Professional Documents
Culture Documents
HCIE Latest PDF
HCIE Latest PDF
Cross-device link aggregation enables data stream transmission and mutual backup of stack member
switches. However, because of the limited bandwidth of stack cables between stack devices, which of
the following methods can be used to improve forwarding efficiency?
Answer: D
2. About the description of CHAP authentication function in the PPP protocol, which of the following are
correct? (Multiple Choice) O
A. If the authenticator does not have a username, the password cannot be configured on the
authenticated interface. O
B. Calculate a hash value using the authentication sequence ID, random number, and key by the MD5
algorithm (Right Answers) O
C. Three-message interactive authentication is required, and the username is transmitted only on the
network without transmitting the password. (Right Answers) O
D. The user name must be configured under the authenticated interface of CHAP authentication. (Right
Answers)
Answer: BCD
3. A switch is running the Rapid Spanning Tree Protocol (RSTP). Upon a topology change, what happens
to dynamic entries in the L2 forwarding table? O
A. Only entries behind the port where TC was received are removed. O
B. All entries are removed except for those behind edge ports and the port where TC was received.
(Right Answers) O
D. All entries are removed except for entries behind edge ports. O
Answer: B
4. Which of the following statements is true about the MUX VLAN feature of Huawei switches? O
A. The MUX VLAN and the Super VLAN features can be used together on the same VLAN. O
B. The Principal Port can communicate with all ports in the MUX VLAN. (Right Answers) O
C. The Mux VLAN is classified into Principal VLAN and Subordinate VLAN. The Subordinate VLAN is
classified into Separate VLAN and Isolate VLAN. O D. Each Separate VLAN can be bound to multiple
Principal VLANs.
Answer: B
5. When you perform troubleshooting on a LAN deployed with Huawei devices, you find that there is a
large number of unicast frames with unknown MAC addresses. What is the biggest risk for the switches?
O
A. Available MAC address table entries in the system will be consumed. (Right Answers)
Answer: A
6. About the description of the process of sending and receiving data frames in the Access mode of the
switch interface, which is correct?
C. When the data frame enters the switch interface, the switch learns the destination MAC address in
the data frame.
D. In the Access mode, the VLAN tag of the data frame will be stripped off when sent. (Right Answers )
Answer: D
7. In Rapid Spanning Tree Protocol (RSTP), which port provides a backup path to the root bridge and
which state should this port be in?
A. Root port/listening
B. Alternate port/forwarding
C. Alternate port/learning
D. Designated port/learning
Answer: E
8. Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice) O
A. Authentication is unsuccessful (Right Answers)
Answer: ABD
9. The following is about the RD attribute filter of BGP, what is the correct description? (Multiple Choice)
A. If RD-filter is configured, but the RD of the route does not match any of the RDs defined in the rule,
the default match result is Permit.
B. The relationship between the rules configured by RD-filter is "or" (Right Answers) O
C. If RD-fitter is not configured, but this RD-fitter is used for filtering, the matching result is deny. O
Answer: BD
10. ISIS will elect DIS in the broadcast multi-access network. Which of the following statement about DIS
is correct? (Multiple Choice) O
A. ISIS elects the DIS by comparing the priorities and compares the MAC addresses if the priorities are
the same. (Right Answers) O
B. DIS guarantees database synchronization by periodically sending CSNP messages (Right Answers) O
C. In a broadcast multi-access network, the DIS sends Hello PDUs three times as often. (Right Answers)
D. DIS supports the preemption function. After the new DIS preemption is successful, you do not need
to flood any LSP packets.
Answer: ABC
11. About Filter-policy, which of the following description is correct? ❑
A. Filtering the generation of type 5 LSAs and type 7 LSAs on the ASBR in OSPF using Filter-Policy (Right
Answers)
C. Fitter-Policy can fitter the received or advertised link state information and can modify the attributes
of the route entry.
D. When filtering routes using the prefix list, the entry ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 means
that only the default route is matched.
Answer: A
12. The OSPFv3 protocol is a separately developed protocol. It differs from OSPFv2 in that OSPFv3 is
based on links rather than network segments. Which of the following statement is wrong?
A. The two routers connected to the link can establish neighbor relationships even if their IPN/6 address
prefixes are different.
B. The two routers connected to the link can establish neighbor relationships even if no unicast IPN/6
address is configured.
C. The routing information obtained by the OSPFv3 router from the neighbor uses the link-local address
of the neighbor as the next hop of the forwarded packet.
D. All OSPFv3 interfaces use the Link-local address as the destination address of the packet except the
virtual link. (Right Answers )
Answer: D
13. Which of the following statements are NOT true regarding the TCP sliding window? (Multiple Choice)
O A. If the retransmission timer expires but the sender has not received the acknowledgement, it will
retransmit the unacknowledged data. O
C. TCP sliding window allows the transmission of multiple frames before waiting for an
acknowledgement.
D. The size of the sliding window can only increase or stay the same. (Right Answers) O
Answer: DE
14. As shown in the following figure, in IPv4 and IPv6 environments the SEL value in an IS-IS NET address
is always 00.
AFT [ IDP 1 DSP tr'1 Mph Gordo. OSP System ID SEE Area ID e-iare 4. MI . as
B. False
Answer: A
15. As shown in the following figure, a part of the LSP of the LSDB of a router is shown in the first line of
the figure. First received a new LSP, the second hop in the following picture, which of the following
statement is wrong?
LSPID Svy Num Checksum Holdtime Length ATT/P/OL 0002.0002.0002.00-00 0x00000019 Ox4eeb 786
102 0/0/0 Level-2 Link State Database LSPID Sec' Num Checksum Holdtime Length ATT P/OL
0002.0002.0002.00-00 0x00000020 Ox4eeb ttlo 102 0/0/0
A. The router will put the newly received LSP into the LSDB. (Right Answers)
B. This router will ignore the LSP received from the neighbor.
D. If it is a broadcast network, the DIS will include the summary information of the LSP in the next CSNP
packet.
Answer: A
16. Regarding the Stub area and the NSSA area of OSPF, the wrong statement of the following is
A. Type 5 LSA is not allowed in the Stub area, but Type 5 LSA is allowed in the NSSA area. (Right
Answers)
B. Both the Stub area and the NSSA area are allowed to inject Type 3 LSA. \
C. Stub area and NSSA area are not allowed to inject Type 4 LSA.
D. Type 7 LSA is not allowed in the Stub area, but Type 7 LSA is allowed in the NSSA area.
Answer: A
17. Regarding BGP route filtering, which of the following description is wrong?
A. For a locally advertised route, configure a routing policy. The policy takes effect before the route is
added to the BGP routing table. (Right Answers)
B. The filtering relationship between the nodes of the Route-Policy is "OR", that is, the Route-Policy can
be passed with a node fitter only.
C. When receiving a route from a BGP peer, perform a routing policy to fitter unwanted BGP routes.
These routes are not added to the local BGP routing table.
D. In the same node of Route-Policy, the relationship of multiple if-match clauses for different
attributes is "OR". (Right Answers)
Answer: AD
18. If the value of the Option field in the OSPFv3 Hello packet sent by GigabitEthernet 0/0/0 on Router A
is 0x000013, the correct description of the following is: (Multiple Choice).
Answer: BCD
19. The ISIS protocol is deployed in an IPv6 environment. The correct statement in the following is:
A. In broadcast networks, the DIS priorities of IPv4 and IPv6 can be set separately. (Right Answers)
B. By default, the DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.
C. In the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6
must be the same device.
D. Configure ISIS silent on the ISIS interface, then this interface will not send ISIS packets, but will receive
ISIS packets.
Answer: A
19. The ISIS protocol is deployed in an IPv6 environment. The correct statement in the following is:
A. In broadcast networks, the DIS priorities of IPv4 and IPv6 can be set separately. (Right Answers)
B. By default, the DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.
C. In the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6
must be the same device.
D. Configure ISIS silent on the ISIS interface, then this interface will not send ISIS packets, but will
receive ISIS packets.
Answer: A
20. After BGP imports routes of other protocols, the next hop in the BGP routing table is the same as the
next hop of the introduced routing protocol.
A. True
Answer: B
21. There is an AS-path-fitter, ip as-path-filter 1 permit ^100L100)" L400)", which AS-PATH attribute
cannot be matched by the As-path-filter?
A. 100 400 CI
D. 100
Answer: C
21. There is an AS-path-fitter, ip as-path-filter 1 permit ^100L100)" L400)", which AS-PATH attribute
cannot be matched by the As-path-filter?
A. 100 400 CI
Answer: C
22. Which statements about BGP route reflection are true? (Multiple Choice) O
A. IBGP peers must be fully connected in the absence of a route reflector (RR). The BGP route reflection
mechanism is introduced to lower the requirement. O
B. After learning routes from a non-client, a route reflector (RR) advertises these routes to all clients.
(Right Answers ) O
C. After learning routes from a client, an RR advertises these routes to all other clients and non-clients.
(Right Answers) O
D. After learning routes from an IBGP peer, an RR advertises these routes to all clients and non-clients.
(Right Answers)
Answer: BCD
23. Regarding the BGP alliance, which of the following description is wrong? O
A. The alliance divides an AS into several sub-ASs, and the external AS still considers the alliance to be
an AS. O
B. The sub-AS number of the alliance is advertised to BGP peers outside the alliance by default. (Right
Answers) O
C. The sub-AS number in the alliance can use a private AS number. A Huawei NE/AR router can be
configured with up to 32 sub-AS numbers. O D. The alliance can easily detect the routing loop in the AS
because EBGP is running between sub-ASs.
Answer: B
24. After the BGP connection is successful and it is down again. What are the impossible reasons? O
C. After the BGP connection is established, the keepalive packet is not received within the negotiated
holdtime. ❑
Answer: A
25. When ISIS area authentication is configured, which ISIS packet carries the authentication
information? 7
Answer: A
26. The Type 5 LSA in OSPF are used to pass external routes. Which of the following statements about
the Type 5 LSA are wrong? O
A. The router in the same area as the ASBR can calculate the external route through the intra-area LSA
and the Type 5 LSA. O
B. Configure the corresponding policies on the ABR and ASBR to filter the Type 5 LSA. O
C. Type 5 LSAs are advertised by the ASBR and flooded in the OSPF network in the non-Stub/NSSA area.
O
D. The FA address is included in the Type 5 LSA, and the FA address is 0.0.0.0, but has no practical effect
as a reservation. (Right Answers)
Answer: D
27. Which of following statements is true about the domain-authentication-mode md5 hello command
in the IS-IS process? O
A. The routing domain authentication is used to carry the authentication information during the
delivery process of SNPs and LSPs of Level-1 and Level-2. O
B. The domain authentication mode of all routers in the same routing domain is MD5, the password is
hello, and the ISIS SNP and LSP are flooded. (Right Answers) O
C. This command is mainly used to enable ISIS Hello packets to carry authentication information during
the delivery process. O D. ISIS certification cannot be applied in IPN/6 environment.
