HCIE R & S Dumps - June 2020 Update - H12-261-EnU V15.02 From Netcert Learning

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 145

KillTest

*KIJGT  3 WCNKV [   $ GV V GT  5 GT X KE G

Q&A

NZZV ]]]QORRZKYZIUS

=KULLKXLXKK[VJGZKYKX\OIKLUXUTK_KGX
The safer , easier way to help you pass any IT exams.

Exam : H12-261

Title : HCIE-R&S (Written)


(Expert - Routing
&Switching)

Version : V15.02

1 / 144
The safer , easier way to help you pass any IT exams.

1. Cross-device link aggregation enables data stream transmission and mutual backup of stack member
switches. However, because of the limited bandwidth of stack cables between stack devices, which of the
following methods can be used to improve forwarding efficiency?
A. Connect stack devices through stack cards
B. Enable stack multiple master check function
C. Configure stack system MAC address switching
D. Enable traffic local priority forwarding
Answer: D

2. About the description of CHAP authentication function in the PPP protocol, which of the following are
correct? (Multiple Choice)
A. If the authenticator does not have a username, the password cannot be configured on the
authenticated interface.
B. Calculate a hash value using the authentication sequence ID, random number, and key by the MD5
algorithm
C. Three-message interactive authentication is required, and the username is transmitted only on the
network without transmitting the password.
D. The user name must be configured under the authenticated interface of CHAP authentication.
Answer: BCD

3. A switch is running the Rapid Spanning Tree Protocol (RSTP).


Upon a topology change, what happens to dynamic entries in the L2 forwarding table?
A. Only entries behind the port where TC was received are removed.
B. All entries are removed except for those behind edge ports and the port where TC was received.
C. All entries are removed (purged).
D. All entries are removed except for entries behind edge ports.
E. The aging timer is set to 15 seconds, so idle entries age out.
Answer: B

4. Which of the following statements is true about the MUX VLAN feature of Huawei switches?
A. The MUX VLAN and the Super VLAN features can be used together on the same VLAN.
B. The Principal Port can communicate with all ports in the MUX VLAN.
C. The Mux VLAN is classified into Principal VLAN and Subordinate VLAN. The Subordinate VLAN is
classified into Separate VLAN and Isolate VLAN.
D. Each Separate VLAN can be bound to multiple Principal VLANs.
Answer: B

5. When you perform troubleshooting on a LAN deployed with Huawei devices, you find that there is a
large number of unicast frames with unknown MAC addresses.
What is the biggest risk for the switches?
A. Available MAC address table entries in the system will be consumed.
B. Increased power consumption.
C. Exhausts memory for buffered frames.
D. Exhausts available TCAM entries.

2 / 144
The safer , easier way to help you pass any IT exams.

E. Exhausts available bandwidth.


Answer: A

6. About the description of the process of sending and receiving data frames in the Access mode of the
switch interface, which is correct?
A. Directly discards when receiving a tagged data frame in Access mode
B. Only receive unlabeled data frames in Access mode
C. When the data frame enters the switch interface, the switch learns the destination MAC address in the
data frame.
D. In the Access mode, the VLAN tag of the data frame will be stripped off when sent.
Answer: D

7. In Rapid Spanning Tree Protocol (RSTP), which port provides a backup path to the root bridge and
which state should this port be in?
A. Root port/listening
B. Alternate port/forwarding
C. Alternate port/learning
D. Designated port/learning
E. Alternate port/discarding
Answer: E

8. Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice)
A. Authentication is unsuccessful
B. The BGP protocol version is inconsistent
C. IBGP-Multi-hop is not configured
D. IGP routing is unreachable
Answer: ABD

9. The following is about the RD attribute filter of BGP, what is the correct description? (Multiple Choice)
A. If RD-filter is configured, but the RD of the route does not match any of the RDs defined in the rule, the
default match result is Permit.
B. The relationship between the rules configured by RD-filter is "or"
C. If RD-filter is not configured, but this RD-filter is used for filtering, the matching result is deny.
D. Matching multiple rules in the order of configuration
Answer: BD

10. ISIS will elect DIS in the broadcast multi-access network. Which of the following statement about DIS
is correct? (Multiple Choice)
A. ISIS elects the DIS by comparing the priorities and compares the MAC addresses if the priorities are
the same.
B. DIS guarantees database synchronization by periodically sending CSNP messages
C. In a broadcast multi-access network, the DIS sends Hello PDUs three times as often.
D. DIS supports the preemption function. After the new DIS preemption is successful, you do not need to
flood any LSP packets.

3 / 144
The safer , easier way to help you pass any IT exams.

Answer: ABC

11. About Filter-policy, which of the following description is correct?


A. Filtering the generation of type 5 LSAs and type 7 LSAs on the ASBR in OSPF using Filter-Policy
B. The prefix list can filter routes as well as filter packets.
C. Filter-Policy can filter the received or advertised link state information and can modify the attributes of
the route entry.
D. When filtering routes using the prefix list, the entry ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 means
that only the default route is matched.
Answer: A

12. The OSPFv3 protocol is a separately developed protocol. It differs from OSPFv2 in that OSPFv3 is
based on links rather than network segments. Which of the following statement is wrong?
A. The two routers connected to the link can establish neighbor relationships even if their IPv6 address
prefixes are different.
B. The two routers connected to the link can establish neighbor relationships even if no unicast IPv6
address is configured.
C. The routing information obtained by the OSPFv3 router from the neighbor uses the link-local address
of the neighbor as the next hop of the forwarded packet.
D. All OSPFv3 interfaces use the Link-local address as the destination address of the packet except the
virtual link.
Answer: D

13. Which of the following statements are NOT true regarding the TCP sliding window? (Multiple Choice)
A. If the retransmission timer expires but the sender has not received the acknowledgement, it will
retransmit the unacknowledged data.
B. The sender need not transmit a full window's worth of data.
C. TCP sliding window allows the transmission of multiple frames before waiting for an acknowledgement.
D. The size of the sliding window can only increase or stay the same.
E. The size of initial window is advertised by the sender.
Answer: DE

14. As shown in the following figure, in IPv4 and IPv6 environments the SEL value in an IS-IS NET
address is always 00.

A. Ture
B. False
Answer: A

15. As shown in the following figure, a part of the LSP of the LSDB of a router is shown in the first line of
the figure. First received a new LSP, the second hop in the following picture, which of the following

4 / 144
The safer , easier way to help you pass any IT exams.

statement is wrong?

A. The router will put the newly received LSP into the LSDB.
B. This router will ignore the LSP received from the neighbor.
C. If it is a point-to-point network, this router will send PSNP
D. If it is a broadcast network, the DIS will include the summary information of the LSP in the next CSNP
packet.
Answer: B

16. Regarding the Stub area and the NSSA area of OSPF, the wrong statement of the following is _____.
A. Type 5 LSA is not allowed in the Stub area, but Type 5 LSA is allowed in the NSSA area.
B. Both the Stub area and the NSSA area are allowed to inject Type 3 LSA.
C. Stub area and NSSA area are not allowed to inject Type 4 LSA.
D. Type 7 LSA is not allowed in the Stub area, but Type 7 LSA is allowed in the NSSA area.
Answer: A

17. Regarding BGP route filtering, which of the following description is wrong?
A. For a locally advertised route, configure a routing policy. The policy takes effect before the route is
added to the BGP routing table.
B. The filtering relationship between the nodes of the Route-Policy is "OR", that is, the Route-Policy can
be passed with a node filter only.
C. When receiving a route from a BGP peer, perform a routing policy to filter unwanted BGP routes.
These routes are not added to the local BGP routing table.
D. In the same node of Route-Policy, the relationship of multiple if-match clauses for different attributes is
"OR".
Answer: AD

18. If the value of the Option field in the OSPFv3 Hello packet sent by GigabitEthernet 0/0/0 on Router A
is 0x000013, the correct description of the following is: (Multiple Choice).
A. GigabitEthernet0/0/0 of Router A belongs to the NSSA area.
B. GigabitEthernet0/0/0 of Router A will participate in IPv6 route calculation.
C. Router A is an OSPFv3 device with forwarding capability
D. Router A supports AS-External-LSA flooding
Answer: BCD

19. The ISIS protocol is deployed in an IPv6 environment. The correct statement in the following is:

5 / 144
The safer , easier way to help you pass any IT exams.

A. In broadcast networks, the DIS priorities of IPv4 and IPv6 can be set separately.
B. By default, the DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.
C. In the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6
must be the same device.
D. Configure ISIS silent on the ISIS interface, then this interface will not send ISIS packets, but will
receive ISIS packets.
Answer: C

20. After BGP imports routes of other protocols, the next hop in the BGP routing table is the same as the
next hop of the introduced routing protocol.
A. True
B. False
Answer: B

21. There is an AS-path-filter, ip as-path-filter 1 permit ^100(_100)*(_400)*, which AS-PATH attribute


cannot be matched by the As-path-filter?
A. 100 400
B. 100 400 400 400
C. 100 200 900
D. 100
Answer: C

22. Which of the following statement is correct about Router-LSA of OSPFv3?


A. Similar to OSPFv2, the Option field exists in the head of the LSA instead of the data area of the
Router-LSA.
B. The data area of the Router-LSA contains the link-local address.
C. When the LSA header LS type=0x0001, the data area representing the LSA is Router-LSA.
D. The data area of the Router-LSA contains the interface ID of the local end and the neighbor.
Answer: D

23. Regarding the BGP alliance, which of the following description is wrong?
A. The alliance divides an AS into several sub-ASs, and the external AS still considers the alliance to be
an AS.
B. The sub-AS number of the alliance is advertised to BGP peers outside the alliance by default.
C. The sub-AS number in the alliance can use a private AS number. A Huawei NE/AR router can be
configured with up to 32 sub-AS numbers.
D. The alliance can easily detect the routing loop in the AS because EBGP is running between sub-ASs.
Answer: B

24. After the BGP connection is successful and it is down again. What are the impossible reasons?
A. Open packet negotiation failed.
B. The mandatory attribute in the routing update message is lost.
C. After the BGP connection is established, the keepalive packet is not received within the negotiated
holdtime.

6 / 144
The safer , easier way to help you pass any IT exams.

D. Received incorrect BGP packets.


Answer: A

25. When ISIS area authentication is configured, which ISIS packet carries the authentication
information?
A. SNPs and LSPs of ISIS Level-1
B. Hello message of ISIS Level-1
C. SNPs and LSPs of ISIS Level-2
D. Hello packet of ISIS Level-2
Answer: A

26. The Type 5 LSA in OSPF are used to pass external routes. Which of the following statements about
the Type 5 LSA are wrong?
A. The router in the same area as the ASBR can calculate the external route through the intra-area LSA
and the Type 5 LSA.
B. Configure the corresponding policies on the ABR and ASBR to filter the Type 5 LSA.
C. Type 5 LSAs are advertised by the ASBR and flooded in the OSPF network in the non-Stub/NSSA
area.
D. The FA address is included in the Type 5 LSA, and the FA address is 0.0.0.0, but has no practical effect
as a reservation.
Answer: D

27. Which of following statements is true about the domain-authentication-mode md5 hello command in
the IS-IS process?
A. The routing domain authentication is used to carry the authentication information during the delivery
process of SNPs and LSPs of Level-1 and Level-2.
B. The domain authentication mode of all routers in the same routing domain is MD5, the password is
hello, and the ISIS SNP and LSP are flooded.
C. This command is mainly used to enable ISIS Hello packets to carry authentication information during
the delivery process.
D. ISIS certification cannot be applied in IPv6 environment.
Answer: B

28. The level-1-2 IS transmits the Level-2 LSP to the Level-1 area. If the ATT bit in the Level-2 LSP is set
to 1, the level-1 in the area can pass the Level-1-2 IS to the outside region.
A. True
B. False
Answer: B

29. In the OSPF broadcast network, there are four routers in the same network segment, RTA, RTB, RTC,
and RTD. The DR priorities are 2, 1, 1, and 0, and the Router IDs are 192.168.1.1, 192.168.2.1,
192.168. .3.1 and 192.168.4.1. If OSPF protocol is enabled on all the four routers, the BDR selected by
OSPF is ________.
A. RTB

7 / 144
The safer , easier way to help you pass any IT exams.

B. RTC
C. RTA
D. RTD
Answer: B

30. Which AS_PATH can be matched by command ip as-path-filter 1 permit ^12.*74$?


A. AS_PATH(32 1274 23)
B. AS_PATH(123 621 743 2374)
C. AS_PATH(321 12 2374)
D. AS_PATH(125 328 74 23)
Answer: B

31. An OSPF protocol is running on a company network. An engineer wants to understand the OSPF
mechanism to perform packet capture operations on the network, which of the following description about
the OSPF packet is correct? (Multiple Choice)
A. LS Update message synchronizes the link state database by sending detailed LSA information.
B. After receiving the LS Update message, the router must send LS Ack to confirm.
C. Sending Hello packets immediately after the interface joins the OSPF area.
D. The LS Update message is sent only when the adjacency is established.
Answer: AC

32. In the following topology picture, R1 can access the Internet through R2 and R3. R1 and R2, and R1
and R3 establish an EBGP connection. R2 and R3 belong to the same AS. The default route is advertised
through BGP. R2 is the optimization when requiring R1 to access the Internet traffic. The following
practices that can be achieved are (Multiple Choice)

A. R2 specifies that the peer R1 sets the MED attribute to 150 in the export direction.
B. R1 specifies that the peer R3 sets the MED attribute to 150 in the import direction.
C. R2 specifies that the peer R1 sets the local priority to 150 in the export direction.
D. R1 specifies that the peer R2 sets the local priority to 150 in the import direction.
Answer: BD

33. In addition to stateless address autoconfiguration, IPv6 devices can also obtain information such as
addresses, gateways, and DNS through DHCPv6.
A. True
B. False
Answer: B

8 / 144
The safer , easier way to help you pass any IT exams.

34. The network administrator is ready to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4
network. The IPv4 address of the router interface is 138.14.85.210, so the corresponding tunnel address
is 2001:8a0e:55d2:1:230:65ff: fe2c:9a6.
A. True
B. False
Answer: B

35. In an IPv6 network, two nodes A and B are neighbors. If node A sends an NS message to node B, if
node B replies to the NA message after received the message, so what neighbor status will be marked as
when viewing on the node A?
A. Reachable
B. Stale
C. Probe
D. Incomplete
Answer: A

36. As the description of MPLS, which of the following is wrong?


A. The label space range of dynamic signaling protocols such as LDP and MP-BGP is 16-1023.
B. The length of the MPLS label is 20 bits and is used for packet forwarding.
C. In the TTL processing mode of the Pipe mode, IP packets are transmitted on the MPLS network. The
TTL value of the IP packets is reduced by 1 in the MPLS ingress node and the egress node respectively.
D. MPLS supports multi-layer tag nesting, the S-bit value of the innermost tag is 1.
Answer: A

37. RD is used to distinguish the same IP address in different VPNs. How many bits does the RD contain?
A. 16
B. 64
C. 32
D. 128
Answer: B

38. In the packet forwarding by the way of inter-AS VPN-Option B, the two ASBRs exchange the LSP
labels of the public network.
A. True
B. False
Answer: B

39. About the description of MPLS lable related information, which of the following is wrong?
A. The length of the MPLS label is 4 bytes and it is encapsulated between the link layer and the network
layer.
B. By default, the device supports the PHP feature, and the label value of the egress node supporting
PHP which is allocated to the penultimate hop node is 3.
C. If the bottom mark of the label is S=0, it indicates that the label is the bottom label and directly performs

9 / 144
The safer , easier way to help you pass any IT exams.

IP forwarding.
D. When the tag value is 0, it indicates that the tag should be ejected, and the packet must be forwarded
based on IPv4.
Answer: C

40. View the details of all VPN instances on a network device. The results are as follows. Which of the
following statements are incorrect? (Multiple Choice)

A. The total number of instances of the IPv6 address cluster enabled in the VPN configured on the local
end is 1.
B. The device will assign a label to each route of the VPN-Instance vpna.
C. VPN-Instance vpna will not receive VPN routes with RT 2:1
D. GigabitEthernet 1/0/0 interface is bound to the VPN-Instance vpna.
Answer: AB

41. The following are the statements about LDP reliability, which one is wrong?
A. LDP FRR can also be used to generate an LSP for the label mapping from the non-optimal next hop.
And it can be as a backup of the primary LSP to establish the transfer entries.
B. The association between the LDP and the IGP requires the IGP to suppress the advertisement of the
route and ensure that the LDP path is consistent with the IGP path.
C. The manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to
establish a backup LSP.
D. LDP GR Graceful Restart uses the feature that the MPLS forwarding plane is separated from the
control plane. The device does not interrupt when the protocol is restarted or the active/standby
switchover is performed.
Answer: C

42. What improvements have been made to the IGMPv2 protocol compared to IGMPv1? (Multiple
Choice)
A. Added specific group query message
B. Added off-group messages
C. Added maximum response time field
D. Added specific source group query messages

10 / 144
The safer , easier way to help you pass any IT exams.

Answer: ABC

43. If multiple candidate RPs are configured in a certain group of multicasts, which of the following
parameters need to be compared between the multiple candidate RPs? (Multiple Choice)
A. C-RP priority
B. Group-wide mask length of the C-RP service matching the group address to which the user joins
C. IP address of the C-RP interface
D. Number of the C-RP interface
Answer: ABC

44. If a DR is elected between the multicast routers running PIM-SM to be responsible for receiving and
receiving multicast data on the source or member, what is the correct description of the DR election rules?
A. Compare the DR priorities first, if the priorities are the same, you need to compare the IP addresses of
the PIM router interface to elect DRs.
B. The PIM router with a long interface mask is elected as the DR.
C. A PIM router with a low DR priority value is elected as the DR.
D. A router with a small IP address is elected as a DR.
Answer: A

45. If you run PIM-SM on a multicast network, you need to construct a multicast forwarding tree between
the multicast source and the receiver for the receiver to receive multicast data, so the following
descriptions are about the constructed multicast forwarding tree, which are the correct options? (Multiple
Choice)
A. The RTP tree is constructed between the RP and the receiver.
B. The RPT tree is constructed between the multicast source and the RP.
C. The SPT tree is constructed between the RP and the receiver.
D. The SPT tree is constructed between the multicast source and the RP.
Answer: AD

46. As shown in the figure, the IPSEC VPN is established between the branch and the headquarters
using redundant links. At the same time, URPF is enabled on the traffic from the branch 1 on Router B.
Which of the following options is correct? (Multiple Choice)

A. When using IPSEC backup link redundancy backup, URPF loose mode is recommended when the
URPF function enables on the physical interface.
B. When using IPSEC multi-link redundancy backup, URPF strict mode can be used when URPF function
enables on the tunnel interface.
C. When using IPSEC backup link redundancy backup, URPF strict mode can be used when URPF

11 / 144
The safer , easier way to help you pass any IT exams.

function enables on the physical interface.


D. When using IPSEC multi-link redundancy backup, URPF strict mode can be used when URPF function
enables on the physical interface.
Answer: AB

47. The HTTP protocol is based on TCP. Therefore, you can use the TCP Flood attack defense method to
defend against HTTP flood attacks.
A. True
B. False
Answer: B

48. As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same
time, an IPSEC tunnel needs to be established between the two IPv6 networks for communication. Which
of the following encapsulation modes can meet the requirements above?

A. ESP + tunnel mode


B. None of the above options
C. AH + transmission mode
D. AH + tunnel mode
Answer: A

49. When there are multiple matching rules in the ACL of the VRP, which of the following statements is
correct about the matching order?
A. On confirmation, follow the Rule-ID, match from small to large
B. By default, match according to the principle of “depth first”
C. On confirmation, match the order by matching the permit first and then matching the deny.
D. There is only one matching order and cannot be modified.
Answer: A

50. The LAND attack is performed by the attacker sending a source address and a destination address to
the destination host, they are all the destination hosts. The source port and the destination port are the
same SYN packet. When the receiver waits for the final ACK packet from the sender, The connection is
always in a semi-connected state, resulting in waste of limited TCP resources at the receiving end.
A. True
B. False
Answer: B

51. What is the relationship between CIR, BC and TC?


A. TC=CIR/BC

12 / 144
The safer , easier way to help you pass any IT exams.

B. CIR=TC/BC
C. CIR=BE/TC
D. TC=BC/CIR
Answer: D

52. A home user has opened a 10Mb/s broadband. To improve the user experience, the operator can
stabilize at 12Mb/s when measuring speed. If we use token bucket technology to achieve this demand,
which of the following methods is optimal?
A. cir 10000 pir 12000
B. cir 10000 cbs 10000 pbs 12000
C. cir 8000 pir 12000
D. cir 10000 cbs 12000 pbs 12000
Answer: A

53. Which of the following options is correct for the description of the optimal routing elections for various
protocols?
A. OSPF puts all routing information in the LSDP into the IP routing table.
B. The route with the next hop unreachable in BGP is also put into the IP routing table.
C. Different routing entries learning from BGP and OSPF to the same destination network segment select
the optimal route to join the IP routing table by comparing the preference value of the protocol.
D. BGP selects the optimal route to the same destination network segment by comparing the cost value of
the route entry.
Answer: C

54. As shown in the following topology diagram, all the interfaces of the router in the figure are all enabled
with the ISIS protocol. The correct statements of the following are: (Multiple Choice)

A. If the GE0/0/0 interface of R3 is down, then R2 will become the master device.
B. If the Ethernet 0/0/0 interface of R3 is down, then R2 will become the master device.
C. If the Ethernet 0/0/0 interface of R1 is down, then R2 will become the master device.
D. If the Ethernet 0/0/1 interface of R1 is down, then R2 will become the master device.
Answer: ACD

13 / 144
The safer , easier way to help you pass any IT exams.

55. Which of the following statements about the BFD one-armed echo function are correct? (Multiple
Choice)
A. The BFD one-armed echo function must be configured with a local identifier and a remote identifier.
B. The default destination IP address of the BFD one-armed echo function protocol packet is 224.0.0.184.
C. The BFD one-armed echo function is applicable to scenarios where one device supports BFD and the
other device does not.
D. After the BFD one-armed echo function is enabled, the destination IP address and source IP address
of the BFD packets are the same.
Answer: CD

56. Which of the following is not the role of EVPN Type2 routing?
A. Host MAC address Announcement
B. Host ARP Announcement
C. BUM message forwarding
D. Host IP route Announcement
Answer: C

57. One BD in VXLAN can correspond to multiple VNI.


A. True
B. False
Answer: B

58. Which of the following is optimal for building a loop-free Layer 2 network?
A. Stacking + link aggregation
B. TRILL+MSTP
C. Stacking + MSTP
D. Link Aggregation + MSTP
Answer: A

59. By default, the switch configures the MAC address table to be empty. Host A connected to the switch
sends the first unicast data frame. What operation will the switch perform after receiving the data frame?
A. The switch will discard the data frame
B. The switch forwards the data frame out of an interface according to the destination MAC address of the
data frame.
C. The switch records the source MAC address of the data frame and floods the data frame.
D. The switch caches the data frame and waits for the destination host to send the data frame and then
forward it.
Answer: C

60. As shown in the figure, three switches SW1, SW2 and SW3, where SW1 is the root bridge, the link
between SW1 and SW2 is congested, and SW2 cannot receive the configuration BPDU sent by the root
bridge. Which spanning tree protection mechanism does the administrator need to configure to prevent
link congestion?

14 / 144
The safer , easier way to help you pass any IT exams.

A. Loop protection
B. Root protection
C. TC-BPDU protection
D. BPDU protection
Answer: A

61. Which of the following command is displayed to determine that the loop fault of the switch is
generated?
A

Answer: D

62. A total of 6 bits indicating the priority field in the VLAN (802.1Q) data encapsulation

15 / 144
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: B

63. Four routers R1, R2, R3, and R4 run ISIS, the ISIS router type is marked, and the routing table is
viewed on R1. The reason why R1 does not reach the route of 10.34.34.4 is

A. Configure a routing policy on R2 to filter the default route.


B. R2's system-ID conflicts with R3
C. Regional planning errors for R3 and R4
D. R2's system-ID conflicts with R1
Answer: C

64. The OSPFv3 Option field appears in all LSA.


A. True
B. False
Answer: B

65. Which of the following is true about Link-LSA for OSPFv3?


A. The Option field exists in the LSA header, not the data area of Link-lsa.
B. Contains both the link-local address of this interface and all IPv6 prefixes of this interface.
C. If the Prefix Option field of a prefix of the Link-LSA is 0x00, the Prefix will not be included in the IPv6
unicast calculation.
D. Contains both the link-local address of the interface and all Ipv6 prefixes in the same area on the
router.
Answer: B

16 / 144
The safer , easier way to help you pass any IT exams.

66. The following topology is available, and based on this analysis, the following statements which are
correct?

A. Because R2 does route aggregation, only the routing entry of 10.0.0.0/16 exists in the IP routing table
of R1.
B. The routing entries of 10.0.2.2/32 and 10.0.3.3/32 in the IP routing table of R1.
C. The routing entries of 10.3.3.3/32 and 10.0.0.0/16 exist in the IP routing table of R1.
D. The routing entries of 10.0.2.2/32 and 10.0.0.0/16 in the IP routing table of R1.
Answer: C

67. Which type of prefix will the router running BGP advertise to its own IBGP neighbor (assuming the
router is not configured as a route reflector)?
A. The prefix is learned through the EBGP neighbor, or the prefix is learned from the RR.
B. The prefix is learned by other BGF neighbors, or the prefix is locally learned through network or route
introduction.
C. The prefix is learned by other IBGP neighbors, or the prefix is learned from the EBGP neighbor, or the
prefix is learned through the route introduction.
D. Presences existing in routing shows
E. The prefix is learned through the EBGP neighbor, or the prefix is learned locally through the network or
route.
Answer: E

68. As shown in the figure, the AS100 has two paths to the AS400. By default, the best route is
transmitted from the AS200. It is known that the path to the AS400 through the AS300 is better. Therefore,
the following configuration is performed on the R2. After the configuration is complete, the optimal route is
not changed. Which of the following operations can make the configuration take effect?
[R2] ip as-path-filter 1 permit ^400$
R2] route-policy med permit node 10
r2-route-policy] if-match as-path-filter 1
Ir2-route-policy] apply cost 20

17 / 144
The safer , easier way to help you pass any IT exams.

A. Configure deterministic-med in the BGP process of R1.


B. Configure compare- different-as-med in the BGP process of R2.
C. Configure deterministic-med in the BGP process of R2.
D. Configure compare- different-as-med in the BGP process of R1.
Answer: D

69. A network consisting of an existing router R1, router R2, router R3 and router R4. These four routers
are interconnected via a LAN network. Basic OSPF is deployed on all four routers. When you execute the
command "display ospf peer" on the router R2, the status between router R2 and router R3 is "2way".
What conclusion can you draw from this output?
A. Router R4 is DR
B. Router R2 is DR or BDR
C. Router R2 is not DR
D. Router R3 is not DR, nor BDR
E. There is no full adjacency between router R2 and router R3.
Answer: CDE

70. The following statement about the NSSA area, which is correct.
A. In the OSPF neighbor relationship sent by the OSPF neighbor, the N position in the option field is set to
1. The E position is 0.
B. The NSSA area generates seven types of LSAs to advertise external routes. The FA address in the
seven types of LSAs is used to prevent loops.
C. A default LSA must be automatically generated in the NSSA area to access the external network.
D. The OSPF neighbor in the NSSA area sends the he1lo text. The N position in the option- field is 0, and
the E position is 1.
Answer: A

71. In the aggregate ipv4-address { mask | mask-length }[ as-set | attribute-policy route-policy- name1 |
detail-suppressed | origin-policy route-policy-name2 | suppress-policy route-policy- name3 ] command,
multiple parameters can be specified to affect the route summarization process and results.

