H12 261 HCIE Routing Switching Written PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 110

H12-261.prepaway.premium.exam.

284q

Number: H12-261
Passing Score: 800
Time Limit: 120 min
File Version: 6.0

H12-261

HCIE-Routing&Switching (written) (Huawei Certified Internetwork Expert-Routing & Switching)

Version 6.0

002591BC9A38C8BBCFC618EE290DAB95
Exam A

QUESTION 1
Router HW1 is seeing a large number of Discard Eligible (DE) frames. In Frame-relay, as part of the
Congestion-Control Mechanism, the DE bit works in conjunction with which of the following mechanisms?

A. Differentiated Services Code Point (DSCP) settings


B. Frame-relay Traffic Shaping (FRTS) settings
C. Class-to-Service (CoS) settings
D. Type-of-service (ToS) settings
E. Forward Explicit Congestion Notification (FECN) of Backward Explicit Congestion Notification (BECN)
settings

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 2
Which parameter will not be received from the root bridge by a non-root bridge running 802.1D STP?

A. Forward delay
B. Hello time
C. Root cost
D. Hold time
E. Max Age

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 3
Which of the following are used in Ethernet networks?

A. 802.5 encapsulated frames


B. 802.3 encapsulated frames
C. CSMA/CD for media access
D. Non Canonical format MAC addresses
E. Canonical format MAC addresses

Correct Answer: BCE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 4
Which of the following statements is true about the port mirroring on Huawei devices?

002591BC9A38C8BBCFC618EE290DAB95
A. Huawei devices support port mirroring on the control traffic sent to the CPU
B. Huawei devices support flow-based port mirroring. The mirrored traffic can be copied onto multiple
observing ports
C. Traffic in the RSPAN is transmitted to observing ports in multicast mode
D. When the observing port becomes congested, mirrored packets cannot be discarded because these
packets have higher priority than service traffic

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 5
If a Gigabit Ethernet port receive buffer becomes full on a LAN switch, what protocol can be used to request
that the remote port delay sending frames for a specified time?

A. 802.3AF
B. 802.1D
C. 802.3
D. 802.3X
E. 802.1U

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 6
When receives or transmits data frames on an access port, what will the switch do?

A. Switch will send tagged frames belong to a specified vlan


B. When received a tagged frame from an access port. Switch may forward it vlan
C. Switch will learn the MAC-address only on access port
D. Switch only receives untagged frames from access port and drop all tagged frames

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 7
Spanning Tree Protocol calculates path cost based on which of the following?

A. Interface bandwidth
B. Interface delay
C. Hop count
D. Interface bandwidth and delay
E. Bridge priority

002591BC9A38C8BBCFC618EE290DAB95
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 8
On router HW1, you want to view the status of a frame relay connection. Which “display” commands will show
the status of a Frame-Relay PVC?

A. display frame relay interface


B. display frame relay pvc
C. display fr lmi-info
D. display fr map-info interface Serial 0/0/0
E. display fr interface Serial 0/0/0
F. display fr inarp-info

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 9
HW has a Frame Relay network with two sites (a headquarters site and a remote site) connected by a single
PVC. RIP version 2 is running in the network. A new remote site is added and HW has ordered a second PVC
between this site and the headquarters site. All Frame Relay interface IP addresses are in a single subnet. The
customer configured Frame Relay DLCI mappings and can successfully ping from the new remote to the
headquarters site as well as to the other remote site. However, the new router does not have a route in its route
table to the other remote site’s LAN, and cannot ping the LAN interface or any hosts on that LAN. What is most
likely causing the problem?

A. Triggered updates should be configured on the headquarters router, to directly forward routing updates
between the two remote sites
B. The headquarters site router has split-horizon enabled on the frame-relay interface
C. Neighbor statements are not configured on the two remote sites, pointing to all other sites
D. The frame-relay IP to DLCI mappings are incorrectly configured
E. RIP cannot propagate routing updates over a partial mesh frame-relay configuration, so another routing
protocol should be selected

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 10

002591BC9A38C8BBCFC618EE290DAB95
Based on the preceding networking and configurations, which of the following statements is true?

