Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

1.

Cross-device link aggregation enables data stream transmission and mutual backup of stack member
switches. However, because of the limited bandwidth of stack cables between stack devices, which of
the following methods can be used to improve forwarding efficiency?

O A. Connect stack devices through stack cards

O B. Enable stack multiple master check function

O C. Configure stack system MAC address switching

O D. Enable traffic local priority forwarding (Right Answers)

Answer: D

2. About the description of CHAP authentication function in the PPP protocol, which of the following are
correct? (Multiple Choice) O

A. If the authenticator does not have a username, the password cannot be configured on the
authenticated interface. O

B. Calculate a hash value using the authentication sequence ID, random number, and key by the MD5
algorithm (Right Answers) O

C. Three-message interactive authentication is required, and the username is transmitted only on the
network without transmitting the password. (Right Answers) O

D. The user name must be configured under the authenticated interface of CHAP authentication. (Right
Answers)

Answer: BCD

3. A switch is running the Rapid Spanning Tree Protocol (RSTP). Upon a topology change, what happens
to dynamic entries in the L2 forwarding table? O

A. Only entries behind the port where TC was received are removed. O

B. All entries are removed except for those behind edge ports and the port where TC was received.
(Right Answers) O

C. All entries are removed (purged). O

D. All entries are removed except for entries behind edge ports. O

E. The aging timer is set to 15 seconds, so idle entries age out.

Answer: B

4. Which of the following statements is true about the MUX VLAN feature of Huawei switches? O
A. The MUX VLAN and the Super VLAN features can be used together on the same VLAN. O

B. The Principal Port can communicate with all ports in the MUX VLAN. (Right Answers) O

C. The Mux VLAN is classified into Principal VLAN and Subordinate VLAN. The Subordinate VLAN is
classified into Separate VLAN and Isolate VLAN. O D. Each Separate VLAN can be bound to multiple
Principal VLANs.

Answer: B

5. When you perform troubleshooting on a LAN deployed with Huawei devices, you find that there is a
large number of unicast frames with unknown MAC addresses. What is the biggest risk for the switches?
O

A. Available MAC address table entries in the system will be consumed. (Right Answers)

B. Increased power consumption.

C. Exhausts memory for buffered frames.

D. Exhausts available TCAM entries.

E. Exhausts available bandwidth.

Answer: A

6. About the description of the process of sending and receiving data frames in the Access mode of the
switch interface, which is correct?

A. Directly discards when receiving a tagged data frame in Access mode

B. Only receive unlabeled data frames in Access mode

C. When the data frame enters the switch interface, the switch learns the destination MAC address in
the data frame.

D. In the Access mode, the VLAN tag of the data frame will be stripped off when sent. (Right Answers )

Answer: D

7. In Rapid Spanning Tree Protocol (RSTP), which port provides a backup path to the root bridge and
which state should this port be in?

A. Root port/listening

B. Alternate port/forwarding
C. Alternate port/learning

D. Designated port/learning

E. Alternate port/discarding (Right Answers)

Answer: E

8. Which of the following options may affect the establishment of IBGP neighbors? (Multiple Choice) O
A. Authentication is unsuccessful (Right Answers)

B. The BGP protocol version is inconsistent (Right Answers)

C. IBGP-Multi-hop is not configured

D. IGP routing is unreachable (Right Answers)

Answer: ABD

9. The following is about the RD attribute filter of BGP, what is the correct description? (Multiple Choice)
A. If RD-filter is configured, but the RD of the route does not match any of the RDs defined in the rule,
the default match result is Permit.

B. The relationship between the rules configured by RD-filter is "or" (Right Answers) O

C. If RD-fitter is not configured, but this RD-fitter is used for filtering, the matching result is deny. O

D. Matching multiple rules in the order of configuration (Right Answers)

Answer: BD

10. ISIS will elect DIS in the broadcast multi-access network. Which of the following statement about DIS
is correct? (Multiple Choice) O

A. ISIS elects the DIS by comparing the priorities and compares the MAC addresses if the priorities are
the same. (Right Answers) O

B. DIS guarantees database synchronization by periodically sending CSNP messages (Right Answers) O

C. In a broadcast multi-access network, the DIS sends Hello PDUs three times as often. (Right Answers)

D. DIS supports the preemption function. After the new DIS preemption is successful, you do not need
to flood any LSP packets.

Answer: ABC
11. About Filter-policy, which of the following description is correct? ❑

A. Filtering the generation of type 5 LSAs and type 7 LSAs on the ASBR in OSPF using Filter-Policy (Right
Answers)

B. The prefix list can fitter routes as well as fitter packets.

C. Fitter-Policy can fitter the received or advertised link state information and can modify the attributes
of the route entry.

D. When filtering routes using the prefix list, the entry ip ip-prefix 1 deny 0.0.0.0 0 less-equal 32 means
that only the default route is matched.

Answer: A

12. The OSPFv3 protocol is a separately developed protocol. It differs from OSPFv2 in that OSPFv3 is
based on links rather than network segments. Which of the following statement is wrong?

A. The two routers connected to the link can establish neighbor relationships even if their IPN/6 address
prefixes are different.

B. The two routers connected to the link can establish neighbor relationships even if no unicast IPN/6
address is configured.

C. The routing information obtained by the OSPFv3 router from the neighbor uses the link-local address
of the neighbor as the next hop of the forwarded packet.

D. All OSPFv3 interfaces use the Link-local address as the destination address of the packet except the
virtual link. (Right Answers )

Answer: D

13. Which of the following statements are NOT true regarding the TCP sliding window? (Multiple Choice)
O A. If the retransmission timer expires but the sender has not received the acknowledgement, it will
retransmit the unacknowledged data. O

B. The sender need not transmit a full window's worth of data. O

C. TCP sliding window allows the transmission of multiple frames before waiting for an
acknowledgement.

D. The size of the sliding window can only increase or stay the same. (Right Answers) O

E. The size of initial window is advertised by the sender. (Right Answers)

Answer: DE
14. As shown in the following figure, in IPv4 and IPv6 environments the SEL value in an IS-IS NET address
is always 00.

AFT [ IDP 1 DSP tr'1 Mph Gordo. OSP System ID SEE Area ID e-iare 4. MI . as

A. Ture (Right Answers)

B. False

Answer: A

15. As shown in the following figure, a part of the LSP of the LSDB of a router is shown in the first line of
the figure. First received a new LSP, the second hop in the following picture, which of the following
statement is wrong?

Level-2 Link State Database

LSPID Svy Num Checksum Holdtime Length ATT/P/OL 0002.0002.0002.00-00 0x00000019 Ox4eeb 786
102 0/0/0 Level-2 Link State Database LSPID Sec' Num Checksum Holdtime Length ATT P/OL
0002.0002.0002.00-00 0x00000020 Ox4eeb ttlo 102 0/0/0

A. The router will put the newly received LSP into the LSDB. (Right Answers)

B. This router will ignore the LSP received from the neighbor.

C. If it is a point-to-point network, this router will send PSNP

D. If it is a broadcast network, the DIS will include the summary information of the LSP in the next CSNP
packet.

Answer: A

16. Regarding the Stub area and the NSSA area of OSPF, the wrong statement of the following is

A. Type 5 LSA is not allowed in the Stub area, but Type 5 LSA is allowed in the NSSA area. (Right
Answers)

B. Both the Stub area and the NSSA area are allowed to inject Type 3 LSA. \

C. Stub area and NSSA area are not allowed to inject Type 4 LSA.

D. Type 7 LSA is not allowed in the Stub area, but Type 7 LSA is allowed in the NSSA area.

Answer: A

17. Regarding BGP route filtering, which of the following description is wrong?
A. For a locally advertised route, configure a routing policy. The policy takes effect before the route is
added to the BGP routing table. (Right Answers)

B. The filtering relationship between the nodes of the Route-Policy is "OR", that is, the Route-Policy can
be passed with a node fitter only.

C. When receiving a route from a BGP peer, perform a routing policy to fitter unwanted BGP routes.
These routes are not added to the local BGP routing table.

D. In the same node of Route-Policy, the relationship of multiple if-match clauses for different
attributes is "OR". (Right Answers)

Answer: AD

18. If the value of the Option field in the OSPFv3 Hello packet sent by GigabitEthernet 0/0/0 on Router A
is 0x000013, the correct description of the following is: (Multiple Choice).

A. GigabitEthernet0/0/0 of Router A belongs to the NSSA area.

B. GigabitEthernet0/0/0 of Router A will participate in IPv6 route calculation. (Right Answers)

C. Router A is an OSPFv3 device with forwarding capability (Right Answers)

D. Router A supports AS-External-LSA flooding (Right Answers)

Answer: BCD

19. The ISIS protocol is deployed in an IPv6 environment. The correct statement in the following is:

A. In broadcast networks, the DIS priorities of IPv4 and IPv6 can be set separately. (Right Answers)

B. By default, the DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.

C. In the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6
must be the same device.

D. Configure ISIS silent on the ISIS interface, then this interface will not send ISIS packets, but will receive
ISIS packets.

Answer: A
19. The ISIS protocol is deployed in an IPv6 environment. The correct statement in the following is:

A. In broadcast networks, the DIS priorities of IPv4 and IPv6 can be set separately. (Right Answers)

B. By default, the DIS priority of the broadcast network interface on Level-1 and Level-2 is 1.

C. In the same broadcast network, if each router supports both IPv4 and IPv6, the DIS of IPv4 and IPv6
must be the same device.

D. Configure ISIS silent on the ISIS interface, then this interface will not send ISIS packets, but will
receive ISIS packets.

Answer: A

20. After BGP imports routes of other protocols, the next hop in the BGP routing table is the same as the
next hop of the introduced routing protocol.

A. True

B. False (Right Answers)

Answer: B

21. There is an AS-path-fitter, ip as-path-filter 1 permit ^100L100)" L400)", which AS-PATH attribute
cannot be matched by the As-path-filter?

A. 100 400 CI

B. 100 400 400 400 O

C. 100 200 900 (Right Answers)

D. 100

Answer: C

21. There is an AS-path-fitter, ip as-path-filter 1 permit ^100L100)" L400)", which AS-PATH attribute
cannot be matched by the As-path-filter?

A. 100 400 CI

B. 100 400 400 400

C. 100 200 900 (Right Answers)


D. 100

Answer: C

22. Which statements about BGP route reflection are true? (Multiple Choice) O

A. IBGP peers must be fully connected in the absence of a route reflector (RR). The BGP route reflection
mechanism is introduced to lower the requirement. O

B. After learning routes from a non-client, a route reflector (RR) advertises these routes to all clients.
(Right Answers ) O

C. After learning routes from a client, an RR advertises these routes to all other clients and non-clients.
(Right Answers) O

D. After learning routes from an IBGP peer, an RR advertises these routes to all clients and non-clients.
(Right Answers)

Answer: BCD

23. Regarding the BGP alliance, which of the following description is wrong? O

A. The alliance divides an AS into several sub-ASs, and the external AS still considers the alliance to be
an AS. O

B. The sub-AS number of the alliance is advertised to BGP peers outside the alliance by default. (Right
Answers) O

C. The sub-AS number in the alliance can use a private AS number. A Huawei NE/AR router can be
configured with up to 32 sub-AS numbers. O D. The alliance can easily detect the routing loop in the AS
because EBGP is running between sub-ASs.

Answer: B

24. After the BGP connection is successful and it is down again. What are the impossible reasons? O

A. Open packet negotiation failed. (Right Answers) O

B. The mandatory attribute in the routing update message is lost. ❑

C. After the BGP connection is established, the keepalive packet is not received within the negotiated
holdtime. ❑

D. Received incorrect BGP packets.

Answer: A
25. When ISIS area authentication is configured, which ISIS packet carries the authentication
information? 7

A. SNPs and LSPs of ISIS Level-1 (Right Answers) ❑

B. Hello message of ISIS Level-1 ❑

C. SNPs and LSPs of ISIS Level-2

D. Hello packet of ISIS Level-2

Answer: A

26. The Type 5 LSA in OSPF are used to pass external routes. Which of the following statements about
the Type 5 LSA are wrong? O

A. The router in the same area as the ASBR can calculate the external route through the intra-area LSA
and the Type 5 LSA. O

B. Configure the corresponding policies on the ABR and ASBR to filter the Type 5 LSA. O

C. Type 5 LSAs are advertised by the ASBR and flooded in the OSPF network in the non-Stub/NSSA area.
O

D. The FA address is included in the Type 5 LSA, and the FA address is 0.0.0.0, but has no practical effect
as a reservation. (Right Answers)

Answer: D

27. Which of following statements is true about the domain-authentication-mode md5 hello command
in the IS-IS process? O

A. The routing domain authentication is used to carry the authentication information during the
delivery process of SNPs and LSPs of Level-1 and Level-2. O

B. The domain authentication mode of all routers in the same routing domain is MD5, the password is
hello, and the ISIS SNP and LSP are flooded. (Right Answers) O

C. This command is mainly used to enable ISIS Hello packets to carry authentication information during
the delivery process. O D. ISIS certification cannot be applied in IPN/6 environment.