Answer: B
28. The level-1-2 IS transmits the Level-2 LSP to the Level-1 area. If the KIT bit in the Level-2 LSP is set to
1, the level-1 in the area can pass the Level-1-2 IS to the outside region. 0
A. True
Answer: B
29. In the OSPF broadcast network, there are four routers in the same network segment, RTA, RTB, RTC,
and RTD. The DR priorities are 2, 1, 1, and 0, and the Router IDs are 192.168.1.1, 192.168.2.1, 192.168.
.3.1 and 192.168.4.1. If OSPF protocol is enabled on all the four routers, the BDR selected by OSPF is O
A. RTB O
Answer: B
A. AS_PATH ( 32 1274 23 ) 0
Answer: B
31. An OSPF protocol is running on a company network. An engineer wants to understand the OSPF
mechanism to perform packet capture operations on the network, which of the following description
about the OSPF packet is correct? (Multiple Choice)
A. LS Update message synchronizes the link state database by sending detailed LSA information. (Right
Answers)
B. After receiving the LS Update message, the router must send LS Ack to confirm.
C. Sending Hello packets immediately after the interface joins the OSPF area. (Right Answers)
Answer: AC
32. In the following topology picture, R1 can access the Internet through R2 and R3. R1 and R2, and R1
and R3 establish an EBGP connection. R2 and R3 belong to the same AS. The default route is advertised
through BGP. R2 is the optimization when requiring R1 to access the Internet traffic. The following
practices that can be achieved are (Multiple Choice)
rin.sena G0011
InternoI
A. R2 specifies that the peer R1 sets the MED attribute to 150 in the export direction. O
B. R1 specifies that the peer R3 sets the MED attribute to 150 in the import direction. (Right Answers ) O
C. R2 specifies that the peer R1 sets the local priority to 150 in the export direction.
D. R1 specifies that the peer R2 sets the local priority to 150 in the import direction. (Right Answers )
Answer: BD
33. In addition to stateless address autoconfiguration, IPv6 devices can also obtain information such as
addresses, gateways, and DNS through DHCPv6.
A. True
Answer: B
34. The network administrator is ready to use the 6to4 automatic tunnel to carry IFV6 data on the IPv4
network. The IPv4 address of the router interface is 138.14.85.210, so the corresponding tunnel address
is 2001:8a0e:55d2:1:230:65ff: fe2c:9a6.
A. True
Answer: B
35. In an IPv6 network, two nodes A and B are neighbors. If node A sends an NS message to node B, if
node B replies to the NA message after received the message, so what neighbor status will be marked as
when viewing on the node A?
B. Stale
C. Probe
D. Incomplete
Answer: A
36. As the description of MPLS, which of the following is wrong?
A. The label space range of dynamic signaling protocols such as LDP and MP-BGP is 16-1023. (Right
Answers)
B. The length of the MPLS label is 20 bits and is used for packet forwarding.
C. In the TTL processing mode of the Pipe mode, IP packets are transmitted on the MPLS network. The
TTL value of the IP packets is reduced by 1 in the MPLS ingress node and the egress node respectively. •
D. MPLS supports multi-layer tag nesting, the S-bit value of the innermost tag is 1.
Answer: A
37. RD is used to distinguish the same IP address in different VPNs. How many bits does the RD contain?
A. 16
B. 64 (Right Answers)
C. 32
D. 128
Answer: B
38. In the packet forwarding by the way of inter-AS VPN-Option B, the two ASBRs exchange the LSP
labels of the public network.
A. True
Answer: B
39. About the description of MPLS lable related information, which of the following is wrong?
A. The length of the MPLS label is 4 bytes and it is encapsulated between the link layer and the network
layer.
B. By default, the device supports the PHP feature, and the label value of the egress node supporting
PHP which is allocated to the penultimate hop node is 3.
C. If the bottom mark of the label is S=O, it indicates that the label is the bottom label and directly
performs IP forwarding. (Right Answers)
D. When the tag value is 0, it indicates that the tag should be ejected, and the packet must be
forwarded based on IPv4.
Answer: C
40. View the details of all VPN instances on a network device. The results are as follows. Which of the
following statements are incorrect? (Multiple Choice)
06Jawei> display ip von-instance verbose Total VPN-Instances configured : 3 Total IPv4 VPN-Instances
configured : 1 Total 7PvG VPN-Inntances configured : 2
A. The total number of instances of the IPv6 address cluster enabled in the VPN configured on the local
end is 1. (Right Answers )
B. The device will assign a label to each route of the VPN-Instance vpna. (Right Answers)
Answer: AB
41. The following are the statements about LDP reliability, which one is wrong?
A. LDP FRR can also be used to generate an LSP for the label mapping from the non-optimal next hop.
And it can be as a backup of the primary LSP to establish the transfer entries. •
B. The association between the LDP and the IGP requires the IGP to suppress the advertisement of the
route and ensure that the LDP path is consistent with the IGP path.
C. The manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to
establish a backup LSP. (Right Answers)
D. LDP GR Graceful Restart uses the feature that the MPLS forwarding plane is separated from the
control plane. The device does not interrupt when the protocol is restarted or the active/standby
switchover is performed.
Answer: C
42. What improvements have been made to the IGMPv2 protocol compared to IGMPv1? (Multiple
Choice)
Answer: ABC
43. If multiple candidate RPs are configured in a certain group of mutticasts, which of the following
parameters need to be compared between the multiple candidate RPs? (Multiple Choice)
B. Group-wide mask length of the C-RP service matching the group address to which the user joins (Right
Answers )
Answer: ABC
44. If a DR is elected between the mutticast routers running PIM-BM to be responsible for receiving and
receiving mutticast data on the source or member, what is the correct description of the DR election
rules?
A. Compare the DR priorities first, if the priorities are the same, you need to compare the IP addresses
of the PIM router interface to elect DRs. (Right Answers)
B. The PIM router with a long interface mask is elected as the DR.
Answer: A
45. If you run PIM-SM on a mutticast network, you need to construct a multicast forwarding tree
between the multicast source and the receiver for the receiver to receive mutticast data, so the
following descriptions are about the constructed mutticast forwarding tree, which are the correct
options? (Multiple Choice)
A. The RTP tree is constructed between the RP and the receiver. (Right Answers)
B. The RPT tree is constructed between the multicast source and the RP.
D. The SPT tree is constructed between the multicast source and the RP. (Right Answers)
Answer: AD
46. As shown in the figure, the IPSEC VPN is established between the branch and the headquarters using
redundant links. At the same time, URPF is enabled on the traffic from the branch 1 on Router B. Which
of the following options is correct? (Multiple Choice)
A. When using IPSEC backup link redundancy backup, URPF loose mode is recommended when the
URPF function enables on the physical interface. (Right Answers)
B. When using IPSEC multi-link redundancy backup, URPF strict mode can be used when URPF function
enables on the tunnel interface. (Right Answers)
C. When using IPSEC backup link redundancy backup, URPF strict mode can be used when URPF function
enables on the physical interface.
D. When using IPSEC multi-link redundancy backup, URPF strict mode can be used when URPF function
enables on the physical interface.
Answer: AB
47. The HTTP protocol is based on TCP. Therefore, you can use the TCP Flood attack defense method to
defend against HTTP flood attacks.
A. True
Answer: B
48. As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same
time, an IPSEC tunnel needs to be established between the two IPv6 networks for communication.
Which of the following encapsulation modes can meet the requirements above?
Router A NAT64
Router_B NAT64
IPv6 Host A
C. AH + transmission mode
D. AH + tunnel mode
Answer: A
IPv6 Host B
49. When there are multiple matching rules in the ACL of the VRP, which of the following statements is
correct about the matching order?
A. On confirmation, follow the Rule-ID, match from small to large (Right Answers)
C. On confirmation, match the order by matching the permit first and then matching the deny. 171 D.
There is only one matching order and cannot be modified.
Answer: A
50. The LAND attack is performed by the attacker sending a source address and a destination address to
the destination host, they are all the destination hosts. The source port and the destination port are the
same SYN packet. When the receiver waits for the final ACK packet from the sender, The connection is
always in a semi-connected state, resulting in waste of limited TCP resources at the receiving end.
A. True
Answer: B
A. TC=CIR/BC
B. CIR=TC/BC
C. CIR=BE/TC O
Answer: D
52. A home user has opened a 10Mb/s broadband. To improve the user experience, the operator can
stabilize at 12Mb/s when measuring speed. If we use token bucket technology to achieve this demand,
which of the following methods is optimal?
Answer: A
53. Which of the following options is correct for the description of the optimal routing elections for
various protocols?
A. OSPF puts all routing information in the LSDP into the IP routing table.
B. The route with the next hop unreachable in BGP is also put into the IP routing table.
C. Different routing entries learning from BGP and OSPF to the same destination network segment select
the optimal route to join the IP routing table by comparing the preference value of the protocol. (Right
Answers)
D. BGP selects the optimal route to the same destination network segment by comparing the cost value
of the route entry.
