When the router receives a packet with the label 1024, it replaces the label with 1027 and sends it.

C.

When a packet with a destination address of 2222 is sent , it is sent without labeling.

D.

When sending a packet with a destination address of 3333, label 1026 and send it.

Full Access
Question # 89

Regarding the description of the encapsulation format of the labels in MPLS, the correct one is ?

A.

The TTL field in the label has a similar meaning to the TTL (Time To Live) in the IP packet, and also has the effect of preventing loops

B.

The total length of an MPLS single tag is 4 bytes (32 bits).

C.

For Ethernet, PPP packets, the tag stack is like a "cushion layer", located between the layer 2 header and the data, and when there is a VLAN tag, the MPLS header is placed on the Ether head and VLANtag between

D.

label in the S field, lbit Used to identify whether the label is a bottom label, and a value of 1 indicates that it is the penultimate label

Full Access
Question # 90

The following message about OSPFV3 is correct?

A.

The Option field of the Hello and DD packets extends to 24-bit

B.

LSR packets containing the full LSA header information for requesting an update to the LSA

C.

The LSACK message contains LSA header information to confirm receipt of the LSU message

D.

The Hello message must contain the interface ID of the sending interface

Full Access
Question # 91

Regarding route introduction, what is the following description of the error?

A.

BGP supports both import and network when generating routes, and the network mode is more precise.

B.

By default, OSPF introduces an external route with a default metric of 1, and the level-2 network of the ingested external route type type, Type2

C.

ISIS, routes to Level After the 1 makes a route ingestion, if you do not manually configure the ingestion policy, a bad route will be formed.

D.

Introducing IBGP routing in OSPF may cause routing loops

Full Access