Answer: B
28. The level-1-2 IS transmits the Level-2 LSP to the Level-1 area. If the KIT bit in the Level-2 LSP is set to
1, the level-1 in the area can pass the Level-1-2 IS to the outside region. 0

A. True

B. False (Right Answers)

Answer: B

29. In the OSPF broadcast network, there are four routers in the same network segment, RTA, RTB, RTC,
and RTD. The DR priorities are 2, 1, 1, and 0, and the Router IDs are 192.168.1.1, 192.168.2.1, 192.168.
.3.1 and 192.168.4.1. If OSPF protocol is enabled on all the four routers, the BDR selected by OSPF is O

A. RTB O

B. RTC (Right Answers) O C. RTA O D. RTD

Answer: B

30. Which AS_PATH can be matched by command ip as-path-fitter 1 permit ^12.*74$?

A. AS_PATH ( 32 1274 23 ) 0

B. AS_PATH ( 123 621 743 2374 ) (Right Answers)

C. AS_PATH ( 321 12 2374 ) 0 D. AS_PATH ( 125 328 74 23 )

Answer: B

31. An OSPF protocol is running on a company network. An engineer wants to understand the OSPF
mechanism to perform packet capture operations on the network, which of the following description
about the OSPF packet is correct? (Multiple Choice)

A. LS Update message synchronizes the link state database by sending detailed LSA information. (Right
Answers)

B. After receiving the LS Update message, the router must send LS Ack to confirm.

C. Sending Hello packets immediately after the interface joins the OSPF area. (Right Answers)

D. The LS Update message is sent only when the adjacency is established.

Answer: AC

32. In the following topology picture, R1 can access the Internet through R2 and R3. R1 and R2, and R1
and R3 establish an EBGP connection. R2 and R3 belong to the same AS. The default route is advertised
through BGP. R2 is the optimization when requiring R1 to access the Internet traffic. The following
practices that can be achieved are (Multiple Choice)

tlh.'"44 °Cm' muerte* NM FI2 it-


RI nnorma

rin.sena G0011

InternoI

A. R2 specifies that the peer R1 sets the MED attribute to 150 in the export direction. O

B. R1 specifies that the peer R3 sets the MED attribute to 150 in the import direction. (Right Answers ) O
C. R2 specifies that the peer R1 sets the local priority to 150 in the export direction.

D. R1 specifies that the peer R2 sets the local priority to 150 in the import direction. (Right Answers )

Answer: BD

33. In addition to stateless address autoconfiguration, IPv6 devices can also obtain information such as
addresses, gateways, and DNS through DHCPv6.

A. True

B. False (Right Answers)

Answer: B

34. The network administrator is ready to use the 6to4 automatic tunnel to carry IFV6 data on the IPv4
network. The IPv4 address of the router interface is 138.14.85.210, so the corresponding tunnel address
is 2001:8a0e:55d2:1:230:65ff: fe2c:9a6.

A. True

B. False (Right Answers)

Answer: B

35. In an IPv6 network, two nodes A and B are neighbors. If node A sends an NS message to node B, if
node B replies to the NA message after received the message, so what neighbor status will be marked as
when viewing on the node A?

A. Reachable (Right Answers)

B. Stale

C. Probe

D. Incomplete

Answer: A
36. As the description of MPLS, which of the following is wrong?

A. The label space range of dynamic signaling protocols such as LDP and MP-BGP is 16-1023. (Right
Answers)

B. The length of the MPLS label is 20 bits and is used for packet forwarding.

C. In the TTL processing mode of the Pipe mode, IP packets are transmitted on the MPLS network. The
TTL value of the IP packets is reduced by 1 in the MPLS ingress node and the egress node respectively. •

D. MPLS supports multi-layer tag nesting, the S-bit value of the innermost tag is 1.

Answer: A

37. RD is used to distinguish the same IP address in different VPNs. How many bits does the RD contain?

A. 16

B. 64 (Right Answers)

C. 32

D. 128

Answer: B

38. In the packet forwarding by the way of inter-AS VPN-Option B, the two ASBRs exchange the LSP
labels of the public network.

A. True

B. False (Right Answers)

Answer: B

39. About the description of MPLS lable related information, which of the following is wrong?

A. The length of the MPLS label is 4 bytes and it is encapsulated between the link layer and the network
layer.

B. By default, the device supports the PHP feature, and the label value of the egress node supporting
PHP which is allocated to the penultimate hop node is 3.

C. If the bottom mark of the label is S=O, it indicates that the label is the bottom label and directly
performs IP forwarding. (Right Answers)

D. When the tag value is 0, it indicates that the tag should be ejected, and the packet must be
forwarded based on IPv4.
Answer: C

40. View the details of all VPN instances on a network device. The results are as follows. Which of the
following statements are incorrect? (Multiple Choice)

06Jawei> display ip von-instance verbose Total VPN-Instances configured : 3 Total IPv4 VPN-Instances
configured : 1 Total 7PvG VPN-Inntances configured : 2

VPN-Instance Name and ID : vpna, 6 Description : vpna-1 Service ID : 12 4 Interfaces :


GigabitEthernet1/0/0 Address family ipv4 Create date : 2018/6/3 15:36:20 Up time : 6 days, 04 hours, 41
sinuses and 67 seconds Route DIstinguisher : 100:1 Export VPN Targets : 1:1 2:1 Import VFW Targets :
1:1 Label Policy : label per instance Per-Instance Label : 1024 IP FRR Route Policy : 20 VPN FRR Route
Policy : 12

A. The total number of instances of the IPv6 address cluster enabled in the VPN configured on the local
end is 1. (Right Answers )

B. The device will assign a label to each route of the VPN-Instance vpna. (Right Answers)

C. VPN-Instance vpna will not receive VPN routes with RT 2:1

D. GigabitEthernet 1/0/0 interface is bound to the VPN-Instance vpna.

Answer: AB

41. The following are the statements about LDP reliability, which one is wrong?

A. LDP FRR can also be used to generate an LSP for the label mapping from the non-optimal next hop.
And it can be as a backup of the primary LSP to establish the transfer entries. •

B. The association between the LDP and the IGP requires the IGP to suppress the advertisement of the
route and ensure that the LDP path is consistent with the IGP path.

C. The manually configured LDP FRR policy defaults to a 32-bit backup route that triggers LDP to
establish a backup LSP. (Right Answers)

D. LDP GR Graceful Restart uses the feature that the MPLS forwarding plane is separated from the
control plane. The device does not interrupt when the protocol is restarted or the active/standby
switchover is performed.

Answer: C

42. What improvements have been made to the IGMPv2 protocol compared to IGMPv1? (Multiple
Choice)

A. Added specific group query message (Right Answers)


B. Added off-group messages (Right Answers)

C. Added maximum response time field (Right Answers)

D. Added specific source group query messages

Answer: ABC

43. If multiple candidate RPs are configured in a certain group of mutticasts, which of the following
parameters need to be compared between the multiple candidate RPs? (Multiple Choice)

A. C-RP priority (Right Answers)

B. Group-wide mask length of the C-RP service matching the group address to which the user joins (Right
Answers )

C. IP address of the C-RP interface (Right Answers)

D. Number of the C-RP interface

Answer: ABC

44. If a DR is elected between the mutticast routers running PIM-BM to be responsible for receiving and
receiving mutticast data on the source or member, what is the correct description of the DR election
rules?

A. Compare the DR priorities first, if the priorities are the same, you need to compare the IP addresses
of the PIM router interface to elect DRs. (Right Answers)

B. The PIM router with a long interface mask is elected as the DR.

C. A PIM router with a low DR priority value is elected as the DR.

D. A router with a small IP address is elected as a DR.

Answer: A

45. If you run PIM-SM on a mutticast network, you need to construct a multicast forwarding tree
between the multicast source and the receiver for the receiver to receive mutticast data, so the
following descriptions are about the constructed mutticast forwarding tree, which are the correct
options? (Multiple Choice)

A. The RTP tree is constructed between the RP and the receiver. (Right Answers)

B. The RPT tree is constructed between the multicast source and the RP.

C. The SPT tree is constructed between the RP and the receiver.

D. The SPT tree is constructed between the multicast source and the RP. (Right Answers)
Answer: AD

46. As shown in the figure, the IPSEC VPN is established between the branch and the headquarters using
redundant links. At the same time, URPF is enabled on the traffic from the branch 1 on Router B. Which
of the following options is correct? (Multiple Choice)

A. When using IPSEC backup link redundancy backup, URPF loose mode is recommended when the
URPF function enables on the physical interface. (Right Answers)

B. When using IPSEC multi-link redundancy backup, URPF strict mode can be used when URPF function
enables on the tunnel interface. (Right Answers)

C. When using IPSEC backup link redundancy backup, URPF strict mode can be used when URPF function
enables on the physical interface.

D. When using IPSEC multi-link redundancy backup, URPF strict mode can be used when URPF function
enables on the physical interface.

Answer: AB

47. The HTTP protocol is based on TCP. Therefore, you can use the TCP Flood attack defense method to
defend against HTTP flood attacks.

A. True

B. False (Right Answers)

Answer: B

48. As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same
time, an IPSEC tunnel needs to be established between the two IPv6 networks for communication.
Which of the following encapsulation modes can meet the requirements above?

Router A NAT64

Router_B NAT64

IPv6 Host A

IPv6 over IPv4 IPsec Tunnel

A. ESP + tunnel mode (Right Answers)


B. None of the above options

C. AH + transmission mode

D. AH + tunnel mode

Answer: A

IPv6 Host B

49. When there are multiple matching rules in the ACL of the VRP, which of the following statements is
correct about the matching order?

A. On confirmation, follow the Rule-ID, match from small to large (Right Answers)

B. By default, match according to the principle of "depth first"

C. On confirmation, match the order by matching the permit first and then matching the deny. 171 D.
There is only one matching order and cannot be modified.

Answer: A

50. The LAND attack is performed by the attacker sending a source address and a destination address to
the destination host, they are all the destination hosts. The source port and the destination port are the
same SYN packet. When the receiver waits for the final ACK packet from the sender, The connection is
always in a semi-connected state, resulting in waste of limited TCP resources at the receiving end.

A. True

B. False (Right Answers)

Answer: B

51. What is the relationship between CIR, BC and TC?

A. TC=CIR/BC

B. CIR=TC/BC

C. CIR=BE/TC O

D. TC=BC/CIR (Right Answers)

Answer: D
52. A home user has opened a 10Mb/s broadband. To improve the user experience, the operator can
stabilize at 12Mb/s when measuring speed. If we use token bucket technology to achieve this demand,
which of the following methods is optimal?

A. cir 10000 pir 12000 (Right Answers)

B. cir 10000 cbs 10000 pbs 12000

C. cir 8000 pir 12000

D. cir 10000 cbs 12000 pbs 12000

Answer: A

53. Which of the following options is correct for the description of the optimal routing elections for
various protocols?

A. OSPF puts all routing information in the LSDP into the IP routing table.

B. The route with the next hop unreachable in BGP is also put into the IP routing table.

C. Different routing entries learning from BGP and OSPF to the same destination network segment select
the optimal route to join the IP routing table by comparing the preference value of the protocol. (Right
Answers)

D. BGP selects the optimal route to the same destination network segment by comparing the cost value
of the route entry.

Answer: C

54. As shown in the following topology diagram, all the interfaces of the router in the figure are all
enabled with the ISIS protocol. The correct statements of the following are: (Multiple Choice)

Ri. tederface Ethernet0/0/0 ip adderss 392.161111 231233 21S0 hip end 1 ertualnp 192 168.1 12 vtrp
end 1 pr do 110 rip end 1 pactbid-neon 1 nideerd 20 his enabler 1 • interlace Itherries0/0/1 ip address
10 0 IS 1 2SS 254 2530 Isis enable 1 Old 1 bind pave. ip 100 144 iestrinvanhor Iota/ 1 tetorinsinator
honour • cannel •

ft2 •eet/ace therne10/0/12 ap address 192164_12 2SS1SS1S1-0 end hid 1 victual- ip 192 144 1 12 his
enable •

as interface thernelediVO opop address 100 Sa • 2SS 25S 2550 enable 1 • bid I bind pew -ip 10013 1
deste•ninatee local • discfneinidor remote cannel

DA. If O B. If O C. If O D. If
the GEO/0/0 interface of R3 is the Ethernet 0/0/0 interface of the Ethernet 0/0/0 interface of the
Ethernet 0/0/1 interface of

Answer: AC

down, then R2 will become the master device. (Right Answers ) R3 is down, then R2 will become the
master device. R1 is down, then R2 will become the master device. (Right Answers ) R1 is down, then R2
will become the master device.

55. Which of the following statements about the BFD one-armed echo function are correct? (Multiple
Choice)

A. The BFD one-armed echo function must be configured with a local identifier and a remote identifier.

B. The default destination IP address of the BFD one-armed echo function protocol packet is
224.0.0.184.

C. The BFD one-armed echo function is applicable to scenarios where one device supports BFD and the
other device does not. (Right Answers)

D. After the BFD one-armed echo function is enabled, the destination IP address and source IP address
of the BFD packets are the same. (Right Answers)

Answer: CD

56. Which of the following is not the role of EVPN Type2 routing?

A. Host MAC address Announcement

B. Host ARP Announcement

C. BUM message forwarding (Right Answers)

D. Host IP route Announcement

Answer: C

57. One BD in VXLAN can correspond to multiple VNI.

A. True

B. False (Right Answers)

Answer: B

58. Which of the following is optimal for building a loop-free Layer 2 network?
A. Stacking + link aggregation (Right Answers)

B. TRILL+MSTP

C. Stacking + MSTP

D. Link Aggregation + MSTP

Answer: A

59. By default, the switch configures the MAC address table to be empty. Host A connected to the
switch sends the first unicast data frame. What operation will the switch perform after receiving the
data frame?