Answer: C
54. As shown in the following topology diagram, all the interfaces of the router in the figure are all
enabled with the ISIS protocol. The correct statements of the following are: (Multiple Choice)
Ri. tederface Ethernet0/0/0 ip adderss 392.161111 231233 21S0 hip end 1 ertualnp 192 168.1 12 vtrp
end 1 pr do 110 rip end 1 pactbid-neon 1 nideerd 20 his enabler 1 • interlace Itherries0/0/1 ip address
10 0 IS 1 2SS 254 2530 Isis enable 1 Old 1 bind pave. ip 100 144 iestrinvanhor Iota/ 1 tetorinsinator
honour • cannel •
ft2 •eet/ace therne10/0/12 ap address 192164_12 2SS1SS1S1-0 end hid 1 victual- ip 192 144 1 12 his
enable •
as interface thernelediVO opop address 100 Sa • 2SS 25S 2550 enable 1 • bid I bind pew -ip 10013 1
deste•ninatee local • discfneinidor remote cannel
DA. If O B. If O C. If O D. If
the GEO/0/0 interface of R3 is the Ethernet 0/0/0 interface of the Ethernet 0/0/0 interface of the
Ethernet 0/0/1 interface of
Answer: AC
down, then R2 will become the master device. (Right Answers ) R3 is down, then R2 will become the
master device. R1 is down, then R2 will become the master device. (Right Answers ) R1 is down, then R2
will become the master device.
55. Which of the following statements about the BFD one-armed echo function are correct? (Multiple
Choice)
A. The BFD one-armed echo function must be configured with a local identifier and a remote identifier.
B. The default destination IP address of the BFD one-armed echo function protocol packet is
224.0.0.184.
C. The BFD one-armed echo function is applicable to scenarios where one device supports BFD and the
other device does not. (Right Answers)
D. After the BFD one-armed echo function is enabled, the destination IP address and source IP address
of the BFD packets are the same. (Right Answers)
Answer: CD
56. Which of the following is not the role of EVPN Type2 routing?
Answer: C
A. True
Answer: B
58. Which of the following is optimal for building a loop-free Layer 2 network?
A. Stacking + link aggregation (Right Answers)
B. TRILL+MSTP
C. Stacking + MSTP
Answer: A
59. By default, the switch configures the MAC address table to be empty. Host A connected to the
switch sends the first unicast data frame. What operation will the switch perform after receiving the
data frame?
B. The switch forwards the data frame out of an interface according to the destination MAC address of
the data frame.
C. The switch records the source MAC address of the data frame and floods the data frame. (Right
Answers )
D. The switch caches the data frame and waits for the destination host to send the data frame and then
forward it.
Answer: C
60. As shown in the figure, three switches SW1, SW2 and SW3, where SW1 is the root bridge, the link
between SW1 and SW2 is congested, and SW2 cannot receive the configuration BPDU sent by the root
bridge. Which spanning tree protection mechanism does the administrator need to configure to prevent
link congestion?
B. Root protection
C. TC-BPDU protection
D. BPDU protection
Answer: A
61. Which of the following command is displayed to determine that the loop fault of the switch is
generated?
C 0 O ICE02]display cpu-usage CPU Usage Stat. Cycle: 60 (Second) CPU Usage : 30% Max: 44% CPU Usage
Stat. Time : 2018-05-21 17:19
D • [C802)displey trapbuffer Trapping buffer configuration and contents : enabled Allowed net buffer size
: 1024 Actual buffer else : 236 Channel number : 3 . Channel MI/be : trapbuffer Current iresseses : 178
slay 21 2018 16:26:36 C%02 L2IPPP1/4/SPLPVLANSLA81:01D 1.3.6.1.4.1.2011.15.25.160.3.7 SAC move
detected. VLANIn= I. MacAddress a 60de -f328 -1b90. Original-Port a 2080/0/2. flapping port a 2080/0/1.
Please check the network socottood to flapping port.
Answer: D
62. A total of 6 bits indicating the priority field in the VLAN (802.1Q) data encapsulation 0
A. True 0
Answer: B
63. Four routers R1, R2, R3, and R4 run ISIS, the ISIS router type is marked, and the routing table is viewed
on R1. The reason why R1 does not reach the route of 10.34.34.4 is Route Flags: R - relay, D - Routing
Tables: Public Destinations : 5 download to fib Routes : 5 Destination/Mask Proto Pre Cost Flags NextHop
Interface 10.12.12.0/24 Direct 0 0 D 10.12.12.1 CigabitEthernet°/0/0 10.12.12.1/32 Direct 0 0 D 127. 0.
0.1 CigabitEthernet0/0/0 10.23.23.0/24 ISIS-L1 15 20 D 10.12.12.2 GigabitEthernet0/0/0
Answer: C
A. True 0
Answer: B
65. Which of the following is true about Link-LSA for OSPFv3?
A. The Option field exists in the LSA header, not the data area of Link-Isa.
B. Contains both the link-local address of this interface and all IPv6 prefixes of this interface. (Right
Answers)
C. If the Prefix Option field of a prefix of the Link-LSA is Ox00, the Prefix will not be included in the IPv6
unicast calculation.
D. Contains both the link-local address of the interface and all Ipv6 prefixes in the same area on the router.
Answer: B
66. The following topology is available, and based on this analysis, the following statements which are
correct?
1113
RI
11r-va*Or—o=zzati*--imillbigo
112, ft/
A. Because R2 does route aggregation, only the routing entry of 10.0.0.0/16 exists in the IP routing table
of R1.
B. The routing entries of 10.0.2.2/32 and 10.0.3.3/32 in the IP routing table of R1.
C. The routing entries of 10.3.3.3/32 and 10.0.0.0/16 exist in the IP routing table of R1. (Right Answers)
D. The routing entries of 10.0.2.2/32 and 10.0.0.0/16 in the IP routing table of R1.
Answer: C
68. As shown in the figure, the AS100 has two paths to the AS400. By default, the best route is transmitted
from the AS200. It is known that the path to the AS400 through the AS300 is better. Therefore, the
following configuration is performed on the R2. After the configuration is complete, the optimal route is
not changed. Which of the following operations can make the configuration take effect? [R2] ip as-path-
filter 1 permit ^400$ R2] route-policy med permit node 10 r2-route-policy] if-match as-path-filter 1 Ir2-
route-policy] apply cost 20
/ AS 200 ,••• - ••■ .0 - ■ / AS 100 u i AS 400 / - IIII % R1 .•••• / AS 300 •- R3 R4
Answer: D
69. A network consisting of an existing router R1, router R2, router R3 and router R4. These four routers
are interconnected via a LAN network. Basic OSPF is deployed on all four routers. When you execute the
command "display ospf peer" on the router R2, the status between router R2 and router R3 is "2way".
What conclusion can you draw from this output?
A. Router R4 is DR
B. Router R2 is DR or BDR
E. There is no full adjacency between router R2 and router R3. (Right Answers)
Answer: CDE
70. The following statement about the NSSA area, which is correct.
A. In the OSPF neighbor relationship sent by the OSPF neighbor, the N position in the option field is set to
1. The E position is 0. (Right Answers )
B. The NSSA area generates seven types of LSAs to advertise external routes. The FA address in the seven
types of LSAs is used to prevent loops.
C. A default LSA must be automatically generated in the NSSA area to access the external network. 171 D.
The OSPF neighbor in the NSSA area sends the hello text. The N position in the option- field is 0, and the
E position is 1.
Answer: A
71. In the aggregate ipv4-address { mask I mask-length }( as-set I attribute-policy route-policy- namel I
detail-suppressed I origin-policy route-policy-name2 I suppress-policy route-policy- name3 ] command,
multiple parameters can be specified to affect the route summarization process and results. Which
statements about this command are true? (Multiple Choice)
A. If as-set is configured, the AS_Path of the generated summarized route contains AS_Paths of all specific
routes. This avoids routing loops. (Right Answers)
B. If suppress-policy is configured, the summarized route can be generated, the if-match clauses of the
route-policy can be used to selectively suppress specific routes. Those specific routes that match this
route-policy will still be advertised to other BGP peers.
C. If origin-policy is configured, only the specific routes that match the route-policy are used to generate
the summarized route. (Right Answers)
D. If attribute-policy is configured, attributes can be set for the summarized route. (Right Answers)
Answer: ACD
72. There are two community-filters: ip community-filter 1 permit 100:1 200:1 ip community-filter 2
permit 100:1 ip community-filter 2 permit 200:1 Which of the following statements are true? (Multiple
Choice)
A. A BGP route matches community-filter 1 only when the community attributes carried in the
B. A BGP route matches community-fitter 1 as long as the community attributes carried in the
C. A BGP route matches community-fitter 2 only when the community attributes carried in the O
D. A BGP route matches community-filter 2 as long as the community attributes carried in the
Answer: AD
both 100:1 and 100:1 or 200:1, both 100:1 and 100:1 or 200:1
73. We can use basic community-filters or advanced community-filters to filter BGP routes. Which of the
following tools make the advanced community-fitter more flexible than the basic community- fitters?
A. IP-prefix O
B. AS-path-fitter
Answer: C
74. The ip ip-prefix ip-prefix-name [ index index-number] {permit I deny} ipv4-address mask-length [
greater-equal greater-equal-value] [ less-equal less-equal-value] command is used to configure an IP-
prefix-filter. If less-equal is specified but greater-equal is not, what is the prefix range?
A. [0, less-equal-value]
C. [less-equal-value, 32]
D. Not limited
Answer: B
75. The interface Serial° of an existing router goes to OSPF and sets the interface Serial° to the Silent
interface. What effect does this setting have?
A. OSPF does not establish any adjacencies through the interface. (Right Answers)
B. OSPF does not add routes learned from the interface to the local routing table.
Answer: A
76. Router HW is enabled with OSPF and the role of the router HW is ABR, and abr-surmnary is configured.
Which classes of LSA will be aggregated?
A. Class 4 LSA
B. Class 5 LSA
Answer: CDE
77. Both ISIS CSNP packets and OSPF DD packets are in the MA network, describing the role of the link
state database profile. Which of the following statements is correct?
A. Both routers need to confirm the two routers after sending them. Otherwise, they need to be
retransmitted.
B. The master-slave relationship in the DD packet exchange of OSPFA is not bound to the DR/BDR. The
CSNP packet is generated only by the DIS. (Right Answers)
C. Once the adjacency relationship is established, CSNP packets and DD packets will stop sending. 171
D. The two routers do not need to confirm the peer router after sending.
Answer: B
78. If the default route is not used in the local IP routing table, the default route-import command is used
to advertise the default route to the BGP peer (group). 0
A. True
Answer: B
79. Which scenario can use AS-path -filter? O
C. Fitter the route sent to the BGP neighbor according to the AS_PATH attribute carried in the route. For
example, the command peer x.x.x.x as-path-fitter export (Right Answers) O
D. Fitter the route received to the BGP neighbor according to the AS_PATH attribute carried in the route.
For example, the command peer x.x.x.x as-path-fitter import (Right Answers)
Answer: BCD
A. The Alliance divides an AS into several sub-AS alliances. External As still considers the Alliance to be an
AS.