18 / 144
The safer , easier way to help you pass any IT exams.

Which statements about this command are true? (Multiple Choice)


A. If as-set is configured, the AS_Path of the generated summarized route contains AS_Paths of all
specific routes. This avoids routing loops.
B. If suppress-policy is configured, the summarized route can be generated, the if-match clauses of the
route-policy can be used to selectively suppress specific routes. Those specific routes that match this
route-policy will still be advertised to other BGP peers.
C. If origin-policy is configured, only the specific routes that match the route-policy are used to generate
the summarized route.
D. If attribute-policy is configured, attributes can be set for the summarized route.
Answer: ACD

72. There are two community-filters:


ip community-filter 1 permit 100:1 200:1
ip community-filter 2 permit 100:1
ip community-filter 2 permit 200:1
Which of the following statements are true? (Multiple Choice)
A. A BGP route matches community-filter 1 only when the community attributes carried in the route
contain both 100:1 and 200:1.
B. A BGP route matches community-filter 1 as long as the community attributes carried in the route
contain 100:1 or 200:1, or both.
C. A BGP route matches community-filter 2 only when the community attributes carried in the route
contain both 100:1 and 200:1.
D. A BGP route matches community-filter 2 as long as the community attributes carried in the route
contain 100:1 or 200:1, or both.
Answer: AD

73. We can use basic community-filters or advanced community-filters to filter BGP routes.
Which of the following tools make the advanced community-filter more flexible than the basic community-
filters?
A. IP-prefix
B. AS-path-filter
C. Regular expression
D. ACL
Answer: C

74. The ip ip-prefix ip-prefix-name [ index index-number] {permit | deny} ipv4-address mask-length
[ greater-equal greater-equal-value] [ less-equal less-equal-value] command is used to configure an
IP-prefix-filter.
If less-equal is specified but greater-equal is not, what is the prefix range?
A. [0, less-equal-value]
B. [mask-length, less-equal-value]
C. [less-equal-value, 32]
D. Not limited
Answer: B

19 / 144
The safer , easier way to help you pass any IT exams.

75. The interface Serial0 of an existing router goes to OSPF and sets the interface Serial0 to the Silent
interface. What effect does this setting have?
A. OSPF does not establish any adjacencies through the interface.
B. OSPF does not add routes learned from the interface to the local routing table.
C. OSPF will receive routing updates from neighbors
D. OSPF establishes available adjacencies through this interface.
Answer: A

76. Deploying the ISIS protocol in an IPv6 environment, which of the following statement is correct?
A. In the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6
must be the same device.
B. In a broadcast network, the DIS priorities of IPv4 and IPv6 can be set separately.
C. By default, the DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.
D. If ISIS silent is configured on the IS-IS interface, the interface will not send ISIS packets but will receive
ISIS packets.
Answer: A

77. Both ISIS CSNP packets and OSPF DD packets are in the MA network, describing the role of the link
state database profile. Which of the following statements is correct?
A. Both routers need to confirm the two routers after sending them. Otherwise, they need to be
retransmitted.
B. The master-slave relationship in the DD packet exchange of OSPFA is not bound to the DR/BDR. The
CSNP packet is generated only by the DIS.
C. Once the adjacency relationship is established, CSNP packets and DD packets will stop sending.
D. The two routers do not need to confirm the peer router after sending.
Answer: B

78. If the default route is not used in the local IP routing table, the default route-import command is used
to advertise the default route to the BGP peer (group).
A. True
B. False
Answer: B

79. Which scenario can use AS-path -filter?


A. apply clause in Route-policy
B. If-match clause in Route-policy
C. Filter the route sent to the BGP neighbor according to the AS_PATH attribute carried in the route. For
example, the command peer x.x.x.x as-path-filter export
D. Filter the route received to the BGP neighbor according to the AS_PATH attribute carried in the route.
For example, the command peer x.x.x.x as-path-filter import
Answer: BCD

80. Regarding the BGP alliance, which is wrong description?

20 / 144
The safer , easier way to help you pass any IT exams.

A. The Alliance divides an AS into several sub-AS alliances. External As still considers the Alliance to be
an AS.
B. The sub-AS number of the confederation is advertised to BGP peers outside the confederation by
default.
C. The sub-autonomous system within the federation can use a private AS number. A Huawei NE/AR
router can be configured with up to 32 sub-AS in a single alliance.
D. The federation can easily detect the routing loop within the AS because EBGP is running between the
sub-AS.
Answer: B

81. Which of the following is the correct description of route penetration for ISIS?
A. ISIS route penetration can be used in an IPv6 environment.
B. ISIS route penetration does not cause neighbors to oscillate.
C. In the route penetration of ISIS, the route before penetration cannot be an aggregate route.
D. ISIS route penetration can be deployed on Level-1 routers.
E. ISIS route penetration is used to prevent routing loops.
Answer: AB

82. Two EBGP neighbors connected by two parallel cables. What method will you use to achieve
bidirectional load sharing between two EBGP neighbors connected through these two parallel serial
cables?
A. Configure the loopback interface to establish an EBGP neighbor relationship and configure EBGP
Multi-hop. Configure the loopback interface as the update source, and then use IGP to implement
equal-cost path load sharing between addresses.
B. Without any method, BGP automatically implements load sharing between different autonomous
systems on the available links.
C. Use the command at both ends "ebgp-load-balance
D. Configure the EBGP neighbor relationship with the loopback interface as the update source. The IGP
in each AS must have two equal-cost paths to the EBGP neighbor loopback address. You need to use the
command "next-hop-local".
E. Configure the EBGP neighbor relationship with the loopback interface as the update source. The IGP
in each AS needs to import two equal-cost paths to the EBGP neighbor loopback address. You need to
use the commands ebgp-max-hop and next- Hop-local
Answer: A

83. OSPFv3 and ISIS are running on the router at the same time. You need to import OSPFv3 routes to
ISIS. Which of the following configurations is correct: (Multiple choice)
A. [Huawei] isis 1
[Huawei-isis-1] is-level level-1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] ipv6 enable topology standard
[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1
[Huawei-isis-1] quit
[Huawei] ospfv3 1

21 / 144
The safer , easier way to help you pass any IT exams.

[Huaweiospfv3-1] router-id 2.2.2.2


B. [Huawei] isis 1
[Huawei-isis-1]is-level level-1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] ipv6 enable topology standard
[Huawei-isis-1] ipv6 import-route ospfv3 1
[Huawei-isis-1] quit
[Huawei] ospfv3 1
[Huawei-ospfv3-1] router-id 2.2.2.2
C. [Huawei] isis 1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] ipv6 enable topology standard
[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1
[Huawei-isis-1] quit
[Huawei] ospfv3 1
[Huaweiospfv3-1] router-id 2.2.2.2
D. [Huawei] isis 1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] import-route ospfv3 1
[Huawei-isis-1] quit
[Huawei] ospfv3 1
[Huawei-ospfv3-1] router-id 2.2.2.2
E. [Huawei] isis 1
[Huawei-isis-1]is-level level-1
[Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00
[Huawei-isis-1] import-route ospfv3 1 level-1
[Huawei-isis-1] quit
[Huawei] ospfv3 1
[Huawei ospfv3-1] router-id 2.2.2.2
Answer: AC

84. If the router only needs to forward IPv6 packets, there is no need to configure any IPv4 protocols and
addresses on the router.
A. True
B. False
Answer: A

85. In the intranet MPLS BGP VPNF network, when a packet enters the public network for forwarding, it
will be encapsulated with two layers of MPLS labels. The following description of the two-layer label,
which is wrong?
A. By default, the router assigns the same label value to all VPNv4 routes destined for the peer PE.
B. The private network label is carried and distributed when the route is delivered by MP-BGP. The public
network label is distributed by the LDP protocol.
C. The egress PE uses the inner label when determining which egress CE the message should be sent

22 / 144
The safer , easier way to help you pass any IT exams.

to.
D. MPLS BGP VPN uses two layers of labels: public network labels (also known as outer labels) and
private network labels (also known as inner labels).
Answer: A

86. The following is about the LDP protocol session establishment process, which is the correct
description?
A. After the TCP connection is successfully established, the active party sends an initialization message
to negotiate the parameters related to the LDP session.
B. The party with the larger transmission address acts as the active party and initiates the establishment
of TCP connection.
C. The Hello message discovered by the LDP neighbor uses TCP packets. The destination address is the
multicast address 224.0.0.2.
D. After both parties receive the Keepalive message from the peer, the LDP session is established
successfully.
Answer: ABD

87. The router HW1 exists as an MPLS LSR router in the network of the operator HW. The router receives
a packet carrying a label, but the label entry does not exist in its LFIB.
So how does the router handle the message?
A. Router HW1 uses LDP to create an LSP and creates a new path for the label carried in the packet in
the LFIB.
B. Router HW1 will discard the message.
C. Router HW1 will forward the message using the default label.
D. Router HW1 will strip the label and find the IP destination address of the FIB.
Answer: B

88. The following statement about cross-domain MPLS VPN, which is the wrong description?
A. When the public network label is only LDP, the cross-domain vp-Option-c scheme 2 needs to use
three-layer labels in the packet forwarding process.
B. For the cross-domain vPN-OptionB mode, an MP-eBGP neighbor relationship needs to be established
between the two ASBR.
C. For the cross-domain vPn-OptionA mode, the route between the two ASBR is a common IPv4 route.
D. For the cross-domain vPN-OptionB mode, two ASBR are interconnected by multiple interfaces
(including sub-interfaces). Each interface is associated with one VPN. Each ASBR-PE uses the peer as
the CE.
Answer: AD

89. If there are multiple receivers in a multicast group, the administrator enables IGMP-Snooping on the
switch connecting the receiver. After the receiver receives the general query message from the querier,
the receiver receives multiple receivers. How to respond?
A. All recipients will respond to the Report message.
B. Only when IGMPv1 is running, all receivers respond to the Report message.
C. The first responder with a response timeout sends a Report message, and the other recipients do not

23 / 144
The safer , easier way to help you pass any IT exams.

send it.
D. Only the IGMPV2 is running, and all receivers respond to the Report message.
Answer: A

90. Which of the following is the correct description of the process of registering the source DR with the
RP in the PIM-SM?
A. The registration message encapsulates the multicast service data.
B. The RP sends a registration stop message as soon as it receives the registration message.
C. The registration message is used to construct an RPT tree between the source DR and the RP.
D. The registration message is a multicast message.
Answer: A

91. In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?
A. Register mechanism
B. BSR/RP mechanism
C. Assert mechanism
D. Join/Prune mechanism
Answer: C

92. Which of the following statements about 802.1x authentication, RADIUS, and HWTACACS
authentication is correct?
A. RADIUS authentication and HWTACACS authentication can perform dual authentication for the same
user at the same time, which is more secure.
B. Users can access the network using 802.1x authentication and complete identity authentication
through Radius.
C. RADIUS authentication and HWTACACS authentication are mutually exclusive. You cannot perform
dual authentication for the same user at the same time.
D. RADIUS authentication and 802.1x authentication are mutually exclusive.
Answer: BC

93. Which of the following statements about RADIUS is correct?


A. MAC authentication does not require a username and password, so you cannot use RADIUS to
authenticate a user.
B. RADIUS authentication and Portal authentication cannot be used together. Because Portal
authentication is usually used, the Portal server can be used to authenticate users.
C. RADIUS protocol authentication, authorization, and audit separation.
D. RADIUS supports both wired and wireless access methods.
Answer: D

94. To configure AAA, you first need to define the XRADIUS RADIUS server as follows:
[Huawei] radius-server template EXAM
[Huawei-radius-EXAM] radius-serve shared-key cipher HUAwei123
[Huawei-radius-EXAM] radius-se authentication 10.7.66.66 1812
[Huawei-radius-EXAM] radius-se authorization 10.7.66.661812

24 / 144
The safer , easier way to help you pass any IT exams.

[Huawei radius -EXAM] radius-server retransmit 27. 1813


[Huawei-radius-EXAM] radius-serv accounting 10
A. True
B. False
Answer: B

95. Which of the following does the digital certificate not contain?
A. Public key information
B. Digital envelope
C. Digital signature
D. Issuer
Answer: B

96. Network administrators can use CAR technology in traffic policing. Which of the following technologies
can be applied in CAR?
A. Double barrel double speed
B. Single barrel single speed
C. Three barrels single speed
D. Double barrel single speed
Answer: ABD

97. Router A has an IP router with a destination network segment of 10.0.0.1/32 and an outbound
interface of Gigabitethernet 0/0/1.
Now add the following configuration
acl number 2000
rule 10 permit source 10. 0.1.1 0
traffic classifier test
if-match acl 2000
traffic behavior test
remark dscp cs3
traffic policy test
classifier test behavior test
interface Gigabitethernet0/0/1
ip address10.0.12.1255.255.255.0
traffic-policy test outbound
Suppose Router A receives a packet with a destination IP of 10.0.0.1. The following statements which are
correct?
A. If the source IP address of the packet is 10.0.0.1, it can be forwarded while the DSCP field remains
unchanged.
B. If the source IP address of the packet is 10.0.0.1, it can be forwarded and the DSCP field is marked as
CS3.
C. If the source IP address of the packet is 10.0.0.1, it cannot be forwarded.
D. If the source IP address of the packet is 10.0.0.1, it can be forwarded and the DSCP field is marked as
cS3.

25 / 144
The safer , easier way to help you pass any IT exams.

Answer: AD

98. Which SNMP message type report event sent to the NMS is reliable?
A. Response
B. Trap
C. Inform
D. Get
E. Get Bulk
Answer: C

99. Non-Stopping-Forwarding (NSF) and Non-Stopping Routing (NSR) are two solutions for high reliability.
The following statements which are correct?
A. NSR routers need to negotiate NSR support through specific packet negotiation.
B. After the NSF is enabled, the router performs the master/slave switchover. The routing table and the
forwarding table remain unchanged. Therefore, traffic is not lost during the GR time.
C. After the NSR is enabled, if the main control board fails when the service batch backup is not
completed, the NR switch cannot be completed.
D. NSF routers do not need to support NSF through specific packet negotiation.
Answer: BC

100. As shown below, R1 and R2 establish E-BGP neighbors and enable BFD detection. The following
statements which are correct?

A. The detection time of BFD packets on R2 is 800ms.


B. The detection time of BFD packets on R2 is 600ms.
C. The detection time of BFD packets of R1 is 660ms.
D. The detection time of BFD packets on R1 is 1280ms.
Answer: C

26 / 144
The safer , easier way to help you pass any IT exams.

101. Which is wrong about IPv6 Over VXLAN?


A. IPv6 over VXLAN means that Vxlan's Overlay network is an IPv6 network.
B. IPv6 over VXLAN can solve the problem of insufficient IP address resources for terminal tenants.
C. The tunnel between the Layer 2 and Layer 3 gateways of the VXLAN is an IPv4 network.
D. IPv6 Over VXLAN does not generate entries.
Answer: D

102. Which is wrong about the EVPN Type 5 class routing?


A. The IP Prefix field can carry either the host IP address or the network segment address.
B. Type 5 is an IP prefix route.
C. Type 5 routing carries both Layer 2 VNI and Layer 3 VNI
D. Type 5 routing carries Layer 3 VNI.
Answer: C

103. VXLAN uses BGP EVPN to establish a tunnel. What kind of packets are used?
A. Type3
B. Type5
C. Type4
D. Type2
E. Type1
Answer: A

104. Which of the following advanced features does BGP EVPN support?
A. ARP broadcast suppression
B. VRRP over VXLAN
C. Multi-live gateway
D. VXLAN Qos
Answer: AC

105. Which of the following statements about VXLAN messages is correct?


A. The outer destination IP address is the IP address of the remote VTEP of the VXLAN tunnel.
B. The source UDP port number is 4789
C. Destination UDP port number is 4789
D. VNI has 24 bits and is used to distinguish VLAN segments.
Answer: ACD

106. Which of the following types of packets is required to implement virtual machine migration in the BGP
EVPN distributed gateway scenario?
A. Type3
B. Type5
C. Type4
D. Type2
E. Type1
Answer: D

27 / 144
The safer , easier way to help you pass any IT exams.

107. Which of the following statements about the VRRP protocol are correct?
A. Both VRRPv2 and VRRP v3 support authentication.
B. VRRPv3 does not support authentication, while VRRPv2 supports authentication.
C. VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks.
D. The owner of the Mater IP address has a VRRP priority of 255, so the priority range that can be
configured is 0-254.
Answer: B

108. HW users are transmitting a lot of files through TFTP. What protocol does TFTP rely on for
transmission?
A. IcmP and UDP
B. IP and TCP
C. UDP
D. NFS
E. FTP
Answer: C

109. When deploying LLQ, you need to configure bandwidth parameters. What is the meaning of
bandwidth parameters?
A. Provide a built-in policer to limit the maximum available bandwidth of low latency queues during
congestion
B. This parameter should be as small as possible. It means that the bandwidth is always reserved, even if
LLQ is used, this parameter will reduce the available bandwidth of the interface.
C. It indicates that the reference CR is used to calculate the burst size of the built-in tactical merging
bucket.
D. This parameter is an option because LLQ always takes precedence over other queues
Answer: A

110. Assume that the port shaping rate is 100Mbps. The input bandwidth and PIR of each service on the
interface are as follows.

28 / 144
The safer , easier way to help you pass any IT exams.

Then, after the first round of scheduling, what is the bandwidth allocated by the EF queue?
A. 30M
B. 15M
C. 90M
D. 25M
Answer: B

111. Which of the following statement about the security association SA in IPsec is wrong?
A. The SA is uniquely identified by a triplet that includes the Security Parameter Index (SP), the source IP
address, and the security protocol number used (AH or ESP).
B. Use display IPsec to view information about encryption algorithms, traffic, and other information used
between another IPsec peer.
C. IPsec only supports the use of symmetric encryption algorithms to encrypt data.
D. There must be a two-way SA between IPsec peers to establish an IPsec VPN connection.
Answer: A

112. The HW network consists of Network A and B that are connected via Router HW1 and Router HW2.
The HW network is shown in the following exhibit.

29 / 144
The safer , easier way to help you pass any IT exams.

To set up an IPSec VPN between routers HW1 and HW2, which of the following crypto access-lists must
be configured on Router HW1 in order to send LAN to LAN traffic across the encrypted VPN tunnel?
A. rule permit ip source 192.168.1.10 destination 192.168.1.2 0
B. rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0
C. rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
D. rule permit ip source 192.168.1.10 destination 10.1.2.0 0.0.0.255
E. rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
Answer: C

113. Which of the following description about the assertion mechanism is correct?
A. The size of the IP address will not be used as a condition for election during the election of the winner.
B. In the assertion mechanism, the winner is responsible for forwarding multicast data to the broadcast
network segment.
C. The assertion mechanism is used for the election of the DR.
D. In the assertion mechanism, loser shut down the interface connected to the broadcast network.
Answer: B

114. Which of the following statements about the BSR mechanism are true? (Multiple Choice)
A. A PIM-SM domain can have multiple C-BSRs, but only one elected BSR.
B. An elected BSR can collect C-RP information by using the C-RP packets received.
C. An elected BSR floods Bootstrap packets to advertise BSR information and C-RP information to all
routers in a PIM-SM domain.
D. A C-BSR can also collect C-RP information by using C-RP packets.
Answer: ABC

115. The association between the LDP and the IGP is to suppress the release of the reachable route
through the IGP. This ensures that the LDP and the IGP are synchronized to complete the network
convergence. The IGP and the LDP maintain the same path, minimize the loss of traffic, and improve the
reliability of the entire network.
A. True
B. False
Answer: A

30 / 144
The safer , easier way to help you pass any IT exams.

116. Regarding the processing mode of MPLS for TTL, which of the following description is correct?
A. In the Pipe mode, when an IP packet passes through the MPLS network, the IP TTL is decremented by
1 to the MPLS TTL field in the ingress node.
B. The TTL of the MPLS label has the same meaning as the TTL in the IP header, which can prevent the
MPLS network from generating a routing loop (according to the reason A)
C. Uniform simulation, when the IP packet passes through the MPLS network, the IP TTL of the ingress
node is decremented by 1, and the MPLS TTL field is a fixed value.
D. In MPLS VPN, if you want to hide the structure of the MPLS backbone network, you can use the
uniform mode in Ingress for private network packets.
Answer: B

117. On an MPLS VPN network, different CEs can use different routing protocols to exchange routing
information with the same PE. These routing protocols are independent from one another.
A. True
B. False
Answer: A

118. Which of the following technologies use tunneling technology to communicate between IPv6
addresses?
A. Dual Stack
B. 6to4
C. ISATAP
D. NAT64
Answer: BC

119. The following procedure for NDP to resolve the link layer address is correct or not.

A. True
B. False

31 / 144
The safer , easier way to help you pass any IT exams.

Answer: B

120. In the OSPF broadcast network, there are four routers RTA, RTB, RTC, and RTD in the same
network segment. The DR priorities are 2, 1, 1, and 0 respectively. The router ID are 192.168.1.1,
192.168.2.1, and 192.168.3.1 and 192.168.4.1. If OSPF protocol is enabled on the four routers at the
same time, what is the BDR selected by OSPF?
A. RTC
B. RTA
C. RTB
D. RTD
Answer: A

121. Which of the following information can be included in a basic network layer packet? (Multiple choice)
A. Data link layer header
B. Upper layer data
C. Network layer header
D. Path record
E. Network layer tail
Answer: BC

122. Which of the following description about configuring BGP4+ is correct? (Multiple choice)
A. The BGP4+ router-ID is the same as the BGP4 router-ID.
B. BGP4+ must use the Link-Local address when specifying the peer
C. The next hop of the BGP4+ route does not use the Link-Local address.
D. When BGP4+ configures a reflector, the roles of the reflector and the client must be consistent with the
configuration of BGP4.
E. BGP4+ does not support route reflectors.
Answer: AC

123. Regarding the stub area in the OSPF protocol, which of the following statement is correct? (Multiple
Choice)
A. ASBR cannot exist in the stub area.
B. The virtual link cannot traverse the stub area.
C. stub area is not allowed to inject type7 LSA
D. The backbone area cannot be configured as a stub area.
Answer: ABCD

124. What type of LSA does not exist in the OSPF stub area? (Multiple Choice)
A. Type-7
B. Type-5
C. Type-4
D. Type-3
Answer: ABC

32 / 144
The safer , easier way to help you pass any IT exams.

125. A router is configured for OSPF and is connected to two areas: area 0 and area 1. You configure
area 1 as a stub area. Which LSA types will exist inside area 1?
A. Type 7
B. Type 1 and 2
C. Type 1, 2, and 5
D. Type 3 and 4
E. Type 1, 2, and 3
Answer: E

126. An engineer performs an import operation on an OSPF router in a company network. Which of the
following statement about the introduction of a route LSA is correct? (Multiple choice)
A. The Advertising Route is set to the router-id of the ASBR.
B. netmask is set to 0
C. link state id is set to the destination network segment address
D. Use link state id and advertising Router to uniquely identify an LSA
Answer: AC

127. In broadcast network, the election of DIS is started after the neighbor relationship is established.
A. True
B. False
Answer: A

128. Which of the following statements about the ISS protocol route aggregation is correct?
A. Route aggregation can be configured and validated on all types of routers.
B. Route aggregation can only be configured on the level--1 router to take effect.
C. Route aggregation can only be configured on the level--2 router to take effect.
D. Route aggregation can only be configured on the level--1-2 router to take effect.
Answer: A

129. During the process in which IS-IS establishes a neighbor relationship, IS-IS does not send CSNP
packets on a P2P network.
A. True
B. False
Answer: B

130. OSPFv3 Router-LSA is generated for each router. It describes the interface address and cost of each
link of the router. It also contains the router ID of the neighboring router.
A. True
B. False
Answer: B

131. Which of the following description of the ISS's GR is correct?


A. The GR feature of ISIS is enabled by default.
B. ISIS's GR has a total of four timers.

33 / 144
The safer , easier way to help you pass any IT exams.

C. The ISIS's GR notifies the event and maintains the neighbor relationship through the CSNP packet.
D. ISIS's GR defines a new TLV structure to support this feature.
Answer: D

132. As shown in the figure, R1, R2, and R3 run OSPF at the same time and announce their respective
loopbacks. Which of the following description is wrong?

A. You can use the filter-policy export command to filter the loopback route of R3 in R2.
B. You can use the filter export command to filter the loopback route of R3 in R2.
C. You can use the filter import command to filter the loopback route of R3 in Area0.
D. You can use the filter-policy import command to filter the loopback route of R3 in R1.
Answer: A

133. Regarding the introduction of routes, which of the following description is wrong?
A. bgp supports both import and network when generating routes. Network mode is more accurate.
B. By default, the default metric of the external route redistributed by OSPF is 1, and the imported
external route type is Type2.
C. After ISIS's level-2 network route is imported to the level-1 network, if the import policy is not manually
configured, a routing loop is formed.
D. Introducing IBGP routes in OSPF may cause routing loops.
Answer: C

134. Which of the following description is true about the ISIS LSP fragmentation extension?
A. Enable the ISIS router to generate more LSP fragments to carry more ISIS information.
B. ISIS's fragmentation extension is equally valid for Hello packets.
C. ISIS's fragmentation extension is achieved by adding virtual systems that can scale up to 1000 virtual
systems.
D. ISIS routers can generate up to 1024 shards.
Answer: A

135. The configurations of the defined route-policy test are as follows:


ip community-filter 1 permit 100:1
ip as-path-filter 2 permit ^100$
route-policy test permit node 10
if-match community-filter 1
if-match AS-path-filter 2
apply as-path 200
Which of the following statements is true?

34 / 144
The safer , easier way to help you pass any IT exams.

A. The BGP routes will match the route-policy test only when they contain either community attribute
100:1 or as-path 100. The as-path of the matched routes is then changed to 200.
B. The BGP routes will match the route-policy test only when they contain both community attribute 100:1
and as-path 100. The as-path of the matched routes is then changed to 200.
C. The BGP routes will match the route-policy test only when they contain as-path 100. The as-path of the
matched routes is then changed to 200.
D. The BGP routes will match the route-policy test as long as they contain community attribute 100:1. The
as-path of the matched routes is then changed to 200.
Answer: B

136. Which of the following statements is true about the database synchronization process on an IS-IS
broadcast network?

A. As the DIS, R2 sends a CSNP packet periodically.


B. The interval at which R2, as the DIS, sends Hello packets is three times that of other routers.
C. As the DIS, R2 does not receive the PSNP requests from other routers.
D. R1 and R3 maintain the database consistency by sending PSNP packets periodically.
Answer: A

137. The second-layer network architecture of a company is as shown in the figure. After the engineer is
configured, the services between the departments cannot be communicated. Check the status of the
device as follows. Which is the possible reason? (No figure is shown, the MSTP three elements are
different, causing the entry to appear on the master port.)
A. The Revision Level configuration between switches is inconsistent
B. The BPDU interval configuration between switches is inconsistent.
C. The Region Name configuration between the switches is inconsistent
D. Instance VLAN mapping configuration between the switches is inconsistent
Answer: ACD

138. Two routers are connected through the serial port, but the interconnection interface cannot be pinged.

35 / 144
The safer , easier way to help you pass any IT exams.