A. The switch will discard the data frame

B. The switch forwards the data frame out of an interface according to the destination MAC address of
the data frame.

C. The switch records the source MAC address of the data frame and floods the data frame. (Right
Answers )

D. The switch caches the data frame and waits for the destination host to send the data frame and then
forward it.

Answer: C

60. As shown in the figure, three switches SW1, SW2 and SW3, where SW1 is the root bridge, the link
between SW1 and SW2 is congested, and SW2 cannot receive the configuration BPDU sent by the root
bridge. Which spanning tree protection mechanism does the administrator need to configure to prevent
link congestion?

A. Loop protection (Right Answers)

B. Root protection

C. TC-BPDU protection

D. BPDU protection

Answer: A

61. Which of the following command is displayed to determine that the loop fault of the switch is
generated?

A 0 (0102]display cpu -defend statistics Packet Type Pass(Packet/Byte) Drop(Packet/Byte) Last-dropping-


time arp -reply arp -request

B 24 1536 2003 140044 0 0 0 - 0 2018-05-21 16:56:39 0 [C802]display interface brief I include up


InUti/OutUti: input utility/output utility Interface PHY Protocol InUtI OutUti intrrors outgrrors lEthO/0/1
up Ur' 0.03% 0.01% 0 0 HULLO up up(s) 0% 0% 0 0 Vlenifl up up -- -- 0 X6istabitlithernet0/0/1 up up 0.32%
0.32% 0 0 MisabilEtherne0/0/2 up up 0.32% 0.32% 0 0

C 0 O ICE02]display cpu-usage CPU Usage Stat. Cycle: 60 (Second) CPU Usage : 30% Max: 44% CPU Usage
Stat. Time : 2018-05-21 17:19

D • [C802)displey trapbuffer Trapping buffer configuration and contents : enabled Allowed net buffer size
: 1024 Actual buffer else : 236 Channel number : 3 . Channel MI/be : trapbuffer Current iresseses : 178
slay 21 2018 16:26:36 C%02 L2IPPP1/4/SPLPVLANSLA81:01D 1.3.6.1.4.1.2011.15.25.160.3.7 SAC move
detected. VLANIn= I. MacAddress a 60de -f328 -1b90. Original-Port a 2080/0/2. flapping port a 2080/0/1.
Please check the network socottood to flapping port.

Answer: D

62. A total of 6 bits indicating the priority field in the VLAN (802.1Q) data encapsulation 0

A. True 0

B False (Right Answers)

Answer: B

63. Four routers R1, R2, R3, and R4 run ISIS, the ISIS router type is marked, and the routing table is viewed
on R1. The reason why R1 does not reach the route of 10.34.34.4 is Route Flags: R - relay, D - Routing
Tables: Public Destinations : 5 download to fib Routes : 5 Destination/Mask Proto Pre Cost Flags NextHop
Interface 10.12.12.0/24 Direct 0 0 D 10.12.12.1 CigabitEthernet°/0/0 10.12.12.1/32 Direct 0 0 D 127. 0.
0.1 CigabitEthernet0/0/0 10.23.23.0/24 ISIS-L1 15 20 D 10.12.12.2 GigabitEthernet0/0/0

49.0001 R2.11/2 10.73.73.224 10.23.73.3/24

10.12.12.224 10.12.12.124 51.11 H31.2

A. Configure a routing policy on R2 to filter the default route.

B. R2's system-ID conflicts with R3

C. Regional planning errors for R3 and R4 (Right Answers)

D. R2's system-ID conflicts with R1

Answer: C

64. The OSPFv3 Option field appears in all LSA. 0

A. True 0

B. False (Right Answers)

Answer: B
65. Which of the following is true about Link-LSA for OSPFv3?

A. The Option field exists in the LSA header, not the data area of Link-Isa.

B. Contains both the link-local address of this interface and all IPv6 prefixes of this interface. (Right
Answers)

C. If the Prefix Option field of a prefix of the Link-LSA is Ox00, the Prefix will not be included in the IPv6
unicast calculation.

D. Contains both the link-local address of the interface and all Ipv6 prefixes in the same area on the router.

Answer: B

66. The following topology is available, and based on this analysis, the following statements which are
correct?

1113

RI

11r-va*Or—o=zzati*--imillbigo

112, ft/

RI Isis 1 R2 network-entity 49.0001.0001.0001.0001.00 Isis 1 a is-level level-1 interface Ethernot0/0/0


network-entity 49.0001.0002.0002.0002.00 ip address 10.0.12.1 255.255.255.0 summary 20.0.0.0
255.255.0.0 level-2 Isis enable 1 a a interface Ethernet0/0/0 R3 ip address 10.0.12.2 255.255.255.0 isis 1
Isis enable 1 network-entity 49.0001.0003.0003.0003.00 a a interface Ethernet0/0/1 interface
Ethernet0/0/0 ip address 10.0.23.2 255.255.255.0 ip address 10.0.23.3 255.255.255.0 14 isis enable 1 Isis
enable 1 a .interface Loopeack0 interface Loopilack0 ip address 10.0.3.3 255.255.255.255 ip address
10.0.2.2 55.755.255.255 Isis enable I Isis enable I O a

A. Because R2 does route aggregation, only the routing entry of 10.0.0.0/16 exists in the IP routing table
of R1.

B. The routing entries of 10.0.2.2/32 and 10.0.3.3/32 in the IP routing table of R1.

C. The routing entries of 10.3.3.3/32 and 10.0.0.0/16 exist in the IP routing table of R1. (Right Answers)

D. The routing entries of 10.0.2.2/32 and 10.0.0.0/16 in the IP routing table of R1.

Answer: C

68. As shown in the figure, the AS100 has two paths to the AS400. By default, the best route is transmitted
from the AS200. It is known that the path to the AS400 through the AS300 is better. Therefore, the
following configuration is performed on the R2. After the configuration is complete, the optimal route is
not changed. Which of the following operations can make the configuration take effect? [R2] ip as-path-
filter 1 permit ^400$ R2] route-policy med permit node 10 r2-route-policy] if-match as-path-filter 1 Ir2-
route-policy] apply cost 20
/ AS 200 ,••• - ••■ .0 - ■ / AS 100 u i AS 400 / - IIII % R1 .•••• / AS 300 •- R3 R4

A. Configure deterministic-med in the BGP process of R1.

B. Configure compare- different-as-med in the BGP process of R2.

C. Configure deterministic-med in the BGP process of R2.

D. Configure compare- different-as-med in the BGP process of R1. (Right Answers)

Answer: D

69. A network consisting of an existing router R1, router R2, router R3 and router R4. These four routers
are interconnected via a LAN network. Basic OSPF is deployed on all four routers. When you execute the
command "display ospf peer" on the router R2, the status between router R2 and router R3 is "2way".
What conclusion can you draw from this output?

A. Router R4 is DR

B. Router R2 is DR or BDR

C. Router R2 is not DR (Right Answers)

D. Router R3 is not DR, nor BDR (Right Answers)

E. There is no full adjacency between router R2 and router R3. (Right Answers)

Answer: CDE

70. The following statement about the NSSA area, which is correct.

A. In the OSPF neighbor relationship sent by the OSPF neighbor, the N position in the option field is set to
1. The E position is 0. (Right Answers )

B. The NSSA area generates seven types of LSAs to advertise external routes. The FA address in the seven
types of LSAs is used to prevent loops.

C. A default LSA must be automatically generated in the NSSA area to access the external network. 171 D.
The OSPF neighbor in the NSSA area sends the hello text. The N position in the option- field is 0, and the
E position is 1.

Answer: A

71. In the aggregate ipv4-address { mask I mask-length }( as-set I attribute-policy route-policy- namel I
detail-suppressed I origin-policy route-policy-name2 I suppress-policy route-policy- name3 ] command,
multiple parameters can be specified to affect the route summarization process and results. Which
statements about this command are true? (Multiple Choice)

A. If as-set is configured, the AS_Path of the generated summarized route contains AS_Paths of all specific
routes. This avoids routing loops. (Right Answers)
B. If suppress-policy is configured, the summarized route can be generated, the if-match clauses of the
route-policy can be used to selectively suppress specific routes. Those specific routes that match this
route-policy will still be advertised to other BGP peers.

C. If origin-policy is configured, only the specific routes that match the route-policy are used to generate
the summarized route. (Right Answers)

D. If attribute-policy is configured, attributes can be set for the summarized route. (Right Answers)

Answer: ACD

72. There are two community-filters: ip community-filter 1 permit 100:1 200:1 ip community-filter 2
permit 100:1 ip community-filter 2 permit 200:1 Which of the following statements are true? (Multiple
Choice)

A. A BGP route matches community-filter 1 only when the community attributes carried in the

B. A BGP route matches community-fitter 1 as long as the community attributes carried in the

C. A BGP route matches community-fitter 2 only when the community attributes carried in the O

D. A BGP route matches community-filter 2 as long as the community attributes carried in the

Answer: AD

route contain route contain route contain route contain

both 100:1 and 100:1 or 200:1, both 100:1 and 100:1 or 200:1

200:1. (Right Answers) or both. 200:. or both. (Right Answers)

73. We can use basic community-filters or advanced community-filters to filter BGP routes. Which of the
following tools make the advanced community-fitter more flexible than the basic community- fitters?

A. IP-prefix O

B. AS-path-fitter

C. Regular expression (Right Answers) O D. ACL

Answer: C

74. The ip ip-prefix ip-prefix-name [ index index-number] {permit I deny} ipv4-address mask-length [
greater-equal greater-equal-value] [ less-equal less-equal-value] command is used to configure an IP-
prefix-filter. If less-equal is specified but greater-equal is not, what is the prefix range?

A. [0, less-equal-value]

B. [mask-length, less-equal-value] (Right Answers)

C. [less-equal-value, 32]
D. Not limited

Answer: B

75. The interface Serial° of an existing router goes to OSPF and sets the interface Serial° to the Silent
interface. What effect does this setting have?

A. OSPF does not establish any adjacencies through the interface. (Right Answers)

B. OSPF does not add routes learned from the interface to the local routing table.

C. OSPF will receive routing updates from neighbors

D. OSPF establishes available adjacencies through this interface.

Answer: A

76. Router HW is enabled with OSPF and the role of the router HW is ABR, and abr-surmnary is configured.
Which classes of LSA will be aggregated?

A. Class 4 LSA

B. Class 5 LSA

C. Class 2 LSA (Right Answers)

D. Class 1 LSA (Right Answers)

E. Class 3 LSA (Right Answers)

Answer: CDE

77. Both ISIS CSNP packets and OSPF DD packets are in the MA network, describing the role of the link
state database profile. Which of the following statements is correct?

A. Both routers need to confirm the two routers after sending them. Otherwise, they need to be
retransmitted.

B. The master-slave relationship in the DD packet exchange of OSPFA is not bound to the DR/BDR. The
CSNP packet is generated only by the DIS. (Right Answers)

C. Once the adjacency relationship is established, CSNP packets and DD packets will stop sending. 171

D. The two routers do not need to confirm the peer router after sending.

Answer: B

78. If the default route is not used in the local IP routing table, the default route-import command is used
to advertise the default route to the BGP peer (group). 0

A. True

B. False (Right Answers)

Answer: B
79. Which scenario can use AS-path -filter? O

A. apply clause in Route-policy O

B. If-match clause in Route-policy (Right Answers) O

C. Fitter the route sent to the BGP neighbor according to the AS_PATH attribute carried in the route. For
example, the command peer x.x.x.x as-path-fitter export (Right Answers) O

D. Fitter the route received to the BGP neighbor according to the AS_PATH attribute carried in the route.
For example, the command peer x.x.x.x as-path-fitter import (Right Answers)

Answer: BCD

80. Regarding the BGP alliance, which is wrong description? O

A. The Alliance divides an AS into several sub-AS alliances. External As still considers the Alliance to be an
AS.

B. The sub-AS number of the confederation is advertised to BGP peers outside the confederation by
default. (Right Answers)

C. The sub-autonomous system within the federation can use a private AS number. A Huawei NE/AR router
can be configured with up to 32 sub-AS in a single alliance. O

D. The federation can easily detect the routing loop within the AS because EBGP is running between the
sub-AS.

Answer: B

81. Which of the following is the correct description of route penetration for ISIS? O

A. ISIS route penetration can be used in an IPv6 environment. (Right Answers) O

B. ISIS route penetration does not cause neighbors to oscillate. (Right Answers) O

C. In the route penetration of ISIS, the route before penetration cannot be an aggregate route. O

D. ISIS route penetration can be deployed on Level-1 routers. O E. ISIS route penetration is used to prevent
routing loops.