B. The sub-AS number of the confederation is advertised to BGP peers outside the confederation by
default. (Right Answers)
C. The sub-autonomous system within the federation can use a private AS number. A Huawei NE/AR router
can be configured with up to 32 sub-AS in a single alliance. O
D. The federation can easily detect the routing loop within the AS because EBGP is running between the
sub-AS.
Answer: B
81. Which of the following is the correct description of route penetration for ISIS? O
B. ISIS route penetration does not cause neighbors to oscillate. (Right Answers) O
C. In the route penetration of ISIS, the route before penetration cannot be an aggregate route. O
D. ISIS route penetration can be deployed on Level-1 routers. O E. ISIS route penetration is used to prevent
routing loops.
Answer: AB
82. Two EBGP neighbors connected by two parallel cables. What method will you use to achieve
bidirectional load sharing between two EBGP neighbors connected through these two parallel serial
cables? O
A. Configure the loopback interface to establish an EBGP neighbor relationship and configure EBGP Multi-
hop. Configure the loopback interface as the update source, and then use IGP to implement equal-cost
path load sharing between addresses. (Right Answers ) O
B. Without any method, BGP automatically implements load sharing between different autonomous
systems on the available links. O
C. Use the command at both ends "ebgp-load-balance O
D. Configure the EBGP neighbor relationship with the loopback interface as the update source. The IGP in
each AS must have two equal-cost paths to the EBGP neighbor loopback address. You need to use the
command "next-hop-local". O
E. Configure the EBGP neighbor relationship with the loopback interface as the update source. The IGP in
each AS needs to import two equal-cost paths to the EBGP neighbor loopback address. You need to use
the commands ebgp-max-hop and next- Hop-local
Answer: A
83. OSPFv3 and ISIS are running on the router at the same time. You need to import OSPFv3 routes to ISIS.
Which of the following configurations is correct: (Multiple choice) ❑
Answer: AC
84. If the router only needs to forward IPN/6 packets, there is no need to configure any IPv4 protocols
and addresses on the router. o
B. False
Answer: A
85. In the intranet MPLS BGP VPNF network, when a packet enters the public network for forwarding, it
will be encapsulated with two layers of MPLS labels. The following description of the two-layer label,
which is wrong? O
A. By default, the router assigns the same label value to all VPNv4 routes destined for the peer PE. (Right
Answers) O
B. The private network label is carried and distributed when the route is delivered by MP-BGP. The public
network label is distributed by the LDP protocol. O
C. The egress PE uses the inner label when determining which egress CE the message should be sent to.
D. MPLS BGP VPN uses two layers of labels: public network labels (also known as outer labels) and private
network labels (also known as inner labels).
Answer: A
86. The following is about the LDP protocol session establishment process, which is the correct
description? O
A. After the TCP connection is successfully established, the active party sends an initialization message to
negotiate the parameters related to the LDP session. (Right Answers) O
B. The party with the larger transmission address acts as the active party and initiates the establishment
of TCP connection. (Right Answers) O
C. The Hello message discovered by the LDP neighbor uses TCP packets. The destination address is the
mutticast address 224.0.0.2. O
D. After both parties receive the Keepalive message from the peer, the LDP session is established
successfully. (Right Answers)
Answer: ABD
87. The router HW1 exists as an MPLS LSR router in the network of the operator HW. The router receives
a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle the
message? O
A. Router HW1 uses LDP to create an LSP and creates a new path for the label carried in the packet in the
LFIB. O
C. Router HW1 will forward the message using the default label. O D. Router HW1 will strip the label and
find the IP destination address of the FIB.
Answer: B
88. The following statement about cross-domain MPLS VPN, which is the wrong description? O
A. When the public network label is only LDP, the cross-domain vp-Option-c scheme 2 needs to use three-
layer labels in the packet forwarding process. (Right Answers)
B. For the cross-domain vPN-OptionB mode, an MP-eBGP neighbor relationship needs to be established
between the two ASBR.
C. For the cross-domain vPn-OptionA mode, the route between the two ASBR is a common IPv4 route.
D. For the cross-domain vPN-OptionB mode, two ASBR are interconnected by multiple interfaces
(including sub-interfaces). Each interface is associated with one VPN. Each ASBR-PE uses the peer as the
CE. (Right Answers)
Answer: AD
89. If there are multiple receivers in a multicast group, the administrator enables IGMP-Snooping on the
switch connecting the receiver. After the receiver receives the general query message from the querier,
the receiver receives multiple receivers. How to respond? O
B. Only when IGMPv1 is running, all receivers respond to the Report message. O
C. The first responder with a response timeout sends a Report message, and the other recipients do not
send it. O
D. Only the IGMPV2 is running, and all receivers respond to the Report message.
Answer: A
90. Which of the following is the correct description of the process of registering the source DR with the
RP in the PIM-SM? o
A. The registration message encapsulates the multicast service data. (Right Answers) o
B. The RP sends a registration stop message as soon as it receives the registration message. o
C. The registration message is used to construct an RPT tree between the source DR and the RP. O
Answer: A
91. In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?
❑ A. Register mechanism
❑ B. BSR/RP mechanism
❑ D. Join/Prune mechanism
Answer: C
92. Which of the following statements about 802.1x authentication, RADIUS, and HWTACACS
authentication is correct?
O A. RADIUS authentication and HWTACACS authentication can perform dual authentication for the
same user at the same time, which is more secure.
O B. Users can access the network using 802.1x authentication and complete identity authentication
through Radius. (Right Answers)
O C. RADIUS authentication and HWTACACS authentication are mutually exclusive. You cannot perform
dual authentication for the same user at the same time. (Right Answers)
Answer: BC
O A. MAC authentication does not require a username and password, so you cannot use RADIUS to
authenticate a user.
O B. RADIUS authentication and Portal authentication cannot be used together. Because Portal
authentication is usually used, the Portal server can be used to authenticate users.
O D. RADIUS supports both wired and wireless access methods. (Right Answers )
Answer: D
94. To configure AAA, you first need to define the XRADIUS RADIUS server as follows: [Huawei] radius-
server template EXAM [Huawei-radius-EXAM] radius-serve shared-key cipher HUAwei123 [Huawei-
radius-EXAM] radius-se authentication 10.7.66.66 1812 [Huawei-radius-EXAM] radius-se authorization
10.7.66.661812 [Huawei radius -EXAM] radius-server retransmit 27. 1813 [Huawei-radius-EXAM] radius-
sery accounting 10
0 A. True
Answer: B
95. Which of the following does the digital certificate not contain?
O C. Digital signature
O D. Issuer
Answer: B
96. Network administrators can use CAR technology in traffic policing. Which of the following
technologies can be applied in CAR?
Answer: ABD
97. Router A has an IP router with a destination network segment of 10.0.0.1/32 and an outbound
interface of Gigabitethernet 0/0/1. Now add the following configuration acl number 2000 rule 10 permit
source 10. 0.1.1 0 traffic classifier test if-match acl 2000 traffic behavior test remark dscp cs3 traffic
policy test classifier test behavior test interface Gigabitethernet0/0/1 ip address10.0.12.1255.255.255.0
traffic-policy test outbound Suppose Router A receives a packet with a destination IP of 10.0.0.1. The
following statements which are correct?
O A. If the source IP address of the packet is 10.0.0.1, it can be forwarded while the DSCP field remains
unchanged. (Right Answers)
O B. If the source IP address of the packet is 10.0.0.1, it can be forwarded and the DSCP field is marked
as CS3.
O D. If the source IP address of the packet is 10.0.0.1, it can be forwarded and the DSCP field is marked
as cS3. (Right Answers)
Answer: AD
98. Which SNMP message type report event sent to the NMS is reliable?
❑ A. Response
❑ B. Trap
❑ D. Get
❑ E. Get Bulk
Answer: C
99. Non-Stopping-Forwarding (NSF) and Non-Stopping Routing (NSR) are two solutions for high
reliability. The following statements which are correct?
O A. NSR routers need to negotiate NSR support through specific packet negotiation.
O B. After the NSF is enabled, the router performs the master/slave switchover. The routing table and
the forwarding table remain unchanged. Therefore, traffic is not lost during the GR time. (Right
Answers)
O C. After the NSR is enabled, if the main control board fails when the service batch backup is not
completed, the NR switch cannot be completed. (Right Answers)
O D. NSF routers do not need to support NSF through specific packet negotiation.
Answer: BC
100. As shown below, R1 and R2 establish E-BGP neighbors and enable BFD detection. The following
statements which are correct?
RI
R2
bid interface Ethernet0/0/0 ip address 10 0.12 1 255.255 255 0 • bgp 100 peer 10.0.12.2 as-number 200
peer 10.0.12.2 bfd min-tx-interval 300 min-rx-interval 200 detect-multiplier 4 peer 10.0.12.2 bfd enable
R2: bid interface Ethemet0/0/0 op address 10.0.12.2 255.255.255.0 • bgp 200 peer 10.0.12.1 as-number
100 peer 10_0.12 I bfd min-tx-interval 220 min-rx-interval 320 peer 10.0.12.1 bfd enable
Answer: C
O A. IPv6 over VXLAN means that Vxlan's Overlay network is an IPv6 network.
O B. IPv6 over VXLAN can solve the problem of insufficient IP address resources for terminal tenants.
O C. The tunnel between the Layer 2 and Layer 3 gateways of the VXLAN is an IPv4 network.
O A. The IP Prefix field can carry either the host IP address or the network segment address.
O C. Type 5 routing carries both Layer 2 VNI and Layer 3 VNI (Right Answers)
Answer: C
103. VXLAN uses BGP EVPN to establish a tunnel. What kind of packets are used?
O B. Type5
O C. Type4
O D. Type2
O E. Type1
Answer: A
104. Which of the following advanced features does BGP EVPN support?
O D. VXLAN Qos
Answer: AC
❑ A. The outer destination IP address is the IP address of the remote VTEP of the VXLAN tunnel.
(Right Answers)
Answer: ACD
106. Which of the following types of packets is required to implement virtual machine migration in the
BGP EVPN distributed gateway scenario?