Now check the port status as follows, which is the possible reason? (No figure is shown, one PPP, and
one HDLC, you can find the reason.)
A. Link bandwidth is not enough
B. The IP address is not on the same network segment.
C. Link layer protocol is inconsistent
D. Subnet mask does not match
Answer: C

139. When DLDP detects a unidirectional link on an interface, the default operations on Huawei devices
include: DLDP switches to the interface to Disable state, generates a trap and sets the interface state to
DLDP Down.
A. TRUE
B. FALSE
Answer: A

140. Why does RSTP converge faster than STP?


A. RSTP has more Port states.
B. RSTP has smaller timers.
C. RSTP has less overhead.
D. RSTP convergence is based on mechanisms other than the timers.
Answer: D

141. Which of the following description about the characteristics of the cross-domain vpn-Option C is
correct? (Multiple choice)
A. Up to two layers of labels need to be used in the packet forwarding process.
B. VPNV4 routes are not saved on the ASBR, and VPNv4 routes are not advertised to each other.
C. The VPN route is directly exchanged between the ingress PE and the egress PE, and no intermediate
device is required to save and advertise the VPN route.
D. Cross-domain VPN–Option-c mode is not suitable for use when spanning multiple ASs.
Answer: BC

142. Which of the following configurations can be performed to implement fast failure detection on a
network? (Multiple Choice)
A. Reduce the hold time of Join/Prune messages.
B. Reduce the interval for an interface to send Hello messages.
C. Set up a PIM BFD session between network segment neighbors.
D. Reduce the interval for sending Join/Prune messages.
Answer: BC

143. If you run the PM-SM protocol on the multicast network, you need to configure the RP. The
configuration mode of the RP is classified into dynamic RP and static RP. Which of the following
description of the RP configuration is correct?
A. When configuring a dynamic RP, you need to configure the BSR as the backup of the RP.
B. When configuring a static RP, you need to configure the BSR advertisement RP information.

36 / 144
The safer , easier way to help you pass any IT exams.

C. When configuring a static BP, you need to specify the RP information on all PIM routers.
D. When configuring a dynamic RP, you do not need to configure a BSR.
Answer: C

144. In a multicast network, which of the following situations will cause forwarding failure of multicast
traffic? (Multiple Choice)
A. Router does not have RPF routing.
B. PIM is not enabled on an RPF interface.
C. The upstream router discards the received PIM Join messages.
D. On a network with multiple egress routers, the router is not selected as the DR.
Answer: ABC

145. The IPSG can be configured with a static binding table or used with DHCP-snooping to form a
binding table.
A. True
B. False
Answer: A

146. As shown in the figure, the router load balances the traffic between the branch network 1 and the
branch network 2. In this case, the URPP defense source P address spoofing attack must be configured
in the loose mode on the physical interface of the router.

A. True
B. False
Answer: A

147. Which of the following is a single package attack? (Multiple choice)


A. Special control packet attack
B. Scanning detection attacks
C. DDoS attack
D. Malformed packet attack
Answer: ABD

37 / 144
The safer , easier way to help you pass any IT exams.

148. Which of the following statement about the digital certificate is wrong?
A. Digital signatures guarantee the integrity of digital certificates.
B. The digital certificate contains public key information.
C. When the received peer certificate is valid, but the device itself is in the wrong time and is not within the
validity period of the certificate, the authentication fails.
D. Even if the two PRI entities are not in the same CA system, the two parties can complete the
authentication as long as they can identify each other.
Answer: D

149. A newly deployed HW router is configured for Weighted Random Early Discard (WRED) on the HW
network.
WRED has which of the following characteristics? (Multiple Choice)
A. For packets of different priorities, WRED can set different packet drop thresholds and packet loss
ratios.
B. When the minimum threshold is crossed, WRED begins dropping all incoming packets (tail-drop).
C. Global Synchronization is avoided by selectively dropping packets from multiple TCP flows.
D. Low bandwidth flows are experiencing packet drop at a higher rate than higher bandwidth flows.
Answer: AC

150. Which of the following descriptions about the FTP protocol is correct?
A. In the FTP Passive mode, the client completes the initialization of the TCP session for control and data.
B. In FTP Active mode, the server uses the command "PORT" to tell the client which port it expects to
send data.
C. FTP always uses a TCP session to transmit control information and data information.
D. FTP always uses TCP port 20 to establish a data session, using ICP port 21 to establish control
Session
E. FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control
session.
Answer: A

151. If a Huawei switch runs the RSTP protocol, when will the BPDU on a port of the switch be aged?
A. On the interface, RSTP does not age BPDUs.
B. After more than 6 seconds
C. After MaxAge times out
D. After the Hold time expires
E. After the Forward Delay expires
Answer: D

152. In the process of using the LACP protocol, which of the following description is correct? (Multiple
choice)
A. You can prevent the Eth-Trunk interface from frequently flapping due to physical link reasons.
Interface eth-trunk 1
Lacp preempt enable

38 / 144
The safer , easier way to help you pass any IT exams.

Lacp preempt delay delay-time


B. You can configure the source IP address for load balancing in the enabled link aggregation group by
using the following command:
Interface eth-trunk 1
Load-balance src-dst-ip
C. You can remove a member interface in an enabled link aggregation group by using the following
command:
Interface Gigabitethemnet0/0/0
Debug
Interface Gigabitethernet0/0/1
Undo eth-trunk 1
Interface Gigabitetheret0/0/
Undo shutdown
D. You can add member interfaces to the link aggregation group enabled by the following command:
Interface Gigabitethernet0/0/1
Debug
Interface Gigabitethernet0/0/1
Trunkport Gigabitethernet0/0/
Interface Gigabitethernet0/0/1
Undo shutdown
Answer: AC

153. In the lab network, the network is built as follows. SW1 is the default configuration and SW2 disables
STP. Which of the following description about scenario is correct?

A. G0/0/2 of sw1 enters Discarding state


B. G0/0/1 of sw2 enters Discarding state
C. G0/0/2 of sw2 enters Discarding state
D. No interface is blocked
E. G0/0/1 of SW1 enters Discarding state
Answer: D

154. Which of the following are used in Ethernet networks? (Multiple Choice)
A. Non-Canonical format MAC addresses.
B. CSMA/CD for media access.
C. Canonical format MAC addresses.
D. 802.5 encapsulated frames.

39 / 144
The safer , easier way to help you pass any IT exams.

E. 802.3 encapsulated frames


Answer: BCE

155. The data result of a certain router is as shown in the figure below. According to this analysis, which
conclusion is correct?

A. The GE0/0/0 port of R3 and the neighbor are in different areas.


B. R3 is a Level-1 and Level-2 DIS on the link where Eth0/0/0 is located.
C. The circuit-level of Eth0/0/1 of the R3 router is Level-1-2.
D. Eth0/0/1 of the R3 router is enabled with both IPv4 and IPv6 ISIS.
Answer: C

156. In the broadcast network and the P2P network, when the router receives the LSP, it needs to use the
PSNP to confirm the LSDB.
A. True
B. False
Answer: B

157. Which of the following statements about the attributes of the ISIS protocol LSP packet is correct?
A. The LSP fast flooding feature first spreads out LSPs smaller than the specified number to speed up the
synchronization process of the LSDB.
B. Configure an intelligent timer generated by the LSP, which can automatically adjust the delay time
according to the change frequency of the routing information.
C. When the link state information increases, the packet length of the SP can be increased, so that each
LSP can carry more information.
D. Reduce the minimum interval for sending LSPs on an interface to speed up LSP diffusion.
Answer: AB

158. Routers R1 and R2 are configured for BGP. Both routers are in AS 65234. Routes from Router R2
are in the BGP table on Router R1, but not in the IP routing table. What could be the cause of this
problem?
A. Synchronization is off.
B. The BGP peers are down.
C. BGP multi-hop is disabled on Router R1.
D. Routing is not optimal
Answer: D

40 / 144
The safer , easier way to help you pass any IT exams.

159. Which of the following statement about the R2 routing entry is correct?

A. 2020::/64 router will appear in the IP routing table.


B. 2022::/64 router will appear in the IP routing table.
C. 2019::/64 router will appear in the IP routing table.
D. 2021::/64 router will appear in the IP routing table.
Answer: ABC

160. Regarding the OSPFv3 protocol, which of the following description is wrong?
A. When sharing a router, each OSPFv3 process runs independently.
B. Multiple instances can be run in the same OSPFv3 process on the same interface.
C. Support multiple instances running on a single link
D. The Instance ID field is included in the OSPFv3 packet header.
Answer: B

161. Which of the following statement about the LSA of OSPFv33 is correct?
A. The Link State id of the Inter-Area Prefix-LSA contains the prefix information.
B. Router-LSA and Network-LSA do not contain routing information.
C. When the Intra-Area Prefix LSA is Referenced Link State Type-2, the Referenced Link State id
contains the interface id of the DR.
D. Inter-Area-Prefix LSA also contains Link-Local information.
Answer: BC

41 / 144
The safer , easier way to help you pass any IT exams.

162. A company has built an OSPF network as shown in the following figure. The links form an OSPF
neighbor relationship. All devices have announced their own loopback address. On one day, the S1-R2
and S2-R1 links are faulty. Which of the following description is correct? (Area 0 is split)

A. R5 can learn the loopback route of R2 normally.


B. R3 cannot learn the loopback route of R2.
C. R1 can learn the loopback route of R2 normally.
D. R3 can learn the loopback route of R2 normally.
Answer: AB

163. In Huawei devices, when ISIS imports external routes and sets external route tags for routing
information, ISIS's metric types do not need to be modified, keep the default.
A. True
B. False
Answer: B

164. Which of the following description about the information of BGP4+ is correct?
A. Bgp4+ can use dampening command to suppress IBGP routes.
B. Modifying the BCP's router ID will cause the BGP connection between the routers to be re-established.
C. The Next Hop attribute in BCP4+ is represented by the Pv6 address, which can be the link-local
address of the next hop.
D. bGP4+ does not support automatic route aggregation.
Answer: ABD

165. As shown in the following figure, the corresponding peer relationship is established. The AS400
receives the 1.1.1.1/32 network route from the AS100. What is the AS-Path attribute?

42 / 144
The safer , easier way to help you pass any IT exams.

A. 100 200 300


B. 400 300 200 100
C. 100 200 300 400
D. 300 200 100
Answer: D

166. Which of the following description is true about the OSPF virtual link?
A. A virtual connection can be established in any area, and it belongs to the area itself after it is
established.
B. The virtual link uses the outbound interface P as the link address.
C. The virtual link can be used to solve the problem that area 0 is divided.
D. The cost of the virtual link is 0, it is the optimal link.
Answer: C

167. In the case of not dividing the area, which of the following description is true about the link state
routing protocol? (Multiple Choice)
A. Each router establishes a topological structure of the entire flood domain
B. Each router learns the route directly from the routing update and adds it to the routing table.
C. Routers in the flooding domain may repeatedly receive the same link state information.
D. Routers in the entire flooding domain have the same wrong path state database
E. The router will send all the wrong path status information sent by one neighbor to all other neighbors to
ensure the synchronization of the database.

43 / 144
The safer , easier way to help you pass any IT exams.

Answer: ACD

168. If the OSPF protocol is running on the network, configure the non-backbone area in the OSPP area
as the LSA with the ls-id of 0.0.0.0 in the Totally Stub Totally Stub area. Which LSA does the LSA belong
to?
A. LSA5
B. LSA2
C. LSA1
D. LSA3
Answer: D

169. When an administrator wants to manage some routes on the router during operation and
maintenance, which of the following tools can mark these routes so that the administrator can configure
the policy? (Multiple Choice)
A. If the BGP protocol is running, use the community attribute to mark the route.
B. Use ACLs to mark routes on the router.
C. Use Tag value to mark routes on the router.
D. Use ip-prefix to mark routes on the router.
Answer: AC

170. Which statements regarding IBGP or EBGP neighbors are true? (Multiple Choice)
A. BGP updates from an IBGP peer are propagated to other IBGP and EBGP peers.
B. BGP updates from an EBGP peer are propagated to other IBGP and EBGP peers.
C. IBGP peers must be directly connected; otherwise, the IBGP-multihop option must be configured.
D. EBGP peers must be directly connected; otherwise, the EBGP-multihop option must be configured.
E. IBGP neighbor peering can be established using the loopback interface address.
F. EBGP neighbor peering must use the physical interface address to establish peering.
Answer: BDE

171. In an MPLS-BGP-VPN environment, if only BGP and LDP are used to distribute labels, the MPLS
label of the packet can be up to two layers.
A. True
B. False
Answer: B

172. Which of the following description is wrong regarding the inter-domain VPN Option-B solution?
A. During the packet forwarding process, exchange the private network LSPs of the VPN on the two
ASBRs.
B. An MP-EBGP neighbor relationship needs to be established between the two ASBRs.
C. The inter-domain VPN-option-B scheme is not limited by the number of interconnection links between
ASBRs.
D. Exchange the outer label of the VPNv4 route between the two ASBRs.
Answer: D

44 / 144
The safer , easier way to help you pass any IT exams.

173. Huawei's two switches, SWA and SWB, are connected through seven Ethernet ports and are
configured with static link aggregation. The corresponding ports on the switch SW are Ethernet 1/0/2,
Ethernet 1/0/3, Ethernet 1/0/4, and Ethernet 1/0/5, Ethernet 1/0/6, and Ethernet 1/0/7. The configuration
mode is configured in the order of the ports. If the switch SWA and SWB support only 6 ports in each
aggregation group.
A. Ethernet1/0/7 Unselected port with consistent port configuration
B. Ethernet1/0/6 Unselected port with consistent port configuration
C. In the case that the configurations of the ports are the same, the SWA randomly selects one of the
seven ports as the aggregation group Unselected port.
D. Ethernet1/0/1 Unselected port when the configurations of the ports are the same
Answer: A

174. You need to configure policy routing on the router to specify that specific traffic is forwarded through
an interface.
When using policy-based routing, which two types of most typical information can be used to forward
traffic along a particular path?
A. TTL and source IP address of the packet
B. Source IP address and Layer 2 source address
C. Source IP address and specific protocols (such as FTP, HTTP, etc.)
D. Service type header and message length
Answer: C

175. As shown in the figure, the ISIS neighbor relationship between R1 and R2 has just been established.
which of the following statement is true about the database synchronization process between R1 and R2?

A. The packet sent from R1 to R2 is a PSNP packet.


B. The packet sent from R1 to R2 is a CSNP packet.
C. The packet sent from R1 to R2 is an LSP packet.
D. The packet sent from R1 to R2 is a Hello packet.
Answer: B

176. As shown in the figure, R1 and R2 are PPP links, and the direct connection ports are not on the
same network segment, but the R1 and R2 direct connection ports can communicate, and the Ethernet
link cannot communicate under the same IP planning.what are the reasons? (Multiple Choice)

45 / 144
The safer , easier way to help you pass any IT exams.

A. R1 and R2 are connected to the POS port, and the 24-bit subnet route of the direct connection port of
the other party is learned through IPCP.
B. R1 and R2 are connected to the POS port, and the 32-bit host route of the direct connection port of the
other party is learned through IPCP.
C. The interconnected POS port of R1 and R2 learns the MAC address of the peer interface through LCP,
and does not require the ARP request MAC address.
D. The data packets of the interconnected POS interface of R1 and R2 do not need to encapsulate the
Ethernet header, and do not need to use ARP to request the MAC address.
Answer: BD

177. What command can be used to prevent users from accessing multiple devices through the HUB on
the access port of the switch?
A. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernetO/0/1] port link type trunk
[Huawei-GigabitEtherneto/0/1] port trunk allow pass vlan 10
B. [Huaweiinterface GigabitEthernet 0/0/1
[Huawei-GigabitEthernetO/0/1] port link type access
[Huawei GigabitEtherneto/0/jipsg enable
C. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernet0/O] port link-type access
[Huawei-GigabitEthernet0/O] port-security enable
D. [Huawei]interface GigabitEthernet 0/0/1
[Huawei-GigabitEthernet0/O] port link-type access
[Huawei-GigabitEthernet0/O] port-isolate enable
Answer: C

178. Combined with the output result in the following figure, which statements are correct? (Multiple
Choice)

46 / 144
The safer , easier way to help you pass any IT exams.

A. R3 must be a DIS of a level-1 link


B. R3 router is level-2 router
C. R3 must be a DIS of a level-2 link
D. The system ID of the R3 router is 0003.0000.0000
Answer: CD

179. To display the routing table of router R1, the "display ip routing-table" command was issued. Router
R1 is running OSPF.
Which one of the following statements is true regarding the OSPF information in a routing table?
A. A routing designated with only an “O_ASE" represents either a type-1 or type-2 LSA.
B. A route that has been imported into OSPF can only be represented with an “O_ASE” designation.
C. Routes that are within an area (intra-area) are marked with an “O_IA” in the routing table.
D. Type-7 LSAs display routes are imported into OSPF from another process, and are indicated by an
"OSPF" marking.
E. All LSA types have unique designations in the IP routing table.
Answer: B

180. Regarding the certification of the ISIS protocol, which statements are correct? (Multiple Choice)
A. Interface authentication can implement hello packet authentication for Level-1 and Level-2.
B. After the interface authentication is configured, the IIH sent by the router must carry the authentication
TLV.
C. After the area authentication is configured, the IIH, SNP, and LSP sent by the router must carry the
authentication.
D. Two routers are configured with regional authentication and interface authentication, and the
passwords are the same. Then two routers can establish neighbor relationships.
Answer: AB

181. Regarding the BGP anti-ring mechanism, which of the following descriptions are correct? (Multiple
Choice)
A. Use the AS-PATH attribute between the autonomous systems to prevent loops.
B. The Cluster List attribute is used for the anti-ring in the reflector cluster. The router discovers that the

47 / 144
The safer , easier way to help you pass any IT exams.

cluster list of the route entry contains its own Cluster ID and rejects the route.
C. Routes learned from IBGP are not advertised to IBGP neighbors to prevent routing loops within the AS.
D. You can use the AS-CONFED-SET attribute to prevent loops within the federation.
Answer: ACD

182. Regarding Route Policy, which of the following descriptions are correct? (Multiple Choice)
A. An advanced ACL can be applied to the route-policy to filter routes.
B. The entry permit::0 less-equal 128 indicates that all IPv6 routes are allowed to pass.
C. If more than one node is defined in the Route-policy, at least one of the nodes should have a matching
mode of permit.
D. Route-Policy can only filter the default route.
Answer: BCD

183. Which of the following routing tools is unique to B6P?


A. Route-policy
B. ACL
C. IP-prefix
D. AS-path-filter
Answer: D

184. As shown in the following scene, which description is true?

A. R1 has both Level-1 and Level-2 LSDB


B. R1 can ping the interface address of R21 1oopbapk0
C. R1 has a route to R2 1oopback0 10.0.2.2/32
D. No neighbor relationship can be established between R1 and R2.
Answer: C

185. The configuration of two routers in a company is as follows. which of the following statement about

48 / 144
The safer , easier way to help you pass any IT exams.

the R1 routing table is correct?

A. Only when the priority of the R2 ISIS protocol is adjusted to 5, the P route entry with the destination
network segment of 10.1.2.2/32 on R1 is generated by OSPF.
B. If the priority of the ISIS protocol of R1 is adjusted to 5, the P route entry of the destination network
segment with the destination network segment of 10.1.2.2/32 is generated by OSPF.
C. If the priority of the R1 ISIS protocol is adjusted to 5, the P route entry with the destination network
segment of 10.0.2.2/32 on R1 is generated by ISIS.
D. If the priority of the R2 ISIS protocol is adjusted to 5, the P route entry with the destination network
segment of 10.0.2.2/32 on R1 is generated by ISIS.
Answer: C

186. Which of the following description is true about BGP aggregation?


A. After the Aggregate ipv4-address mask is configured, only the aggregated routes are advertised and
the detailed routes are not advertised.
B. For IPv6 routes, BGP supports manual aggregation and automatic aggregation.
C. BGP enables automatic aggregation by default
D. Manually aggregate routes in the BGP local routing table.
Answer: D

187. Which of the following description is wrong about BGP route selection?
A. Non-aggregated routes take precedence over aggregated routes.
B. In the case where Pref-Val and local_preference are equal, if the BGP preference of the locally
generated route, the IBGP route, and the EBGP route are the same, the locally generated valid route
takes precedence.

49 / 144
The safer , easier way to help you pass any IT exams.

C. See the following entry in the BGP routing table: * 172.16.1.11/32 0.0.0.0 10 0? Indicates that the route
is available non-optimal.
D. The route that is unreachable for nexthop is an invalid route and does not participate in the preference.
Answer: A

188. A number of transition techniques have emerged in the process of replacing a P4 address used in a
network with a Pv6 address. These technologies are divided into two categories, one is PV4/IPv6
coexistence technology and the other is v4/P6 interworking technology. Which of the following options
belong to Pv4/IP6 coexistence technology? (Multiple Choice)
A. NAT64
B. IPv6 over IPv4
C. Dual-Stack
D. ISATAP
Answer: BCD

189. Which of the following descriptions are true about the establishment process of LDP LSP? (Multiple
Choice)
A. By default, the LSR is for the same FEC. The received label mapping can only come from the optimal
next hop. It cannot be from the non-optimal next hop.
B. When the network topology changes cause the next hop neighbor to change, the LSR can directly
reestablish the LSP by using the label sent by the original non-optimal next hop neighbor.
C. In the label publishing DoD mode, for a specific FEC, the LSR does not need to obtain the label
request message from the upstream to perform label distribution and distribution.
D. The process of establishing an LSP is actually the process of binding the FEC to the label and
advertising the binding to the upstream LSR of the LSP.
Answer: BCD

190. As shown in the figure, in the hub&spoke multicast mode of MPLS bgp VPN, in order to realize that
the branch can only communicate with the headquarters, the branches cannot communicate with each
other. Which of the following schemes can the RT be set?

A. Headquarters: Import Target: 12:3 Export Target: 12:3


Branch 1: Import Target: 12:3 Export Target: 12:3

50 / 144
The safer , easier way to help you pass any IT exams.

Branch 2: Import Target: 12:3 Export Target: 12:3


B. Headquarters: Import Target: 1:1 Export Target: 3:3
Branch 1: Import Target: 3:3 Export Target: 1:1
Branch 2: Import Target: 3:3 Export Target: 2:2
C. Headquarters: Import Target: 2:2 Export Target: 3:3
Branch 1: Import Target: 3:3 Export Target: 1:1
Branch 2: Import Target: 3:3 Export Target: 2:2
D. Headquarters: Import Target: 12:3 Export Target: 3:12
Branch 1: Import Target: 3:12 Export Target: 12:3
Branch 2: Import Target: 3:12 Export Target: 12:3
Answer: D

191. Which of the following attacks are DoS (Denial of Service) attacks? (Multiple Choice)
A. Single packet attack
B. Source IP address spoofing attack
C. Man-in-the-middle attack
D. Flood attack
Answer: BD

192. Which of the following statements are true about IPSec VPN? (Multiple Choice)
A. Savage mode can support NAT traversal, while main mode does not support NAT traversal
B. Two routers establish IPSec VPN through the main mode. Starting from the fifth packet (including), the
payload data is often encrypted.
C. Two routers establish IPSec VPN through aggressive mode, then only two packets are exchanged
between the two devices to establish a tunnel.
D. Two routers can establish OSPF neighbor relationships through IPSec VPN tunnels and exchange
intranet routes.
Answer: BC

193. Configure queue-based traffic shaping. If the queue length exceeds the cache size, the tail is
discarded by default.
A. True
B. False
Answer: B

194. As shown in the figure, which of the following statement is correct? (Multiple Choice)

51 / 144
The safer , easier way to help you pass any IT exams.

If the R2 Ethernet 0/0/1 interface is down, the R1 BFD session can quickly detect the fault and notify R1 to
make the OSPF neighbor relationship down.
B. The OSPF status changes to FULL, which triggers the BFD session.
C. If the R2 Ethernet0/0/0 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is changed
to 10.0.21.2.
If the BFD function is disabled on R2, the BFD session on R1 will be down. This will result in the ospf
neighbor relationship down.
E. If the R2 Ethernet 0/0/1 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is
changed to 10.0.12.2.
Answer: AD

195. For Layer 2 VPN technology, which of the following statements are correct? (Multiple Choice)
A. VPLS is a widely used technology on the live network. It can provide Layer 3 packet transparent
transmission and achieve multi-point access.
B. The VPLS configuration is highly complex. The Layer 2 network transparently transmits BUM packets.
C. BGP EVPN supports tenant isolation, multi-homing and broadcast suppression
D. BGP EVPN solves the problem of MAC address drift and multi-tenancy that VPLS cannot support.
Answer: BCD

196. If there is a LAN running the 802.1D Spanning Tree Protocol, which of the following parameters will
the non-root switch not receive from the root switch?
A. MaxAge
B. Root cost
C. Forward delay
D. Hold time

52 / 144
The safer , easier way to help you pass any IT exams.

E. Hello time
Answer: D

197. 802.1s defines deployment for which of the following?


A. One STP instance for each set of Bridges
B. One global instance for all VLANs
C. One STP instance for each VLAN
D. One STP instance for each set of VLANs
Answer: D

198. Between the two directly connected devices that have established IBGP peers, run the shutdown
command to shut down the interface of one of the devices. The BGP connection will not be disconnected
immediately.
A. True
B. False
Answer: A

199. In order to reduce the number of OSPF routes in some stub areas, OSPF has developed a special
area function. Which of the following description is true about the OSPF special area feature?
A. Special area routers cannot establish OSPF neighbor relationships with regular area routers
B. Any OSPF area can be configured as a special area
C. As -External-lsa is released to the Stub area
D. ASBR-Summary-LSA is allowed to be advertised to the NSSA area.
Answer: A

200. An engineer builds a network topology to study the working mechanism of OSPFv3 protocol. The
configurations of R1 and R2 are as follows. What are the LSA types exchanged between R1 and R2?
(Multiple Choice)

R1 configuration
ospfv3 1
router-id 1.1.1.1
interface Gigabitethernet0/0/0
ipv6 enable
ipv6 address auto link-local
ospfv3 1 area 0
R2 configuration
ipv6
ospfv3 1

53 / 144
The safer , easier way to help you pass any IT exams.

router-id 2.2.2.2
interface Gigabitethernet0/0/0
ipv6 enable
ipv6 address auto link-local
ospfv3 1 area 0. 0 0.0
A. Router-lsa
B. Link-LSA
C. Network-LSA
D. Inter-area-prefix-lsa
Answer: ABC

201. The topology map and configuration are as follows. Now I hope that there is no detailed routing entry
of 10.6.3.3/32 in the R1 routing table. Which of the following statements can achieve this requirement?
(Multiple Choice)

A. Configure route summarization on R3 and summarize the routes to 10.0.0.0/16.


B. Configure route summarization on R2 and summarize the routes to 10.0.0.0/16.
C. Configure filter-policy on R2, match ACL 10.0.3.3/32, and apply it in the expot direction.
D. Configure filter-policy on R1, match ACL 10.0.3.3/32, and apply it in the import direction.
Answer: AD

202. As shown in the configuration, if the administrator configures OSPF on R1 but R1 cannot learn the
routes of other routers, what are the possible reasons? (Multiple Choice)

54 / 144
The safer , easier way to help you pass any IT exams.

[R1] ospf
[Rl-ospf-1] area 2
[R1-ospf-1-area-0.0.0.2] network 10.0.13.1 0.0.0.0
A. The area ID configured by this router is different from the area ID of its neighbor router.
B. This router is not configured with an OSPF process ID.
C. The router's announcement network address does not match the interface mask
D. This router is not configured with authentication, but the neighbor router is configured with
authentication.
Answer: AD

203. Configure AS-path-Filter ip as-path-filtr 10 permit_100$ to match the route received from AS100.
A. True
B. False
Answer: B

204. The following topology and configuration are available. Which of the following statements are correct?
(Multiple Choice)

A. There is no route with the destination network segment being 10.6.3.3/32 on R1.
B. There is no route with the destination network segment being 10.0.2.2/32 on R1.
C. There is a route with the destination network segment being 10.6.3.3/32 on R1.
D. There is a route with the destination network segment being 10.0.2.2/32 on R1.
Answer: AD

205. As shown in the following figure, what routes can R2 learn?

55 / 144
The safer , easier way to help you pass any IT exams.