Answer: AB

82. Two EBGP neighbors connected by two parallel cables. What method will you use to achieve
bidirectional load sharing between two EBGP neighbors connected through these two parallel serial
cables? O

A. Configure the loopback interface to establish an EBGP neighbor relationship and configure EBGP Multi-
hop. Configure the loopback interface as the update source, and then use IGP to implement equal-cost
path load sharing between addresses. (Right Answers ) O

B. Without any method, BGP automatically implements load sharing between different autonomous
systems on the available links. O
C. Use the command at both ends "ebgp-load-balance O

D. Configure the EBGP neighbor relationship with the loopback interface as the update source. The IGP in
each AS must have two equal-cost paths to the EBGP neighbor loopback address. You need to use the
command "next-hop-local". O

E. Configure the EBGP neighbor relationship with the loopback interface as the update source. The IGP in
each AS needs to import two equal-cost paths to the EBGP neighbor loopback address. You need to use
the commands ebgp-max-hop and next- Hop-local

Answer: A

83. OSPFv3 and ISIS are running on the router at the same time. You need to import OSPFv3 routes to ISIS.
Which of the following configurations is correct: (Multiple choice) ❑

A. [Huawei] isis 1 [Huawei-isis-1] is-level level-1 [Huawei-isis-1] network-entity


47.0001.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard [Huawei-isis-1] ipv6 import-
route ospfv3 1 level-1 [Huawei-isis-1] quit [Huawei] ospfv3 1 [Huaweiospfv3-1] router-id 2.2.2.2 (Right
Answers) ❑

B. [Huawei] isis 1 [Huawei-isis-1]is-level level-1 [Huawei-isis-1] network-entity


47.0001.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard [Huawei-isis-1] ipv6 import-
route ospfv3 1 [Huawei-isis-1] quit [Huawei] ospfv3 1 [Huawei-ospfv3-1] router-id 2.2.2.2 ❑

C. [Huawei] isis 1 [Huawei-isis-1] network-entity 47.0001.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable


topology standard [Huawei-isis-1] ipv6 import-route ospfv3 1 level-1 [Huawei-isis-1] quit [Huawei] ospfv3
1 [Huaweiospfv3-1] router-id 2.2.2.2 (Right Answers) ❑

D. [Huawei] isis 1 [Huawei-isis-1] network-entity 47.0001.0000.0000.0002.00 [Huawei-isis-1] import-


route ospfv3 1 [Huawei-isis-1] quit [Huawei] ospfv3 1 [Huawei-ospfv3-1] router-id 2.2.2.2 ❑

E. [Huawei] isis 1 [Huawei-isis-1]is-level level-1 [Huawei-isis-1] network-entity


47.0001.0000.0000.0002.00 [Huawei-isis-1] import-route ospfv3 1 level-1 [Huawei-isis-1] quit [Huawei]
ospfv3 1 [Huawei ospfv3-1] router-id 2.2.2.2

Answer: AC

84. If the router only needs to forward IPN/6 packets, there is no need to configure any IPv4 protocols
and addresses on the router. o

A. True (Right Answers) 0

B. False

Answer: A

85. In the intranet MPLS BGP VPNF network, when a packet enters the public network for forwarding, it
will be encapsulated with two layers of MPLS labels. The following description of the two-layer label,
which is wrong? O
A. By default, the router assigns the same label value to all VPNv4 routes destined for the peer PE. (Right
Answers) O

B. The private network label is carried and distributed when the route is delivered by MP-BGP. The public
network label is distributed by the LDP protocol. O

C. The egress PE uses the inner label when determining which egress CE the message should be sent to.

D. MPLS BGP VPN uses two layers of labels: public network labels (also known as outer labels) and private
network labels (also known as inner labels).

Answer: A

86. The following is about the LDP protocol session establishment process, which is the correct
description? O

A. After the TCP connection is successfully established, the active party sends an initialization message to
negotiate the parameters related to the LDP session. (Right Answers) O

B. The party with the larger transmission address acts as the active party and initiates the establishment
of TCP connection. (Right Answers) O

C. The Hello message discovered by the LDP neighbor uses TCP packets. The destination address is the
mutticast address 224.0.0.2. O

D. After both parties receive the Keepalive message from the peer, the LDP session is established
successfully. (Right Answers)

Answer: ABD

87. The router HW1 exists as an MPLS LSR router in the network of the operator HW. The router receives
a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle the
message? O

A. Router HW1 uses LDP to create an LSP and creates a new path for the label carried in the packet in the
LFIB. O

B. Router HW1 will discard the message. (Right Answers ) O

C. Router HW1 will forward the message using the default label. O D. Router HW1 will strip the label and
find the IP destination address of the FIB.

Answer: B

88. The following statement about cross-domain MPLS VPN, which is the wrong description? O

A. When the public network label is only LDP, the cross-domain vp-Option-c scheme 2 needs to use three-
layer labels in the packet forwarding process. (Right Answers)

B. For the cross-domain vPN-OptionB mode, an MP-eBGP neighbor relationship needs to be established
between the two ASBR.

C. For the cross-domain vPn-OptionA mode, the route between the two ASBR is a common IPv4 route.
D. For the cross-domain vPN-OptionB mode, two ASBR are interconnected by multiple interfaces
(including sub-interfaces). Each interface is associated with one VPN. Each ASBR-PE uses the peer as the
CE. (Right Answers)

Answer: AD

89. If there are multiple receivers in a multicast group, the administrator enables IGMP-Snooping on the
switch connecting the receiver. After the receiver receives the general query message from the querier,
the receiver receives multiple receivers. How to respond? O

A. All recipients will respond to the Report message. (Right Answers) O

B. Only when IGMPv1 is running, all receivers respond to the Report message. O

C. The first responder with a response timeout sends a Report message, and the other recipients do not
send it. O

D. Only the IGMPV2 is running, and all receivers respond to the Report message.

Answer: A

90. Which of the following is the correct description of the process of registering the source DR with the
RP in the PIM-SM? o

A. The registration message encapsulates the multicast service data. (Right Answers) o

B. The RP sends a registration stop message as soon as it receives the registration message. o

C. The registration message is used to construct an RPT tree between the source DR and the RP. O

D. The registration message is a multicast message.

Answer: A

91. In a shared network, what mechanism does PIM-SM use to prevent duplicate traffic?

❑ A. Register mechanism

❑ B. BSR/RP mechanism

❑ C. Assert mechanism (Right Answers)

❑ D. Join/Prune mechanism

Answer: C

92. Which of the following statements about 802.1x authentication, RADIUS, and HWTACACS
authentication is correct?

O A. RADIUS authentication and HWTACACS authentication can perform dual authentication for the
same user at the same time, which is more secure.
O B. Users can access the network using 802.1x authentication and complete identity authentication
through Radius. (Right Answers)

O C. RADIUS authentication and HWTACACS authentication are mutually exclusive. You cannot perform
dual authentication for the same user at the same time. (Right Answers)

O D. RADIUS authentication and 802.1x authentication are mutually exclusive.

Answer: BC

93. Which of the following statements about RADIUS is correct?

O A. MAC authentication does not require a username and password, so you cannot use RADIUS to
authenticate a user.

O B. RADIUS authentication and Portal authentication cannot be used together. Because Portal
authentication is usually used, the Portal server can be used to authenticate users.

O C. RADIUS protocol authentication, authorization, and audit separation.

O D. RADIUS supports both wired and wireless access methods. (Right Answers )

Answer: D

94. To configure AAA, you first need to define the XRADIUS RADIUS server as follows: [Huawei] radius-
server template EXAM [Huawei-radius-EXAM] radius-serve shared-key cipher HUAwei123 [Huawei-
radius-EXAM] radius-se authentication 10.7.66.66 1812 [Huawei-radius-EXAM] radius-se authorization
10.7.66.661812 [Huawei radius -EXAM] radius-server retransmit 27. 1813 [Huawei-radius-EXAM] radius-
sery accounting 10

0 A. True

0 B. False (Right Answers)

Answer: B

95. Which of the following does the digital certificate not contain?

O A. Public key information0

O B. Digital envelope (Right Answers)

O C. Digital signature

O D. Issuer

Answer: B

96. Network administrators can use CAR technology in traffic policing. Which of the following
technologies can be applied in CAR?

O A. Double barrel double speed (Right Answers )

O B. Single barrel single speed (Right Answers )

O C. Three barrels single speed

O D. Double barrel single speed (Right Answers)

Answer: ABD

97. Router A has an IP router with a destination network segment of 10.0.0.1/32 and an outbound
interface of Gigabitethernet 0/0/1. Now add the following configuration acl number 2000 rule 10 permit
source 10. 0.1.1 0 traffic classifier test if-match acl 2000 traffic behavior test remark dscp cs3 traffic
policy test classifier test behavior test interface Gigabitethernet0/0/1 ip address10.0.12.1255.255.255.0
traffic-policy test outbound Suppose Router A receives a packet with a destination IP of 10.0.0.1. The
following statements which are correct?

O A. If the source IP address of the packet is 10.0.0.1, it can be forwarded while the DSCP field remains
unchanged. (Right Answers)

O B. If the source IP address of the packet is 10.0.0.1, it can be forwarded and the DSCP field is marked
as CS3.

O C. If the source IP address of the packet is 10.0.0.1, it cannot be forwarded.

O D. If the source IP address of the packet is 10.0.0.1, it can be forwarded and the DSCP field is marked
as cS3. (Right Answers)

Answer: AD

98. Which SNMP message type report event sent to the NMS is reliable?

❑ A. Response

❑ B. Trap

❑ C. Inform (Right Answers)

❑ D. Get

❑ E. Get Bulk

Answer: C

99. Non-Stopping-Forwarding (NSF) and Non-Stopping Routing (NSR) are two solutions for high
reliability. The following statements which are correct?
O A. NSR routers need to negotiate NSR support through specific packet negotiation.

O B. After the NSF is enabled, the router performs the master/slave switchover. The routing table and
the forwarding table remain unchanged. Therefore, traffic is not lost during the GR time. (Right
Answers)

O C. After the NSR is enabled, if the main control board fails when the service batch backup is not
completed, the NR switch cannot be completed. (Right Answers)

O D. NSF routers do not need to support NSF through specific packet negotiation.

Answer: BC

100. As shown below, R1 and R2 establish E-BGP neighbors and enable BFD detection. The following
statements which are correct?

RI

a:00 ft:Li Igzgagill

E0/0/2 E0/0/ LSW

R2

bid interface Ethernet0/0/0 ip address 10 0.12 1 255.255 255 0 • bgp 100 peer 10.0.12.2 as-number 200
peer 10.0.12.2 bfd min-tx-interval 300 min-rx-interval 200 detect-multiplier 4 peer 10.0.12.2 bfd enable

R2: bid interface Ethemet0/0/0 op address 10.0.12.2 255.255.255.0 • bgp 200 peer 10.0.12.1 as-number
100 peer 10_0.12 I bfd min-tx-interval 220 min-rx-interval 320 peer 10.0.12.1 bfd enable

O A. The detection time of BFD packets on R2 is 800ms.

O B. The detection time of BFD packets on R2 is 600ms.

O C. The detection time of BFD packets of R1 is 660ms. (Right Answers )

O D. The detection time of BFD packets on R1 is 1280ms.

Answer: C

101. Which is wrong about IPv6 Over VXLAN?

O A. IPv6 over VXLAN means that Vxlan's Overlay network is an IPv6 network.

O B. IPv6 over VXLAN can solve the problem of insufficient IP address resources for terminal tenants.

O C. The tunnel between the Layer 2 and Layer 3 gateways of the VXLAN is an IPv4 network.

O D. IPv6 Over VXLAN does not generate entries. (Right Answers )


Answer: D

102. Which is wrong about the EVPN Type 5 class routing?

O A. The IP Prefix field can carry either the host IP address or the network segment address.

O B. Type 5 is an IP prefix route.

O C. Type 5 routing carries both Layer 2 VNI and Layer 3 VNI (Right Answers)

O D. Type 5 routing carries Layer 3 VNI.

Answer: C

103. VXLAN uses BGP EVPN to establish a tunnel. What kind of packets are used?

O A. Type3 (Right Answers)

O B. Type5

O C. Type4

O D. Type2

O E. Type1

Answer: A

104. Which of the following advanced features does BGP EVPN support?

O A. ARP broadcast suppression (Right Answers)

O B. VRRP over VXLAN

O C. Multi-live gateway (Right Answers)

O D. VXLAN Qos

Answer: AC

105. Which of the following statements about VXLAN messages is correct?

❑ A. The outer destination IP address is the IP address of the remote VTEP of the VXLAN tunnel.
(Right Answers)

❑ B. The source UDP port number is 4789

❑ C. Destination UDP port number is 4789 (Right Answers)


❑ D. VNI has 24 bits and is used to distinguish VLAN segments. (Right Answers)

Answer: ACD

106. Which of the following types of packets is required to implement virtual machine migration in the
BGP EVPN distributed gateway scenario?

O A. Type3

O B. Type5

O C. Type4

O D. Type2 (Right Answers)

O E. Typel

Answer: D

107. Which of the following statements about the VRRP protocol are correct?

O A. Both VRRPv2 and VRRP v3 support authentication.

O B. VRRPv3 does not support authentication, while VRRPv2 supports authentication. (Right Answers)

O C. VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks.

O D. The owner of the Mater IP address has a VRRP priority of 255, so the priority range that can be
configured is 0-254.

Answer: B

108. HW users are transmitting a lot of files through TFTP. What protocol does TFTP rely on for
transmission?

O A. lcmP and UDP

O B. IP and TCP

O C. UDP (Right Answers)

O D. NFS

O E. FTP

Answer: C

109. When deploying LLQ, you need to configure bandwidth parameters. What is the meaning of
bandwidth parameters?
❑ A. Provide a built-in policer to limit the maximum available bandwidth of low latency queues
during congestion (Right Answers)

❑ B. This parameter should be as small as possible. It means that the bandwidth is always
reserved, even if LLQ is used, this parameter will reduce the available bandwidth of the interface.

❑ C. It indicates that the reference CR is used to calculate the burst size of the built-in tactical
merging bucket.