O A. Type3
O B. Type5
O C. Type4
O E. Typel
Answer: D
107. Which of the following statements about the VRRP protocol are correct?
O B. VRRPv3 does not support authentication, while VRRPv2 supports authentication. (Right Answers)
O C. VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks.
O D. The owner of the Mater IP address has a VRRP priority of 255, so the priority range that can be
configured is 0-254.
Answer: B
108. HW users are transmitting a lot of files through TFTP. What protocol does TFTP rely on for
transmission?
O B. IP and TCP
O D. NFS
O E. FTP
Answer: C
109. When deploying LLQ, you need to configure bandwidth parameters. What is the meaning of
bandwidth parameters?
❑ A. Provide a built-in policer to limit the maximum available bandwidth of low latency queues
during congestion (Right Answers)
❑ B. This parameter should be as small as possible. It means that the bandwidth is always
reserved, even if LLQ is used, this parameter will reduce the available bandwidth of the interface.
❑ C. It indicates that the reference CR is used to calculate the burst size of the built-in tactical
merging bucket.
❑ D. This parameter is an option because LLQ always takes precedence over other queues
Answer: A
110. Assume that the port shaping rate is 100Mbps. The input bandwidth and PIR of each
service on the interface are as follows.
Queue type Queue type Input bandwidth (bps) PQ 15M PIR(bps) 25M 10M 10M 10M 15M 10M
10M Not configured CS7 CS6 PQ WFQ , Weights5 WFQ , Weightsl WFQ , Weights3 WFQ ,
Weights2 WFQ , Weightsl LPQ 30M EF 90M AF4 10M AF3 10M AF2 20M AF1 20M BE 100M
Then, after the first round of scheduling, what is the bandwidth allocated by the EF queue?
O A. 30M
O C. 90M
O D. 25M
Answer: B
111. Which of the following statement about the security association SA in IPsec is wrong?
O A. The SA is uniquely identified by a triplet that includes the Security Parameter Index (SP), the
source IP address, and the security protocol number used (AH or ESP). (Right Answers)
O B. Use display IPsec to view information about encryption algorithms, traffic, and other
information used between another IPsec peer.
O C. IPsec only supports the use of symmetric encryption algorithms to encrypt data.
O D. There must be a two-way SA between IPsec peers to establish an IPsec VPN connection.
Answer: A
112. The HW network consists of Network A and B that are connected via Router HW1 and
Router HW2. The HW network is shown in the following exhibit.
Network A
HW1 HW2
Network B
To set up an IPSec VPN between routers HW1 and HW2, which of the following crypto access-
lists must be configured on Router HW1 in order to send LAN to LAN traffic across the
encrypted VPN tunnel?
O C. rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255 (Right Answers )
Answer: C
113. Which of the following description about the assertion mechanism is correct?
O A. The size of the IP address will not be used as a condition for election during the election of
the winner.
O B. In the assertion mechanism, the winner is responsible for forwarding multicast data to the
broadcast network segment. (Right Answers)
O D. In the assertion mechanism, loser shut down the interface connected to the broadcast
network.
Answer: B
114. Which of the following statements about the BSR mechanism are true? (Multiple Choice)
❑ A. A PIM-SM domain can have multiple C-BSRs, but only one elected BSR. (Right Answers)
❑ B. An elected BSR can collect C-RP information by using the C-RP packets received. (Right
Answers)
❑ C. An elected BSR floods Bootstrap packets to advertise BSR information and C-RP
information to all routers in a PIM-SM domain. (Right Answers)
Answer: ABC
116. Regarding the processing mode of MPLS for TTL, which of the following description is
correct?
O A. In the Pipe mode, when an IP packet passes through the MPLS network, the IP TTL is
decremented by 1 to the MPLS TTL field in the ingress node.
O B. The TTL of the MPLS label has the same meaning as the TTL in the IP header, which can
prevent the MPLS network from generating a routing loop (according to the reason A) (Right
Answers)
O C. Uniform simulation, when the IP packet passes through the MPLS network, the D. In MPLS
VPN, if you want to hide the structure of the MPLS backbone network, you can use the uniform
mode in Ingress for private network packets.
❑ D. In MPLS VPN, if you want to hide the structure of the MPLS backbone network, you can
use the uniform mode in Ingress for private network packets.
Answer: B
117. On an MPLS VPN network, different CEs can use different routing protocols to exchange
routing information with the same PE. These routing protocols are independent from one
another.
O B. False
Answer: A
118. Which of the following technologies use tunneling technology to communicate between
IPv6 addresses?
O A. Dual Stack
O D. NAT64
Answer: BC
119. The following procedure for NDP to resolve the link layer address is correct or not.
1lData = null
NS
NA
O A. True
Answer: B
120. BGP 4+ is running between the two routers. The neighbor relationship is normal. However,
the BGP routing table of the local router does not have any neighbor routing entries. Which of
the following is the possible reason?
❑ A. The routing entries of the peer BGP routing table are non-optimal. (Right Answers)
Answer: AD
121. Which of the following information can be included in a basic network layer packet?
(Multiple choice)
Answer: BC
122. Which of the following description about configuring BGP4+ is correct? (Multiple choice)
O A. The BGP4+ router-ID is the same as the BGP4 router-ID. (Right Answers)
O B. BGP4+ must use the Link-Local address when specifying the peer
O C. The next hop of the BGP4+ route does not use the Link-Local address. (Right Answers)
O D. When BGP4+ configures a reflector, the roles of the reflector and the client must be
consistent with the configuration of BGP4.
Answer: AC
123. Regarding the stub area in the OSPF protocol, which of the following statement is correct?
(Multiple Choice)
O B. The virtual link cannot traverse the stub area. (Right Answers )
Answer: ABCD
124. What type of LSA does not exist in the OSPF stub area? (Multiple Choice)
O D. Type-3
Answer: ABC
125. A router is configured for OSPF and is connected to two areas: area 0 and area 1. You
configure area 1 as a stub area. Which LSA types will exist inside area 1?
O A. Type 7
O B. Type 1 and 2
O C. Type 1, 2, and 5
O D. Type 3 and 4
Answer: E
O A. The Advertising Route is set to the router-id of the ASBR. (Right Answers)
O B. netmask is set to 0
O C. link state id is set to the destination network segment address (Right Answers)
Answer: AC
127. In broadcast network, the election of DIS is started after the neighbor relationship is
established.
0 B. False
Answer: A
128. Which of the following statements about the ISS protocol route aggregation is correct?
O A. Route aggregation can be configured and validated on all types of routers. (Right Answers)
O B. Route aggregation can only be configured on the level--1 router to take effect.
O C. Route aggregation can only be configured on the level--2 router to take effect.
O D. Route aggregation can only be configured on the level--1-2 router to take effect.
Answer: A
130. OSPFv3 Router-LSA is generated for each router. It describes the interface address and cost
of each link of the router. It also contains the router ID of the neighboring router.0 A. True
Answer: B
O C. The ISIS's GR notifies the event and maintains the neighbor relationship through the CSNP
packet.
O D. ISIS's GR defines a new TLV structure to support this feature. (Right Answers )
Answer: D
132. As shown in the figure, R1, R2, and R3 run OSPF at the same time and announce their
respective loopbacks. Which of the following description is wrong?
❑ A. You can use the filter-policy export command to filter the loopback route of R3 in R2.
(Right Answers)
❑ B. You can use the filter export command to filter the loopback route of R3 in R2.
❑ C. You can use the filter import command to filter the loopback route of R3 in AreaO.
❑ D. You can use the filter-policy import command to filter the loopback route of R3 in R1.
Answer: A
133. Regarding the introduction of routes, which of the following description is wrong? O A. bgp
supports both import and network when generating routes. Network mode is more accurate.
O B. By default, the default metric of the external route redistributed by OSPF is 1, and the
imported external route type is Type2. El
O C. After ISIS's level-2 network route is imported to the level-1 network, if the import policy is
not manually configured, a routing loop is formed. (Right Answers)
Answer: C
134. Which of the following description is true about the ISIS LSP fragmentation extension?
O A. Enable the ISIS router to generate more LSP fragments to carry more ISIS information.
(Right Answers)
O C. ISIS's fragmentation extension is achieved by adding virtual systems that can scale up to
1000 virtual systems.
Answer: A
135. The configurations of the defined route-policy test are as follows: ip community-filter 1
permit 100:1 ip as-path-filter 2 permit ^100$ route-policy test permit node 10 if-match
community-filter 1 if-match AS-path-filter 2 apply as-path 200 Which of the following
statements is true?
O A. The BGP routes will match the route-policy test only when they contain
O B. The BGP routes will match the route-policy test only when they contain
O C. The BGP routes will match the route-policy test only when they contain
O D. The BGP routes will match the route-policy test as long as they contain
Answer: B
136. Which of the following statements is true about the database synchronization process on
an IS-IS broadcast network?
R1
R3
R2 DIS
O A. As the DIS, R2 sends a CSNP packet periodically. (Right Answers)
O B. The interval at which R2, as the DIS, sends Hello packets is three times that of other routers.
O C. As the DIS, R2 does not receive the PSNP requests from other routers.
Answer: A
137. The second-layer network architecture of a company is as shown in the figure. After the
engineer is configured, the services between the departments cannot be communicated. Check
the status of the device as follows. Which is the possible reason? (No figure is shown, the MSTP
three elements are different, causing the entry to appear on the master port.)
O A. The Revision Level configuration between switches is inconsistent (Right Answers) O B. The
BPDU interval configuration between switches is inconsistent.
O C. The Region Name configuration between the switches is inconsistent (Right Answers)
O D. Instance VLAN mapping configuration between the switches is inconsistent (Right Answers)
Answer: ACD
138. Two routers are connected through the serial port, but the interconnection interface cannot
be pinged. Now check the port status as follows, which is the possible reason? (No figure is
shown, one PPP, and one HDLC, you can find the reason.)
Answer: C
139. When DLDP detects a unidirectional link on an interface, the default operations on Huawei
devices include: DLDP switches to the interface to Disable state, generates a trap and sets the
interface state to DLDP Down.