A. R2 can learn all the routes of R1.


B. R2 can learn the route 10.1.1.0/24.
C. R2 can learn routes 10.1.2.0/24 and 10.1.3.0/24.
D. R2 can learn the LSPs of R1 but cannot add them to the routing table.
Answer: A

206. What is the role of RT in MPLS VPN? (Multiple Choice)


A. Allow the peer PE to decide which VPNv4 routes to import into the specific VRF.
B. Allow the peer PE to decide which VPNv4 routes will not be imported into the specific VRF.
C. Allow the peer CE to decide which VPNv4 routes to import into the specific VRF.
D. Allow the peer CE to decide which VPNv4 routes will not be imported into the specific VRF.
Answer: AB

207. Which of the following descriptions are wrong about BGP load sharing? (Multiple Choice)
A. IBGP routes and EBGP routes arriving at the same destination on the public network can form load
balancing.
B. If BGP load balancing is implemented, the local device needs to be configured with the peer
next-hop-local command to change the next hop address to its own address when advertise router to the
IBGP peer group.
C. The destination network segment is the same, and BGP routes with different sources can form load
sharing.
D. The AS_Path attribute of the equal-cost route that forms load sharing must be different.
Answer: ACD

208. Which of the following description is wrong about the MPLS BGP VPN?
A. IBGP establishes a stable BGP neighbor relationship for the ARPback interface address.
B. Route switching between PE and CE can be static route, OSPF multi-instance, IS-iS multi-instance,
EBGP.

56 / 144
The safer , easier way to help you pass any IT exams.

C. The TTL field in the tag has the effect of preventing loops.
D. BGP Soo is used to prevent routes routed from a VPN site from going back to the site through the
MPLS backbone. Soo is an extended community attribute automatically generated by MP-BGP.
Answer: D

209. Which of the following are the techniques for improving MPLS BGP VPN reliability? (Multiple Choice)
A. VPN GR
B. VPN FRR
C. Configure CE dual-homing networking at the access layer.
D. Private network IP routing between the PE and the CE FRR
Answer: ABCD

210. Which of the following description is wrong about the VPNv4 address?
A. When BGP advertises reachable and unreachable VPNv4 routes, it carries the RD attribute.
B. By default, the PE does not perform vpn-target filtering on the received VPNv4 routes.
C. The VPNv4 address has a total of 12 bytes, including an 8-word route identifier RD (Route
Distinguisher) and a 4-byte IPv4 address prefix.
D. Before the local PE advertises the VPNv4 route learned from the site directly connected to itself to
other PEs, it sets the Target attribute for these routes and advertises it as a BGP extended community
attribute along with the route.
Answer: B

211. Regarding the basic forwarding process of MPLS, which of the following description is wrong?
A. When the IP packet enters the MPLS domain, the tunnel ID corresponding to the destination IP
address is checked. If the tunnel ID is 0x0, the MPLS forwarding process is entered.
B. By default, the value of the label assigned to the penultimate hop node by the Egress1 node that
supports PHP is 3.
C. When the packet is forwarded in the MPLS domain, the top label of the MPLS packet is replaced with
the label assigned by the next hop according to the label forwarding table.
D. When an IP packet enters the MPLS domain, the MPLS border device inserts a new label between the
packet header and the IP header.
Answer: A

212. The multicast IP address is 229.130.130.1, and what is its corresponding MAC address?
A. 00-00-5E-02-82-01
B. 00-00-5E-82-82-01
C. 01-00-5E-82-82-01
D. 01-00-5E-02-82-01
Answer: D

213. Which of the following statement is true about IPSG technology?


A. The IPSG can perform binding table matching check on P packets that enter the interface and leave
the interface.
B. On the Huawei router, you can configure the IPSG function on the Vlanif.

57 / 144
The safer , easier way to help you pass any IT exams.

C. If an interface is configured with DHCP snooping Trust HCP ACK, DHCP NAKHCP, and Offerf packets,
other untrusted ports cannot receive these packets.
The ip source check user-bind check-item command is used to configure IP-based check packets for the
dynamic or static entries.
Answer: C

214. Which of the following is wrong about HTTPS?


A. HTTPS protocol uses TCP port 443 by default.
B. HTTPS secures access to data by using SSL VPN.
C. When using HTTPS to access a website, if the user's browser does not recognize the digital certificate
of the website, the website cannot be accessed.
D. If the HTTPS traffic contains a virus, the router cannot directly detect the virus using IPS technology.
Answer: B

215. In traffic policing, the dual-bucket dual-speed is used. The number of tokens in the C bucket is TC,
and the number of tokens in the P bucket is TP. When a message of length B enters, which of the
following statements are correct? (Multiple Choice)
A. If TP-B>0 and TC-B>0, the message is marked as green
B. If TP-B>0 and TC-B<0, the message is marked as yellow
C. If TP-B<0 and TC-B<0, the message is marked in red
D. If TP-B>0 and TC-B<0, the message is marked as green
Answer: ABC

216. The network administrator defines the following policy for traffic policing:

If the policy is applied to a router port and there is no traffic on the port for about 10 seconds, how many
bytes of burst will be available for class cl for packets to be marked as green?
A. 256K bytes
B. 32K bytes
C. 48128 bytes
D. 80128 bytes
Answer: C

217. Which of the following types of routes are used to advertise external routes in BGP EVPN?
A. Type4

58 / 144
The safer , easier way to help you pass any IT exams.

B. Type1
C. Type2
D. Type3
E. Type5
Answer: E

218. Mainstream second-tier technologies include VXLAN, TRILL, NVGRE and MPLS.
A. True
B. False
Answer: A

219. In Huawei device, when ISIS imports external routes and sets external route tags for routing
information, the ISIS metric type does not need to be modified to keep the default.
A. True
B. False
Answer: B

220. The order for the protocols using TCP ports 443, 179, 137, 110, and 23 is:
A. BGP, POP3, SNMP, TFTP, Telnet
B. LDAP, SNMP, TFTP, POP3, Telnet
C. Https, SNMP, Pop3, DNS, Telnet
D. Finger, DHCP Server, NetBios Name Server, POP3, Telnet
E. Https, BGP, Netbios Name server Pop3, TelNet
Answer: E

221. What benefits can be achieved after using WRED? (Multiple Choice)
A. Thoroughly avoid congestion
B. Avoid TCP global synchronization
C. Provide minimum bandwidth guarantee
D. Provide a certain low latency
E. Can avoid UDP taking up most of the bandwidth when it is congested
Answer: BE

222. When there are multiple matching rules in the ACL of the VRP, which of the following statements is
correct about the matching order?
A. By default, match according to rule-id, from small to large
B. By default, match the permit first and deny later.
C. By default, match according to the principle of “depth first”
D. There is only one matching order and cannot be modified
Answer: A

223. Use WRED to avoid congestion. Which of the following scenarios is better for deploying WRED?
A. The main is UDP traffic in the network.
B. The main is TCP traffic in the network.

59 / 144
The safer , easier way to help you pass any IT exams.

C. Deploy on low bandwidth links.


D. Deploy on a serial link.
E. WRED randomly drops packets, the effect is not related to the scene.
Answer: B

224. Which of the following is the access control method provided by NAC? (Multiple Choice)
A. 802.1X authentication
B. AAA authentication
C. MAC address authentication
D. Web authentication
Answer: ACD

225. Use the ip as-path-filter as-path-filter-number {deny | permit} regular-expression command to


configure the as-path filter.
In this command, multiple clauses can form an as-path-filter statement.
So what is the relationship between multiple statements?
A. Relationship with
B. Relationship or
C. The routes are matched in order. When a route matches a clause, it no longer matches downwards.
D. The routes are matched in order and the route needs to match all the clauses.
Answer: C

226. Command ip ip-prefix ip-prefix-name [index index-number] { permit | deny} ipv4-address mask-length
[greater-equal greater-equal-value ] less-equal less-equal-value]Hf-IP- Prefix-filter.
If the less-equal of a prefix list has been specified, but the greater-equal is not specified, what is the range
of the prefix?
A. [0,less-equal-value
B. mask-length, less-equal-value
C. [less-equal-value, 32
D. No restrictions
Answer: B

227. Which of the following is true about Smart-link? (Multiple Choice)


A. Smart-link can be mixed with STP under the interface.
B. Smart-link supports load sharing.
C. Smart-link mainly includes two roles: primary port and slave port.
D. Smart-link cannot detect the uplink and downlink status.
Answer: BC

228. In multicast network, what happens to multicast traffic that cannot be forwarded normally? (Multiple
choice)
A. The router does not have RPF routes.
B. PIM is not enabled on the RPF interface.
C. The upstream router discards the received PIM Join message.

60 / 144
The safer , easier way to help you pass any IT exams.

D. Multi-router exit network, this router is not DR


Answer: ABC

229. Which of the following is the correct description of the Register message in PMSM? (Multiple choice)
A. Register message is sent by the receiver router
B. Register message enables the RP to learn multicast source information.
C. Register message is sent by the source DR
D. Register message is sent to the RP by unicast instead of multicast.
Answer: BCD

230. When a router constructs its own routing table based on routing entries learned by different routing
protocols, which routing entries are added to the routing table?
A. The routing entry with the largest preference value
B. Have a routing entry with a low router ID
C. The route entry with the largest next hop address
D. Routing entries with the fastest routing process
E. Unique routing entries
Answer: E

231. Which of the following is correct about the ISIS GR description?


A. The GR feature of ISIS is enabled by default.
B. ISIS GR has four timers.
C. ISIS GR notifies the event and maintains the neighbor relationship through the CSNP message.
D. ISIS GR defines a new TL structure to support this feature
Answer: D

232. There is an existing router HW1 running OSPF. The interface Sera0 of HW1 is released in area 0,
and the interface Sera1 is released in area 1. Run the "nssa default-route-advertise" command in the
OSPF process.
Based on the previous description, which of the following options are inferred to be correct? (Multiple
choice)
A. HW1 will inject zone 3 default routes into zone 1.
B. HW1 will inject zone 7 default route into zone 1.
C. HW1 will inject zone 7 default route into zone 0
D. When HW1 injects the default route into Area 1, the local routing table of HW1 needs to have a default
route.
E. When HW1 injects the default route into Area 1, the local routing table of HW1 may not contain a
default route.
Answer: BD

233. You are doing a job to compress the length of an IPv6 address as much as possible. The existing
IPv6 address is 2013: X000:130F:0000:0000:09C0:876A:130B. In order to make the IPV6 address more
concise, the IPv6 address can be compressed into which of the following one?
A. 2013: 0:130F:0:0:09C0:876A:130B

61 / 144
The safer , easier way to help you pass any IT exams.

B. 2013::130F::9C0:876A:130B
C. 2013: 0:130F:0:0:9C0:876A:130B
D. 213::13F:9C:876A:13B
E. 2013: 0:130F::9C0:876A:130B
Answer: E

234. In addition to stateless address autoconfiguration, IPv6 devices can also obtain information such as
address, gateway and DNS through DHCPv6.
A. True
B. False
Answer: B

235. Which of the following is the correct description of the route priority for ISIS?
A. The LeveI-1 and Leve-2 routes in the ISIS database have different routing priorities.
B. The default route of ISIS priority is 15.
C. The routing priority of ISIS cannot be modified.
D. ISIS aggregated route has a priority of 10
Answer: B

236. Which of the following is correct about the ISIS LSP fragmentation extension?
A. Enable the ISIS router to generate more LSP fragments to carry more ISIS information.
B. ISIS fragmentation extensions are equally valid for Hello packets.
C. ISIS fragmentation extensions are achieved by adding virtual systems, which can be expanded to a
maximum of 1000 virtual systems.
D. The maximum number of fragments that an ISIS router can generate is 1024.
Answer: A

237. Routers HW1 and HW2 are IP multicast routers. These routers use the (S, G) entry to forward
multicast packets.
Which of the following is correct about the "S" in the forwarding entry?
A. SSM address
B. Manage a part of the multicast address
C. SDP/SAP address
D. Any A, B or C host address
E. GLOP address
Answer: D

238. In the HW MPLS network, which parameters are used to define a forwarding equivalence class?
(Multiple choice)
A. IP prefix
B. Layer 2 link
C. BGP MED value
D. RSVP requests resource reservation from CE
Answer: AB

62 / 144
The safer , easier way to help you pass any IT exams.

239. What is the role of the command peer ignore?


A. Delete BGP neighbors
B. Keep the neighbor configuration and maintain the BGP neighbor relationship, but cannot accept the
route sent by the neighbor.
C. Keep the neighbor configuration and maintain BGP neighbor relationships, but cannot advertise routes
to neighbors
D. Keep the neighbor configuration, interrupt the BGP neighbor relationship, and clear all related routing
information.
Answer: D

240. Which of the following description of the 8021s deployment features is correct?
A. Multiple bridges share a spanning tree instance
B. All VLANs share a spanning tree instance
C. Each VLAN shares a spanning tree instance
D. Multiple VLANs share a spanning tree instance
Answer: D

241. The default type of router in ISIS is Level-2.


A. True
B. False
Answer: B

242. The network administrator defines a traffic policing strategy such as


[Huawei] display traffic policy user-defined
User Defined Traffic Policy Information:
Policy: p1
Classifier c1
Operator: OR
Behavior: b1
Committed Access Rate:
CIR 256(Kbps), PIR 0 (Kbps) CBS 48128 (byte), PBS 80128 (byte)
Color Mode: color blind
Conform Action: pass
Yellow Action: pass
Exceed Action: discard
statistic: enable
The router port that uses this policy has been idle for about 10 seconds. At this time, there are huge
bursts of c1 type traffic coming in an instant, so how many bytes will be colored in the green packet?
A. 2K bytes
B. 32K bytes
C. 48128 bytes
D. 80128 bytes
Answer: C

63 / 144
The safer , easier way to help you pass any IT exams.

243. If the topology of the entire network does not change, only the IP network segment allocation in the
router changes, ISIS only uses the PRC to calculate the changed routing information, and does not
recalculate the SPT.
A. True
B. False
Answer: A

244. In an HW multicast network, the device needs to send an SSM message. What is the range of
multicast addresses reserved for SSM?
A. 232.0.0.0-232.0.0.255
B. 233.0.0.0-233.255.255.255
C. 232.0.0.0-232.255.255.255
D. 239.0.0.0-239.255.255.255
Answer: C

245. Regular expressions can be used in Community-filter and AS-path-filter to define attribute types for
route filtering.
A. True
B. False
Answer: A

246. There are now two gateway routers that provide services for hosts on a LAN network to connect to
the extranet. What techniques should be used on these two redundant routers to make them the default
gateway for hosts in the LAN network?
A. DHCP
B. RIP
C. OSPF
D. VRRP
E. BOOTP
Answer: D

247. What do we usually call the devices in the MPLS BGP VPN domain? (Multiple choice)
A. P
B. CP
C. PE
D. User router
Answer: AC

248. If the host HW1 in the HW device network wants to join a video conference, what does the host do?
A. Send IGMPv2 membership report unicast to the default router on the local network.
B. Sending an IGMPv2 membership report through multicast on the local network, and the multicast
address carried in the IGMPv2 membership report is the joined multicast address.
C. Send a unicast IGMPv2 membership report to the RP

64 / 144
The safer , easier way to help you pass any IT exams.

D. Send the IGMPv2 membership report through multicast on the local network. The destination multicast
address sent by the IGMPv2 membership report is "all PIM routers" 224.0.0.2 multicast address.
Answer: B

249. In an MPLS VPN network, some devices maintain VPN routing information and private network
information to ensure that VPN packets can be forwarded. These devices not only need to run routing
protocols but also need to run MP-BGP and MPLS protocols. What types of these devices are?
A. CE
B. PE
C. P
D. Host
Answer: B

250. How do 802.1w and 802.1D handle BPDUs?


A. The 802.1w bridge only forwards BPDU packet received from the root bridge.
B. The 802.1D bridge does not forward BPDU packet.
C. The 802.1D bridge only forwards BPDU packet received from the root bridge.
D. The 802.1W bridge does not forward BPDU packet.
Answer: C

251. What are the differences between traffic policing and traffic shaping? (Multiple Choice)
A. For traffic shaping, the router will buffer excess packets until the bandwidth is available again.
B. For traffic policing, you can adjust the usage of the cache for traffic exceeding CIR.
C. For traffic shaping, you can adjust the usage of the buffer for traffic exceeding CIR.
D. Apply traffic shaping in the direction of the entrance and use traffic policing in the direction of the exit.
E. Traffic policing uses the token bucket algorithm, and traffic shaping uses the SPD algorithm.
Answer: AC

252. Which control bit in the TCP header information can cause the receiver to reset the TCP connection?
A. SND
B. ACK
C. CLR
D. RST
E. PSH
F. SYN
Answer: D

253. The fields indicating priority in the VLAN (802.1Q) data encapsulation are a total of 6 bits.
A. True
B. False
Answer: B

254. What are the common methods of learning routes in BGP? (Multiple Choice)
A. Introducing direct route

65 / 144
The safer , easier way to help you pass any IT exams.

B. Introducing static route


C. Introducing BGP routes of other AS
D. Receive neighbor routing information
Answer: ABD

255. Which AS_PATH can the command ip as-path-filter1 permit^12*74$ match?


A. AS PATH(321122374)
B. AS PATH(1236217432374)
C. AS PATH(1253287423)
D. AS PATH(32127423)
Answer: B

256. Which descriptions are correct about the BGP reflector? (Multiple Choice)
A. IBGP neighbor relationships need to be fully interconnected without a route reflector. The introduction
of route reflectors can reduce the requirements for full interconnection
B. The route reflector can advertise the routes learned from the non-client to all clients.
C. The route reflector can advertise other clients and non-clients from the routes learned from one client.
D. The route reflector can advertise all clients and non-clients from routes learned from IBGP neighbors.
Answer: ABC

257. MPLS BGP VPN is a Layer 3 VPN technology used to provide VPN solutions (PPVPN).
What are the basic components of MPLS BGP VPN?
A. CE and P
B. PE, P and CE
C. P and PE
D. SP
Answer: B

258. In RSTP, which port can provide the backup path to reach the root node of the spanning tree? What
status is the port in?
A. Root port and Listening status
B. Alternate port and Forwarding status
C. Alternate port and Learning status
D. Designated port and Listening status
E. Alternate port and Discarding status
Answer: E

259. If a switch runs RSTP, which interface on the switch will send BPDU carrying the Proposa logo?
A. The specified port in the forwarding state
B. Designated port in non-forwarded state
C. Root port in the Blocking state
D. Alternate port
Answer: B

66 / 144
The safer , easier way to help you pass any IT exams.

260. To enable the routers at both ends of the IPv6 over IPv4 manual tunnel to exchange routing
information, you can enable OSPFv3 on the tunnel. OSPFv3 can form a neighbor relationship and use the
tunnel interface as a P2P tunnel interface.
A. True
B. False
Answer: A

261. ISIS authentication types include interface authentication, area authentication, and routing domain
authentication.
A. True
B. False
Answer: A

262. User wants to enable the router for packets forwarding and routing according to the policy defined by
itself based on the traditional route forwarding.
To achieve this goal, policy routing can be employed.
Which of the following about the description of policy routing is wrong?
A. Policy routing cannot be used to set IP Precedence
B. Policy routing cannot set DSCP in a statement
C. Policy routing can set the next hop IP address
D. Policy routing can be used to match the packet length
Answer: A

263. Which of the following is the correct description of OSPF adjacency and link state database
synchronization?
A. When the state of the OSPF router reaches the LOADING state, the FULL adjacency is formed.
B. The adjacency relationship starts from the EXSTART state.
C. FULL adjacencies are formed between all routers in the broadcast network.
D. The INT status indicates that the router has received a Hello packet from the neighbor and the Hello
packet already contains its own router ID.
Answer: B

264. Cross-device link aggregation enables data stream transmission and mutual backup of stack
member switches. However, because of the limited bandwidth of stack cables between stack devices,
which of the following methods can improve forwarding efficiency?
A. Connect stack devices through stack cards
B. Enable stack multi-master check function
C. Configure stack system MAC address switching
D. Enable traffic local priority forwarding
Answer: D

265. Which of the following description about the CHAP authentication function in the PPP protocol is
correct? (Multiple Choice)
A. If the authenticator does not configure a username, the password cannot be configured on the

67 / 144
The safer , easier way to help you pass any IT exams.

authenticated interface.
B. Calculate a Hash value by the MD5 algorithm using the authentication sequence ID, random number
and key
C. Three-message interactive authentication is required, and the username is transmitted only on the
network without transmitting the password.
D. The user name must be configured under the authenticated interface of CHAP authentication.
Answer: BCD

266. An existing switch runs RSTP. If the network topology changes, what happens to the Layer 2
forwarding entries learned automatically by the switch?
A. All entries are deleted
B. Only entries related to the port that received the TC message will be deleted.
C. Other entries are deleted except the entries related to the edge port.
D. If the aging time is set to 15 seconds, the entries that exceed the aging time will be deleted.
E. Other entries are deleted except the entries related to the edge port and the entries related to the port
that receives the TC message.
Answer: E

267. Which of the following description of the MUX VLAN in the Huawei switch is correct?
A. In the same VLAN, the MUX VLAN can be mixed with the Super VLAN to use.
B. The MUX VLAN is divided into a Principal VLAN and a Subordinate VLAN. The Subordinate VLAN is
further divided into a Separate VLAN and an Isolate VLAN.
C. Each Separate VLAN can be bound to multiple Principal VLANs
D. Principal Port can communicate with all interfaces in the MUX VLAN
Answer: D

268. When you troubleshoot a LAN that has Huawei devices deployed, you find that there are many
unicast frames with unknown source MAC addresses in the LAN. What is the greatest harm that many
unknown source MAC address unicast frames will cause to the switch?
A. Consume available bandwidth
B. Increase the power consumption of the power supply
C. Occupy the memory of cached frames
D. Consume available MAC address entries in the system
E. Occupy TCAM entries
Answer: D

269. Which of the following description about the process of sending and receiving data frames in the
Access mode of the switch interface is correct?
A. Directly discard when receiving a tagged data frame in Access mode.
B. Only receive unlabeled data frames in Access mode
C. When the data frame enters the switch interface, the switch learns the destination MAC address in the
data frame.
D. In the Access mode, the VLAN tag of the data frame will be stripped off when sent.
Answer: D

68 / 144
The safer , easier way to help you pass any IT exams.

270. In RSTP, which port can provide the backup path that has reached to the root node of the spanning
tree? What state is the port?
A. Alternate port and Learning state
B. Alternate port and Forwarding state
C. Root port and Listening state
D. Designate port and Listening state
E. Alternate port and Discarding state
Answer: E

271. Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice)
A. Authentication is unsuccessful
B. The BGP protocol version is inconsistent
C. IBGP – Multi-hop not configured
D. IGP routing is unreachable
Answer: ABD

272. Which of the following about the RD attribute filter of BGP is correct? (Multiple Choice)
A. If RD-filter is configured, but the RD of the route does not match any of the RDs defined in the rule, the
default match result is Permit.
B. The relationship between the rules configured by RD-filter is "or".
C. If RD-filter is not configured, but this RD-filter is used for filtering, the matching result is deny.
D. Match multiple rules in the order of configuration
Answer: BD

273. ISIS will elect DIS in the broadcast multi-access network. Which of the following statement about DIS
is correct? (Multiple Choice)
A. ISIS elects the DIS by comparing the priorities, and compares the MAC addresses if the priorities are
the same.
B. DIS guarantees database synchronization by periodically sending CSNP messages
C. In a broadcast multi-access network, the DIS sends Hello PDUs three times as often.
D. DIS supports the preemption function. After the new DIS preemption is successful, it does not need to
flood any LSPs.
Answer: ABC

274. What is the correct description about Filter-policy?


A. Filtering the generation of type 5 LSA and type 7 LSA on the ASBR in OSPF using Filter-Policy
B. The prefix list can filter routes as well as filter packets.
C. Filter-Policy can filter the received or advertised link state information, and can modify the attributes of
the route entry.
D. When filtering routes using the prefix list, the entry ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 means
that only the default route is matched.
Answer: A

69 / 144
The safer , easier way to help you pass any IT exams.

275. The OSPFv3 protocol is a separately developed protocol. It differs from OSPFv2 in that OSPFv3 is
based on links rather than network segments. Which of the following statement is incorrect?
A. The two routers connected to the link can establish neighbor relationships even if their IPv6 address
prefixes are different.
B. The two routers connected to the link can establish neighbor relationships even if no unicast IPv6
address is configured.
C. The routing information obtained by the OSPFv3 router from the neighbor uses the link-local address
of the neighbor as the next hop of the forwarded packet.
D. All OSPFv3 interfaces use the Link-local address as the destination address of the packet except the
virtual link.
Answer: D

276. Regarding the sliding window of TCP, which of the following descriptions are wrong? (Multiple
Choice)
A. After the retransmission timer expires, the sender has not received the acknowledgement and will
retransmit the unconfirmed data.
B. The sender does not need to transmit a complete window size message.
C. TCP sliding window allows multiple packets to be sent before receiving an acknowledgment
D. The sliding window size can only be increased or left unchanged
E. The sender announces the initial window size
Answer: DE

277. As shown in the figure, in the IPv4 and IPv6 environment, the SEL field in the ISIS NET address
always takes the value 00.

A. True
B. False
Answer: A

278. As shown in the figure, a part of LSP of the LSDB of a router is shown in the first line of the figure.
First received a new LSP, the second hop is shown in the following picture, which of the following
statement is wrong?

70 / 144
The safer , easier way to help you pass any IT exams.

A. The router will put the newly received LSP into the LSDB.
B. The router will ignore the LSP received from the neighbor.
C. If it is a point-to-point network, the router will send PSNP
D. If it is a broadcast network, the DIS will be in the next CSNP packet, including the summary Information
of the LSP.
Answer: B

279. To view the routing table of router R1, execute the command "display ip routing-table" on the route
R1. Router R1 runs OSPF. Which of the following is true about the OSPF information in the routing table?
A. In the routing table, the routing entry identified by the "O_ASE" identifier indicates that the entry was
learned through a Type 1 LSA or a Type 2 LSA.
B. In the routing table, the routing entry identified by the "O_ASE" identifier indicates that the entry can
only be learned through routing.
C. In the routing table, the routing entry identified by the "O_IA" identifier is the intraregional routing.
D. In the routing table, the routing entry identified by the "OSPF" identifier are learned through the Type 7
LSA imported from other processes to OSPF.
E. In the routing table, all types of LSAs correspond to unique destination addresses.
Answer: B

280. Regarding the Stub area and the NSSA area of the OSPF protocol, which of the following statement
is incorrect?
A. Type 5 LSA is not allowed in the Stub area, and Type 5 LSA is allowed in the NSSA area.
B. Both the Stub area and the NSSA area can inject Type 3 LSAs.
C. Both the Stub area and the NSSA area are not allowed to inject Type 4 LSA.
D. Type7 LSA is not allowed in the Stub area, and Type 7 LSA is allowed in the NSSA area.
Answer: A

281. Regarding BGP route filtering, what is wrong with the following description? (Multiple Choice)
A. For a locally advertised route, configure a routing policy. The policy takes effect before the route is
added to the BGP routing table.
B. The filtering relationship between the nodes of the Route-Policy is "or", that is, if it is filtered by a node,
it can pass route-policy.
C. When receiving a route of a BGP peer, perform a routing policy to filter unwanted BGP routes. These

71 / 144
The safer , easier way to help you pass any IT exams.

routes are not added to the local BGP routing table.