❑ D. This parameter is an option because LLQ always takes precedence over other queues

Answer: A

110. Assume that the port shaping rate is 100Mbps. The input bandwidth and PIR of each
service on the interface are as follows.

Queue type Queue type Input bandwidth (bps) PQ 15M PIR(bps) 25M 10M 10M 10M 15M 10M
10M Not configured CS7 CS6 PQ WFQ , Weights5 WFQ , Weightsl WFQ , Weights3 WFQ ,
Weights2 WFQ , Weightsl LPQ 30M EF 90M AF4 10M AF3 10M AF2 20M AF1 20M BE 100M

Then, after the first round of scheduling, what is the bandwidth allocated by the EF queue?

O A. 30M

O B. 15M (Right Answers)

O C. 90M

O D. 25M

Answer: B

111. Which of the following statement about the security association SA in IPsec is wrong?

O A. The SA is uniquely identified by a triplet that includes the Security Parameter Index (SP), the
source IP address, and the security protocol number used (AH or ESP). (Right Answers)

O B. Use display IPsec to view information about encryption algorithms, traffic, and other
information used between another IPsec peer.

O C. IPsec only supports the use of symmetric encryption algorithms to encrypt data.

O D. There must be a two-way SA between IPsec peers to establish an IPsec VPN connection.

Answer: A
112. The HW network consists of Network A and B that are connected via Router HW1 and
Router HW2. The HW network is shown in the following exhibit.

Network A

Serial 0/0/0 Serial 0/0/0 192.168.1.1/30 - 192.168.1.2/30

HW1 HW2

Network B

FastEthernet 0/0/0 FastEthernet 0/0/0 10.1.1.1/24 10.1.2.1/24

To set up an IPSec VPN between routers HW1 and HW2, which of the following crypto access-
lists must be configured on Router HW1 in order to send LAN to LAN traffic across the
encrypted VPN tunnel?

O A. rule permit ip source 192.168.1.10 destination 192.168.1.2 0

O B. rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0

O C. rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255 (Right Answers )

O D. rule permit ip source 192.168.1.10 destination 10.1.2.0 0.0.0.255

O E. rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255

Answer: C

113. Which of the following description about the assertion mechanism is correct?

O A. The size of the IP address will not be used as a condition for election during the election of
the winner.

O B. In the assertion mechanism, the winner is responsible for forwarding multicast data to the
broadcast network segment. (Right Answers)

O C. The assertion mechanism is used for the election of the DR.

O D. In the assertion mechanism, loser shut down the interface connected to the broadcast
network.

Answer: B
114. Which of the following statements about the BSR mechanism are true? (Multiple Choice)

❑ A. A PIM-SM domain can have multiple C-BSRs, but only one elected BSR. (Right Answers)

❑ B. An elected BSR can collect C-RP information by using the C-RP packets received. (Right
Answers)

❑ C. An elected BSR floods Bootstrap packets to advertise BSR information and C-RP
information to all routers in a PIM-SM domain. (Right Answers)

❑ D. A C-BSR can also collect C-RP information by using C-RP packets.

Answer: ABC

116. Regarding the processing mode of MPLS for TTL, which of the following description is
correct?

O A. In the Pipe mode, when an IP packet passes through the MPLS network, the IP TTL is
decremented by 1 to the MPLS TTL field in the ingress node.

O B. The TTL of the MPLS label has the same meaning as the TTL in the IP header, which can
prevent the MPLS network from generating a routing loop (according to the reason A) (Right
Answers)

O C. Uniform simulation, when the IP packet passes through the MPLS network, the D. In MPLS
VPN, if you want to hide the structure of the MPLS backbone network, you can use the uniform
mode in Ingress for private network packets.

❑ D. In MPLS VPN, if you want to hide the structure of the MPLS backbone network, you can
use the uniform mode in Ingress for private network packets.

Answer: B

117. On an MPLS VPN network, different CEs can use different routing protocols to exchange
routing information with the same PE. These routing protocols are independent from one
another.

O A. True (Right Answers)

O B. False

Answer: A

118. Which of the following technologies use tunneling technology to communicate between
IPv6 addresses?
O A. Dual Stack

O B. 6to4 (Right Answers)

O C. ISATAP (Right Answers)

O D. NAT64

Answer: BC

119. The following procedure for NDP to resolve the link layer address is correct or not.

ICMP Type = 135 Src = IPv6-Addr of A Dst = solicited-node multtcast of B

1lData = null

NS

Query = What is your link address/

NA

ICMP Type = 136 Src = IPv6-Addr of B IPv6-Addr of A Data = iihIc-layer address of B

O A. True

O B. False (Right Answers)

Answer: B

120. BGP 4+ is running between the two routers. The neighbor relationship is normal. However,
the BGP routing table of the local router does not have any neighbor routing entries. Which of
the following is the possible reason?

❑ A. The routing entries of the peer BGP routing table are non-optimal. (Right Answers)

❑ B. The next hop address of the BGP routing entry is unreachable.

❑ C. Peer ignore configured on the peer

❑ D. The peer is configured with Active-route-advertise (Right Answers)

Answer: AD
121. Which of the following information can be included in a basic network layer packet?
(Multiple choice)

O A. Data link layer header

O B. Upper layer data (Right Answers)

O C. Network layer header (Right Answers)

O D. Path record O E. Network layer tail

Answer: BC

122. Which of the following description about configuring BGP4+ is correct? (Multiple choice)

O A. The BGP4+ router-ID is the same as the BGP4 router-ID. (Right Answers)

O B. BGP4+ must use the Link-Local address when specifying the peer

O C. The next hop of the BGP4+ route does not use the Link-Local address. (Right Answers)

O D. When BGP4+ configures a reflector, the roles of the reflector and the client must be
consistent with the configuration of BGP4.

O E. BGP4+ does not support route reflectors.

Answer: AC

123. Regarding the stub area in the OSPF protocol, which of the following statement is correct?
(Multiple Choice)

O A. ASBR cannot exist in the stub area. (Right Answers )

O B. The virtual link cannot traverse the stub area. (Right Answers )

O C. stub area is not allowed to inject type? LSA (Right Answers)

O D. The backbone area cannot be configured as a stub area. (Right Answers )

Answer: ABCD

124. What type of LSA does not exist in the OSPF stub area? (Multiple Choice)

O A. Type-7 (Right Answers)

O B. Type-5 (Right Answers)


O C. Type-4 (Right Answers)

O D. Type-3

Answer: ABC

125. A router is configured for OSPF and is connected to two areas: area 0 and area 1. You
configure area 1 as a stub area. Which LSA types will exist inside area 1?

O A. Type 7

O B. Type 1 and 2

O C. Type 1, 2, and 5

O D. Type 3 and 4

O E. Type 1, 2, and 3 (Right Answers)

Answer: E

126. An engineer performs an import operation on an OSPF router in a company network.


Which of the following statement about the introduction of a route LSA is correct? (Multiple
choice)

O A. The Advertising Route is set to the router-id of the ASBR. (Right Answers)

O B. netmask is set to 0

O C. link state id is set to the destination network segment address (Right Answers)

O D. Use link state id and advertising Router to uniquely identify an LSA

Answer: AC

127. In broadcast network, the election of DIS is started after the neighbor relationship is
established.

0 A. True (Right Answers)

0 B. False

Answer: A

128. Which of the following statements about the ISS protocol route aggregation is correct?

O A. Route aggregation can be configured and validated on all types of routers. (Right Answers)
O B. Route aggregation can only be configured on the level--1 router to take effect.

O C. Route aggregation can only be configured on the level--2 router to take effect.

O D. Route aggregation can only be configured on the level--1-2 router to take effect.

Answer: A

130. OSPFv3 Router-LSA is generated for each router. It describes the interface address and cost
of each link of the router. It also contains the router ID of the neighboring router.0 A. True

0 B. False (Right Answers)

Answer: B

131. Which of the following description of the ISS's GR is correct?

O A. The GR feature of ISIS is enabled by default.

O B. ISIS's GR has a total of four timers.

O C. The ISIS's GR notifies the event and maintains the neighbor relationship through the CSNP
packet.

O D. ISIS's GR defines a new TLV structure to support this feature. (Right Answers )

Answer: D

132. As shown in the figure, R1, R2, and R3 run OSPF at the same time and announce their
respective loopbacks. Which of the following description is wrong?

❑ A. You can use the filter-policy export command to filter the loopback route of R3 in R2.
(Right Answers)

❑ B. You can use the filter export command to filter the loopback route of R3 in R2.

❑ C. You can use the filter import command to filter the loopback route of R3 in AreaO.

❑ D. You can use the filter-policy import command to filter the loopback route of R3 in R1.

Answer: A

133. Regarding the introduction of routes, which of the following description is wrong? O A. bgp
supports both import and network when generating routes. Network mode is more accurate.

O B. By default, the default metric of the external route redistributed by OSPF is 1, and the
imported external route type is Type2. El

O C. After ISIS's level-2 network route is imported to the level-1 network, if the import policy is
not manually configured, a routing loop is formed. (Right Answers)

O D. Introducing IBGP routes in OSPF may cause routing loops.

Answer: C

134. Which of the following description is true about the ISIS LSP fragmentation extension?

O A. Enable the ISIS router to generate more LSP fragments to carry more ISIS information.
(Right Answers)

O B. ISIS's fragmentation extension is equally valid for Hello packets.

O C. ISIS's fragmentation extension is achieved by adding virtual systems that can scale up to
1000 virtual systems.

O D. ISIS routers can generate up to 1024 shards.

Answer: A

135. The configurations of the defined route-policy test are as follows: ip community-filter 1
permit 100:1 ip as-path-filter 2 permit ^100$ route-policy test permit node 10 if-match
community-filter 1 if-match AS-path-filter 2 apply as-path 200 Which of the following
statements is true?

O A. The BGP routes will match the route-policy test only when they contain

O B. The BGP routes will match the route-policy test only when they contain

O C. The BGP routes will match the route-policy test only when they contain

O D. The BGP routes will match the route-policy test as long as they contain

Answer: B

136. Which of the following statements is true about the database synchronization process on
an IS-IS broadcast network?

R1

R3

R2 DIS
O A. As the DIS, R2 sends a CSNP packet periodically. (Right Answers)

O B. The interval at which R2, as the DIS, sends Hello packets is three times that of other routers.

O C. As the DIS, R2 does not receive the PSNP requests from other routers.

O D. R1 and R3 maintain the database consistency by sending PSNP packets periodically.

Answer: A

137. The second-layer network architecture of a company is as shown in the figure. After the
engineer is configured, the services between the departments cannot be communicated. Check
the status of the device as follows. Which is the possible reason? (No figure is shown, the MSTP
three elements are different, causing the entry to appear on the master port.)

O A. The Revision Level configuration between switches is inconsistent (Right Answers) O B. The
BPDU interval configuration between switches is inconsistent.

O C. The Region Name configuration between the switches is inconsistent (Right Answers)

O D. Instance VLAN mapping configuration between the switches is inconsistent (Right Answers)

Answer: ACD

138. Two routers are connected through the serial port, but the interconnection interface cannot
be pinged. Now check the port status as follows, which is the possible reason? (No figure is
shown, one PPP, and one HDLC, you can find the reason.)

O A. Link bandwidth is not enough

O B. The IP address is not on the same network segment.

O C. Link layer protocol is inconsistent (Right Answers)

O D. Subnet mask does not match

Answer: C

139. When DLDP detects a unidirectional link on an interface, the default operations on Huawei
devices include: DLDP switches to the interface to Disable state, generates a trap and sets the
interface state to DLDP Down.

O A. TRUE (Right Answers )

O B. FALSE
Answer: T

140. Why does RSTP converge faster than STP?

O A. RSTP has more Port states.

O B. RSTP has smaller timers.

O C. RSTP has less overhead.

O D. RSTP convergence is based on mechanisms other than the timers. (Right Answers)

Answer: D

141. Which of the following description about the characteristics of the cross-domain vpn-Option C is
correct? (Multiple choice)

A. Up to two layers of labels need to be used in the packet forwarding process.

B. VPNV4 routes are not saved on the ASBR, and VPNv4 routes are not advertised to each other. (Right
Answers)

C. The VPN route is directly exchanged between the ingress PE and the egress PE, and no intermediate
device is required to save and advertise the VPN route. (Right Answers)

D. Cross-domain VPN—Option-c mode is not suitable for use when spanning multiple ASs.

Answer: BC

142. Which of the following configurations can be performed to implement fast failure detection on a
network? (Multiple Choice)

A. Reduce the hold time of Join/Prune messages.

B. Reduce the interval for an interface to send Hello messages. (Right Answers)

C. Set up a PIM BFD session between network segment neighbors. (Right Answers)

D. Reduce the interval for sending Join/Prune messages.

Answer: BC

143. If you run the PM-SM protocol on the multicast network, you need to configure the RP. The
configuration mode of the RP is classified into dynamic RP and static RP. Which of the following
description of the RP configuration is correct?

A. When configuring a dynamic RP, you need to configure the BSR as the backup of the RP.

B. When configuring a static RP, you need to configure the BSR advertisement RP information.

C. When configuring a static BP, you need to specify the RP information on all PIM routers. (Right
Answers)

D. When configuring a dynamic RP, you do not need to configure a BSR.

Answer: C

144. In a multicast network, which of the following situations will cause forwarding failure of multicast
traffic? (Multiple Choice)

A. Router does not have RPF routing. (Right Answers)

B. PIM is not enabled on an RPF interface. (Right Answers)

C. The upstream router discards the received PIM Join messages. (Right Answers)

D. On a network with multiple egress routers, the router is not selected as the DR.

Answer: ABC

145. The IPSG can be configured with a static binding table or used with DHCP-snooping to form a
binding table.

A. True (Right Answers)

B. False

Answer: A

146. As shown in the figure, the router load balances the traffic between the branch network 1 and the
branch network 2. In this case, the URPP defense source P address spoofing attack must be configured
in the loose mode on the physical interface of the router.