A. Route flapping occurs


B. RTB and RTC cannot establish a neighbor relationship
C. RTA and RTB cannot establish a neighbor relationship

002591BC9A38C8BBCFC618EE290DAB95
D. A neighbor relationship can be established; all network segments are reachable

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 11
When a router is building a routing table from different routing protocols, which of the following will determine
the routes to be installed in the routing table?

A. The fastest routing process


B. uniqueness
C. Higher preference value
D. The route with the largest next-hop address
E. Low Router ID

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 12
Which of the following statements are NOT true regarding the TCP sliding window protocol? (Choose all that
apply.)

A. The initial window offer is advertised by the sender


B. If the retransmission timer expires without the sender receiving an ACK message, the receiver retransmits
the packet to the sender.
C. The size of the sliding window can only increase or stay the same
D. It allows the transmission of multiple frames before waiting for an acknowledgment
E. The receiver is required to acknowledge the data packets transmitted by the sender
F. The sender need not transmit a full window’s worth of data

Correct Answer: ABEF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 13
Routers R1 and R2 are configured for BGP. Both routers are in AS 65234. Routes from Router R2 are in the
BGP table on Router R1, but not in the IP routing table. What could be the cause of this problem?

A. Synchronization is off
B. BGP multi-hop is disabled on Router R1
C. The next-hop of these routes can not reach by router R1
D. The BGP peers are down

Correct Answer: C

002591BC9A38C8BBCFC618EE290DAB95
Section: (none)
Explanation

Explanation/Reference:

QUESTION 14
What is the destination IP address of routing update packets sent by RIPv2?

A. 255.255.255.255
B. 224.0.0.1
C. 224.0.0.5
D. 224.0.0.9
E. 224.0.0.10

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 15
The LS Sequence Number field is used to detect expired and duplicate LSAs. This field is a signed 32-bit
integer and therefore the minimum LS Sequence Number is 0x800000000.

A. FALSE
B. TRUE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 16
Which types of prefixes will a router running BGP most likely advertise to an IBGP peer, assuming it is not
configured as a route reflector?

A. Prefixes received from EBGP peers and prefixes received from route reflectors
B. All prefixes in its routing table
C. Prefixes received from EBGP peers and prefixes locally originated via network statements or imported
D. Prefixes received from other IBGP peers, prefixes received from EBGP peers, and prefixes imported to
BGP
E. Prefixes received from other IBGP peers and prefixes received from router reflectors
F. Prefixes received from any other BGP peer and prefixes locally originated via network statements or
imported

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 17
In a data communication session between two hosts, the session layer in the OSI model generally
communicates with what other layer of the OSI model?

A. The physical layer of the peer


B. The peer’s presentation layer
C. The peer’s session layer
D. The peer’s application layer
E. The data link layer of the peer

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 18
If a router receives a BGP route carrying the no-export community attribute, which of the following actions does
the router take?

A. Does not advertise the route to other BGP routers


B. Discards the route directly
C. Advertises the route to IBGP peers only
D. Advertises the route normally, but does not use it to forward data

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 19
As shown in the following figure, the neighbor relationship between R1 and R2 has just been established.
Which of the following statements is true about the database synchronization process between R1 and R2?

002591BC9A38C8BBCFC618EE290DAB95
A. The packet sent from R1 and R2 is a PSNP packet
B. The packet sent from R1 and R2 is a Hello packet
C. The packet sent from R1 and R2 is a CSNP packet
D. The packet sent from R1 and R2 is a LSP packet

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 20
Which of the following are key differences between RIP version 1 and RIP version 2?

A. RIP version 2 uses multicasts while RIP version 1 does not


B. RIP version 1 supports authentication while RIP version 2 does not
C. RIP version 1 does not support VLSM while RIP version 2 does
D. RIP version 1 is distance vector while RIP version 2 is not
E. RIP version 1 uses hop counts as the metric while RIP version 2 uses bandwidth information

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 21
Which of following statements is true about IS-IS LDP synchronization?