D. In the same node of Route-Policy, the relationship of multiple if-match clauses for different attributes is
"OR".
Answer: AD

282. If the value of the Option field in the OSPFv3 Hello packet sent by GigabitEthernet 0/0/0 interface of
Router A is 0x000013, which of the following description is correct? (Multiple Choice)
A. GigabitEthernet0/0/0 interface of Router A belongs to the NSSA area.
B. GigabitEthernet0/0/0 interface of Router A will participate in IPv6 route calculation.
C. Router A is an OSPFv3 device with forwarding capability.
D. Router A supports AS-External-LSA flooding.
Answer: BCD

283. Which of the following statement about deploying ISIS protocol in IPv6 environment is correct?
A. In broadcast networks, the DIS priorities of IPv4 and IPv6 can be set separately.
B. By default, the DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.
C. In the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6
must be the same device.
D. Configure ISIS silent on the ISIS interface, then this interface will not send ISIS packets, but will
receive ISIS packets.
Answer: C

284. After the BGP route is imported to other protocols, the next hop in the BGP routing table is the same
as the next hop of the routing protocol imported.
A. True
B. False
Answer: B

285. There is an AS-path-filter, ip as-path-filter 1 permit ^100(_100)*(_400)*, which AS-PATH attribute


cannot be matched by the As-path-filter?
A. 100 400
B. 100 400 400 400
C. 100 200 900
D. 100
Answer: C

286. Regarding the BGP confederation, which of the following description is incorrect?
A. The confederation divides an AS into several sub-AS confederation. External As still considers the
confederation to be an AS.
B. The sub-AS number of the confederation is advertised to BGP peers outside the confederation by
default.
C. The sub-autonomous system within the confederation can use a private AS number. A Huawei NE/AR
router can be configured with up to 32 sub-AS in a single confederation.
D. The confederation can easily detect the routing loop within the AS because EBGP is running between

72 / 144
The safer , easier way to help you pass any IT exams.

the sub-As.
Answer: B

287. What is the correct description of the BGP reflector? (Multiple Choice)
A. The route reflector can advertise the routers learned from IBGP neighbors to all clients and non-clients.
B. IBGP neighbor relationships need to be fully interconnected without a route reflector. The introduction
of route reflectors can reduce the requirements for full interconnection.
C. The route reflector can advertise the routes learned from the non-client to all clients.
D. The route reflector can advertise the routes learned from one client to other clients and non-clients.
Answer: BCD

288. VXLAN needs to be accessed under different VPN subnets. One subnet information is as follows.
EVPN RT 10:10 both, RT 1000:1000 export, VPN RT 100:100. What is the configuration of another
subnet? (Multiple Choice)
A. EVPN configuration 1000: 1000 export
B. VPN configuration 10:10 both
C. EVPN configuration 1000: 1000 both
D. VPN configuration 1000:1000 both evpn
Answer: CD

289. After the BGP connection is successful, then down, what are the reasons for the impossible?
A. Open packet negotiation failed.
B. The mandatory attribute in the routing update message is lost.
C. After the BGP connection is established, the keepalive packet is not received within the negotiated
holdtime.
D. Received incorrect BGP packets.
Answer: A

290. When ISIS area authentication is configured, which ISIS packet can carry the authentication
information?
A. Level-1 SNP and LSP of ISIS
B. Level-1 Hello message of ISIS
C. Level-2 SNP and LSP of ISIS
D. Level-2 Hello packet of ISIS
Answer: A

291. The Type 5 LSA in OSPF is used to pass external routes. Which of the following statement about the
five Type 5 LSA is wrong?
A. The router in the same area as the ASBR can calculate the external route through the intra-area LSA
and the Type 5 LSA.
B. Configure the corresponding policies on the ABR and ASBR to filter the Type 5 LSA.
C. The Type 5 LSA is advertised by the ASBR and flooded in the OSPF network in the non-Stub/NSSA
area.
D. The FA address is included in the Type 5 LSA, and the FA address is 0.0.0.0, but has no practical effect

73 / 144
The safer , easier way to help you pass any IT exams.

as a reservation.
Answer: D

292. About the domain-authentication-mode md5 hello command in the ISIS process, which of the
following is the correct explanation?
A. The routing domain authentication is used to enable SNPs and LSPs of Level-1 and Level-2 to carry
authentication information during the delivery process.
B. The domain authentication mode of all routers in the same routing domain is MD5, the password is
hello, and the ISIS SNP and LSP spread normally.
C. This command is mainly used to enable ISIS Hello packets to carry authentication information during
the delivery process.
D. ISIS certification cannot be applied in IPv6 environment.
Answer: B

293. The Level-2 LSP is transmitted to the Level-1 area by Level-1-2 IS. If the location of ATT is in the
Level-2 LSP is 1, it indicates that the Level-1 in the area can pass the Level-1-2 IS to the outside area.
A. True
B. False
Answer: B

294. In the OSPF broadcast network, there are four routers in the same network segment, RTA, RTB,
RTC and RTD, whose DR priorities are 2, 1, 1, and 0, and the router IDs are respectively 192.168.1.1,
192.168.2.1,192.168.3.1 and 192.168.4.1. If OSPF is enabled on all the four routers, the BDR selected by
OSPF is ().
A. RTB
B. RTC
C. RTA
D. RTD
Answer: B

295. Which AS_PATH can be matched by command ip as-path-filter 1 permit ^12.*74$?


A. AS_PATH (32 1274 23)
B. AS_PATH (123 621 743 2374)
C. AS_PATH (321 12 2374)
D. AS_PATH (125 328 74 23)
Answer: B

296. The OSPF protocol is running on a company network. To understand the OSPF mechanism to
perform packet capture operations on the network, which of the following description about the OSPF
packet is correct? (Multiple Choice)
A. LS Update message synchronizes the link state database by sending detailed LSA information.
B. After receiving the LS Update message, the router must send LS Ack to confirm.
C. Sending Hello packets immediately after the interface joins the OSPF area.
D. The LS Update message is sent only when the adjacency is established.

74 / 144
The safer , easier way to help you pass any IT exams.

Answer: AC

297. In the following topology, R1 can access the Internet through R2 and R3. The EBGP connections are
established between R1 and R2, R1 and R3. R2 and R3 belong to the same AS. The default route is
advertised through BGP. The traffic that R1 is required to access the Internet is preferably R2. Which of
the following practices can be achieved? (Multiple Choice)

A. R2 specifies that the peer R1 sets the MED attribute to 150 in the export direction.
B. R1 specifies that the peer R3 sets the MED attribute to 150 in the import direction.
C. R2 specifies that the peer R1 sets the local priority to 150 in the export direction.
D. R1 specifies that the peer R2 sets the local priority to 150 in the import direction.
Answer: BD

298. In addition to stateless address auto-configuration, IPv6 devices can also obtain information such as
address, gateway, and DNS through DHCPv6.
A. True
B. False
Answer: B

299. The network administrator prepares to use the 6to4 automatic tunnel to carry IPv6 data on the IPv4
network. The IPv4 address of the router interface is 138.14.85.210, so the corresponding tunnel address
is 2001:8a0e:55d2:1:230:65ff:fe2c:9a6.
A. True
B. False
Answer: B

300. In an IPv6 network, two nodes A and B are neighbors each other. If node A sends an NS message to
node B, if node B receives a message and then replies the NA message, then checked on node A, what
will the neighbor status be marked?
A. Reachable
B. Stale
C. Probe

75 / 144
The safer , easier way to help you pass any IT exams.

D. Incomplete
Answer: A

301. What is wrong about the description of MPLS below?


A. The label space range of dynamic signaling protocols such as LDP and MP-BGP is 16-1023.
B. The length of the MPLS label is 20 bits and it is used for packet forwarding.
C. In the TTL processing mode by using Pipe mode, IP packets are transmitted on the MPLS network.
The TTL value of the IP packets is reduced by 1 in the MPLS ingress node and the egress node
respectively.
D. MPLS supports multi-layer tag nesting, the S-bit value of the innermost tag is 1.
Answer: A

302. RD is used to distinguish the same IP address in different VPNs. How many bits does the RD
contain?
A. 16
B. 64
C. 32
D. 128
Answer: B

303. In the packet forwarding of the cross-domain VPN-Option B mode, the two ASBRs will exchange the
LSP labels of the public network once.
A. True
B. False
Answer: B

304. Which of the following about the MPLS label related information is wrong?
A. The MPLS label is 4 bytes long and is encapsulated between the link layer and the network layer.
B. By default, the device supports the PHP feature, and the label value of the egress node supported PHP
that is assigned to the penultimate hop node is 3.
C. If the bottom mark of the label is S=0, it indicates that the label is the bottom label of the stack and
directly performs IP forwarding.
D. When the tag value is 0, it indicates that the tag should be ejected, and the packet must be forwarded
based on IPv4.
Answer: C

305. View the details of all VPN instances on a network device, the results are as follows. Which of the
following statements are incorrect? (Multiple Choice)

76 / 144
The safer , easier way to help you pass any IT exams.

A. The total number of instances of the IPv6 address cluster enabled in the VPN configured on the local
end is 1.
B. The device will assign a label to each route of the VPN-Instance vpna.
C. VPN-Instance vpna will not receive VPN routes with RT 2:1.
D. GigabitEthernet 1/0/0 interface is bound to the VPN-Instance vpna.
Answer: AB

306. Which of the following description about LDP reliability is incorrect?


A. LDP FRR can also be used to generate an LSP for the label mapping from the non-optimal next hop.
And it can be a backup of the main LSP, to establish the forwarding entries.
B. The association between the LDP and the IGP requires the IGP to suppress the advertisement of the
route and ensure that the LDP path is consistent with the IGP path.
C. The manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to
establish a backup LSP.
D. LDP GR (Graceful Restart) uses the feature that MPLS forwarding plane is separated from the control
plane to ensure that the device does not interrupt forwarding during protocol restart or active/standby
switchover.
Answer: C

307. What improvements have been made to the IGMPv2 protocol compared to IGMPv1? (Multiple
Choice)
A. Added specific group query message
B. Added off-group messages

77 / 144
The safer , easier way to help you pass any IT exams.

C. Added maximum response time field


D. Added specific source group query messages
Answer: ABC

308. If multiple candidate RPs are configured in a certain group of multicasts, which of the following
parameters need to be compared for selecting the RPs from the multiple candidate RPs? (Multiple
Choice)
A. The priority of C-RP
B. The group scope mask length of the C-RP service matching the group address which the user joins
C. IP address of the C-RP interface
D. Number of the C-RP interface
Answer: ABC

309. When running PIM-SM between multicast routers need to elect a DR to be responsible for sending
and receiving multicast data at the source or member end, what is the correct description of the DR
election rule?
A. Compare the DR priorities first, if the priorities are the same, you need to compare the IP addresses of
the PIM router interface to elect DRs.
B. The PIM router with a long interface mask is elected as the DR.
C. The PIM router with a low DR priority value is elected as the DR.
D. The router with a small IP address is elected as a DR.
Answer: A

310. If running PIM-SM on a multicast network, you need to construct a multicast forwarding tree between
the multicast source and the receiver to enable the receiver to receive multicast data. Which of the
following description about the constructed multicast forwarding tree is correct? (Multiple Choice)
A. The RTP tree is built between the RP and the receiver.
B. The RPT tree is built between the multicast source and the RP.
C. The SPT tree is built between the RP and the receiver.
D. The SPT tree is built between the multicast source and the RP.
Answer: AD

311. As shown in the figure, the IPSEC VPN is established between the branch and the headquarters
using redundant links. At the same time, URPF is enabled for the traffic from the branch 1 on Router_B.
Which of the following options is correct? (Multiple Choice)

78 / 144
The safer , easier way to help you pass any IT exams.

A. When using IPSEC main-link redundant backup, URPF loose mode is recommended when the URPF
function is used on the physical interface.
B. When using IPSEC multi-link redundancy backup, URPF strict mode can be used when enable URPF
function on the tunnel interface.
C. When using IPSEC main-link redundant backup, URPF strict mode can be used when the URPF
function is used on the physical interface.
D. When using IPSEC multi-link redundancy backup, RPF strict mode can be used when enable URPF
function on the physical interface.
Answer: AB

312. The HTTP protocol is based on TCP, so you can use the TCP Flood attack defense method to
defend against HTTP Flood attacks.
A. True
B. False
Answer: B

313. As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same
time, an IPSEC tunnel needs to be established between the two IPv6 networks for communication. Which
of the following encapsulation modes can meet the above requirements?

A. ESP+ tunnel mode


B. None of the above options
C. AH+ transmission mode
D. AH+ tunnel mode
Answer: A

314. When there are multiple matching rules in the ACL of the VRP, which of the following statements is
correct about the matching order?
A. In case of confirmation, follow the Rule-ID, match from small to large
B. By default, match according to the principle of “depth first”
C. In case of confirmation, match the order by matching the permit first and then matching the deny.
D. There is only one matching order and cannot be modified.
Answer: A

315. The LAND attack is performed by the attacker sending a source address and a destination address
to the destination host are the destination host, the same SYN packet on source port and the destination
port. When the receiver waits for the final ACK packet from the sender, the connection is always in a
semi-connected state, resulting in waste of limited TCP resources at the receiving end.
A. True

79 / 144
The safer , easier way to help you pass any IT exams.

B. False
Answer: B

316. What is the relationship between CIR, BC and TC?


A. TC=CIR/BC
B. CIR=TC/BC
C. CIR=BE/TC
D. TC=BC/CIR
Answer: D

317. A home user has opened a 10Mb/s broadband. To improve the user experience, the operator can
stabilize at 12Mb/s when performing speed measurement. If we use token bucket technology to achieve
this demand, which of the following is the best?
A. cir 10000 pir 12000
B. cir 10000 cbs 10000 pbs 12000
C. cir 8000 pir 12000
D. cir 10000 cbs 12000 pbs 12000
Answer: A

318. Which of the following options is correct for the description of the optimal routing elections for various
protocols?
A. OSPF puts all routing information in the LSDP into the IP routing table.
B. The route with the next hop unreachable in BGP is also put into the IP routing table.
C. Learn different routing entries to the same destination network segment from BGP and OSPF, and
select the optimal route to join the IP routing table by comparing the preference value of the protocol.
D. Select the best route to the same destination network segment by comparing the cost value of the
route entry in BGP protocol.
Answer: C

319. The following topology diagram, all the interfaces of the router in the figure open the ISIS protocol,
which of the following statement is correct? (Multiple Choice)

80 / 144
The safer , easier way to help you pass any IT exams.

A. If the GE0/0/0 interface of R3 is down, then R2 will become the master device.
B. If the Ethernet 0/0/0 interface of R3 is down, then R2 will become the master device.
C. If the Ethernet 0/0/0 interface of R1 is down, then R2 will become the master device.
D. If the Ethernet 0/0/1 interface of R1 is down, then R2 will become the master device.
Answer: ACD

320. Which of the following statements about the BFD single-arm echo function are correct? (Multiple
Choice)
A. The BFD single-arm echo function must be configured with a local identifier and a remote identifier.
B. The default destination IP address of the BFD single-arm echo function protocol packet is 224.0.0.184.
C. BFD single-arm echo function is applicable to scenarios where one device supports BFD and the other
device does not.
D. After the BFD single-arm echo function is enabled, the destination IP and source IP of the BFD packets
are the same.
Answer: CD

321. Which of the following does not belong to EVPN Type 2 routing functions?
A. Host MAC address notification
B. Host ARP notification
C. BUM message forwarding
D. Host IP route notification
Answer: C

322. Mainstream large-scale Layer 2 technologies include VXLAN, TRILL, NVGRE, and MPLS.
A. True
B. False
Answer: A

323. One BD in VXLAN can correspond to multiple VNIs.


A. True
B. False
Answer: B

324. Which of the following is optimal for building a loop-free Layer 2 network?
A. Stack + link aggregation
B. TRILL+MSTP
C. Stack + MSTP
D. Link Aggregation + MSTP
Answer: A

325. Now, the switch MAC address table is empty by default configuration. The host A connected to the
switch sends the first unicast data frame. What operation will the switch perform after receiving the data
frame?
A. The switch will discard the data frame

81 / 144
The safer , easier way to help you pass any IT exams.

B. The switch forwards the data frame out of an interface according to the destination MAC address of the
data frame.
C. The switch records the source MAC address of the data frame and floods the data frame.
D. The switch caches the data frame and waits for the destination host to send the data frame and then
forward it.
Answer: C

326. As shown in the figure, three switches SW1, SW2 and SW3, where SW1 is the root bridge, the link
between SW1 and SW2 is congested, and SW2 cannot receive the configuration BPDU sent by the root
bridge. What kind of spanning tree protection mechanism need to configure to prevent problems caused
by link congestion?

A. Loop protection
B. Root protection
C. TC-BPDU protection
D. BPDU protection
Answer: A

327. Through the following displayed command, you can determine that switch loop fault is caused by ().
A.

B.

C.

82 / 144
The safer , easier way to help you pass any IT exams.

D.

Answer: D

328. A total of 6 bits indicating the priority field in the VLAN (802.1Q) data encapsulation.
A. True
B. False
Answer: B

329. Four routers R1, R2, R3, and R4 run ISIS, the ISIS router type is marked, and the routing table is
viewed on R1. The reason why the R1 does not reach the route of 10.34.34.4 is ( ).

83 / 144
The safer , easier way to help you pass any IT exams.

A. Configure a routing policy on R2 to filter the default route.


B. The system-ID of R2 conflicts with R3.
C. Regional planning errors for R3 and R4.
D. The system-ID of R2 conflicts with R1.
Answer: C

330. The OSPFv3 Option field appears in all LSAs.


A. True
B. False
Answer: B

331. Which of the following is true about Link-LSA of OSPFv3?


A. The Option field exists in the LSA header, not in the data area of Link-lsa.
B. Contains both the link-local address of this interface and all IPv6 prefixes of this interface.
C. If the Prefix Option field of a prefix of the Link-LSA is 0x00, the Prefix will not be included in the IPv6
unicast calculation.
D. Contains both the link-local address of the interface and all Ipv6 prefixes in the same area on the
router.
Answer: B

332. The following topology is available, which of the following statement is correct based on analysis?

A. Because R2 does route aggregation, only the routing entry of 10.0.0.0/16 exists in the IP routing table
of R1.
B. There are routing entries for 10.0.2.2/32 and 10.0.3.3/32 in the IP routing table of R1.
C. The routing entries of 10.3.3.3/32 and 10.0.0.0/16 exist in the IP routing table of R1 at the same time.
D. There are routing entries of 10.0.2.2/32 and 10.0.0.0/16 in the IP routing table of R1.
Answer: C

333. Which type of prefix will the router running BGP advertise to its own IBGP neighbor (assuming the
router is not configured as a route reflector)?

84 / 144
The safer , easier way to help you pass any IT exams.

A. The prefix is learned through the EBGP neighbor, or the prefix is learned from the RR.
B. The prefix is learned through other BGF neighbors, or the prefix is locally learned through network or
route introduction.
C. The prefix is learned through other IBGP neighbors, or the prefix is learned from the EBGP neighbor, or
the prefix is learned through the route introduction.
D. Prefix existing in routing shows
E. The prefix is learned through the EBGP neighbor, or the prefix is learned locally through the network or
route introduction.
Answer: E

334. As shown in the figure, the AS100 has two paths to access the AS400. By default, the best route is
transmitted from the AS200. It is known that the path bandwidth to the AS400 through the AS300 is better.
Therefore, doing the configuration on R2 as follows. After the configuration is complete, the optimal route
is not changed. Which of the following operations can make the configuration take effect?
[R2]ip as-path-filter 1 permit ^400$ [R2]route-policy med permit node 10 [r2-route-policy]if-match
as-path-filter 1 [r2-route-policy]apply cost 20

A. Configure deterministic-med under the BGP process of R1.


B. Configure compare-different-as-med under the BGP process of R2.
C. Configure deterministic-med under the BGP process of R2
D. Configure compare-different-as-med in the BGP process of R1.
Answer: D

335. Now there is a network consisting of router R1, router R2, router R3 and router R4. These four
routers are interconnected via a LAN network. Basic OSPF is deployed on all four routers. When you
execute the command "display ospf peer" on the router R2, the status between router R2 and router R3 is
"2way".
So, what conclusion can you draw from this output? (Multiple Choice)
A. Router R4 is DR
B. Router R2 is a DR or BDR
C. Router R2 is not DR
D. Router R3 is neither a DR, nor a BDR
E. There is no full adjacency relationship between router R2 and router R3.
Answer: CDE

336. Which of the following statement about the NSSA area is correct?

85 / 144
The safer , easier way to help you pass any IT exams.

A. In the hello message sent by OSPF neighbor in NSSA region, position N is 1 and position E is 0 in
option field
B. The NSSA region generates Type 7 LSA to inform external routing, and the FA address role in the Type
7 LSA is to prevent loops
C. The NSSA region will automatically generate a default LSA to access the external network.
D. In the hello message sent by OSPF neighbor in NSSA region, position N is 0 and position E is 1 in
option field.
Answer: A

337. In the command aggregate ipv4-address {mask | mask-length} [ as-set | attribute-policy


route-policy-name1 | detail-suppressed | origin-policy route-policy-name2 | suppress-policy
route-policy-name3], multiple parameters can be used to influence the summary route and its results.
What is the correct description about this command?
A. If the Suppress policy is configured, the aggregated route is generated. The if-match clause of the
route-policy is used to select the detailed route to be suppressed. The detailed route matching the
route-policy is still advertised to other BGP neighbors.
B. If the Origin-policy is configured, only the detailed routes matching the Route-policy can participate in
the aggregation.
C. If Attribute-policy is configured, you can change the attributes of the aggregated route.
D. If As-set is configured, AS_ATH of the summary route contains AS path information of all specific
routes to prevent routing loops.
Answer: BCD

338. There are two Community-filter ip Community-filter 1 permit 100: 1 200:1 ip community-filter 2 permit
100: 1 ip Community-filter 2 permit 200:1 Which is the correct description of the above Community-filter?
(Multiple Choice)
A. Only when the community attribute value carried in the BGP route contains 100:1 and 200:1, the BGP
route will match 2
B. Only when the community attribute value carried in the BGP route contains 100:1 and 200:1, the BGP
route will match 1
C. As long as the community attribute value carried in the BGP route contains 100:1 or 200:1 or both, the
BGP route will match the community-filter1
D. As long as the community attribute value carried in the BGP route contains 100:1 or 200:1 or both, the
BGP route will match the community-filter2
Answer: BD

339. There are two types of community-filter: basic community attribute filters and advanced community
attribute filters. Which of the following filtering tools makes the advanced community attribute filter more
flexible than the basic community attribute filter?
A. ACL
B. Regular-expression
C. AS-path-filter
D. IP-prefix
Answer: B

86 / 144
The safer , easier way to help you pass any IT exams.

340. Command ip ip-prefix ip-prefix-name [index index-number] { permit | deny } ipv4-address


mask-length [ match-network ] [ greater-equal greater-equal-value ] [ less-equal less- Equal-value ] is
used to configure ip-prefix-. If 1ess -equal- of a prefix list has been specified, but greater-equal4- is not
specified, what is the range of the prefix?
A. [mask-length, less-equal-value]
B. [less-equal-value,32]
C. No restrictions
D. [0, less-equal-value]
Answer: A

341. The interface Serial0 of an existing router is in OSPF area 1, and the interface Serial0 is set to the
Silent interface, so what effect does this setting have?
A. OSPF does not establish any adjacencies through the interface.
B. OSPF does not add routes learned from the interface to the local routing table.
C. OSPF will receive routing updates from neighbors
D. OSPF establishes available adjacencies through this interface.
Answer: A

342. Router HW is enabled with OSPF and the role of the router HW is ABR, and abr -surmnary is
configured. Which classes of LSA will be aggregated? (Multiple Choice)
A. Type 4 LSA
B. Type 5 LSA
C. Type 2 LSA
D. Type 1 LSA
E. Type 3 LSA
Answer: CD

343. Both ISIS CSNP packets and OSPF DD packets are in the MA network, describing the role of the link
state database profile. Which of the following statements is correct?
A. Both routers need to confirm the two routers after sending them. Otherwise, they need to be
retransmitted.
B. The master-slave relationship in the DD packet exchange of OSPFA is not bound to the DR/BDR. The
CSNP packet is generated only by the DIS.
C. Once the adjacency relationship is established, CSNP packets and DD packets will stop sending.
D. The two routers do not need to confirm the peer router after sending.
Answer: B

344. If the default route is not used in the local IP routing table, the default route-import command is used
to advertise the default route to the BGP peer (group).
A. True
B. False
Answer: B

87 / 144
The safer , easier way to help you pass any IT exams.

345. Which scenario can use AS-path -filter? (Multiple Choice)


A. apply clause in Route-policy
B. If-match clause in Route-policy
C. Filter the route sent to the BGP neighbor according to the AS_PATH attribute carried in the route. For
example, the command peer x.x.x.x as-path-filter export
D. Filter the route received to the BGP neighbor according to the AS_PATH attribute carried in the route.
For example, the command peer x.x.x.x as-path-filter import
Answer: BCD

346. Which of the following is true about the route penetration of ISIS? (Multiple Choice)
A. ISIS route penetration can be used in IPv6 environment.
B. ISIS route penetration does not cause neighbors to oscillate.
C. In the route penetration of ISIS, the route before penetration cannot be an aggregate route.
D. ISIS route penetration can be deployed on Level--1 router.
E. ISIS route penetration is used to prevent routing loops.
Answer: AB

347. Two EBGP neighbors connected by two parallel cables. What method will you use to achieve
bidirectional load sharing between two EBGP neighbors connected through these two parallel serial
cables?
A. Configure the EBGP neighbor relationship on the interface of the loopback and configure EBGP
Multi-hop. Configure the loopback interface as the update source and then use IGP to implement
equal-cost path load sharing between addresses.
B. Without any method, BGP automatically implements load sharing between different autonomous
systems on the available links.
C. Use the command "ebgp-load-balance" at both ends
D. Configure the EBGP neighbor relationship with the loopback interface as the update source. The IGP
in each AS must have two equal-cost paths to the EBGP neighbor loopback address. You must use the
command next-hop-local.
E. Configure the EBGP neighbor relationship with the loopback interface as the update source. The IGP
in each AS need to import two equal-cost paths to the EBGP neighbor loopback address. You must use
the commands ebgp-max-hop and next- Hop-local
Answer: A

348. OSPFv3 and ISIS are running on the router at the same time. You need to import OSPFv3 routes to
ISIS. Which of the following types of configurations is correct? (Multiple choice)
A. [Huawei] isis 1 [Huawei-isis-1] is-level level-1 [Huavvei-isis-1] network-entity
47.0001.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard [Huawei-isis-1] ipv6
import-route ospfv3 1 level-1 [Huawei-isis-1] quit [Huawei] ospfv3 1 [Huaweiospfv3-1] router-id 2.2.2.2
B. [Huawei] isis 1 [Huawei-isis-1]is-level level-1 [Huavvei-isis-1] network-entity
47.0001.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard [Huawei-isis-1] ipv6
import-route ospfv3 1 [Huawei-isis-1] quit [Huawei] ospfv3 1 [Huawei-ospfv3-1] router-id 2.2.2.2
C. [Huawei] isis 1 [Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable
topology standard [Huawei-isis-1] ipv6 import-route ospfv3 1 level-1 [Huawei-isis-1] quit [Huawei] ospfv3

88 / 144
The safer , easier way to help you pass any IT exams.