A. True (Right Answers)


B. False

Answer: A

147. Which of the following is a single package attack? (Multiple choice)

A. Special control packet attack (Right Answers)

B. Scanning detection attacks (Right Answers)

C. DDoS attack O D. Malformed packet attack (Right Answers)

Answer: ABD

148. Which of the following statement about the digital certificate is wrong?

A. Digital signatures guarantee the integrity of digital certificates.

B. The digital certificate contains public key information.

C. When the received peer certificate is valid, but the device itself is in the wrong time and is not within
the validity period of the certificate, the authentication fails.

D. Even if the two PRI entities are not in the same CA system, the two parties can complete the
authentication as long as they can identify each other. (Right Answers)

Answer: D

149. A newly deployed HW router is configured for Weighted Random Early Discard (WRED) on the HW
network. WRED has which of the following characteristics? (Multiple Choice)

A. For packets of different priorities, WRED can set different packet drop thresholds and packet loss
ratios. (Right Answers)

B. When the minimum threshold is crossed, WRED begins dropping all incoming packets (tail-drop).

C. Global Synchronization is avoided by selectively dropping packets from multiple TCP flows. (Right
Answers)

D. Low bandwidth flows are experiencing packet drop at a higher rate than higher bandwidth flows.

Answer: AC
150. Which of the following descriptions about the FTP protocol is correct?

A. In the FTP Passive mode, the client completes the initialization of the TCP session for control and
data. (Right Answers )

B. In FTP Active mode, the server uses the command "PORT" to tell the client which port it expects to
send data.

C. FTP always uses a TCP session to transmit control information and data information.

D. FTP always uses TCP port 20 to establish a data session, using ICP port 21 to establish control Session

E. FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session.

Answer: A

151. If a Huawei switch runs the RSTP protocol, when will the BPDU on a port of the switch be aged?

A. On the interface, RSTP does not age BPDUs.

B. After more than 6 seconds

C. After MaxAge times out

D. After the Hold time expires (Right Answers)

E. After the Forward Delay expires

Answer: D

152. In the process of using the LACP protocol, which of the following description is correct? (Multiple
choice)

A. You can prevent the Eth-Trunk interface from frequently flapping due to physical link reasons.
Interface eth-trunk 1 Lacp preempt enable Lacp preempt delay delay-time (Right Answers)

B. You can configure the source IP address for load balancing in the enabled link aggregation group by
using the following command: Interface eth-trunk 1 Load-balance src-dst-ip El

C. You can remove a member interface in an enabled link aggregation group by using the following
command: Interface Gigabitethemnet0/0/0 Debug Interface Gigabitethernet0/0/1 Undo eth-trunk 1
Interface Gigabitetheret0/0/ Undo shutdown (Right Answers)
D. You can add member interfaces to the link aggregation group enabled by the following command:
Interface Gigabitethernet0/0/1 Debug Interface Gigabitethernet0/0/1 Trunkport Gigabitethernet0/0/
Interface Gigabitethernet0/0/1 Undo shutdown

Answer: AC

153. In the lab network, the network is built as follows. SW1 is the default configuration and SW2
disables STP. Which of the following description about scenario is correct?

StA1 Cf0/91 • Co/1p_ Crebfr I) A, 40,

A. GO/0/2 of sw1 enters Discarding state

B. GO/0/1 of sw2 enters Discarding state

C. G0/0/2 of sw2 enters Discarding state

D. No interface is blocked (Right Answers) O E. GO/0/1 of SW1 enters Discarding state

Answer: D

154. Which of the following are used in Ethernet networks? (Multiple Choice)

A. Non-Canonical format MAC addresses.

B. CSMA/CD for media access. (Right Answers)

C. Canonical format MAC addresses. (Right Answers)

D. 802.5 encapsulated frames. O E. 802.3 encapsulated frames (Right Answers)

Answer: BCE

155. When judging the old and new LSA, the serial number parameter and the age parameter will be
used. Which of the following statements about the two parameters is correct?

A. When the router receives an LSA age set to 360s, it means that the LSA is unavailable.

B. Both the serial number and the age parameter can judge the LSA is old or new, and the router
preferentially compares the sequence parameters, the bigger, the better.

C. When the router receives two LSAs, the serial number is the same, the checksum is the same, and the
smaller the age, the better. (Right Answers )
D. If the serial number of the LSA reaches the end value of Ox7FFF, the current router advertises the
age of 3600s for Isa.

Answer: C

156. In the broadcast network and the P2P network, when the router receives the LSP, it needs to use
the PSNP to confirm the LSDB.

A. True

B. False (Right Answers)

Answer: B

157. Which of the following statements about the attributes of the ISIS protocol LSP packet is correct?

A. The LSP fast flooding feature first spreads out LSPs smaller than the specified number to speed up the
synchronization process of the LSDB. (Right Answers)

B. Configure an intelligent timer generated by the LSP, which can automatically adjust the delay time
according to the change frequency of the routing information. (Right Answers)

C. When the link state information increases, the packet length of the SP can be increased, so that each
LSP can carry more information.

D. Reduce the minimum interval for sending LSPs on an interface to speed up LSP diffusion.

Answer: AB

158. Routers R1 and R2 are configured for BGP. Both routers are in AS 65234. Routes from Router R2 are
in the BGP table on Router R1, but not in the IP routing table. What could be the cause of this problem?

A. Synchronization is off.

B. The BGP peers are down.

C. BGP multi-hop is disabled on Router R1.

D. Routing is not optimal (Right Answers)

Answer: D
159. Which of the following statement about the R2 routing entry is correct?

RI sntprtace I nopitarNO ipv6 enable ipv6 address 1019:1/64 ,ntertace toope•ackl ipvbetcabte ipv6
addirev. itUO 1/64 ......laCeloopeackl ipv6 mat*. tpv6 address 10/1 .1/64

triefix• 1ome-6(43 ipvt enable vv6 address ion 1164 •

H2 ad tpv6 number 101/0 rule !) permit source 7014../(4 rule 10 permit source 2010::/64 rule 1c deny
Klollf CP 2011:164 role 70 permit 1Si% 1 ipv6 filer pan //Wu moult

A. 2020::164 router will appear in the IP routing table. (Right Answers )

B. 2022:164 router will appear in the IP routing table. (Right Answers)

C. 2019::/64 router will appear in the IP routing table. (Right Answers)

D. 2021::/64 router will appear in the IP routing table.

Answer: ABC

160. Regarding the OSPFv3 protocol, which of the following description is wrong?

A. When sharing a router, each OSPFv3 process runs independently.

B. Multiple instances can be run in the same OSPFv3 process on the same interface. (Right Answers)

C. Support multiple instances running on a single link

D. The Instance ID field is included in the OSPFv3 packet header.

Answer: B

161. Which of the following statement about the LSA of OSPFv33 is correct?

A. The Link State id of the Inter-Area Prefix-LSA contains the prefix information.

B. Router-LSA and Network-LSA do not contain routing information. (Right Answers)

C. When the Intra-Area Prefix LSA is Referenced Link State Type-2, the Referenced Link State id contains
the interface id of the DR. (Right Answers)

D. Inter-Area-Prefix LSA also contains Link-Local information.

Answer: BC
162. A company has built an OSPF network as shown in the following figure. The links form an OSPF
neighbor relationship. All devices have announced their own loopback address. On one day, the S1-R2
and S2-R1 links are faulty. Which of the following description is correct? (Area 0 is spli )

111

St

R3

A: • .1

Areal

S2

R4

A. R5 can learn the loopback route of R2 normally. (Right Answers)

B. R3 cannot learn the loopback route of R2. (Right Answers)

C. R1 can learn the loopback route of R2 normally.

D. R3 can learn the loopback route of R2 normally.

Answer: AB

163. In Huawei devices, when ISIS imports external routes and sets external route tags for routing
information, ISIS's metric types do not need to be modified, keep the default.

A. True

B. False (Right Answers)

Answer: B

164. Which of the following description about the information of BGP4+ is correct?
A. Bgp4+ can use dampening command to suppress IBGP routes. (Right Answers)

B. Modifying the BCP's router ID will cause the BGP connection between the routers to be re-
established. (Right Answers)

C. The Next Hop attribute in BCP4+ is represented by the Pv6 address, which can be the link-local
address of the next hop.

D. bGP4+ does not support automatic route aggregation. (Right Answers)

Answer: ABD

165. As shown in the following figure, the corresponding peer relationship is established. The AS400
receives the 1.1.1.1/32 network route from the AS100. What is the AS-Path attribute?

RT2

RT5

I $ AS Mail ' USW'

RT6

RT1

EBGP

1.1.1.1/32

AS400

4o•

RT7

A. 100 200 300

B. 400 300 200 100

C. 100 200 300 400


D. 300 200 100 (Right Answers)

Answer: D

166. Which of the following description is true about the OSPF virtual link?

A. A virtual connection can be established in any area, and it belongs to the area itself after it is
established.

B. The virtual link uses the outbound interface P as the link address.

C. The virtual link can be used to solve the problem that area 0 is divided. (Right Answers)

D. The cost of the virtual link is 0, it is the optimal link.

Answer: C

167. In the case of not dividing the area, which of the following description is true about the link state
routing protocol? (Multiple Choice)

A. Each router establishes a topological structure of the entire flood domain (Right Answers ) B. Each
router learns the route directly from the routing update and adds it to the routing table.

C. Routers in the flooding domain may repeatedly receive the same link state information. (Right
Answers )

D. Routers in the entire flooding domain have the same wrong path state database (Right Answers )

E. The router will send all the wrong path status information sent by one neighbor to all other neighbors
to ensure the synchronization of the database.

Answer: ACD

168. If the OSPF protocol is running on the network, configure the non-backbone area in the OSPP area
as the LSA with the Is-id of 0.0.0.0 in the Totally Stub Totally Stub area. Which LSA does the LSA belong
to?

A. LSA5

B. LSA2

C. LSA1
D. LSA3 (Right Answers)

Answer: D

169. When an administrator wants to manage some routes on the router during operation and
maintenance, which of the following tools can mark these routes so that the administrator can configure
the policy? (Multiple Choice)

A. If the BGP protocol is running, use the community attribute to mark the route. (Right Answers)

B. Use ACLs to mark routes on the router.

C. Use Tag value to mark routes on the router. (Right Answers)

D. Use ip-prefix to mark routes on the router.

Answer: AC

170. Which statements regarding IBGP or EBGP neighbors are true? (Multiple Choice)

A. BGP updates from an IBGP peer are propagated to other IBGP and EBGP peers.

B. BGP updates from an EBGP peer are propagated to other IBGP and EBGP peers. (Right Answers)

C. IBGP peers must be directly connected; otherwise, the IBGP-muttihop option must be configured.

D. EBGP peers must be directly connected; otherwise, the EBGP-multihop option must be configured.
(Right Answers)

E. IBGP neighbor peering can be established using the loopback interface address. (Right Answers)

F. EBGP neighbor peering must use the physical interface address to establish peering.

Answer: BDE 1

171. In an MPLS-BGP-VPN environment, if only BGP and LDP are used to distribute labels, the MPLS label
of the packet can be up to two layers.

❑ A. True ❑

B. False (Right Answers)

Answer: B
172. Which of the following description is wrong regarding the inter-domain VPN Option-B solution?

O A. During the packet forwarding process, exchange the private network LSPs of the VPN on the two
ASBRs.

O B. An MP-EBGP neighbor relationship needs to be established between the two ASBRs.

O C. The inter-domain VPN-option-B scheme is not limited by the number of interconnection links
between ASBRs.

O D. Exchange the outer label of the VPNv4 route between the two ASBRs. (Right Answers)

Answer: D

173. Huawei's two switches, SWA and SWB, are connected through seven Ethernet ports and are
configured with static link aggregation. The corresponding ports on the switch SW are Ethernet 11012,
Ethernet 1/0/3, Ethernet 11014, and Ethernet 1/0/5, Ethernet 110/6, and Ethernet 110/7. The
configuration mode is configured in the order of the ports. If the switch SWA and SWB support only 6
ports in each aggregation group.

O A. Ethernet1/0/7 Unselected port with consistent port configuration (Right Answers )

O B. Ethernet//0/6 Unselected port with consistent port configuration

O C. In the case that the configurations of the ports are the same, the SWA randomly selects one of the
seven ports as the aggregation group Unselected port.

O D. Ethernet//0/1 Unselected port when the configurations of the ports are the same

Answer: A

174. You need to configure policy routing on the router to specify that specific traffic is forwarded
through an interface. When using policy-based routing, which two types of most typical information can
be used to forward traffic along a particular path?

O A. TTL and source IP address of the packet

O B. Source IP address and Layer 2 source address

O C. Source IP address and specific protocols (such as FTP, HTTP, etc.) (Right Answers)

O D. Service type header and message length

Answer: C

175. As shown in the figure, the ISIS neighbor relationship between R1 and R2 has just been established.
which of the following statement is true about the database synchronization process between R1 and
R2?

k) k 2.