A. LDP establishes a neighbor relationship faster than IS-IS, so LDP synchronization is disabled by default
B. LDP synchronization can prevent traffic loss during an active/standby link switchover
C. LDP synchronization can be enabled globally

002591BC9A38C8BBCFC618EE290DAB95
D. LDP synchronization can be configured on Loopback interfaces

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 22
When a router within the HW network makes a forwarding decision, the _____is always used to select the best
route from those installed in the routing table.

A. Routing process ID
B. Longest prefix match
C. Administrative Distance
D. Router ID
E. Peer ID

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 23
Which of the following are found in a basic Network Layer Packet?

A. Network Layer Header


B. Path records
C. Data Link Layer Header
D. Upper Layer Data
E. Network Layer Trailer

Correct Answer: ADE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 24
OSPF is running on a network. In OSPF, what LSA type would only cause an Incremental SPF calculation?

A. Type 3
B. Type 4
C. Type 1
D. Type 2
E. Type 5

Correct Answer: ABE


Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:

QUESTION 25
With regard to TCP headers, which control bit tells the receiver to reset the TCP connection?

A. SND
B. CLR
C. PSH
D. SYN
E. RST
F. ACK

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 26
Two routers configured to run BGP have been connected to a firewall, one on the inside interface and one on
the outside interface. BGP has been configured so the two routers should peer, including the correct BGP
session endpoint addresses and the correct BGP session hop-count limit (EBGP multihop). What is a good first
test to see if BGP will work across the firewall?

A. There is no way to make BGP work across a firewall without special configuration, so there is no simple test
that will show you if BGP will work, other than trying to start the peering session.
B. Attempt to Telnet from the router connected to the inside of the firewall to the router connected to the
outside of the firewall. If Telnet works, BGP will work, since telnet and BGP both use TCP to transport data
C. There is no way to make BGP work across a firewall
D. Ping from the router connected to the inside interface of the firewall to the router connected to the outside
interface of the firewall. If you can ping between them, BGP should work, since BGP uses IP to transport
packets.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 27
Which of the following can be used for BGP route selection?

A. DSCP
B. IP-PREFIX
C. ACL
D. AS-PATH-FILTER

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 28
Authentication can be configured in the IS-IS protocol to enhance IS-IS security. The IS-IS authentication
functions include interface authentication, area authentication, and routing domain authentication.

A. FALSE
B. TRUE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 29
Each DD packet has a DD sequence number for packet acknowledgment. A DD sequence number is two-bytes
long.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 30
You must configure a router for Policy Based Routing (PBR). PBR allows network administrators to implement
routing policies to allow or deny paths on which of the following?

A. Protocol
B. Identification of a particular end system
C. Application
D. Throughput
E. Size of packets

Correct Answer: ABCE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 31
An AS-path-filter uses the regular expression ^[0-9]+$ to indicate all as-path attributes.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:

QUESTION 32
Which of the following scenarios can an AS-path-filter be used for?

A. Apply clauses in a route-policy


B. Filtering the routes received from a BGP peer based on the as-path attributes of the routes, for example,
peer X.X.X.X as path-filter import
C. Filtering the routes sent to a BGP peer based on the as-path attributes of the routers, for example, peer
X.X.X.X as-path-filter export
D. If-match clauses in a route-policy

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 33
Which of the following statements are true about RIPng?

A. RIPng does not have an authentication mechanism


B. Each RIPng update packet contains a maximum of 25 routes
C. RIPng supports MD5 authentication
D. RIPng uses the link local address to send update packets
E. RIPng supports a maximum of 32 hops

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 34
An IPv6 device with the address of FC00::1 connects to the network and captures the following data packet.
What is function of the data packet?