O B. FALSE
Answer: T
O D. RSTP convergence is based on mechanisms other than the timers. (Right Answers)
Answer: D
141. Which of the following description about the characteristics of the cross-domain vpn-Option C is
correct? (Multiple choice)
B. VPNV4 routes are not saved on the ASBR, and VPNv4 routes are not advertised to each other. (Right
Answers)
C. The VPN route is directly exchanged between the ingress PE and the egress PE, and no intermediate
device is required to save and advertise the VPN route. (Right Answers)
D. Cross-domain VPN—Option-c mode is not suitable for use when spanning multiple ASs.
Answer: BC
142. Which of the following configurations can be performed to implement fast failure detection on a
network? (Multiple Choice)
B. Reduce the interval for an interface to send Hello messages. (Right Answers)
C. Set up a PIM BFD session between network segment neighbors. (Right Answers)
Answer: BC
143. If you run the PM-SM protocol on the multicast network, you need to configure the RP. The
configuration mode of the RP is classified into dynamic RP and static RP. Which of the following
description of the RP configuration is correct?
A. When configuring a dynamic RP, you need to configure the BSR as the backup of the RP.
B. When configuring a static RP, you need to configure the BSR advertisement RP information.
C. When configuring a static BP, you need to specify the RP information on all PIM routers. (Right
Answers)
Answer: C
144. In a multicast network, which of the following situations will cause forwarding failure of multicast
traffic? (Multiple Choice)
C. The upstream router discards the received PIM Join messages. (Right Answers)
D. On a network with multiple egress routers, the router is not selected as the DR.
Answer: ABC
145. The IPSG can be configured with a static binding table or used with DHCP-snooping to form a
binding table.
B. False
Answer: A
146. As shown in the figure, the router load balances the traffic between the branch network 1 and the
branch network 2. In this case, the URPP defense source P address spoofing attack must be configured
in the loose mode on the physical interface of the router.
Answer: A
Answer: ABD
148. Which of the following statement about the digital certificate is wrong?
C. When the received peer certificate is valid, but the device itself is in the wrong time and is not within
the validity period of the certificate, the authentication fails.
D. Even if the two PRI entities are not in the same CA system, the two parties can complete the
authentication as long as they can identify each other. (Right Answers)
Answer: D
149. A newly deployed HW router is configured for Weighted Random Early Discard (WRED) on the HW
network. WRED has which of the following characteristics? (Multiple Choice)
A. For packets of different priorities, WRED can set different packet drop thresholds and packet loss
ratios. (Right Answers)
B. When the minimum threshold is crossed, WRED begins dropping all incoming packets (tail-drop).
C. Global Synchronization is avoided by selectively dropping packets from multiple TCP flows. (Right
Answers)
D. Low bandwidth flows are experiencing packet drop at a higher rate than higher bandwidth flows.
Answer: AC
150. Which of the following descriptions about the FTP protocol is correct?
A. In the FTP Passive mode, the client completes the initialization of the TCP session for control and
data. (Right Answers )
B. In FTP Active mode, the server uses the command "PORT" to tell the client which port it expects to
send data.
C. FTP always uses a TCP session to transmit control information and data information.
D. FTP always uses TCP port 20 to establish a data session, using ICP port 21 to establish control Session
E. FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session.
Answer: A
151. If a Huawei switch runs the RSTP protocol, when will the BPDU on a port of the switch be aged?
Answer: D
152. In the process of using the LACP protocol, which of the following description is correct? (Multiple
choice)
A. You can prevent the Eth-Trunk interface from frequently flapping due to physical link reasons.
Interface eth-trunk 1 Lacp preempt enable Lacp preempt delay delay-time (Right Answers)
B. You can configure the source IP address for load balancing in the enabled link aggregation group by
using the following command: Interface eth-trunk 1 Load-balance src-dst-ip El
C. You can remove a member interface in an enabled link aggregation group by using the following
command: Interface Gigabitethemnet0/0/0 Debug Interface Gigabitethernet0/0/1 Undo eth-trunk 1
Interface Gigabitetheret0/0/ Undo shutdown (Right Answers)
D. You can add member interfaces to the link aggregation group enabled by the following command:
Interface Gigabitethernet0/0/1 Debug Interface Gigabitethernet0/0/1 Trunkport Gigabitethernet0/0/
Interface Gigabitethernet0/0/1 Undo shutdown
Answer: AC
153. In the lab network, the network is built as follows. SW1 is the default configuration and SW2
disables STP. Which of the following description about scenario is correct?
Answer: D
154. Which of the following are used in Ethernet networks? (Multiple Choice)
Answer: BCE
155. When judging the old and new LSA, the serial number parameter and the age parameter will be
used. Which of the following statements about the two parameters is correct?
A. When the router receives an LSA age set to 360s, it means that the LSA is unavailable.
B. Both the serial number and the age parameter can judge the LSA is old or new, and the router
preferentially compares the sequence parameters, the bigger, the better.
C. When the router receives two LSAs, the serial number is the same, the checksum is the same, and the
smaller the age, the better. (Right Answers )
D. If the serial number of the LSA reaches the end value of Ox7FFF, the current router advertises the
age of 3600s for Isa.
Answer: C
156. In the broadcast network and the P2P network, when the router receives the LSP, it needs to use
the PSNP to confirm the LSDB.
A. True
Answer: B
157. Which of the following statements about the attributes of the ISIS protocol LSP packet is correct?
A. The LSP fast flooding feature first spreads out LSPs smaller than the specified number to speed up the
synchronization process of the LSDB. (Right Answers)
B. Configure an intelligent timer generated by the LSP, which can automatically adjust the delay time
according to the change frequency of the routing information. (Right Answers)
C. When the link state information increases, the packet length of the SP can be increased, so that each
LSP can carry more information.
D. Reduce the minimum interval for sending LSPs on an interface to speed up LSP diffusion.
Answer: AB
158. Routers R1 and R2 are configured for BGP. Both routers are in AS 65234. Routes from Router R2 are
in the BGP table on Router R1, but not in the IP routing table. What could be the cause of this problem?
A. Synchronization is off.
Answer: D
159. Which of the following statement about the R2 routing entry is correct?
RI sntprtace I nopitarNO ipv6 enable ipv6 address 1019:1/64 ,ntertace toope•ackl ipvbetcabte ipv6
addirev. itUO 1/64 ......laCeloopeackl ipv6 mat*. tpv6 address 10/1 .1/64
H2 ad tpv6 number 101/0 rule !) permit source 7014../(4 rule 10 permit source 2010::/64 rule 1c deny
Klollf CP 2011:164 role 70 permit 1Si% 1 ipv6 filer pan //Wu moult
Answer: ABC
160. Regarding the OSPFv3 protocol, which of the following description is wrong?
B. Multiple instances can be run in the same OSPFv3 process on the same interface. (Right Answers)
Answer: B
161. Which of the following statement about the LSA of OSPFv33 is correct?
A. The Link State id of the Inter-Area Prefix-LSA contains the prefix information.
C. When the Intra-Area Prefix LSA is Referenced Link State Type-2, the Referenced Link State id contains
the interface id of the DR. (Right Answers)
Answer: BC
162. A company has built an OSPF network as shown in the following figure. The links form an OSPF
neighbor relationship. All devices have announced their own loopback address. On one day, the S1-R2
and S2-R1 links are faulty. Which of the following description is correct? (Area 0 is spli )
111
St
R3
A: • .1
Areal
S2
R4
Answer: AB
163. In Huawei devices, when ISIS imports external routes and sets external route tags for routing
information, ISIS's metric types do not need to be modified, keep the default.
A. True
Answer: B
164. Which of the following description about the information of BGP4+ is correct?
A. Bgp4+ can use dampening command to suppress IBGP routes. (Right Answers)
B. Modifying the BCP's router ID will cause the BGP connection between the routers to be re-
established. (Right Answers)
C. The Next Hop attribute in BCP4+ is represented by the Pv6 address, which can be the link-local
address of the next hop.
Answer: ABD
165. As shown in the following figure, the corresponding peer relationship is established. The AS400
receives the 1.1.1.1/32 network route from the AS100. What is the AS-Path attribute?
RT2
RT5
RT6
RT1
EBGP
1.1.1.1/32
AS400
4o•
RT7
Answer: D
166. Which of the following description is true about the OSPF virtual link?
A. A virtual connection can be established in any area, and it belongs to the area itself after it is
established.
B. The virtual link uses the outbound interface P as the link address.
C. The virtual link can be used to solve the problem that area 0 is divided. (Right Answers)
Answer: C
167. In the case of not dividing the area, which of the following description is true about the link state
routing protocol? (Multiple Choice)
A. Each router establishes a topological structure of the entire flood domain (Right Answers ) B. Each
router learns the route directly from the routing update and adds it to the routing table.
C. Routers in the flooding domain may repeatedly receive the same link state information. (Right
Answers )
D. Routers in the entire flooding domain have the same wrong path state database (Right Answers )
E. The router will send all the wrong path status information sent by one neighbor to all other neighbors
to ensure the synchronization of the database.
Answer: ACD
168. If the OSPF protocol is running on the network, configure the non-backbone area in the OSPP area
as the LSA with the Is-id of 0.0.0.0 in the Totally Stub Totally Stub area. Which LSA does the LSA belong
to?
A. LSA5
B. LSA2
C. LSA1
D. LSA3 (Right Answers)
Answer: D
169. When an administrator wants to manage some routes on the router during operation and
maintenance, which of the following tools can mark these routes so that the administrator can configure
the policy? (Multiple Choice)
A. If the BGP protocol is running, use the community attribute to mark the route. (Right Answers)
Answer: AC
170. Which statements regarding IBGP or EBGP neighbors are true? (Multiple Choice)
A. BGP updates from an IBGP peer are propagated to other IBGP and EBGP peers.
B. BGP updates from an EBGP peer are propagated to other IBGP and EBGP peers. (Right Answers)
C. IBGP peers must be directly connected; otherwise, the IBGP-muttihop option must be configured.
D. EBGP peers must be directly connected; otherwise, the EBGP-multihop option must be configured.
(Right Answers)
E. IBGP neighbor peering can be established using the loopback interface address. (Right Answers)
F. EBGP neighbor peering must use the physical interface address to establish peering.
Answer: BDE 1
171. In an MPLS-BGP-VPN environment, if only BGP and LDP are used to distribute labels, the MPLS label
of the packet can be up to two layers.