7 kt.00-00
O A. The packet sent from R1 to R2

O B. The packet sent from R1 to R2

O C. The packet sent from R1 to R

O D. The packet sent from R1 to R2

Answer: B

R1.0 p —0 9 is a PSNP packet. is a CSNP packet. (Right Answers) is an LSP packet. is a Hello packet.

176. As shown in the figure, R1 and R2 are PPP links, and the direct connection ports are not on the
same network segment, but the R1 and R2 direct connection ports can communicate, and the Ethernet
link cannot communicate under the same IP planning.what are the reasons? (Multiple Choice)

42.1611.N. 1/50 .0190

O A. R1 and R2 are connected to the POS port, and the 24-bit subnet route of the direct connection port
of the other party is learned through IPCP.

O B. R1 and R2 are connected to the POS port, and the 32-bit host route of the direct connection port of
the other party is learned through IPCP. (Right Answers )

O C. The interconnected POS port of R1 and R2 learns the MAC address of the peer interface through
LCP, and does not require the ARP request MAC address.

O D. The data packets of the interconnected POS interface of R1 and R2 do not need to encapsulate the
Ethernet header, and do not need to use ARP to request the MAC address. (Right Answers)

Answer: BD

177. What command can be used to prevent users from accessing multiple devices through the HUB on
the access port of the switch?

O A. [Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0/1] port link type trunk


[Huawei-GigabitEtherneto/0/1] port trunk allow pass vlan 10

O B. [Huaweiinterface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0/1] port link type access


[Huawei GigabitEtherneto/0/jipsg enable

O C. [Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0] port link-type access


[Huawei-GigabitEthernet0/0] port-security enable (Right Answers)

O D. [Huawei]interface GigabitEthernet 0/0/1 [Huawei-GigabitEthernet0/0] port link-type access


[Huawei-GigabitEthernet0/0] port-isolate enable

Answer: C
178. Combined with the output result in the following figure, which statements are correct? (Multiple
Choice) Total LS1101: 4 •(10 TLV) Leaking Route, •fay LOP1111•Solf LSP, 45e(KKI-ndc4), ATT-Attached, P
Pi-6)t"In, 01. OvnrIo4d

pv(11 2 Link Slate Database

L:.111) $e..i ?cm Checksua

0)00000000 Oxllfr 119-1)J3.01-00 01100000002 OxeSfr o 0 .0000.0000.c. 14 , '14124 Oxty696


0003.0000.0000.03-0• I Oxac40 01)4.0000.Wou.uu-uu 0X00000010

7_,t41 ISM): 5 •(In TLV)-Leeking 1,

SnidltIon

Lewitt) ../P/01.

675 102 0/0/0 GSA SS 0/0/0 110 0/0/0 se two 84 0/0/0

ielf Lr.P. • =01 ISP(rxremdfiAl. ovecloal

❑ A. R3 must be a DIS of a level-1 link

❑ B. R3 router is level-2 router

❑ C. R3 must be a DIS of a level-2 link (Right Answers)

❑ D. The system ID of the R3 router is 0003.0000.0000 (Right Answers)

Answer: CD

179. To display the routing table of router R1, the "display ip routing-table" command was issued.
Router R1 is running OSPF. Which one of the following statements is true regarding the OSPF
information in a routing table?

O A. A routing designated with only an "0_ASE" represents either a type-1 or type-2 LSA.

O B. A route that has been imported into OSPF can only be represented with an "O_ASE" designation.
(Right Answers)

O C. Routes that are within an area (intra-area) are marked with an "0_IA" in the routing table.

O D. Type-7 LSAs display routes are imported into OSPF from another process, and are indicated by an
"OSPF" marking. O E. All LSA types have unique designations in the IP routing table.

Answer: B

180. Regarding the certification of the ISIS protocol, which statements are correct? (Multiple Choice)

O A. Interface authentication can implement hello packet authentication for Level-1 and Level-2. (Right
Answers)

O B. After the interface authentication is configured, the IIH sent by the router must carry the
authentication TLV. (Right Answers
) O C. After the area authentication is configured, the IIH, SNP, and LSP sent by the router must carry the
authentication.

O D. Two routers are configured with regional authentication and interface authentication, and the
passwords are the same. Then two routers can establish neighbor relationships.

Answer: AB

181. Regarding the BGP anti-ring mechanism, which of the following descriptions are correct? (Multiple
Choice)

❑ A. Use the AS-PATH attribute between the autonomous systems to prevent loops. (Right Answers )

❑ B. The Cluster List attribute is used for the anti-ring in the reflector cluster. The router discovers that
the cluster list of the route entry contains its own Cluster ID and rejects the route.

O C. Routes learned from IBGP are not advertised to IBGP neighbors to prevent routing loops within the
AS. (Right Answers )

❑ D. You can use the AS-CONFED-SET attribute to prevent loops within the federation. (Right Answers )

Answer: ACD

182. Regarding Route Policy, which of the following descriptions are correct? (Multiple Choice)

❑ A. An advanced ACL can be applied to the route-policy to filter routes.

❑ B. The entry permit::0 less-equal 128 indicates that all IPv6 routes are allowed to pass. (Right
Answers)

❑ C. If more than one node is defined in the Route-policy, at least one of the nodes should have a
matching mode of permit. (Right Answers)

❑ D. Route-Policy can only filter the default route. (Right Answers)

Answer: BCD

183. Which of the following routing tools is unique to B6P?

O A. Route-policy

O B. ACL O C. IP-prefix O D. AS-path-filter (Right Answers)

Answer: D

184. As shown in the following scene, which description is true?

ilbenuOVVIO RI

Intarnp111/0013

R1 fists 1 netwnek enttty 49.0001 0001-0001 0001 110 U tntettac P t themett2/010 ip addles% 10.0.17
755.255.25S-0 tut. pitiable 1 tOstattuit type p?p KIS pep' ip Knot e
a R2 mos 1 netwntk entity 49 (1(101 0007 0002.0001.00 Intettate t thernet0/0/0 ip address 10.0.13.2
2SS.2S5.)SSIS iris enabiti 1 ises cot tnt type pip nos peet tpAgnore a tretettJuP loopliarkt) ty address
10.0.1-2 255.25S./SS 255 real PflAbIP

❑ A. R1 has both Level-1 and Level-2 LSDB

❑ B. R1 can ping the interface address of R21 1oopbapk0

❑ C. R1 has a route to R2 1oopback0 10.0.2.2/32 (Right Answers)

❑ D. No neighbor relationship can be established between R1 and R2.

Answer: C

185. The configuration of two routers in a company is as follows. which of the following statement
about the R1 routing table is correct?

Etherne10/0/0

RI

Ithernet0/0/01111 N)

I is level kyd I network-entily 49.0001.0001.0001.0001 00 a interface Ithetnet0/0/0 sp address


10.0.1L1255.255.255.0 Kl$ enst* osse 1 router id 10.0.1.1 area 0.0.0.0 network 10 0 12.0 0.0.0.2S5

lsis 1 kNorl level 1 network enlity 49.0001.0002.0002 01 I interface 11hervirt0/0/0 address 10 0.17
215S.25S.2SSA isis enable 1 interface toopeark0 sp address 10.0.2.2 25525S/SS2SS My enable 1 sppi I
rouse, sd 10.0 1.1 area 0.0.0.0 network 10 0.12 0 0.0.0.255 network In 0 / / 0 0 0.0

❑ A. Only when the priority of the R2 ISIS protocol is adjusted to 5, the P route entry with the
destination network segment of 10.1.2.2/32 on R1 is generated by OSPF.

❑ B. If the priority of the ISIS protocol of R1 is adjusted to 5, the P route entry of the destination
network segment with the destination network segment of 10.1.2.2/32 is generated by OSPF.

❑ C. If the priority of the R1 ISIS protocol is adjusted to 5, the P route entry with the destination
network segment of 10.0.2.2/32 on R1 is generated by ISIS. (Right Answers)

❑ D. If the priority of the R2 ISIS protocol is adjusted to 5, the P route entry with the destination
network segment of 10.0.2.2/32 on R1 is generated by ISIS.

Answer: C

186. Which of the following description is true about BGP aggregation?

❑ A. After the Aggregate ipv4-address mask is configured, only the aggregated routes are advertised
and the detailed routes are not advertised.

❑ B. For IPv6 routes, BGP supports manual aggregation and automatic aggregation.
❑ C. BGP enables automatic aggregation by default

❑ D. Manually aggregate routes in the BGP local routing table. (Right Answers)

Answer: D

187. Which of the following description is wrong about BGP route selection?

O A. Non-aggregated routes take precedence over aggregated routes. (Right Answers )

O B. In the case where Pref-Val and local_preference are equal, if the BGP preference of the locally
generated route, the IBGP route, and the EBGP route are the same, the locally generated valid route
takes precedence.

O C. See the following entry in the BGP routing table: * 172.16.1.11/32 0.0.0.0 10 0? Indicates that the
route is available non-optimal.

O D. The route that is unreachable for nexthop is an invalid route and does not participate in the
preference.

Answer: A

188. A number of transition techniques have emerged in the process of replacing a P4 address used in a
network with a Pv6 address. These technologies are divided into two categories, one is PV4/IPv6
coexistence technology and the other is v4/P6 interworking technology. Which of the following options
belong to Pv4/1P6 coexistence technology? (Multiple Choice)

O A. NAT64

O B. 112V6 over IPv4 (Right Answers)

O C. Dual-Stack (Right Answers)

O D. ISATAP (Right Answers)

Answer: BCD

189. Which of the following descriptions are true about the establishment process of LDP LSP? (Multiple
Choice)

A. By default, the LSR is for the same FEC. The received label mapping can only come from the optimal
next hop. It cannot be from the non-optimal next hop.

B. When the network topology changes cause the next hop neighbor to change, the LSR can directly
reestablish the LSP by using the label sent by the original non-optimal next hop neighbor. (Right
Answers)

C. In the label publishing DoD mode, for a specific FEC, the LSR does not need to obtain the label
request message from the upstream to perform label distribution and distribution. (Right Answers)

D. The process of establishing an LSP is actually the process of binding the FEC to the label and
advertising the binding to the upstream LSR of the LSP. (Right Answers)
Answer: BCD

190. As shown in the figure, in the hub&spoke multicast mode of MPLS bgp VPN, in order to realize that
the branch can only cmmunicate with the headquarters, the branches cannot communicate with each
other. Which of the following schemes can the RT be set?

A. Headquarters: Import Target: 12:3 Export Target: 12:3 Branch 1: Import Target: 12:3 Export Target:
12:3 Branch 2: Import Target: 12:3 Export Target: 12:3

B. Headquarters: Import Target: 1:1 Export Target: 3:3 Branch 1: Import Target: 3:3 Export Target: 1:1
Branch 2: Import Target: 3:3 Export Target: 2:2

C. Headquarters: Import Target: 2:2 Export Target: 3:3 Branch 1: Import Target: 3:3 Export Target: 1:1
Branch 2: Import Target: 3:3 Export Target: 2:2

D. Headquarters: Import Target: 12:3 Export Target: 3:12 Branch 1: Import Target: 3:12 Export Target:
12:3 Branch 2: Import Target: 3:12 Export Target: 12:3 (Right Answers)

Answer: D

191. Which of the following attacks are DoS (Denial of Service) attacks? (Multiple Choice)

A. Single packet attack

B. Source IP address spoofing attack (Right Answers)

C. Man-in-the-middle attack

D. Flood attack (Right Answers)

Answer: BD

192. Which of the following statements are true about IPSec VPN? (Multiple Choice)

A. Savage mode can support NAT traversal, while main mode does not support NAT traversal

B. Two routers establish IPSec VPN through the main mode. Starting from the fifth packet (including),
the payload data is often encrypted. (Right Answers)

C. Two routers establish IPSec VPN through aggressive mode, then only two packets are exchanged
between the two devices to establish a tunnel. (Right Answers)

D. Two routers can establish OSPF neighbor relationships through IPSec VPN tunnels and exchange
intranet routes.

Answer: BC

193. Configure queue-based traffic shaping. If the queue length exceeds the cache size, the tail is
discarded by default.

A. True
B. False (Right Answers)

Answer: B

194. As shown in the figure, which of the following statement is correct? (Multiple Choice)

at ikkiebucte likervw111/0011 kldre•t 10 011 1 ns o • olorbk► itheme111111/1 klebei• 10 0 21 1 AS


1SS AS 0 • iri✓reare inevbart1/0 addryst 30 01 1 21% 2Vi /SS ?SS • owe 1 t•ig*, d 10 0 1 1 to,a 0 0 0 0 bkl
101-Intedacirs *vials neural' 10 0 1 1 0000 nortroot 10 0 22000021S

r rover-suer 100! 1 AS PIS :Si IOC

• / •-•elt•t 11A••••10211/0 ▪ address 10 0 17 7S'i riS AS 0 • wort-tale • Ithomr10/1111 •p arldimas 100


)1 : /5% /SS Ail 0 • Intrrtace buogekerbe op Achim.% 10 el J 2SS 2SS 2SS lss • owe 1 routrryd 10011 ova 0
0 0 0 bed ail inawbko• womble nitwit.% 100220000 nottwort 10 0 210 0 0 0JSS

mut. eau 10 01 1 2SS 2SS 2SS JSS lc c

If the R2 Ethernet 0/0/1 interface is down, the R1 BFD session can quickly detect the fault and notify R1
to make the OSPF neighbor relationship down.