1 [Huaweiospfv3-1] router-id 2.2.2.2


D. [Huawei] isis 1 [Huavvei-isis-1] network-entity 47.0001.0000.0000.0002.00 [Huawei-isis-1]
import-route ospfv3 1 [Huawei-isis-1] quit [Huawei] ospfv3 1 [Huawei-ospfv3-1] router-id 2.2.2.2
E. [Huawei] isis 1 [Huawei-isis-1]is-level level-1 [Huavvei-isis-1] network-entity
47.0001.0000.0000.0002.00 [Huawei-isis-1] import-route ospfv3 1 level-1 [Huawei-isis-1]quit [Huawei]
ospfv3 1 [Huawei ospfv3-1] router-id 2.2.2.2
Answer: AC

349. If the router only needs to forward IPv6 packets, then no IPv4 protocol and address need to be
configured on the router.
A. True
B. False
Answer: A

350. In the intranet MPLS BGP VPNF network, when a packet enters the public network for forwarding, it
will be encapsulated with two layers of MPLS labels. The following description of the two-layer label,
which is wrong?
A. By default, the router assigns the same label value to all VPNv4 routes destined for the peer PE.
B. The private network label is carried and distributed when the route is delivered by MP-BGP. The public
network label is distributed by the LDP protocol.
C. The egress PE uses the inner label when determining which egress CE the message should be sent
to.
D. MPLS BGP VPN uses two layers of labels: public network labels (also known as outer labels) and
private network labels (also known as inner labels).
Answer: A

351. The following is about the LDP protocol session establishment process, which is the correct
description? (Multiple Choice)
A. After the TCP connection is successfully established, the active party sends an initialization message
to negotiate the parameters related to the LDP session.
B. The party with the larger transmission address acts as the active party and initiates the establishment
of TCP connection.
C. The Hello message discovered by the LDP neighbor uses TCP packets. The destination address is the
multicast address 224.0.0.2.
D. After both parties receive the Keepalive message from the peer, the LDP session is established
successfully.
Answer: ABD

352. The router HW1 exists as an MPLS LSR router in the network of the operator HW. The router
receives a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router
handle the packet?
A. Router HW1 uses LDP to create an LSP and creates a new path for the label carried in the packet in
the LFIB.
B. Router HW1 will discard the packet.

89 / 144
The safer , easier way to help you pass any IT exams.

C. Router HW1 will forward the packet using the default label.
D. Router HW1 will strip the label and find the IP destination address of the FIB.
Answer: B

353. The following statement about cross-domain MPLS VPN, which is wrong? (Multiple Choice)
A. When the public network label only use LDP, for the cross-domain vp-Option-c scheme 2, three-layer
labels are required for packet forwarding.
B. For the cross-domain vPN-Option B mode, an MP-eBGP neighbor relationship needs to be established
between the two ASBR.
C. For the cross-domain vPn-OptionA mode, the route between the two ASBR is a common IPv4 route.
D. For the cross-domain vPN-OptionB mode, two ASBR are interconnected by multiple interfaces
(including sub-interfaces). Each interface is associated with one VPN. Each ASBR-PE uses the peer as
the CE.
Answer: AD

354. If there are multiple receivers in a multicast group, the administrator enables IGMP-Snooping on the
switch that connects the receivers. After the receiver receives the general group query message from the
querier, how do multiple recipients respond?
A. All recipients will respond to the Report message.
B. Only when IGMPv1 is running, all receivers respond to the Report message.
C. The first responder with a response timeout sends Report message, and the other recipients do not
send it.
D. Only the IGMPV2 is running, and all receivers respond to the Report message.
Answer: A

355. Which of the following is the correct description of the process of registering the source DR with the
RP in the PIM-SM?
A. The registration message encapsulates the multicast service data.
B. The RP sends a registration stop message as soon as it receives the registration message.
C. The registration message is used to construct an RPT tree between the source DR and the RP.
D. The registration message is a multicast message.
Answer: A

356. In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?
A. Register mechanism
B. BSR/RP mechanism
C. Assert mechanism
D. Join/Prune mechanism
Answer: C

357. Which are the correct statements about 802.1x authentication, RADIUS and HWTACACS
authentication? (Multiple Choice)
A. RADIUSi authentication and HWTACACS authentication can perform dual authentication for the same
user at the same time, which is more secure.

90 / 144
The safer , easier way to help you pass any IT exams.

B. Users can access the network using 802.1x authentication and complete identity authentication
through Radius.
C. RADIUS authentication and HWTACACS authentication are mutually exclusive. You cannot perform
dual authentication for the same user at the same time.
D. RADIUS authentication and 802.1x authentication are mutually exclusive.
Answer: BC

358. Which of the following statements about RADIUS is correct?


A. MAC authentication does not require username and password, so RADIUS authentication user identity
cannot be used.
B. RADIUS authentication and Portal authentication cannot be combined because the Portal server can
be used to authenticate users when Portal authentication is deployed.
C. RADIUS protocol authentication, authorization and audit separation.
D. RADIUS supports both wired and wireless access methods.
Answer: D

359. To configure AAA, you first need to define the XRADIUS RADIUS server as follows:
[Huawei ]radius-server template EXAM [Huawei-radius-EXAM]radius-serve shared-key cipher
HUAwei123 [Huawei-radius-EXAMJradius-se authentication 10.7.66.66 1812
[Huawei-radius-EXAMJradius-se authorization 10.7.66.661812 [Huawei radius -EXAM]radius-server
retransmit 27. 1813 [Huawei-radius-EXAM] radius-serv accounting 10
A. True
B. False
Answer: B

360. Which of the following is not included in the digital certificate?


A. Public key information
B. Digital envelope
C. Digital signature
D. Issuer
Answer: B

361. Network administrators can use CAR technology in traffic policing. Which of the following
technologies can be applied in CAR? (Multiple Choice)
A. Double barrel double speed
B. Single barrel single speed
C. Three barrels single speed
D. Double barrel single speed
Answer: ABD

362. Router A has a destination network segment of 10.0.0.1/32 IP routing, and the outgoing interface is
Gigabitethernet0/0/1. Now add the following configuration acl number 2000 rule 10 permit source 10.
0.1.1 0 traffic classifier test if-match acl 2000 traffic behavior test remark dscp cs3 traffic policy test
classifier test behavior test interface Gigabitethernet0/0/1 ip address10.0.12.1255.255 .255.0 traffic-policy

91 / 144
The safer , easier way to help you pass any IT exams.

test outbound assumes that Router A received a packet with a destination IP of 10.0.0.1. The following
statements which are correct? (Multiple Choice)
A. If the source IP address of the packet is 10.0.0.2, it can be forwarded while the DSCP field remains
unchanged.
B. If the source IP address of the packet is 10.0.0.2, it can be forwarded and the DSCP field is marked as
CS3.
C. If the source IP address of the packet is 10.0.0.2, it cannot be forwarded.
D. If the source IP address of the packet is 10.0.0.1, it can be forwarded and the DSCP field is marked as
cS3.
Answer: AD

363. Which SNMP message type report event sent to the NMS is reliable?
A. Response
B. Trap
C. Inform
D. Get
E. Get Bulk
Answer: C

364. Non-Stopping-Forwarding (NSF) and Non-Stopping Routing (NSR) are two solutions for high
reliability. The following statements which are correct? (Multiple Choice)
A. NSR routers need to negotiate support NSR through specific packet.
B. After the NSF is enabled, the router performs the master/slave switchover. The routing table and the
forwarding table remain unchanged. Therefore, traffic is not lost during the GR time.
C. After the NSR is enabled, if the main control board fails when the service batch backup is not
completed, the NR switch cannot be completed.
D. NSF routers do not need to negotiate support NSF through specific packet.
Answer: BC

365. As shown below, R1 and R2 establish an E-BGP neighbor and enable BFD detection. The following
statement which is correct?

A. The detection time of BFD packets on R2 is 800ms.

92 / 144
The safer , easier way to help you pass any IT exams.

B. The detection time of BFD packets on R2 is 600ms.


C. The detection time of BFD packets on R1 is 660ms.
D. The detection time of BFD packets on R1 is 1280ms.
Answer: C

366. Which is wrong about IPv6 Over VXLAN?


A. IPv6 over VXLAN means that Overlay network of Vxlan is IPv6 network.
B. IPv6 over VXLAN can solve the problem of insufficient IP address resources for terminal tenants.
C. The tunnel between the Layer 2 and Layer 3 gateways of the VXLAN is IPv4 network.
D. IPv6 Over VXLAN does not generate entries.
Answer: D

367. Which is wrong about the EVPN Type 5 class routing?


A. The IP Prefix field can carry either the host IP address or the network segment address.
B. Type 5 is an IP prefix route.
C. Type 5 routing carries both Layer 2 VNI and Layer 3 VNI
D. Type 5 routing carries Layer 3 VNI
Answer: C

368. VXLAN uses BGP EVPN to establish a tunnel. What kind of packets are used?
A. Type3
B. Type5
C. Type4
D. Type2
E. Type1
Answer: A

369. Which of the following advanced features does BGP EVPN support? (Multiple Choice)
A. ARP broadcast suppression
B. VRRP over VXLAN
C. Multi-live gateway
D. VXLAN Qos
Answer: AC

370. Which of the following statements about VXLAN messages is correct? (Multiple Choice)
A. The outer destination IP address is the IP address of the remote VTEP of the VXLAN tunnel.
B. The source UDP port number is 4789
C. Destination UDP port number is 4789
D. VNI has 24 bits and used to distinguish VLAN segments.
Answer: ACD

371. Which of the following types of packets is required to implement virtual machine migration in the BGP
EVPN distributed gateway scenario?
A. Type3

93 / 144
The safer , easier way to help you pass any IT exams.

B. Type5
C. Type4
D. Type2
E. Type1
Answer: D

372. The following statements about the VRRP protocol which are correct?
A. Both VRRPv2 and VRRPv3 support authentication.
B. VRRPv3 does not support authentication, while VRRPv2 supports authentication.
C. VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks.
D. The owner of the Mater IP address has VRRP priority of 255, so the priority range that can be
configured is 0-254.
Answer: B

373. HW users are transmitting a lot of files through TFTP. What protocol does TFTP rely on for
transmission?
A. IcmP and UDP
B. iP and TCP
C. UDP
D. NFS
E. FTP
Answer: C

374. When deploying LLQ, you need to configure bandwidth parameters. What is the meaning of
bandwidth parameters?
A. Provide a built-in policer to limit the maximum available bandwidth of low latency queues during
congestion
B. This parameter should be as small as possible. It means that the bandwidth is always reserved, even if
LLQ is used, this parameter will reduce the available bandwidth of the interface.
It indicates that the reference CR is used to calculate the burst size of the built-in policer token bucket.
D. This parameter is an option because LLQ always takes precedence over other queues
Answer: A

375. Assuming that the port shaping rate is 100 Mbps, the input bandwidth and configured PIR of each
service of the interface are as follows. Then, after the first round of scheduling, what is the bandwidth
allocated by the EF queue?

94 / 144
The safer , easier way to help you pass any IT exams.

A. 30M
B. 15M
C. 90M
D. 25M
Answer: B

376. The following statement about the security confederation SA in IPsec, which is wrong?
A. The SA is uniquely identified by a triplet that includes the Security Parameter Index (SP), the source IP
address and the security protocol number used (AH or ESP).
B. Use display IPsec to view information about encryption algorithms, traffic, and other information used
between another IPsec peer.
C. IPsec only supports the use of symmetric encryption algorithms to encrypt data.
D. There must be two-way SA between IPsec peers to establish an IPsec VPN connection.
Answer: A

377. Router HW1 and router HW2 are connected to network A and network B respectively. As shown
below, if you want to establish an IPsec VPN between router HW1 and router HW2.
Which ACL does the router HW1 need to configure to enable LAN-to-LAN traffic to pass through the
encrypted VPN tunnel?

A. rule permit ip source 192.168.1.10 destination 192.168.1.2 0


B. rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0
C. rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
D. rule permit ip source 192.168.1.10 destination 10.1.2.0 0.0.0.255
E. rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255
Answer: C

95 / 144
The safer , easier way to help you pass any IT exams.

378. Which of the following options is correct for the assertion mechanism?
A. The size of the IP address will not be used as a condition for election during the election of the winner.
B. In the assertion mechanism, winner is responsible for forwarding multicast data to the broadcast
network segment.
C. The assertion mechanism is used for the election of the DR.
D. In the assertion mechanism, loser shut down the interface connected to the broadcast network.
Answer: B

379. The following description of the BSR mechanism, which is correct? (Multiple Choice)
A. There can be multiple C-BSR in a PIM-SM domain, but only one BSR can be elected.
B. The BSR collects C-RP information through the received C-RP data packets.
C. The BSR advertises BSR information and C-RP information to all routers in the PIM-SM domain by
flooding Bootstrap packets.
D. One C-BSR can also collect C-RP information through received C-RP packets.
Answer: ABC

380. The association between LDP and IGP refers to the suppression of the issuance of reachable routes
through IGP. To ensure that the LDP and IGP linkages complete network convergence. Make the IGP and
LDP keep the path consistent. Minimize the loss of traffic and improve the reliability of the entire network.
A. True
B. False
Answer: A

381. Regarding the processing mode of MPLS for TTL, which description is correct?
A. In Pipe mode, when an IP packet passes through the MPLS network, the IP TTL is decremented by 1
to the MPLS TTL field on the ingress node.
B. The TTL of the MPLS label has the same meaning as the TTL in the IP header, which can prevent the
MPLS network from generating a routing loop
C. Uniform simulation, when the IP packet passes through the MPLS network, the IP TTL of the ingress
node is decremented by 1, and the MPLS TTL field is a fixed value.
D. In MPLS VPN, if you want to hide the structure of the MPLS backbone network, you can use the
uniform mode for Ingress packets for private network packets.
Answer: B

382. In an MPLS VPN network, different CE devices can exchange routing information with the same PE
device using different routing protocols. The routing protocols used between different CE devices and the
same device are independent of each other.
A. True
B. False
Answer: A

383. Which of the following technologies use tunneling technology to communicate between IPv6
addresses? (Multiple Choice)
A. Dual Stack

96 / 144
The safer , easier way to help you pass any IT exams.

B. 6to4
C. ISATAP
D. NAT64
Answer: BC

384. The following is the correct procedure for NDP to resolve the link layer address.

A. True
B. False
Answer: B

385. BGP 4+ runs between the two routers. The neighbor relationship is normal. However, the BGP
routing table of the local router does not have neighbor's routing entry. What is the possible reason?
(Multiple Choice)
A. The routing entries of the peer BGP routing table are non-optimal.
B. The next hop address of the BGP routing entry is unreachable.
C. Peer ignore configured on the peer
D. Active-route-advertise configured on the peer
Answer: ABD

386. Which of the following information can be included in a basic network layer packet? (Multiple choice)
A. Data link layer header
B. Upper layer data
C. Network layer header
D. Path record
E. Network layer tail
Answer: BC

387. The description of configuring BGP4+, which is correct? (Multiple choice)


A. The BGP4+ router-ID is the same as the BGP4 router-ID.
B. BGP4+ must use the Link-Local address when specifying the peer
C. The next hop of the BGP4+ route does not use the Link-Local address.
D. When BGP4+ configures a reflector, the roles of the reflector and the client must be consistent with the
configuration of BGP4.
E. BGP4+ does not support route reflectors.
Answer: AC

97 / 144
The safer , easier way to help you pass any IT exams.

388. Regarding the stub area in the OSPF protocol, the following statement which is correct? (Multiple
Choice)
A. ASBR cannot exist in the stub area.
B. The virtual link cannot traverse the stub area.
C. stub area is not allowed to inject type7 LSA
D. The backbone area cannot be configured as a stub area.
Answer: ABCD

389. Which type of LSA cannot in the OSPF stub area? (Multiple Choice)
A. Type-7
B. Type-5
C. Type-4
D. Type-3
Answer: ABC

390. An existing router running OSPF is connected to Zone 0 and Zone 1. You configure zone 1 as a stub
area. What types of LSA are only operating inside Zone 1?
A. Type 7 LSA
B. Type 1 LSA and Type 2 LSA
C. Type 1 LSA, Type 2 LSA and Type 5 LSA
D. Type 3 LSA and Type 4 LSA
E. Type 1 LSA, Type 2 LSA and Type 3 LSA
Answer: E

391. An engineer performs an import operation on an OSPF router in a company network. The following
statement about the introduction of a route LSA, which is correct? (Multiple Choice)
A. The Advertising Route is set to the router-id of the ASBR.
B. netmask is set to 0
C. link state id is set to the destination network segment address
D. Use link state id and advertising router to uniquely identify an LSA
Answer: AC

392. Broadcast-type network, starting the election of DIS after the establishment of the neighbor
relationship
A. True
B. False
Answer: A

393. The following statements about the ISS protocol route aggregation, which are correct?
A. Route aggregation can be configured and validated on all types of routers.
B. Route aggregation can only be configured on the level-1 router to take effect.
C. Route aggregation can only be configured on the level-2 router to take effect.
D. Route aggregation can only be configured on the level-1-2 router to take effect.

98 / 144
The safer , easier way to help you pass any IT exams.

Answer: A

394. ISIS does not send CSNP packets under the P2P network type during the neighbor establishment
process.
A. True
B. False
Answer: B

395. Router-LSA of OSPFv3 is generated by each router. It describes the interface address and cost of
each link of the router, and also contains the router ID of the neighboring router.
A. True
B. False
Answer: B

396. Which of the following is true about the ISS GR description?


A. The GR feature of ISIS is enabled by default.
B. The GR of ISIS has a total of four timers.
C. The GR of ISIS notifies the event and maintains the neighbor relationship through the CSNP message.
D. The GR of ISIS defines a new TLV structure to support this feature.
Answer: D

397. Regarding route introduction, which of the following description is wrong?


A. bgp supports both import and network when generating routes. Network mode is more accurate.
B. By default, the default metric of the external route redistributed by OSPF is 1, and the imported
external route type is Type2.
C. After the ISIS level-2 network route is imported to the level-1 route, the routing loop is formed if the
import policy is not manually configured.
D. Introducing IBGP routes in OSPF may cause routing loops.
Answer: C

398. Which of the following is true about the ISIS LSP fragmentation extension?
A. Enable the ISIS router to generate more LSP fragments to carry more ISIS information.
B. ISIS fragmentation extensions are equally valid for Hello packets.
C. ISIS fragmentation extensions are achieved by adding virtual systems, which can be expanded to a
maximum of 1000 virtual systems.
D. The maximum number of fragments that ISIS router can generate is 1024.
Answer: A

399. The existing route-policy is as follows: ip community-filter 1permit 100:1 ip as-path-filter 2


permit^100$ route-policytest permit node 10 if-match community-filter 1 if-match as-path-filter 2 apply as
-path 200 the above configuration description, which is correct?
A. Only when the community attribute value carried in the BGP route is 100:1 or AS_PATH is 100, the
BGP route matches the route-policy above. The AS-PATH attribute of the matching route will be changed
to 200.

99 / 144
The safer , easier way to help you pass any IT exams.

B. Only when the community attribute value carried in the BGP route is 100:1 and AS_PATH is 100, the
BGP route matches the route-policy above. The AS-PATH attribute of the matching route will be changed
to 200.
C. Only when the BGP route carries the AS-PATH as 100, the BGP route matches the route-policy above.
The AS-PATH attribute of the matching route will be changed to 200.
D. As long as the BGP route carries the community attribute value of 100:1, the BGP route matches the
route-policy above. The AS-PATH attribute of the matching route will be changed to 200.
Answer: B

400. In the ISIS broadcast network database synchronization process, the following statement which is
correct?

A. R2 acts as DIS and periodically sends CSNP.


B. R2 acts as DIS, and the Hello time is three times than the ordinary router.
C. R2 acts as DIS will not receive PSNP requests for other routes.
D. R1 and R3 maintain database consistency by periodically sending PSNP requests.
Answer: A

401. Which of the following tools cannot be directly referenced by the If-match clause in the Route-policy?
A. Regular expression
B. IP-prefix
C. AS-path-filter
D. Community-filt
Answer: A

402. Two routers are connected through the serial port, but the interconnect interface cannot be pinged.
Now check the port status as follows:

100 / 144
The safer , easier way to help you pass any IT exams.

From the above information can determine what is the reason?


A. Link bandwidth is not enough
B. The IP address is not on the same network segment.
C. Link layer protocol is inconsistent
D. Subnet mask does not match
Answer: C

403. When DLDP detects that a unidirectional link exists in the optical fiber, the default operations of the
Huawei device include: DLDP state machine migrates to the Disable state, outputs trap information,
automatically sets the interface to the blocked state.
A. True
B. False
Answer: A

404. What is the main reason why RSTP converges faster than STP?
A. RSTP increases the type of port status
B. RSTP has less overhead
C. RSTP is not based on timer convergence
D. RSTP has a smaller timer
Answer: C

405. The following is the description of the characteristics of the cross domain vpn-Option C, which is
correct? (Multiple Choice)
A. Up to two layers of labels need to be used in the packet forwarding process.
B. VPNV4 routes are not saved on the ASBR, and VPNv4 routes are not advertised to each other.
C. The VPN route is directly exchanged between the ingress PE and the egress PE, and no intermediate
device is required to save and advertise the VPN route.
D. Cross-domain VPN-Option-c mode is not suitable for use when spanning multiple AS.
Answer: BC

406. Which of the following operations can implement fast fault detection on multicast network? (Multiple

101 / 144
The safer , easier way to help you pass any IT exams.

choice)
A. Shorten the Holdtime of Join/Prune messages
B. Reduce the interval at which the interface sends Hello messages.
C. Establishing PIM BFD session between neighbors
D. Reduce the interval for sending Join/Prune messages.
Answer: BC

407. If the PM-SM protocol is run on the multicast network, you need to configure the RP. The
configuration of the RP is classified into dynamic RP and static RP. The following which is the correct
description of the RP configuration?
A. When configuring dynamic RP, you need to configure the BSR as the backup of the RP.
B. When configure static RP, you need to configure the BSR advertisement RP information.
C. When configuring static BP, you need to specify the RP information on all PIM routers.
D. You do not need to configure BSR when configuring dynamic RP.
Answer: C

408. In multicast network, what happens to multicast traffic that cannot be forwarded normally? (Multiple
choice)
A. The router does not have RPF routes.
B. PIM is not enabled on the RPF interface.
C. The upstream router discards the received PIM Join message.
D. Multi-router exit network, this router is not DR
Answer: ABC

409. IPSG can configure static binding table or use DHCP-snooping to form a binding table.
A. True
B. False
Answer: A

410. As shown in the figure, the router load balances the traffic between the branch network 1 and the
branch network 2. In this case, configure the URPP defense source IP address spoofing attack on the
physical interface of the router to use loose mode.

A. True
B. False
Answer: A

411. Which of the following is single package attack? (Multiple Choice)

102 / 144
The safer , easier way to help you pass any IT exams.

A. Special control packet attack


B. Scanning detection attack
C. DDoS attack
D. Malformed packet attack
Answer: ABD

412. Which of the following statement about the digital certificate is wrong?
A. Digital signatures guarantee the integrity of digital certificates.
B. The digital certificate contains public key information.
C. When the received peer certificate is valid, but the device itself is in the wrong time and is not within the
validity period of the certificate, the authentication fails.
D. Even if the two PRI entities are not in the same CA system, the two parties can complete the
authentication as long as they can identify each other.
Answer: D

413. WRED is configured on the newly deployed router HW. Which of the following description of the
WRED feature is correct? (Multiple choice)
A. WRED can set different discard thresholds and packet loss rates for packets of different priorities.
B. When the flow exceeds the minimum threshold, WRED begins to discard all ingress traffic (tail drop)
C. Avoid global synchronization by selectively dropping multiple TCP streams
D. Low bandwidth traffic is easier to drop than high bandwidth traffic
Answer: AC

414. Which of the following descriptions about the FTP protocol is correct?
A. In FTP Passive mode, the client completes the initialization of the TCP session for control and data.
B. In FTP Active mode, the server uses the command "PORT to tell the client which port it expects to send
data. C. FTP always uses a TCP session to transmit control information and data information.
D. FTP always uses TCP port 20 to establish a data session and ICP port 21 to establish a control
session.
E. FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control
session.
Answer: A

415. If a Huawei switch runs the RSTP protocol, when will the BPDU on a port of the switch be aged?
A. On the interface, RSTP does not age BPDUs.
B. After more than 6 seconds
C. After MaxAge timed out
D. After the Hold timed out
E. After the Forward Delay timed out
Answer: D

416. In the process of using the LACP protocol, which of the following description is correct? (Multiple
choice)
A. You can prevent the Eth-Trunk interface from frequently oscillating due to physical link by using the

103 / 144
The safer , easier way to help you pass any IT exams.

following command: interface eth-trunk 1 lacp preempt enable lacp preempt delay delay-time
B. You can configure the source IP address for load balancing in the enabled link aggregation group by
using the following command: interface eth-trunk 1 load-balance src-dst-ip
C. You can remove a member interface in an enabled link aggregation group by using the following
command: interface Gigabitethemnet0/0/0 shutdown interface Gigabitethernet0/0/1 undo eth-trunk 1
interface Gigabitetheret0/0/ undo shutdown
D. You can add member interfaces to the enabled link aggregation group by using the following command:
interface Gigabitethernet0/0/1 shutdown interface Gigabitethernet0/0/1 trunkport Gigabitethernet0/0/
interface Gigabitethernet0/0/1 undo shutdown
Answer: AC

417. In the lab network, the network is built as follows. SW1 is the default configuration and SW2 disables
STP. Which of the following description about the scenario is correct?

A. G0/0/2 of Sw1 enters Discarding state


B. G0/0/1 of sw2 enters Discarding state
C. G0/0/2 of sw2 enters Discarding state
D. No interface is blocked
E. G0/0/1 of SW1 enters Discarding state.
Answer: D

418. Which of the following are used in Ethernet? (Multiple choice)


A. Non-canonical format MAC address
B. CSMA/CD in multiple access
C. MAC address in canonical format
D. 802.5 encapsulated frames
E. 802.3 encapsulated frames
Answer: BCE

419. When judging the old and new LSA, the serial number parameter and the age parameter will be used.
Which of the following statements about the two parameters is correct?
A. When the router receives an LSA age is 360s, the LSA is unavailable.
B. Both the serial number and the age parameter can judge the LSA is old or new, and the router
preferentially compares the sequence parameters, the larger the better.
C. When the router receives two LSAs, the serial number is the same, the checksum is the same, and the
smaller the age, the better.

104 / 144
The safer , easier way to help you pass any IT exams.

D. If the serial number of the LSA reaches the end value of 0x7FFF, the current router advertises the age
is lsa of 3600s.
Answer: B

420. ISIS protocol is in broadcast network and P2P network, when the router receives the LSP, it needs to
use PSNP to confirm and ensure the synchronization of the LSDB.
A. True
B. False
Answer: B

421. Which of the following statements about the attributes of the ISIS protocol LSP message are correct?
(Multiple choice)
A. The LSP fast flooding feature first spreads out LSPs smaller than the specified number to speed up the
synchronization process of the LSDB.
B. Configure an intelligent timer generated by the LSP, which can automatically adjust the delay time
according to the change frequency of the routing information.
C. When the link state information increases, the packet length of the SP can be increased, so that each
LSP can carry more information.
D. Reduce the minimum interval for sending LSPs on an interface to speed up LSP diffusion.
Answer: AB

422. Router R1 and Router R2 run BGP. Both routers are in the AS 65234. The route of router R2 exists in
the BGP routing table of router R1, but is not in the IP routing table of router R1. So, what caused the
problem?
A. Synchronization is turned off
B. The BGP neighbor relationship is Down.
C. Router R1 does not enable BGP Multi-hop
D. Routing is not optimal
Answer: D

423. As shown in the following figure, R1 and R2 establish the neighbor relationship of Level2. The key
configuration is as follows. Which of the following statement about the R2 route entry is correct? (Multiple
choice)

105 / 144
The safer , easier way to help you pass any IT exams.