❑ A. True ❑
Answer: B
172. Which of the following description is wrong regarding the inter-domain VPN Option-B solution?
O A. During the packet forwarding process, exchange the private network LSPs of the VPN on the two
ASBRs.
O C. The inter-domain VPN-option-B scheme is not limited by the number of interconnection links
between ASBRs.
O D. Exchange the outer label of the VPNv4 route between the two ASBRs. (Right Answers)
Answer: D
173. Huawei's two switches, SWA and SWB, are connected through seven Ethernet ports and are
configured with static link aggregation. The corresponding ports on the switch SW are Ethernet 11012,
Ethernet 1/0/3, Ethernet 11014, and Ethernet 1/0/5, Ethernet 110/6, and Ethernet 110/7. The
configuration mode is configured in the order of the ports. If the switch SWA and SWB support only 6
ports in each aggregation group.
O C. In the case that the configurations of the ports are the same, the SWA randomly selects one of the
seven ports as the aggregation group Unselected port.
O D. Ethernet//0/1 Unselected port when the configurations of the ports are the same
Answer: A
174. You need to configure policy routing on the router to specify that specific traffic is forwarded
through an interface. When using policy-based routing, which two types of most typical information can
be used to forward traffic along a particular path?
O C. Source IP address and specific protocols (such as FTP, HTTP, etc.) (Right Answers)
Answer: C
175. As shown in the figure, the ISIS neighbor relationship between R1 and R2 has just been established.
which of the following statement is true about the database synchronization process between R1 and
R2?
k) k 2.
7 kt.00-00
O A. The packet sent from R1 to R2
Answer: B
R1.0 p —0 9 is a PSNP packet. is a CSNP packet. (Right Answers) is an LSP packet. is a Hello packet.
176. As shown in the figure, R1 and R2 are PPP links, and the direct connection ports are not on the
same network segment, but the R1 and R2 direct connection ports can communicate, and the Ethernet
link cannot communicate under the same IP planning.what are the reasons? (Multiple Choice)
O A. R1 and R2 are connected to the POS port, and the 24-bit subnet route of the direct connection port
of the other party is learned through IPCP.
O B. R1 and R2 are connected to the POS port, and the 32-bit host route of the direct connection port of
the other party is learned through IPCP. (Right Answers )
O C. The interconnected POS port of R1 and R2 learns the MAC address of the peer interface through
LCP, and does not require the ARP request MAC address.
O D. The data packets of the interconnected POS interface of R1 and R2 do not need to encapsulate the
Ethernet header, and do not need to use ARP to request the MAC address. (Right Answers)
Answer: BD
177. What command can be used to prevent users from accessing multiple devices through the HUB on
the access port of the switch?
Answer: C
178. Combined with the output result in the following figure, which statements are correct? (Multiple
Choice) Total LS1101: 4 •(10 TLV) Leaking Route, •fay LOP1111•Solf LSP, 45e(KKI-ndc4), ATT-Attached, P
Pi-6)t"In, 01. OvnrIo4d
SnidltIon
Lewitt) ../P/01.
Answer: CD
179. To display the routing table of router R1, the "display ip routing-table" command was issued.
Router R1 is running OSPF. Which one of the following statements is true regarding the OSPF
information in a routing table?
O A. A routing designated with only an "0_ASE" represents either a type-1 or type-2 LSA.
O B. A route that has been imported into OSPF can only be represented with an "O_ASE" designation.
(Right Answers)
O C. Routes that are within an area (intra-area) are marked with an "0_IA" in the routing table.
O D. Type-7 LSAs display routes are imported into OSPF from another process, and are indicated by an
"OSPF" marking. O E. All LSA types have unique designations in the IP routing table.
Answer: B
180. Regarding the certification of the ISIS protocol, which statements are correct? (Multiple Choice)
O A. Interface authentication can implement hello packet authentication for Level-1 and Level-2. (Right
Answers)
O B. After the interface authentication is configured, the IIH sent by the router must carry the
authentication TLV. (Right Answers
) O C. After the area authentication is configured, the IIH, SNP, and LSP sent by the router must carry the
authentication.
O D. Two routers are configured with regional authentication and interface authentication, and the
passwords are the same. Then two routers can establish neighbor relationships.
Answer: AB
181. Regarding the BGP anti-ring mechanism, which of the following descriptions are correct? (Multiple
Choice)
❑ A. Use the AS-PATH attribute between the autonomous systems to prevent loops. (Right Answers )
❑ B. The Cluster List attribute is used for the anti-ring in the reflector cluster. The router discovers that
the cluster list of the route entry contains its own Cluster ID and rejects the route.
O C. Routes learned from IBGP are not advertised to IBGP neighbors to prevent routing loops within the
AS. (Right Answers )
❑ D. You can use the AS-CONFED-SET attribute to prevent loops within the federation. (Right Answers )
Answer: ACD
182. Regarding Route Policy, which of the following descriptions are correct? (Multiple Choice)
❑ B. The entry permit::0 less-equal 128 indicates that all IPv6 routes are allowed to pass. (Right
Answers)
❑ C. If more than one node is defined in the Route-policy, at least one of the nodes should have a
matching mode of permit. (Right Answers)
Answer: BCD
O A. Route-policy
Answer: D
ilbenuOVVIO RI
Intarnp111/0013
R1 fists 1 netwnek enttty 49.0001 0001-0001 0001 110 U tntettac P t themett2/010 ip addles% 10.0.17
755.255.25S-0 tut. pitiable 1 tOstattuit type p?p KIS pep' ip Knot e
a R2 mos 1 netwntk entity 49 (1(101 0007 0002.0001.00 Intettate t thernet0/0/0 ip address 10.0.13.2
2SS.2S5.)SSIS iris enabiti 1 ises cot tnt type pip nos peet tpAgnore a tretettJuP loopliarkt) ty address
10.0.1-2 255.25S./SS 255 real PflAbIP
Answer: C
185. The configuration of two routers in a company is as follows. which of the following statement
about the R1 routing table is correct?
Etherne10/0/0
RI
Ithernet0/0/01111 N)
lsis 1 kNorl level 1 network enlity 49.0001.0002.0002 01 I interface 11hervirt0/0/0 address 10 0.17
215S.25S.2SSA isis enable 1 interface toopeark0 sp address 10.0.2.2 25525S/SS2SS My enable 1 sppi I
rouse, sd 10.0 1.1 area 0.0.0.0 network 10 0.12 0 0.0.0.255 network In 0 / / 0 0 0.0
❑ A. Only when the priority of the R2 ISIS protocol is adjusted to 5, the P route entry with the
destination network segment of 10.1.2.2/32 on R1 is generated by OSPF.
❑ B. If the priority of the ISIS protocol of R1 is adjusted to 5, the P route entry of the destination
network segment with the destination network segment of 10.1.2.2/32 is generated by OSPF.
❑ C. If the priority of the R1 ISIS protocol is adjusted to 5, the P route entry with the destination
network segment of 10.0.2.2/32 on R1 is generated by ISIS. (Right Answers)
❑ D. If the priority of the R2 ISIS protocol is adjusted to 5, the P route entry with the destination
network segment of 10.0.2.2/32 on R1 is generated by ISIS.
Answer: C
❑ A. After the Aggregate ipv4-address mask is configured, only the aggregated routes are advertised
and the detailed routes are not advertised.
❑ B. For IPv6 routes, BGP supports manual aggregation and automatic aggregation.
❑ C. BGP enables automatic aggregation by default
❑ D. Manually aggregate routes in the BGP local routing table. (Right Answers)
Answer: D
187. Which of the following description is wrong about BGP route selection?
O B. In the case where Pref-Val and local_preference are equal, if the BGP preference of the locally
generated route, the IBGP route, and the EBGP route are the same, the locally generated valid route
takes precedence.
O C. See the following entry in the BGP routing table: * 172.16.1.11/32 0.0.0.0 10 0? Indicates that the
route is available non-optimal.
O D. The route that is unreachable for nexthop is an invalid route and does not participate in the
preference.
Answer: A
188. A number of transition techniques have emerged in the process of replacing a P4 address used in a
network with a Pv6 address. These technologies are divided into two categories, one is PV4/IPv6
coexistence technology and the other is v4/P6 interworking technology. Which of the following options
belong to Pv4/1P6 coexistence technology? (Multiple Choice)
O A. NAT64
Answer: BCD
189. Which of the following descriptions are true about the establishment process of LDP LSP? (Multiple
Choice)
A. By default, the LSR is for the same FEC. The received label mapping can only come from the optimal
next hop. It cannot be from the non-optimal next hop.
B. When the network topology changes cause the next hop neighbor to change, the LSR can directly
reestablish the LSP by using the label sent by the original non-optimal next hop neighbor. (Right
Answers)
C. In the label publishing DoD mode, for a specific FEC, the LSR does not need to obtain the label
request message from the upstream to perform label distribution and distribution. (Right Answers)
D. The process of establishing an LSP is actually the process of binding the FEC to the label and
advertising the binding to the upstream LSR of the LSP. (Right Answers)
Answer: BCD
190. As shown in the figure, in the hub&spoke multicast mode of MPLS bgp VPN, in order to realize that
the branch can only cmmunicate with the headquarters, the branches cannot communicate with each
other. Which of the following schemes can the RT be set?
A. Headquarters: Import Target: 12:3 Export Target: 12:3 Branch 1: Import Target: 12:3 Export Target:
12:3 Branch 2: Import Target: 12:3 Export Target: 12:3
B. Headquarters: Import Target: 1:1 Export Target: 3:3 Branch 1: Import Target: 3:3 Export Target: 1:1
Branch 2: Import Target: 3:3 Export Target: 2:2
C. Headquarters: Import Target: 2:2 Export Target: 3:3 Branch 1: Import Target: 3:3 Export Target: 1:1
Branch 2: Import Target: 3:3 Export Target: 2:2
D. Headquarters: Import Target: 12:3 Export Target: 3:12 Branch 1: Import Target: 3:12 Export Target:
12:3 Branch 2: Import Target: 3:12 Export Target: 12:3 (Right Answers)
Answer: D
191. Which of the following attacks are DoS (Denial of Service) attacks? (Multiple Choice)
C. Man-in-the-middle attack
Answer: BD
192. Which of the following statements are true about IPSec VPN? (Multiple Choice)
A. Savage mode can support NAT traversal, while main mode does not support NAT traversal
B. Two routers establish IPSec VPN through the main mode. Starting from the fifth packet (including),
the payload data is often encrypted. (Right Answers)
C. Two routers establish IPSec VPN through aggressive mode, then only two packets are exchanged
between the two devices to establish a tunnel. (Right Answers)
D. Two routers can establish OSPF neighbor relationships through IPSec VPN tunnels and exchange
intranet routes.