B. The OSPF status changes to FULL, which triggers the BFD session.

C. If the R2 Ethernet0/0/0 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is
changed to 10.0.21.2. If the BFD function is disabled on R2, the BFD session on R1 will be down. This will
result in the ospf neighbor relationship down.

E. If the R2 Ethernet 0/0/1 interface is down, the next hop of the route that R1 reaches 10.0.0.2 is
changed to 10.0.12.2.

Answer: AD

195. For Layer 2 VPN technology, which of the following statements are correct? (Multiple Choice)

A. VPLS is a widely used technology on the live network. It can provide Layer 3 packet transparent
transmission and achieve multi-point access.

B. The VPLS configuration is highly complex. The Layer 2 network transparently transmits BUM packets.
(Right Answers)

C. BGP EVPN supports tenant isolation, multi-homing and broadcast suppression (Right Answers)

D. BGP EVPN solves the problem of MAC address drift and multi-tenancy that VPLS cannot support.
(Right Answers)

Answer: BCD

196. If there is a LAN running the 802.1D Spanning Tree Protocol, which of the following parameters will
the non-root switch not receive from the root switch?

A. MaxAge
B. Root cost

C. Forward delay

D. Hold time (Right Answers)

E. Hello time

Answer: D

197. 802.1s defines deployment for which of the following?

A. One STP instance for each set of Bridges

B. One global instance for all VLANs

C. One STP instance for each VLAN

D. One STP instance for each set of VLANs (Right Answers)

Answer: D

198. Between the two directly connected devices that have established IBGP peers, run the shutdown
command to shut down the interface of one of the devices. The BGP connection will not be
disconnected immediately.

A. True (Right Answers)

B. False

Answer: A

199. In order to reduce the number of OSPF routes in some stub areas, OSPF has developed a special
area function. Which of the following description is true about the OSPF special area feature?

A. Special area routers cannot establish OSPF neighbor relationships with regular area routers (Right
Answers)

B. Any OSPF area can be configured as a special area

C. As -External-Isa is released to the Stub area

D. ASBR-Summary-LSA is allowed to be advertised to the NSSA area.

Answer: A

200. An engineer builds a network topology to study the working mechanism of OSPFv3 protocol. The
configurations of R1 and R2 are as follows. What are the LSA types exchanged between R1 and R2?
(Multiple Choice)

OSPFv3 Area 0

R1 GO/0/0

G0/0/0
R2

R1 configuration ospfv3 1 router-id 1.1.1.1 interface Gigabitethernet0/0/0 ipv6 enable ipv6 address auto
link-local ospfv3 1 area 0 R2 configuration ipv6 ospfv3 1 router-id 2.2.2.2 interface Gigabitethernet0/0/0
ipv6 enable ipv6 address auto link-local ospfv3 1 area 0. 0 0.0

A. Router-Isa (Right Answers)

B. Link-LSA (Right Answers)

C. Network-LSA (Right Answers)

D. Inter-area-prefix-Isa

Answer: ABC

201. The topology map and configuration are as follows. Now I hope that there is no detailed routing
entry of 10.6.3.3/32 in the R1 routing table. Which of the following statements can achieve this
requirement? (Multiple Choice)

R1

R2

R3

R1 Isis 1 network-entity 49.0001.0001.0001.0001.00 Interface Ethernet0/0/0 up address 10.0.12.1


255.255.255.0 IsIs enable 1

R3

Isis 1 network-entity 49.0001.0003.0003.0003.00 Interface Ethernet0/0/0 Ip address 10.0.23.3


255.255.255.0 his enable 1 a interface loopback0 Ip address 10.0.3.3 255.255.255.255 mos enable 1

a. Y

R2 Is•level level-1 network-entity 49.0001.0002.0002.0002.00 Interface Ethernet0/0/0 Ip address


10.0.12.2 255.255.255.0 Isis enable 1 N Interface Ethernet0/0/1 Ip address 10.0.23.2 255.255.255.0 ism
enable 1 N Interface loop8ack0 Ip address 10.0.2.2 255.255.255.255 Isis enable 1 N

A. Configure route summarization on R3 and summarize the routes to 10.0.0.0/16. (Right Answers)

B. Configure route summarization on R2 and summarize the routes to 10.0.0.0/16. I=1 C. Configure
filter-policy on R2, match ACL 10.0.3.3/32, and apply it in the expot direction.

D. Configure filter-policy on R1, match ACL 10.0.3.3/32, and apply it in the import direction. (Right
Answers)

Answer: AD
202. As shown in the configuration, if the administrator configures OSPF on R1 but R1 cannot learn the
routes of other routers, what are the possible reasons? (Multiple Choice) [R1] ospf [RI-ospf-1] area 2
[R1-ospf-1-area-0.0.0.2] network 10.0.13.1 0.0.0.0

A. The area ID configured by this router is different from the area ID of its neighbor router. (Right
Answers)

B. This router is not configured with an OSPF process ID.

C. The router's announcement network address does not match the interface mask

D. This router is not configured with authentication, but the neighbor router is configured with
authentication. (Right Answers)

Answer: AD

203. Configure AS-path-Fitter ip as-path-fittr 10 permit_100$ to match the route received from AS100. 0
A. True

B. False (Right Answers)

Answer: B

204. The following topology and configuration are available. Which of the following statements are
correct? (Multiple Choice)

R1

R1 oh I is-level level-1 network-entity 49.0001.0001.0001.0001.00 interface Ethernet0/0/0 taaddress


10.0.12.1 255.255.255.0 tatenable 1 a

R2

R3

R2 network-entity 49.0001.0002.0002.0002.00 import-route tkijlevel-2 Into level-1 set-overload


Interface Ethernet0/0/0 address 10.0.12.2 255.255.255.0 wienable 1 interface Ethemet0/0/1 Ip address
10.0.23.2 255.255.255.0 R3 Isis enable 1 %IA) is.level level-2 Interface loopaack0 network-entity
49.0003.0003.0003.0003.00 toaddress 10.0.2.2 255.255.255.255 (,,enable 1 Interface Et hernet0/0/0 at
address 10.0.23.3 255.255.255.0 taenabie 1 a Interface wool:tack° maddress 10.0.3.3 255.255.255.255
tsilenable 1

A. There is no route with the destination network segment being 10.6.3.3/32 on R1.

B. There is no route with the destination network segment being 10.0.2.2/32 on R1.

C. There is a route with the destination network segment being 10.6.3.3/32 on R1.

D. There is a route with the destination network segment being 10.0.2.2/32 on R1.
Answer: AD

(Right Answers ) (Right Answers )

205. As shown in the following figure, what routes can R2 learn?

R1

GO/0/0

GO/0/0

Ri. isis I network-entity 10.0000.0000.0001.00 filter-policy act-name abc export isis 2 import-route direct
interface loopback0 ip address 10 1 1 1 255 255 255 0 ip address 10.1 3.1 255.255.255.0 sub ip address
10.1 2.1 255 255 255.0 sub • interface GigabitEthernet0/0/0 ip address 100.1.1.1 255.255.255.0 isis
enable 1 ad name abc rule 10 permit ip source 10_1 1 0 0.0.0.255

R2. Isis 2 network-entity 10.0000.0000.0002.00 a interface GigabstEthernet0/0/0 ip address 100.1 1 2


255 255 255 0 Isis enable 2

R2

A. R2 can learn all the routes of R1. (Right Answers)

B. R2 can learn the route 10.1.1.0/24.

C. R2 can learn routes 10.1.2.0/24 and 10.1.3.0/24.

D. R2 can learn the LSPs of R1 but cannot add them to the routing table.

Answer: A

206. What is the role of RT in MPLS VPN? (Multiple Choice)

A. Allow the peer PE to decide which VPNv4 routes to import into the specific VRF. (Right Answers)

B. Allow the peer PE to decide which VPNv4 routes will not be imported into the specific VRF. (Right
Answers)

C. Allow the peer CE to decide which VPNv4 routes to import into the specific VRF.

D. Allow the peer CE to decide which VPNv4 routes will not be imported into the specific VRF.

Answer: AB

207. Regarding the way the device handles packets in the MPLS network model, which of the following
descriptions are wrong? (Multiple Choice)
A. The label forwarding path LSP is determined and established through various protocols during the
forwarding of the message. (Right Answers)

B. Both LER and LSR will carry out label distribution.

C. LSR must not strip labels.

D. The device discards the IP packets that enter the MPLS domain. (Right Answers)

Answer: AD

208. Which of the following description is wrong about the MPLS BGP VPN? ❑

A. IBGP establishes a stable BGP neighbor relationship for the ARPback interface address. ❑

B. Route switching between PE and CE can be static route, OSPF multi-instance, IS-iS mufti-instance,
EBGP. ❑

C. The TTL field in the tag has the effect of preventing loops. ❑

D. BGP Soo is used to prevent routes routed from a VPN site from going back to the site through the
MPLS backbone. Soo is an extended community attribute automatically generated by MP-BGP. (Right
Answers)

Answer: D

209. Which of the following are the techniques for improving MPLS BGP VPN reliability? (Multiple
Choice) ❑

A. VPN GR (Right Answers) ❑

B. VPN FRR (Right Answers) ❑

C. Configure CE dual-homing networking at the access layer. (Right Answers) ❑

D. Private network IP routing between the PE and the CE FRR (Right Answers)

Answer: ABCD

210. Which of the following description is wrong about the VPNv4 address? O

A. When BGP advertises reachable and unreachable VPNv4 routes, it carries the RD attribute. O

B. By default, the PE does not perform vpn-target filtering on the received VPNv4 routes. (Right
Answers) O

C. The VPNv4 address has a total of 12 bytes, including an 8-word route identifier RD (Route
Distinguisher) and a 4-byte IPv4 address prefix. O

D. Before the local PE advertises the VPNv4 route learned from the site directly connected to itself to
other PEs, it sets the Target attribute for these routes and advertises it as a BGP extended community
attribute along with the route.
Answer: B

211. Regarding the basic forwarding process of MPLS, which of the following description is wrong? O

A. When the IP packet enters the MPLS domain, the tunnel ID corresponding to the destination IP
address is checked. If the tunnel ID is Ox0, the MPLS forwarding process is entered. (Right Answers) O

B. By default, the value of the label assigned to the penultimate hop node by the Egressl node that
supports PHP is 3. ❑

C. When the packet is forwarded in the MPLS domain, the top label of the MPLS packet is replaced with
the label assigned by the next hop according to the label forwarding table. L

D. When an IP packet enters the MPLS domain, the MPLS border device inserts a new label between the
packet header and the IP header.

Answer: A

212. The mutticast IP address is 229.130.130.1, and what is its corresponding MAC address? ❑

A. 00-00-5E-02-82-01 ❑

B. 00-00-5E-82-82-01 ❑

C. 01-00-5E-82-82-01 ❑

D. 01-00-5E-02-82-01 (Right Answers)

Answer: D

213. Which of the following statement is true about IPSG technology? O

A. The IPSG can perform binding table matching check on P packets that enter the interface and leave
the interface. O

B. On the Huawei router, you can configure the IPSG function on the Vlanif. O

C. If an interface is configured with DHCP snooping Trust HCP ACK, DHCP NAKHCP, and Offerf packets,
other untrusted ports cannot receive these packets. The ip source check user-bind check-item command
is used to configure IP-based check packets for the dynamic or static entries. (Right Answers)

Answer: C

214. Which of the following is wrong about HTTPS? O

A. HTTPS protocol uses TCP port 443 by default. O

B. HTTPS secures access to data by using SSL VPN. (Right Answers) O


C. When using HTTPS to access a website, if the user's browser does not recognize the digital certificate
of the website, the website cannot be accessed. O

D. If the HTTPS traffic contains a virus, the router cannot directly detect the virus using IPS technology.

Answer: B

215. In traffic policing, the dual-bucket dual-speed is used. The number of tokens in the C bucket is TC,
and the number of tokens in the P bucket is TP. When a message of length B enters, which of the
following statements are correct? (Multiple Choice) ❑

A. If TP-B>0 and TC-B>0, the message is marked as green (Right Answers) ❑

B. If TP-B>0 and TC-B<O, the message is marked as yellow (Right Answers) O

C. If TP-B<0 and TC-B<O, the message is marked in red (Right Answers) ❑

D. If TP-B>0 and TC-B<O, the message is marked as green

Answer: ABC

216. The network administrator defines the following policy for traffic policing:

[Nusweildisplay traffic policy user-defined User Defined Traffic Policy Information: Policy: pl Classifier: cl
Operator: OR Behavior: bl Committed Access Rate: C1R 266 (Kbps). PIK 0 (Kbpn). CBS 48128 (byte). PBS
80128 (byte) Color Mode: color Blind Conform Action: pima Yellow Action: Mao Exceed Action: discard
statistic: enable

If the policy is applied to a router port and there is no traffic on the port for about 10 seconds, how
many bytes of burst will be available for class cl for packets to be marked as green? ❑

A. 256K bytes ❑

B. 32K bytes ❑

C. 48128 bytes (Right Answers) ❑

D. 80128 bytes

Answer: C

217. Which of the following types of routes are used to advertise external routes in BGP EVPN? O

A. Type4 O

B. Type1 O

C. Type2 O

D. Type3 O

E. Type5 (Right Answers)

Answer: E
218. Mainstream second-tier technologies include VXLAN, TRILL, NVGRE and MPLS. 0

A. True (Right Answers) 0

B. False

Answer: A

You might also like