A. 2020::/64 router will appear in the IP routing table.


B. 2022::/64 router will appear in the IP routing table.
C. 2019::/64 router will appear in the IP routing table.
D. 2021::/64 router will appear in the IP routing table.
Answer: ABC

424. Regarding the OSPFv3 protocol, which of the following description is wrong?
A. When sharing a router, each OSPFv3 process runs independently.
B. Multiple instances can be run in the same OSPFv3 process on the same interface.
C. Support multiple instances running on a single link
D. The Instance ID field is included in the OSPFv3 packet header.
Answer: B

106 / 144
The safer , easier way to help you pass any IT exams.

425. Which of the following statement about the LSA of OSPFv3 3 is correct? (Multiple choice)
A. The Link State id of the Inter-Area Prefix-LSA contains the prefix information.
B. Router-LSA and Network-LSA do not contain routing information.
C. When the Intra-Area Prefix LSA has the Referenced Link State Type-2, the Referenced Link State id
contains the interface id of the DR.
D. Inter-Area-Prefix LSA also contains Link-Local information
Answer: BC

426. A company has built an OSPF network as shown in the following figure. The links form an OSPF
neighbor relationship. All devices have announced their own loopback address. On one day, the S1-R2
and S2-R1 links are faulty. Which of the following description is correct? (Area 0 is split) (Multiple choice)

A. R5 can learn the loopback route of R2 normally.


B. R3 cannot learn the loopback route of R2.
C. R1 can learn the loopback route of R2 normally.
D. R3 can learn the loopback route of R2 normally.
Answer: AB

427. In Huawei devices, when ISIS imports external routes and sets external route tags for routing
information, the metric type of ISIS does not need to be modified, just keep the default.
A. True
B. False
Answer: B

428. Which of the following description about the related information of BGP4+ is correct? (Multiple
choice)
A. Bgp4+ can use the dampening command to suppress IBGP routes.
B. Modifying the Router ID of the BCP will cause the BGP connection between the routers to be
re-established.

107 / 144
The safer , easier way to help you pass any IT exams.

C. The Next Hop attribute in BCP4+ is represented by the Pv6 address, which can be the link-local
address of the next hop.
D. BGP4+ does not support automatic route aggregation.
Answer: ABD

429. As shown in the following figure, the corresponding peer relationship is established. The AS400
receives the 1.1.1.1/32 network route from the AS100. What is the AS-Path attribute?

A. 100 200 300


B. 400 300 200 100
C. 100 200 300 400
D. 300 200 100
Answer: D

430. Which of the following description about the OSPF virtual link is true?
A. A virtual connection can be established in any area, and itself belongs to the area after it is established.
B. The virtual link uses the outbound interface P as the link address.
C. The virtual link can be used to solve the problem that area 0 is divided.
D. The cost of the virtual link is the optimal link.
Answer: C

431. In the case of not dividing the area, which of the following description of the link state routing protocol
is correct? (Multiple choice)
A. Each router establishes a topology of the entire flood domain
B. Each router learns the route directly from the routing update and adds it to the routing table.
C. Routers in the flooding domain may repeatedly receive the same link state information.
D. Routers in the entire flooding domain have the same link state database
E. The router will send all link state information from one neighbor to all other neighbors to ensure the
synchronization of the database.
Answer: ACD

432. If OSPF is running on the network, the non-backbone area in the OSPP area is configured as the
LSA with the ls-id of 0.0.0.0 in the Totally Stub Totally Stub area. What type of LSA is the LSA?

108 / 144
The safer , easier way to help you pass any IT exams.

A. LSA5
B. LSA2
C. LSA1
D. LSA3
Answer: D

433. The administrator wants to manage some routes on the router during operation and maintenance.
Which of the following tools can mark these routes so that the administrator can configure the policy?
(Multiple choice)
A. If the BGP protocol is running, use the community attribute to mark the route.
B. Use ACLs to mark routes on the router.
C. Mark the route on the router using the Tag value.
D. Use ip-prefix to mark the route on the router.
Answer: AC

434. In the MPLS-BGP-VPN environment, if the label is only distributed through BGP or LDP, the MPLS
label of the packet has at most two layers of labels.
A. True
B. False
Answer: B

435. Regarding the inter-domain VPN Option-B solution, which of the following description is wrong?
A. During the packet forwarding process, the private network LSPs of the VPN are exchanged on the two
ASBRs.
B. An MP-EBGP neighbor relationship needs to be established between the two ASBRs.
C. The inter-domain VPN-option-B scheme is not limited by the number of interconnection links between
ASBRs.
D. Exchange the outer label of the VPNv4 route between the two ASBRs.
Answer: D

436. Huawei's two switches SWA and SWB are connected through 7 Ethernet ports and configured with
static link aggregation. The corresponding ports on the switch SW are Ethernet1/0/2, Ethernet1/0/3,
Ethernet1/0/4. Ethernet 1/0/5, Ethernet 1/0/6, and Ethernet 1/0/7 are configured in the order of the ports.
If the switch SWA and SWB supports only 6 ports per aggregation group,
A. In the case of each interface configuration consistent, Ethernet1/0/7 Unselected port
B. In the case of each interface configuration consistent, Ethernet1/0/6 Unselected port
C. In the case of each interface configuration consistent, SWA randomly select a port in 7 ports as
aggregation Unselected port
D. In the case of each interface configuration consistent, Ethernet1/0/1 Unselected port
Answer: A

437. You need to configure policy routing on the router to specify that specific traffic is forwarded through
an interface. When using policy-based routing, which two types of most typical information can be used to
forward traffic along a particular path?

109 / 144
The safer , easier way to help you pass any IT exams.

A. TTL and source IP address of the data packet


B. Source IP address and Layer 2 source address
C. Source IP address and specific protocols (such as FTP, HTTP, etc.)
D. Service type header and packet length
Answer: C

438. As shown, ISIS neighbor relationship between R1 and R2 has just been established, database
synchronization process between R1 and R2, which of the following statements is correct?

A. The packet sent by R1 to R2 is a PSNP packet.


B. The packet sent by R1 to R2 is a CSNP packet.
C. The packet sent by R1 to R2 is a LSP packet.
D. The packet sent by R1 to R2 is a Hello packet.
Answer: B

439. If the PPP link between R1 and R2 is shown, and the direct connection port is not on the same
network segment, but the R1 and R2 direct connection ports can communicate, and the Ethernet link
cannot communicate under the same IP planning, what is the reason? (Multiple choice)

A. R1 and R2 are connected to the POS port, and the 24-bit subnet route of the direct connection port of
the other party is learned through IPCP.
B. R1 and R2 are connected to the POS port, and the 32-bit host route of the direct connection port of the
other party is learned through IPCP.
C. The interconnected POS port of R1 and R2 learns the MAC address of the peer interface through LCP,
and does not require the ARP request MAC address.
D. The data packets of the interconnected POS interface of R1 and R2 do not need to encapsulate the
Ethernet header, and do not need to use ARP to request the MAC address.
Answer: BD

440. What command can be used to prevent users from accessing multiple devices through the HUB on
the access port of the switch?
A. [Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernetO/0/1]port link type trunk
[Huawei-GigabitEtherneto/0/1]port trunk allow pass vlan 10

110 / 144
The safer , easier way to help you pass any IT exams.

B. [Huaweiinterface GigabitEthernet 0/0/1 [Huawei-GigabitEthernetO/0/1]port link type access [Huawei


GigabitEtherneto/0/jipsg enable
C. [Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/O ]port link-type access
[Huawei-GigabitEthernet0/O ]port-security enable
D. [Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/O ]port link-type access
[Huawei-GigabitEthernet0/O ]port-isolate enable
Answer: C

441. Combined with the output of the following figure, which of the following judgment is correct? (Multiple
choice)

A. R3 must be a DIS of a level-1 link


B. R3 router is a level-2 router
C. R3 must be a DIS of a level-2 link
D. The system ID of the R3 router is 0003.0000.0000
Answer: CD

442. Regarding the BGP anti-ring mechanism, which of the following description is correct? (Multiple
choice)
A. Use the AS-PATH attribute between the autonomous systems to prevent loops.
B. The Cluster List attribute is used for the anti-ring in the reflector cluster. If the router discovers that the
cluster list of the route entry contains its own cluster ID, it will reject the route.
C. Routes learned from IBGP are not advertised to IBGP neighbors. They are used to prevent routing
loops within the AS.

111 / 144
The safer , easier way to help you pass any IT exams.

D. The AS-CONFED-SET attribute can be used to prevent loops within the confederation.
Answer: ACD

443. Regarding the Route Policy, which of the following description is correct? (Multiple choice)
A. The advanced ACL can be applied to the route-policy to filter routes.
B. The entry permit:0 less-equal 128 indicates that all IPv6 routes are allowed to pass.
C. If more than one node is defined in the Route-policy, at least one of the nodes should have a matching
mode of permit.
D. Route-Policy can only filter the default route.
Answer: BCD

444. Which of the following routing tools is unique to B6P?


A. Route-policy
B. ACL
C. IP-prefix
D. AS-path-filter
Answer: D

445. As shown in the following picture, which of the following description is correct?

A. R1 exist LSDB of Level-1 and Level-2 at the same time


B. R1 may Ping through R21 1oopbapk0 interface address
C. R1 has a route to R2 1oopback0 10.0.2.2/32

112 / 144
The safer , easier way to help you pass any IT exams.

D. No neighbor relationship can be established between R1 and R2.


Answer: C

446. The configuration of two routers in a company is as follows. which of the following statement about
the R1 routing table is correct?

A. Only if the priority of the R2 ISIS protocol is adjusted to 5, the P route entry with the destination network
segment of 10.1.2.2/32 on R1 will be generated by OSPF.
B. If the priority of the ISIS protocol of R1 is adjusted to 5, the P route entry with the destination network
segment of R1 on 10.6.2.2/32 is generated by OSPF.
C. If the priority of the R1 ISIS protocol is adjusted to 5, the P route entry with the destination network
segment of 10.0.2.2/32 on R1 is generated by ISIS.
D. If the priority of the R2 ISIS protocol is adjusted to 5, the P route entry with the destination network
segment of 10.1.2.2/32 on R1 is generated by ISIS.
Answer: C

447. Which of the following description about the aggregation of BGP is correct?
A. After the Aggregate ipv4-address mask is configured, only the aggregated routes are advertised and
the detailed routes are not advertised.
B. For IPv6 routes, BGP supports manual aggregation and automatic aggregation.
C. By default, BGP enables automatic aggregation.
D. Routing in BGP local routing table can be processed manually polymerization.

113 / 144
The safer , easier way to help you pass any IT exams.

Answer: D

448. Which of the following description about BGP routing selection is wrong?
A. Non-aggregated routes take precedence over aggregated routes.
B. In the case of Pref-Val and local_preference equal, if the locally generated route, an IBGP route, the
EBGP routes BGP preference consistent, efficient routing priority locally generated is first.
C. See the following entry in the BGP routing table: * 172.16.1.11/32 0.0.0.010 0 ? Indicates that the route
is available non-optimal.
D. The route that is unreachable for nexthop is an invalid route and does not participate in the preference.
Answer: A

449. A number of transition techniques have emerged in the process of replacing a P4 address used in a
network with a Pv6 address. These technologies are divided into two categories, one is PV4/IPv6
coexistence technology and the other is v4/P6 interworking technology. Which of the following options
belong to Pv4/IP6 coexistence technology? (Multiple choice)
A. NAT64
B. IPv6 over IPv4
C. Dual-Stack
D. ISATAP
Answer: BCD

450. Which of the following description of the establishment process of LDP LSP is correct? (Multiple
choice)
A. By default, the LSR is for the same FEC. The received label mapping can only come from the optimal
next hop. It cannot be from the non-optimal next hop.
B. When the network topology change causes the next hop neighbor to change, use free label retention
way, the LSR can directly reestablish the LSP by using the label sent by the original non-optimal next hop
neighbor.
C. Label distribution in the DoD mode, for a specific FEC, the LSR does not need to obtain the label
request message from the upstream to perform label distribution.
D. The process of establishing an LSP is actually the process of binding the FEC to the label and
advertising the binding to the upstream LSR of the LSP.
Answer: BCD

451. As shown in the figure, in the hub&spoke multicast mode of MPLS bgp VPN, in order to realize that
the branch can only communicate with the headquarters, the branches cannot communicate with each
other. Which of the following schemes can the RT be set to?

114 / 144
The safer , easier way to help you pass any IT exams.

A. Headquarters: Import Target:12:3 Export Target: 12:3 branch 1: Import Target: 12:3 Export Target: 12:3
branch 2: Import Target: 12:3 Export Target: 12:3
B. Headquarters: Import Target:1:1 Export Target: 3:3 branch 1: Import Target: 3:3 Export Target: 1:1
branch 2: Import Target: 3:3 Export Target: 2:2
C. Headquarters: Import Target:2:2 Export Target: 3:3 branch 1: Import Target: 3:3 Export Target: 1:1 分
branch 2: Import Target: 3:3 Export Target: 2:2
D. Headquarters: Import Target: 12:3 Export Target: 3:12 branch 1: Import Target: 3:12 Export Target:
12:3 branch 2: Import Target: 3:12 Export Target: 12:3
Answer: D

452. Which of the following are DoS (Denial of Service) attacks? (Multiple choice)
A. Single packet attack
B. Source IP address spoofing attack
C. Middleman attack
D. Flood attack
Answer: ABD

453. Which of the following statement about IPSec VPN is true? (Multiple choice)
A. Savage mode can support NAT traversal, while main mode does not support NAT traversal
B. Two routers establish an IPSec VPN through the master mode. Starting from the fifth packet (inclusive),
the payload data is often encrypted.
C. two routers establish IPSec VPN through aggressive mode, then a minimum of interaction 4 packets
between the two devices build tunnel
D. Between two routers, an OSPF neighbor relationship can be established through an IPSec VPN tunnel,
and intranet routes can be exchanged.
Answer: BC

454. Configure queue-based traffic shaping. If the queue length exceeds the cache size, the tail drop is
performed by default.
A. True
B. False
Answer: B

115 / 144
The safer , easier way to help you pass any IT exams.

455. As shown in the figure, which of the following statement is correct? (Multiple choice)

A. If the R2 Ethernet0/0/1 interfaces down, then R1 BFD session can quickly detect the failure and notify
the R1 to make the OSPF neighbor relationship down
B. OSPF state changes to FULL, will trigger BFD sessions UP
C. If the R2 Ethernet0/0/0 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is changed
to 10.0.21.2.
D. If R2 close BFD function, BFD session of R1 goes down, it will lead ospf neighbor relationship down
E. If the R2 Ethernet 0/0/1 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is
changed to 10.0.12.2.
Answer: AD

456. For the Layer 2 VPN technology, which of the following statement is correct? (Multiple choice)
A. VPLS is a widely used technology on the live network. It can provide Layer 3 packet transparent
transmission and achieve multi-point access.

116 / 144
The safer , easier way to help you pass any IT exams.

B. The VPLS configuration is highly complex. The Layer 2 network transparently transmits BUM packets.
C. BGP EVPN supports tenant isolation, multi-homing and broadcast suppression
D. BGP EVPN solves the problem of MAC address drift and multi-tenancy that VPLS cannot support.
Answer: BCD

457. If there is a LAN running the 802.1D Spanning Tree Protocol, which of the following parameters will
the non-root switch not receive from the root switch?
A. MaxAge
B. Root cost
C. Forward delay
D. Hold time
E. Hello time
Answer: D

458. Which of the following description of the 802.1s deployment features is correct?
A. Multiple bridges share a spanning tree instance
B. All VLANs share a spanning tree instance
C. Each VLAN shares a spanning tree instance
D. Multiple VLANs share a spanning tree instance
Answer: D

459. Between the two directly connected devices that have established IBGP neighbors, run the
shutdown command to shut down the interface of one of the devices. The BGP connection will not be
disconnected immediately.
A. True
B. False
Answer: A

460. In order to reduce the number of OSPF routes in some stub areas, OSPF has developed a special
area function. Which of the following description about the OSPF special area is correct?
A. Special area routers cannot establish OSPF neighbor relationships with regular area routers.
B. Any OSPF area can be configured as a special area.
C. As -External-lsa is released to the Stub area
D. ASBR-Summary-LSA is allowed to be advertised to the NSSA area.
Answer: A

461. An engineer builds a network topology to study the working mechanism of the OSPFv3 protocol. The
configuration of R1 and R2 is as follows. What are the types of LSAs exchanged between R1 and R2?
(Multiple choice)

117 / 144
The safer , easier way to help you pass any IT exams.

A. Router-lsa
B. Link-LSA
C. Network-LSA
D. Inter-area-prefix-lsa
Answer: ABC

462. The topology diagram and configuration are as follows. Now I hope that there is no detailed routing
entry of 10.6.3.3/32 in the R1 routing table. Which of the following statement can achieve this requirement?
(Multiple choice)

A. Configure route summarization on R3 and summarize the routes to 10.0.0.0/16.


B. Configure route summarization on R2 and summarize the routes to 10.0.0.0/16.
C. Configure filter-policy on R2, match 10.0.3.3/32 by ACL, and apply it in the export direction.
D. Configure filter-policy on R1, match 10.0.0.3.3/32 by ACL, and apply it in the import direction.
Answer: AD

463. As shown in the configuration, if the administrator configures OSPF on R1 but R1 cannot learn the
routes of other routers, the possible reason is (). (Multiple choice)
[R1]ospf [Rl-ospf-1]area 2 [R1-ospf-1-area-0.0.0.2]network 10.0.13.1 0.0.0.0
A. Area ID configured by the router and area ID of its neighboring router is different.
B. This router is not configured with an OSPF process ID.

118 / 144
The safer , easier way to help you pass any IT exams.

C. The router's announcement network address does not match the interface mask.
D. This router is not configured with authentication, but the neighbor router is configured with
authentication.
Answer: AD

464. Configure AS-path-Filter ip as-path-filtr 10 permit_100$ means to match the route received from
AS100.
A. True
B. False
Answer: B

465. The following topology and configuration are available. Which of the following statement is correct?
(Multiple choice)

A. There is no route with the destination network segment being 10.6.3.3/32 on R1.
B. There is no route with the destination network segment being 10.0.2.2/32 on R1.
C. There is a route with the destination network segment being 10.6.3.3/32 on R1.
D. There is a route with the destination network segment being 10.0.2.2/32 on R1.
Answer: AD

466. As shown in the figure below, which routes will R2 learn?

119 / 144
The safer , easier way to help you pass any IT exams.

A. R2 can learn all the routes of R1.


B. R2 can learn the 10.1.1.0/24 route.
C. R2 can learn the two routes 10.1.2.0/24 and 10.1.3.0/24.
D. R2 can receive the LSP of R1 but cannot join the routing table.
Answer: A

467. In the MPLS VPN, what is the role of RT? (Multiple choice)
A. Allow the peer PE to decide which VPNv4 routes to import into the specific VRF.
B. Allow the peer PE to decide which VPNv4 routes are not to be imported into a specific VRF.
C. Allow the peer CE to decide which VPNv4 routes to import into the specific VRF.
D. Allow the peer CE to decide which VPNv4 routes are not to be imported into a specific VRF.
Answer: AB

468. Regarding the way the device handles packets in the MPLS network model, which of the following
description is wrong? (Multiple Choice)
A. The label forwarding path LSP is determined and established through various protocols during the
forwarding of the packet.
B. Both LER and LSR will carry out label distribution.
C. LSR must not strip labels.
D. The device discards the IP packets entering the MPLS domain.
Answer: AD

469. Which of the following description about the MPLS BGP VPN is wrong?
A. IBGP enables a stable BGP neighbor relationship on the ARPback interface address.
B. Route switching between PE and CE can be static route, OSPF multi-instance, IS-iS multi-instance,
EBGP.
C. The TTL field in the tag has the effect of preventing loops.
D. BGP Soo is used to prevent routes routed from a VPN site from going back to the site through the
MPLS backbone. Soo is an extended community attribute automatically generated by MP-BGP.
Answer: D

120 / 144
The safer , easier way to help you pass any IT exams.

470. Which of the following are the techniques for improving MPLS BGP VPN reliability? (Multiple choice)
A. VPN GR
B. VPN FRR
C. Configure CE dual-homing networking on the access layer.
D. Private network IP routing FRR between the PE and CE
Answer: ABCD

471. Which of the following statement about the VPNv4 address is wrong?
A. When BGP advertises reachable and unreachable VPNv4 routes, it carries the RD attribute.
B. By default, the PE does not perform vpn-target filtering on the received VPNv4 routes.
C. The VPNv4 address has a total of 12 bytes, including an 8-byte route identifier RD (Route
Distinguisher) and a 4- byte IPv4 address prefix.
D. Before the local PE advertises the VPNv4 route learned from the site directly connected to itself to
other PEs, it sets the Target attribute for these routes and advertises it as a BGP extended community
attribute along with the route.
Answer: B

472. Regarding the basic forwarding process of MPLS, which of the following description is wrong?
A. When the IP packets into the MPLS domain, checks the destination IP address of the corresponding
Tunnel ID if TunnelID is 0x0, and proceeds to MPLS forwarding process.
B. By default, the value of the label assigned to the penultimate hop node by the Egress1 node that
supports PHP is 3.
C. When the packet is forwarded in the MPLS domain, the top label of the MPLS packet is replaced by the
label allocated by the next hop according to the label forwarding table.
D. When an IP packet enters the MPLS domain, the MPLS border device inserts a new label between the
packet layer 2 header and the IP header.
Answer: A

473. The multicast IP address is 229.130.130.1, and the corresponding MAC address is:
A. 00-00-5E-02-82-01
B. 00-00-5E-82-82-01
C. 01-00-5E-82-82-01
D. 01-00-5E-02-82-01
Answer: D

474. Which of the following statement about IPSG technology is correct?


A. The IPSG can perform binding table matching check on P packets that enter the interface and leave
the interface.
B. On the Huawei router, you can configure the IPSG function on the Vlanif.
C. If an interface is configured as a DHCP snooping Trust HCP ACK, DHCP NAKHCP, and Offerf packets,
other untrusted ports cannot receive these packets.
D. ip source check user-bind check-item command to configure based VLAN or interface IP packet
checking items, the command have effect on the dynamic and static entries.

121 / 144
The safer , easier way to help you pass any IT exams.

Answer: C

475. Which of the following statement about HTTPS is wrong?


A. HTTPS protocol uses TCP port 443 by default.
B. HTTPS secures access to data by using SSL VPN.
C. When using HTTPS to access a website, if the user's browser does not recognize the digital certificate
of the website, the website cannot be accessed.
D. If the HTTPS traffic contains a virus, the router cannot directly detect the virus using IPS technology.
Answer: B

476. Application of the two-speed double-barrel in traffic policing, the number of tokens in the C bucket is
TC, a number of tokens in P bucket is TP. When a packet of length B enters, which of the following
statements is correct? (Multiple choice)
A. If TP-B>0 and TC-B>0, the packet is marked as green.
B. If TP-B>0 and TC-B<0, the packet is marked as yellow.
C. If TP-B<0 and TC-B<0, the packet is marked as red.
D. If TP-B>0 and TC-B<0, the packet is marked as green.
Answer: ABC

477. The network administrator defines a traffic policing strategy as follows:

The router port that uses this policy has been idle for about 10 seconds. At this time, there are huge
bursts of c1 type traffic coming in an instant, so how many bytes will be colored in the green packet?
A. 256K bytes
B. 32K bytes
C. 48128 bytes
D. 80128 bytes
Answer: C

478. BGP EVPN advertises external routes, which of the following types of routes are used?
A. Type4
B. Type1
C. Type2
D. Type3

122 / 144
The safer , easier way to help you pass any IT exams.

E. Type5
Answer: E

479. Which of the following statements about the VXLAN gateway are wrong?
A. The third layer gateway of VXLAN can be divided into centralized gateway and distributed gateway.
B. The third layer gateway of VXLAN allows inter-subnet VXLAN communications and external network
access.
C. VXLAN Layer 2 gateway is bound to the VPN instance.
D. The second layer gateway of VXLAN allows tenant access XLAN, and used to communicate between
the subnets in the same VLAN.
Answer: C

480. VRRP priority cannot be set to 0, so the device which send VRRP packets of priority 0 will stop
adding VRRP backup group, and inform the backup device immediately become a Master device, without
waiting for Master_Down_Interval timer expires.
A. True
B. False
Answer: A

481. Which of the following statements about BGP attributes are correct?
A. A path can only have one Community attribute value.
B. The number of the neighboring AS is displayed on the right side of the As Path list of the BGP routing
entry.
C. The Local_Pref attribute is exchanged only between EBGP peers and is not advertised to the other
ASs.
D. When a route learned from an EBGP peer is advertised to an IBGP peer, the BGP speaker does not
change the Next_Hop attribute of the route.
Answer: D

482. You need to access the subnets of different VPNs in the VXLAN network. The information about a
subnet is as follows: RT=10:10 RT=1000:1000 Export 1000 in the EVPN instance and RT-100:100 in the
VPN instance. Which of the following configurations can I make for another subnet? (Multiple choice)
A. The EVPN instance is 1000:1000.
B. 1000:1000 appears in the VPN instance
C. 10:10 in the VPN instance
D. EVPN implement 1000: 1000 expor
Answer: BD

483. A number of transition techniques have emerged in the process of replacing an IPV4 address used in
a network with an IPv6 address. These technologies are divided into two categories: one is IPV4/IPv6
coexistence technology, and the other is IPV4/IPV6 interworking technology. Which of the following
options belong to IPV4/IPV6 coexistence technology? (Multiple choice)
A. NAT64
B. IPv6 over IPv4

123 / 144
The safer , easier way to help you pass any IT exams.

C. Dual-stack
D. SATAP
Answer: BCD

484. To which NMS 's SNMP message type event reports sent are reliable?
A. Response
B. Trap
C. Inform
D. Get
E. Get bulk
Answer: C

485. The bookstore provides a wired network for customers to learn online. However, some users
suddenly cannot access the network. After troubleshooting, all IP addresses in the DHCP address pool
are exhausted. Which of the following is the best way to solve the problem?
A. Configure a static ARP binding entry.
B. Configure IPSG
C. Configure DAI
D. Limit the maximum number of DHCP snooping binding entries that can be learned on the interface.
Answer: D

486. Assume that the BGP/MPLS IPv4 VPN of Static routing and OSPF, LDP are configured on the PE to
enable the NSF function. Which of the following protocols are required to configure to enable the GR
function on the PE? (Multiple Choice)
A. OSPF
B. MPLS LDP
C. BGP
D. Static routing
Answer: ABC

487. Which of the following belong to single package attack? (Multiple Choice)
A. Special control package attack
B. Scanning detection attack
C. DDoS attack
D. Malformed package attack
Answer: ABD

488. The LAND attack is performed by the attacker sending a source address and a destination address
to the destination host as the destination host. The source port and the destination port are the same SYN
packet. When the receiver waits for the final ACK packet from the sender, the connection is always in a
semi-connected state, resulting in waste of limited TCP resources at the receiving end.
A. True
B. False
Answer: B

124 / 144
The safer , easier way to help you pass any IT exams.