Answer: BC
193. Configure queue-based traffic shaping. If the queue length exceeds the cache size, the tail is
discarded by default.
A. True
B. False (Right Answers)
Answer: B
194. As shown in the figure, which of the following statement is correct? (Multiple Choice)
If the R2 Ethernet 0/0/1 interface is down, the R1 BFD session can quickly detect the fault and notify R1
to make the OSPF neighbor relationship down.
B. The OSPF status changes to FULL, which triggers the BFD session.
C. If the R2 Ethernet0/0/0 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is
changed to 10.0.21.2. If the BFD function is disabled on R2, the BFD session on R1 will be down. This will
result in the ospf neighbor relationship down.
E. If the R2 Ethernet 0/0/1 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is
changed to 10.0.12.2.
Answer: AD
195. For Layer 2 VPN technology, which of the following statements are correct? (Multiple Choice)
A. VPLS is a widely used technology on the live network. It can provide Layer 3 packet transparent
transmission and achieve multi-point access.
B. The VPLS configuration is highly complex. The Layer 2 network transparently transmits BUM packets.
(Right Answers)
C. BGP EVPN supports tenant isolation, multi-homing and broadcast suppression (Right Answers)
D. BGP EVPN solves the problem of MAC address drift and multi-tenancy that VPLS cannot support.
(Right Answers)
Answer: BCD
196. If there is a LAN running the 802.1D Spanning Tree Protocol, which of the following parameters will
the non-root switch not receive from the root switch?
A. MaxAge
B. Root cost
C. Forward delay
E. Hello time
Answer: D
Answer: D
198. Between the two directly connected devices that have established IBGP peers, run the shutdown
command to shut down the interface of one of the devices. The BGP connection will not be
disconnected immediately.
B. False
Answer: A
199. In order to reduce the number of OSPF routes in some stub areas, OSPF has developed a special
area function. Which of the following description is true about the OSPF special area feature?
A. Special area routers cannot establish OSPF neighbor relationships with regular area routers (Right
Answers)
Answer: A
200. An engineer builds a network topology to study the working mechanism of OSPFv3 protocol. The
configurations of R1 and R2 are as follows. What are the LSA types exchanged between R1 and R2?
(Multiple Choice)
OSPFv3 Area 0
R1 GO/0/0
G0/0/0
R2
R1 configuration ospfv3 1 router-id 1.1.1.1 interface Gigabitethernet0/0/0 ipv6 enable ipv6 address auto
link-local ospfv3 1 area 0 R2 configuration ipv6 ospfv3 1 router-id 2.2.2.2 interface Gigabitethernet0/0/0
ipv6 enable ipv6 address auto link-local ospfv3 1 area 0. 0 0.0
D. Inter-area-prefix-Isa
Answer: ABC
201. The topology map and configuration are as follows. Now I hope that there is no detailed routing
entry of 10.6.3.3/32 in the R1 routing table. Which of the following statements can achieve this
requirement? (Multiple Choice)
R1
R2
R3
R3
a. Y
A. Configure route summarization on R3 and summarize the routes to 10.0.0.0/16. (Right Answers)
B. Configure route summarization on R2 and summarize the routes to 10.0.0.0/16. I=1 C. Configure
filter-policy on R2, match ACL 10.0.3.3/32, and apply it in the expot direction.
D. Configure filter-policy on R1, match ACL 10.0.3.3/32, and apply it in the import direction. (Right
Answers)
Answer: AD
202. As shown in the configuration, if the administrator configures OSPF on R1 but R1 cannot learn the
routes of other routers, what are the possible reasons? (Multiple Choice) [R1] ospf [RI-ospf-1] area 2
[R1-ospf-1-area-0.0.0.2] network 10.0.13.1 0.0.0.0
A. The area ID configured by this router is different from the area ID of its neighbor router. (Right
Answers)
C. The router's announcement network address does not match the interface mask
D. This router is not configured with authentication, but the neighbor router is configured with
authentication. (Right Answers)
Answer: AD
203. Configure AS-path-Fitter ip as-path-fittr 10 permit_100$ to match the route received from AS100. 0
A. True
Answer: B
204. The following topology and configuration are available. Which of the following statements are
correct? (Multiple Choice)
R1
R2
R3
A. There is no route with the destination network segment being 10.6.3.3/32 on R1.
B. There is no route with the destination network segment being 10.0.2.2/32 on R1.
C. There is a route with the destination network segment being 10.6.3.3/32 on R1.
D. There is a route with the destination network segment being 10.0.2.2/32 on R1.
Answer: AD
R1
GO/0/0
GO/0/0
Ri. isis I network-entity 10.0000.0000.0001.00 filter-policy act-name abc export isis 2 import-route direct
interface loopback0 ip address 10 1 1 1 255 255 255 0 ip address 10.1 3.1 255.255.255.0 sub ip address
10.1 2.1 255 255 255.0 sub • interface GigabitEthernet0/0/0 ip address 100.1.1.1 255.255.255.0 isis
enable 1 ad name abc rule 10 permit ip source 10_1 1 0 0.0.0.255
R2
D. R2 can learn the LSPs of R1 but cannot add them to the routing table.
Answer: A
A. Allow the peer PE to decide which VPNv4 routes to import into the specific VRF. (Right Answers)
B. Allow the peer PE to decide which VPNv4 routes will not be imported into the specific VRF. (Right
Answers)
C. Allow the peer CE to decide which VPNv4 routes to import into the specific VRF.
D. Allow the peer CE to decide which VPNv4 routes will not be imported into the specific VRF.
Answer: AB
207. Regarding the way the device handles packets in the MPLS network model, which of the following
descriptions are wrong? (Multiple Choice)
A. The label forwarding path LSP is determined and established through various protocols during the
forwarding of the message. (Right Answers)
D. The device discards the IP packets that enter the MPLS domain. (Right Answers)
Answer: AD
208. Which of the following description is wrong about the MPLS BGP VPN? ❑
A. IBGP establishes a stable BGP neighbor relationship for the ARPback interface address. ❑
B. Route switching between PE and CE can be static route, OSPF multi-instance, IS-iS mufti-instance,
EBGP. ❑
C. The TTL field in the tag has the effect of preventing loops. ❑
D. BGP Soo is used to prevent routes routed from a VPN site from going back to the site through the
MPLS backbone. Soo is an extended community attribute automatically generated by MP-BGP. (Right
Answers)
Answer: D
209. Which of the following are the techniques for improving MPLS BGP VPN reliability? (Multiple
Choice) ❑
D. Private network IP routing between the PE and the CE FRR (Right Answers)
Answer: ABCD
210. Which of the following description is wrong about the VPNv4 address? O
A. When BGP advertises reachable and unreachable VPNv4 routes, it carries the RD attribute. O
B. By default, the PE does not perform vpn-target filtering on the received VPNv4 routes. (Right
Answers) O
C. The VPNv4 address has a total of 12 bytes, including an 8-word route identifier RD (Route
Distinguisher) and a 4-byte IPv4 address prefix. O
D. Before the local PE advertises the VPNv4 route learned from the site directly connected to itself to
other PEs, it sets the Target attribute for these routes and advertises it as a BGP extended community
attribute along with the route.
Answer: B
211. Regarding the basic forwarding process of MPLS, which of the following description is wrong? O
A. When the IP packet enters the MPLS domain, the tunnel ID corresponding to the destination IP
address is checked. If the tunnel ID is Ox0, the MPLS forwarding process is entered. (Right Answers) O
B. By default, the value of the label assigned to the penultimate hop node by the Egressl node that
supports PHP is 3. ❑
C. When the packet is forwarded in the MPLS domain, the top label of the MPLS packet is replaced with
the label assigned by the next hop according to the label forwarding table. L
D. When an IP packet enters the MPLS domain, the MPLS border device inserts a new label between the
packet header and the IP header.
Answer: A
212. The mutticast IP address is 229.130.130.1, and what is its corresponding MAC address? ❑
A. 00-00-5E-02-82-01 ❑
B. 00-00-5E-82-82-01 ❑
C. 01-00-5E-82-82-01 ❑
Answer: D
A. The IPSG can perform binding table matching check on P packets that enter the interface and leave
the interface. O
B. On the Huawei router, you can configure the IPSG function on the Vlanif. O
C. If an interface is configured with DHCP snooping Trust HCP ACK, DHCP NAKHCP, and Offerf packets,
other untrusted ports cannot receive these packets. The ip source check user-bind check-item command
is used to configure IP-based check packets for the dynamic or static entries. (Right Answers)
Answer: C
D. If the HTTPS traffic contains a virus, the router cannot directly detect the virus using IPS technology.
Answer: B
215. In traffic policing, the dual-bucket dual-speed is used. The number of tokens in the C bucket is TC,
and the number of tokens in the P bucket is TP. When a message of length B enters, which of the
following statements are correct? (Multiple Choice) ❑
Answer: ABC
216. The network administrator defines the following policy for traffic policing:
[Nusweildisplay traffic policy user-defined User Defined Traffic Policy Information: Policy: pl Classifier: cl
Operator: OR Behavior: bl Committed Access Rate: C1R 266 (Kbps). PIK 0 (Kbpn). CBS 48128 (byte). PBS
80128 (byte) Color Mode: color Blind Conform Action: pima Yellow Action: Mao Exceed Action: discard
statistic: enable
If the policy is applied to a router port and there is no traffic on the port for about 10 seconds, how
many bytes of burst will be available for class cl for packets to be marked as green? ❑
A. 256K bytes ❑
B. 32K bytes ❑
D. 80128 bytes
Answer: C
217. Which of the following types of routes are used to advertise external routes in BGP EVPN? O
A. Type4 O
B. Type1 O
C. Type2 O
D. Type3 O
Answer: E
218. Mainstream second-tier technologies include VXLAN, TRILL, NVGRE and MPLS. 0
B. False
Answer: A