489. The network administrator defines a traffic policing strategy as follows:


[Huawei] display traffic policy user-defined
User Defined Traffic Policy Information
Policy: p1
Classifier: c1
Operator: OR
Behavior: b1
Committed Access Rate
CIR 256(kbps),PIR 0(kbps),CBS 48128(byte),PBS 80128(byte)
Color Mode: color blind
Conform Action: pass
Yellow Action: pass
Exceed Action: discard
statistic: enable
The router port to which this policy is applied has been idle for about 10 seconds. At this time, there is a
huge amount of burst traffic of the c1 type, then how many bytes will the packet be colored in green?
A. 256K bytes
B. 32K bytes
C. 48128 bytes
D. 80128 bytes
Answer: C

490. Which of the following does the digital certificate not contain?
A. Public key information
B. Digital envelope
C. Digital signature
D. Issuer
Answer: B

491. BGP can only automatically aggregate routes originating from Incomplete.
A. True
B. False
Answer: A

492. What improvements have been made to the IGMPV2 protocol compared to IGMPV1? (Multiple
Choice)
A. Added specific group query message
B. Added off-group message
C. Added maximum response time field
D. Added specific source group query message
Answer: ABC

493. Run the display mpls Isp command on the router to view the LSP information. The command output

125 / 144
The safer , easier way to help you pass any IT exams.

is as follows.

Which of the following is correct?


A. When sending a packet with the destination IP address of 4.4.4.4, the router sends it directly without
adding any labels.
B. After the router receives the data packet with the label 1024, it changes to the label 1027 and then
sends the data packet.
C. When sending a packet with the destination P address of 2.2.2.2, the router sends it directly without
adding any label.
D. When sending a packet with a destination address of 3.3.3.3, the router will add the label 1026 to the
packet before sending it.
Answer: C

494. Which of the following statements are wrong about cross-domain MPLS VPN? (Multiple Choice)
A. When the public network label is LDP-based, the Layer 3 label is required for the cross-domain
VPN-OptionC scheme 2 packet forwarding process.
B. For cross-domain VPN-Option B mode, an MP-EBGP neighbor relationship needs to be established
between the two ASBRs.
C. For the cross-domain VPN Option A mode, the route between the two ASBRs is a normal PV4 route.
D. For the cross-domain VPN-OptionB mode, the two ASBRs are connected to each other through
multiple interfaces (including sub-interfaces). Each interface is associated with a VPN. Each ASBR-PE
treats the peer as a CE.
Answer: AD

495. Regarding the way the device handles packets in the MPLS network model, which of the following
descriptions are wrong? (Multiple Choice)
A. The label forwarding path LSP is determined and established through various protocols during the
forwarding of the packet.
B. Both LER and LSR will carry out label distribution.
C. LSR must not strip labels.
D. The device discards the IP packets that enter the MPLS domain.

126 / 144
The safer , easier way to help you pass any IT exams.

Answer: ACD

496. Enable SSM on the entire IP multicast network.


Which of the following statements about SSM are correct? (Multiple Choice)
A. No RP is required.
B. Only RPT is used for SSM.
C. SSM is recommended when there are multiple sources on the network and multicast routing is simple.
D. SSM is suitable for one-to-many application
E. Only SPT is used for SSM.
Answer: ADE

497. When a packet is forwarded to the public network in the MPLS BGP VPN network in the domain, it
will be encapsulated with two layers of MPLS labels. Which of the following description about the
two-layer label is wrong?
A. By default, the router assigns the same label value to all VPNv4 routes destined for the peer PE.
B. The private network label is carried and distributed when the route is delivered by MP-BGP. The public
network label is distributed by the LDP protocol.
C. The export PE uses the inner label when determining which export CE the message should be sent to.
D. MPLS BGP VPN uses two-layer label public network label (also known as outer label) and private
network label (also known as inner label).
Answer: A

498. You are assigned the task of compressing the IPV6 address as much as possible. If the original IPV6
address is 2013:0000:130F:0000:0000:09c0:876A:130B, which of the following is the compressed format
IPV6 address?
A. 213:13F:9C:876A:13B
B. 2013:130F:9C0:876A:130B
C. 20130:130F:0:0:9C0:876A:130B
D. 20130:130F:0:0:090:876A:130B
E. 20130:130F::9C0:876A:130B
Answer: E

499. Which of the following statements about the IS-IS route summary is correct?
A. You can configure route aggregation and take effect on all types of routers.
B. Route summarization only takes effect on the Leve-2 router
C. Route aggregation only takes effect on LeveI-1 router
D. Route aggregation only takes effect on the LeveI-1-2 router
Answer: A

500. In an existing OSPF network, which type of LSA will cause SPF calculation? (Multiple Choice)
A. Type 1 LSA
B. Type 3 LSA
C. Type 4 LSA
D. Type 2 LSA

127 / 144
The safer , easier way to help you pass any IT exams.

E. Type 5 LSA
Answer: AD

501. Which of the following statements about IS-IS route leakage are correct? (Multiple Choice)
A. IS-IS route leakage can be configured in the IPV6 environment.
B. In the IS-IS route leakage, the route to be leaked cannot be a summary route.
C. IS-IS route leakage does not cause neighbors to oscillate
D. IS-IS route leakage is used to prevent routing loops
E. You can configure IS-IS route leakage on the Level-1 router.
Answer: AC

502. Which of the following description is correct about the ISIS LSP fragmentation extension?
A. Enable the lSIS router to generate more LSP fragments to carry more ISIS information.
B. The fragmentation extension of ISIS is equally valid for the Helio package.
C. ISIS fragmentation extension is achieved by adding virtual systems, which can be expanded to up to
1000 virtual systems.
D. The maximum number of fragments that an ISIS router can generate is 1024.
Answer: A

503. Regarding the BGP confederation, which of the following description is wrong?
A. The confederation divides an AS into several sub-ASs, and the external AS still considers the
confederation to be an AS.
B. The sub-AS number of the confederation is advertised to BGP peers outside the confederation by
default.
C. The sub-AS number in the confederation can use a private AS number. A Huawei NE/AR router can be
configured with up to 32 sub-AS numbers.
D. The confederation can easily detect the routing loop in the AS because EBGP is running between
sub-ASs.
Answer: B

504. Which layers are shared in the OSI reference model and the TCP/IP model? (Multiple Choice)
A. Expression layer
B. Application layer
C. Transport layer
D. Session layer
E. Data link layer
Answer: BC

505. Which of the following As_Path attribute values of path-filter1 permit* (100|400)$ command can the
AS-Path filter configured with IP match? (Multiple Choice)
A. 100
B. 3100
C. 300 4200
D. 1234 1400

128 / 144
The safer , easier way to help you pass any IT exams.

Answer: ABD

506. Regarding the Stub area and the NSSA area of the OSPF protocol, which of the following statement
is wrong?
A. Type 5 LSA is not allowed to be injected in the Stub area, and Type 5 LSA is allowed to inject in the
NSSA area.
B. Both the Stub area and the NSSA area are allowed to inject Type 3 LSA.
C. Stub area and NSSA area are not allowed to inject Type 4 LSA.
D. The Type 7 LSA is not allowed to be injected in the Stub area, and the NSSA area is allowed to inject
the Type 7 LSA.
Answer: A

507. Between the two directly connected devices that have established IBGP neighbor, run the shutdown
command to shut down the interface of one of the devices. The BGP connection will not be disconnected
immediately.
A. True
B. False
Answer: A

508. Which of the following description is correct about Filter-policy?


A. Filtering the generation of type 5 LSAs and type 7 LSAs on the ASBR in OSPF using Filter-Policy
B. The prefix list can filter routes as well as filter data packets.
C. Filter-Policy can filter the received or advertised link state information, and can modify the attributes of
the route entry.
D. When filtering routes using the prefix list, the entry ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 means
that only the default route is matched.
Answer: A

509. After the IS-IS area authentication is configured, which of the following IS-IS packet carries the
authentication information?
A. IS-IS Level-1 SNP and LSP
B. IS-IS Leve -1 Hello PDU
C. IS-IS Level-2 Hello PDU
D. IS-IS Leve-2 SNP and LSP
Answer: A

510. If the Option field 0X000013 in the OSPFv3 Hello packet sent by GigabitEthernet 0/0/0 port of Router
A, which of the following descriptions are correct? (Multiple Choice)
A. GigabitEthernet0/0/0 of Router A belongs to the NSSA area.
B. GigabitEthernet0/0/0 of Router A will participate in IPv6 route calculation.
C. Router A is an OSPFv3 device with forwarding capability
D. Router A supports AS-ExternaI-LSA flooding
Answer: BCD

129 / 144
The safer , easier way to help you pass any IT exams.

511. The path selection tool can define multiple entries, which of the following tools will automatically
generate and reject any entries at the end of the configuration? (Multiple Choice)
A. Route policy
B. IP-prefix
C. Community -filter
D. AS-Path-filter
Answer: ABCD

512. If there is no zoning, which of the following statements are correct about the link state routing
protocol? (Multiple Choice)
A. Routers in the same routing domain may repeatedly receive the same link state information.
B. Routers in the entire routing domain have the same LSDB
C. Each router establishes a routing domain topology.
D. Each router learns routing entries from the updated routing information and adds them to the routing
table.
E. The router sends all link state information from the neighbor to all other neighbors to ensure that the
data in the database is synchronized.
Answer: ABC

513. Which of the following configurations of OSPFV3 route aggregation are correct? (Multiple Choice)
A. [Huawei] ospfv3 1
[Huawei-ospfv3-1] asbr-summary 48 cost 20 tag 100
B. [Huawei] ospfv3 1
[Huawei-ospfv3-1] abr-summary 48 cost 400
C. [Huawei] ospf3 1
[Huawei-ospfv3-1] area 1
[Huawei-ospfv3-1-area-0.0.0.1] abr-summary fc00:0:0:: 48 cost 400
D. [Huawei] ospfv3 1
[Huawei-ospfv3-1] area 1
E. [Huawei-ospfv3-1-area-0.0.0.1] asbr-summary fc00:0:0::48 cost 20 tag 100
[Huawei]interface gigabitether 1/0/0
[Huawei-GigabitEthernet1 /0/0) asbr-summary fc00:0:0::48 cost 20
Answer: AC

514. Configuring AS-path-filter ip as-path-fltr10 permit_100$ means match the route received from
AS100.
A. True
B. False
Answer: B

515. In the Broadcast network, the election of DIS is started after the neighbor relationship is established.
A. True
B. False
Answer: A

130 / 144
The safer , easier way to help you pass any IT exams.

516. Which of the following attributes cannot be directly referenced by the if-match of a routing policy?
A. Community-filter
B. IP-prefix
C. As-Path-filter
D. Regular expressions
Answer: D

517. As shown in the figure, Between R1 and R2 are PPP links and the direct connection ports are not on
the same network segment, but the R1 and R2 direct connection ports can communicate, and the
Ethernet link cannot communicate under the same IP planning, what are the reasons? (Multiple Choice)
A. R1 and R2 are connected to the POS port, and the 24-bit subnet route of the direct connection port of
the other party is learned through IPCP.
B. R1 and R2 are connected to the POS port, and the 32-bit host route of the direct connection port of the
other party is learned through IPCP.
C. R1 and R2 are connected to the POS port and learns the MAC address of the peer interface through
LCP, and does not require the ARP request MAC address.
D. The data packets of the interconnected POS interface of R1 and R2 do not need to encapsulate the
Ethernet header, and do not need to use ARP to request the MAC address.
Answer: BD

518. Which of the following statements are correct about PPPoE data frames? (Multiple Choice)
A. The fixed value of the Ethernet Type field is Ox8863.
B. The Session_ID segment of the ppp session must be the value specified in the Discovery phase and
cannot be changed.
C. When PPPoE is used to transfer session data, Code must be set to 0x0.
D. After the PPPoE session is established, all Ethernet packets are unicast.
Answer: BCD

519. Which of the following description is correct about the process of sending and receiving data frames
in the Access mode of the switch interface?
A. When receiving a tagged data frame directly discards in Access mode
B. Only receive unlabeled data frames in Access mode
C. When the data frame enters the switch interface, the switch learns the destination MAC address in the
data frame.
D. In the Access mode, the VLAN tag of the data frame will be stripped off when sending.
Answer: D

520. The SWA and SWB are connected by two physical Ethernet links.
The SWA has the following interface configurations:
[SWA]interface GigabitEthernet 1/0/1
[SWA-GigabitEthernet 1/0/1] port link-type trunk
[SWA-GigabitEthernet 1/0/1] port trunk allow-pass vlan 1 0 100
[SWA]interface GigabitEthernet 1/0/2

131 / 144
The safer , easier way to help you pass any IT exams.

[SWA-GigabitEthernet 1/0/2] port link-type trunk


[SWA-GigabitEthernet 1/0/2] port trunk allow-pass vlan 1 10
These two links are aggregated
Assume that the configuration on the SMB is correct.
Which of the following statements are correct in view of this information? (Multiple Choice)
A. GigabitEthernet 1/0/1 and Gigabitethernet 1/0/2 can be added to the same LAG without changing the
current configuration.
B. After the link aggregation is configured on the SWA and the SWB, if enabled MSTP, GigabitEthernet
1/0/1 and GigabitEthernet 1/0/2 will enter the Forwarding state in MSTP
C. GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 can be added to the same LAG only after
GigabitEthernet 1/0/2 is configured. Change to the same as GigabitEthernet1/0/1
D. GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2 cannot be added to the same LAG because the
allowed VLANs are different.
Answer: CD

521. The following topology is available, and based on this analysis, which of the following statement is
correct?

A. Because R2 does route aggregation, only the routing entry of 10.0.0.0/16 exists in the IP routing table
of R1.
B. There are routing entries for 10.0.2.2/32 and 10.0.3.3/32 in the IP routing table of R1.
C. The routing entries of 10.3.3.3/32 and 10.0.0.0/16 exist in the IP routing table of R1.
D. There are routing entries of 10.0.2.2/32 and 10.0.0.0/16 in the IP routing table of R1.
Answer: C

522. Assume that the port shaping rate is 100 Mbps. The input bandwidth and configured PIR of each

132 / 144
The safer , easier way to help you pass any IT exams.

service on the interface are as follows.


Then, after the first round of scheduling, what is the bandwidth allocated by the EF queue?

A. 30M
B. 15M
C. 90M
D. 25M
Answer: B

523. As shown in the following figure, enterprises hope to achieve successful access VPN between
headquarters and branches through MPLS.

133 / 144
The safer , easier way to help you pass any IT exams.

Branch office VPN traffic must be forwarded through the headquarters for traffic monitoring.
Which of the following statement about this solution is wrong?
A. When Hub-CE and Hub-PE use EBGP to transmit routing information, the Hub-PE must be able to
accept routes that are repeated by the AS number to receive routes advertised by the Hu-CE.
B. OSPF can be used to exchange routing information between the Hub-CE and the Hub-PE and
between the Spoke-PE and the Spoke-CE.
C. BGP can be used to exchange VPN routing information between the CE and the PE.
D. You can establish an MP-IBGP peer relationship between the Spoke-PEs and exchange VPN routing
information.
Answer: D

524. As shown in the figure, R1, R2, and R3 run OSPF at the same time and announce their respective
loopbacks. Which of the following description is wrong?

134 / 144
The safer , easier way to help you pass any IT exams.

A. You can use the filter-policy export command to filter the loopback route of R3 on the R2.
B. You can use the filter export command to filter the loopback route of R3 in Area1 on the R2.
C. You can use the filter import command in Area0 to filter the loopback route of R3 on the R2.
D. You can filter the loopback route of R3 by using filter-policy import on the R1.
Answer: A

525. The topology diagram and configuration are as follows. Now hope that there are no detailed routing
entries of 10.6.3.3/32 in the R1 routing table. Which of the following statements can achieve this
requirement? (Multiple Choice)

A. Configure route summarization on R3 and summarize the routes to 10.0.0.0/16.


B. Configure route summarization on R2 and summarize the routes to 10.0.0.0/16.
C. Configure filter-policy on R2 and apply it to the export direction through ACL matching 10.0.0.3/32.
D. Configure filter-policy on R1 and match the ACL to 10.0.0.3.3/32 and apply it in the import direction.

135 / 144
The safer , easier way to help you pass any IT exams.

Answer: AD

526. As shown in the following topology figure, the corresponding peer relationship is established. The
AS400 receives the 1.1.1.1/32 network route from the AS100. What is the AS-Path attribute?

A. 100 200 300


B. 400 300 200 100
C. 100 200 300 400
D. 300 200 100
Answer: D

527. The figure shows the router data. Which of the following statement is wrong?
A. The system ID of R3 is 0003.0000.0000
B. R3 is a Leve-1-2 router
C. R3 is the DIS of the Leve-1 link
D. R3 is the DIS of the Leve-2 link
Answer: C

528. As shown in the figure, the A department of branch 1 can access the Internet, but the B department
can only use the encrypted VPN to access the headquarters resources. You can configure the NAT policy
on the export device so that department A can access the Internet and configure IPsec VPN (ESP
protocol) for department B + tunnel mode method to allow it to access the headquarters.

136 / 144
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: A

529. Regarding the characteristics of CE dual-homing, which description is wrong?


A. The CE is connected to the backbone network through two links. The two links can be used as both
load balancing and active/standby links.
B. In the CE dual-homing network, loops may occur, and route-tags can be used to solve loop problems.
C. CE and PE form a CE dual-homed network to ensure high network availability.
D. The VRFs of two PEs connected to the same CE can belong to different VPNs.
Answer: B

530. If multiple candidate RPs are configured in a multicast group, which of the following parameters
should be compared the candidate RPs? (Multiple Choice)
A. Group-wide mask length of the C-RP service matching the multicast address to which the user joins
B. Number of the C-RP interface
C. IP address of the C-RP interface
D. C-RP priority
Answer: ACD

531. A bookstore provides a wired network for customers to learn online. However, some users are found
unable to access the network one day. After checking, the IP resource of the DHCP address pool has
been exhausted. Which of the following is the best way to solve the current problem?
A. Configure IPSG
B. Configure a static ARP binding table.
C. Limit the maximum number of DHCP snooping binding entries that an interface can learn.
D. Configure DAI
Answer: C

532. Regarding the BGP anti-ring mechanism, which of the following descriptions are correct? (Multiple
Choice)
A. Use the AS-PATH attribute between the autonomous systems to prevent loops.
B. The Cluster List attribute is used for the anti-ring in the reflector cluster. If the router discovers that the
cluster list of the route entry contains its own cluster ID, it will reject the route.
C. Routes learned from IBGP are not advertised to IBGP neighbors to prevent routing loops within the AS.
D. You can use the AS-CONFED-SET attribute to prevent loops within the federation.
Answer: ACD

533. Which of the following types of packets is required to implement virtual machine migration in a BGP
EVPN distributed gateway scenario?

137 / 144
The safer , easier way to help you pass any IT exams.

A. Type5
B. Type4
C. Type1
D. Type2
E. Type3
Answer: D

534. Which of the following technologies use tunnels to communicate between IPv6 addresses? (Multiple
Choice)
A. Dual Stack
B. 6to4
C. ISATAP
D. NAT64
Answer: BC

535. The results of the existing router data are as follows, which of the analysis conclusion is wrong?

A. R3 router is a Level-1-2 router


A. R3 must be a DIS of a Level-1 link
B. R3 must be a DIS of a Level-2 link
D. The system ID of the R3 router is 0003.0000.0000.0000
Answer: B

536. In the process of using the LACP protocol, which of the following descriptions are correct? (Multiple
Choice)
A. You can prevent the Eth-Trunk interface from frequently flapping due to physical link reasons.
Interface eth-trunk 1

138 / 144
The safer , easier way to help you pass any IT exams.

Lacp preempt enable


Lacp preempt delay delay-time
B. You can configure the source IP address for load balancing in the enabled link aggregation group by
using the following command:
Interface eth-trunk 1
Load-balance src-dst-ip
C. You can remove a member interface in an enabled link aggregation group by using the following
command:
Interface GigabitEthernet0/0/1
Debug
Interface GigabitEthernet0/0/1
Undo eth-trunk 1 interface GigabitEthernet0/0/1
Undo shutdown
D. You can add member interfaces to the link aggregation group enabled by the following command:
Interface GigabitEthernet0/0/1
Debug
Interface GigabitEthernet0/0/1
Trunkport GigabitEthernet0/0/1
Interface GigabitEthernet0/0/1
Undo shutdown
Answer: AC

537. As shown in the figure, an OSPF network is set up by the company. The links in the figure form
OSPF adjacencies. All OSPF devices announce their own loopback addresses. One day S1-R2 and
S2-R1 two links suddenly failed. In order to check whether the network is running normally, the engineer
performed a device status check. Which of the following descriptions are correct? (Multiple Choice)

A. R5 can learn the loopback route of R2 normally.


B. R3 cannot learn the loopback route of R2.
C. R1 can learn the loopback route of R2 normally.
D. R3 can learn the loopback route of R2 normally.

139 / 144
The safer , easier way to help you pass any IT exams.

Answer: AB

538. The Option field in OSPF3 appears in all LSAs.


A. True
B. False
Answer: B

539. As shown in the following topology, EBGP is run between AS100, AS200, AS300, and AS400. The
neighbor relationship is established. When AS400 receives the BGP route from the network segment
1.1.1.1/32, what is the correct path order recorded in the AS path attribute?

A. 10,200,3
B. 400,300,200,100
C. 100,200,300,400
D. 300,200,100
Answer: D

540. An existing BGP router HW1 is configured with both an IBGP neighbor and an EBGP neighbor.
Which of the following descriptions are correct about IBGP neighbors and EBGP neighbors? (Multiple
Choice)
A. The router will send BGP updates learned from its IBGP neighbors to its own other IBGP neighbors
and EBGP neighbors.
B. The router will send BGP updates learned from its EBGP neighbors to its own other IBGP neighbors
and EBGP neighbors.
C. IBGP neighbors must be directly connected. Otherwise, IBGP-Multi-hop must be configured
D. EBGP neighbors must be directly connected. Otherwise, EBGP-Multi-hop must be configured
E. IBGP neighbors can establish neighbor relationships through loopback interfaces.
F. EBGP neighbors must establish neighbor relationships through directly connected physical interface
addresses.
Answer: BDE

541. In an MPLS IBGP VPN environment, if LDP distributes labels only through BGP, the MPLS labels of
the packets are at most two layers.
A. True

140 / 144
The safer , easier way to help you pass any IT exams.

B. False
Answer: A

542. Regarding the cross-domain VPN-OptionB scheme, which of the following description is wrong?
A. During the packet forwarding process, exchange the private network LSPs of the VPN on the two
ASBRs.
B. An IP-EBGP neighbor relationship needs to be established between the two ASBRs.
C. The cross-domain VPN-Option B scheme is not limited by the number of interconnected links between
ASBRs.
D. Exchange the outer label of the VPNv4 route between the two ASBRs.
Answer: D

543. Router R1 runs the 0SPF protocol. Use the display ip routing-table command to view the routing
table of the Router R1. Which of the following description is correct about the 0SPF information in the
routing table?
A. In the routing table, the routing entries identified by the “0SPF” identifier can only be learned through
the Type 3 LSA.
B. In the routing table, the routing entry identified by the "0SPF" identifier can only pass the LSA of class
1.
C. In the routing table, the routing entries identified by the OSPF identifier can be learned through 1/2/3/5
LSAs.
D. In the routing table, the routing entries identified by the “0_ASE” identifier can only be learned through
routing.
Answer: D

544. Regarding the certification of the ISIS protocol, which statements are correct? (Multiple Choice)
A. Interface authentication can authenticate hello packets of Level-1 and Level-2.
B. After the interface authentication is configured, the IIH that the router sends must carry the
authentication TLV.
C. After the area authentication is configured, the IIH, SNP, and LSP sent by the router must be connected
to the authentication TLV.
D. Two routers are configured for regional authentication and interface authentication. The passwords are
the same, so the two can establish neighbor relationship.
Answer: AB

545. If the value of the Option field in the 0SPFv3 Hello packet sent by the GigabitEthermet 0/0/0 interface
on the router is 0x000013, which of the following descriptions are correct? (Multiple Choice)
A. Gigabit/thernet0/0/0 port of Router A will participate in IPv6 route calculation.
B. GigabitEthernct0/0/0 port of Router A belongs to the NSSA area.
C. Router A supports AS-External-LSA flooding
D. The router is an OSPFv3 device with forwarding capability.
Answer: ACD

546. Regarding the BGP anti-ring mechanism, which of the following description is correct? (Multiple

141 / 144
The safer , easier way to help you pass any IT exams.

Choice)
A. Use the AS_PATH attribute between autonomous systems to prevent loops.
B. The Cluster List attribute is used for the anti-ring in the reflector cluster. If the router discovers that the
cluster list of the route entry contains its own cluster ID, it will reject the route.
C. Routes learned from IBGP are not advertised to IBGP neighbors to prevent routing loops within the AS.
D. You can use the AS_CONFED_SET attribute to prevent loops within the federation.
Answer: ACD

547. Which of the following description is wrong about BGP routing selection?
A. Non-aggregated routes take precedence over aggregated routes.
A. If the PrefVal and Local_Preference are equal, if the locally generated route, the IBGP route, and the
BGP preference of the EBGP route are used, the valid indication generated by this priority takes
precedence.
C. See the following entry in the BGP routing table: * 172.16.1.11/32 0.0.0.0 10 0 ? Indicates that the
route is available non-optimal.
D. The route that is unreachable for next_hop is invalid and does not participate in the preference.
Answer: A

548. Which of the following statements are correct about IPsec VPN? (Multiple Choice)
A. Aggressive mode can support NAT traversal, while main mode does not support NAT traversal.
B. Two routers establish IPsec VPN through the main mode. Starting from the fifth message (inclusive),
the payload data is often encrypted.
C. Two routers establish IPsec VPN through the aggressive mode, then only two packets are exchanged
between the two devices to establish a tunnel.
D. An OSPF neighbor relationship can be established between two routers through an IPsec VPN tunnel,
and the intranet is exchanged.
Answer: BC

549. As shown in the figure, which of the following statement is correct? (Multiple Choice)

142 / 144
The safer , easier way to help you pass any IT exams.

If the R2 Ethernet 0/0/1 interface is down, the R1 BFD session can quickly detect the fault and notify R1 to
make the OSPF neighbor relationship down.
B. The OSPF status changes to FULL, which triggers the BFD session.
C. If the R2 Ethernet0/0/0 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is changed
to 10.0.21.2.
D. If the BFD function is disabled on R2, the BFD session of R1 will be down. It will cause OSPF neighbor
relationship down.
E. If the R2 Ethernet 0/0/1 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is
changed to 10.0.12.2.
Answer: AB

550. An MSTP switch treats an RSTP switch as an MSTP domain consisting of a single switch. The
MSTP switch resolves the RSTP BPDU to an MST BPDU, where the IRPC is 0.
A. True
B. False

143 / 144
The safer , easier way to help you pass any IT exams.

Answer: A

551. Which of the following descriptions are correct about the PPPoE data frame? (Multiple Choice)
A. When PPPoE passes session data, Code must be set to 0x0.
B. Once the PPPoE session is established, all Ethernet packets are unicast
C. The Session_ID of the PPP session is not allowed to change, it must be specified in the Discovery
phase.
D. The Ethernet_Type field is fixed to 0x8863.
Answer: ABC

552. When the ABR is a Type 5/7 LSA switch router in the NSSA area, the ABR can aggregate the Type 5
LSAs converted from the Type 7 LSA.
A. True
B. False
Answer: A

144 / 144

You might also like