A. There are multiple routers on the network segment. One router advertises router redirect messages to the
IPv6 device.
B. The router on this network segment tests the working status of the IPv6 device

002591BC9A38C8BBCFC618EE290DAB95
C. The IPv6 device implements self-loop tests
D. Another device on this network segment requests to resolve the Layer 2 address of the IPv6 device
E. The IPv6 device requests the address of the egress router
F. The IPv6 device checks address configuration of other devices on the network

Correct Answer: F
Section: (none)
Explanation

Explanation/Reference:

QUESTION 35
Which of the following are legal representations of the IPv6 prefix 12AB00000000CD30?

A. 12AB::CD3::/64
B. 12AB::CD30/64
C. 12AB::0000:0000:CD30:0000:0000:0000:0000/64
D. 12AB:0:0:CD3::/64
E. 12AB:0:0:CD3/64

Correct Answer: BC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 36
On a RIPng network, configure a router to advertise the default route to the entire network. Which of the
following configurations is correct?

A. [Huawei]ripng 1
[Huawei-ripng-1]import-route static cost 2
[Huawei-ripng-1]quit
[Huawei]ipv6 route-static :: 0 NULL0
B. [Huawei]ripng 1
[Huawei-ripng-1]import-route static cost 2
[Huawei-ripng-1]quit
[Huawei]ipv6 route-static :: 0 2001:19:9
C. [Huawei]ripng 1
[Huawei-ripng-1] ripng default-route originate
[Huawei-ripng-1]quit
D. [Huawei]interface GigabitEthernet0/0/1
[Huawei-GigabitEthernet0/0/1]ipv6 enable
[Huawei-GigabitEthernet0/0/1]ipv6 address 2001::12::1/64
[Huawei-GigabitEthernet0/0/1]ripng 1 enable
[Huawei-GigabitEthernet0/0/1]ripng default-route originate
[Huawei-GigabitEthernet0/0/1]quit

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 37
Which IPv6 header field has a function similar to that of the “Type of Service” field in an IPv4 header?

A. Flow Label
B. Traffic Class
C. Next Header
D. Version

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 38
Besides an IPv4 address, a router distinguisher (RD) also contains an identifier that distinguishes IP routes to
the same destination IP address in different VPNs. How many bits are there in the identifier?

A. 16
B. 64
C. 128
D. 32

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 39
Which of the following statements about penultimate hop popping are true?

A. It can only be used with LDP


B. It enables the Edge LSR to request a label pop operation from its upstream neighbors
C. It is only used when two or more labels are stacked
D. It is requested through LDP using a special label value that is also called the implicit-null value
E. It is used only for directly connected subnets or aggregate routes

Correct Answer: BDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 40
Based on the routing information exchange mode, MPLS VPNs are usually classified into two types. One is the
overlay VPN. What is the other type of MPLS VPN?

A. L3 VPN
B. Virtual Private Network
C. L2 VPN

002591BC9A38C8BBCFC618EE290DAB95
D. Peer-to-Peer VPN

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 41
What is the class D IP address range 239.0.0.0-239.255.255.255 used for?

A. It is a multicast address range used by routing protocols


B. Any legal multicast data flow and multicast application can use this address segment
C. Link-local multicast traffic mode up of network control messages meant to stay in the local subnet
D. It is a locally scoped multicast address and should only be used on local segments
E. It is an SSM multicast address range which is used on the entire network.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 42
Source Specific Multicast (SSM)is being used throughput the HW IP Multicast network. Which of the following
three statements about SSM are true? (Choose three.)

A. SSM uses Shortest-Path Trees Only


B. There are no RPs to worry about
C. SSM is best suited for applications that are of the Many-to-Many category
D. SSM uses shared Trees only
E. The use of SSM is recommended when there are many sources and it is desirable to keep the amount of
mroute state in the routers in the network to a minimum.
F. SSM is best suited for applications that are of one-to-many category

Correct Answer: ABF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 43
The default SSM group address range is 232.0.0.0/8. Which of the following configurations can be performed to
modify the SSM group address range?

A. Run the ssm-policy advanced-acl-number command in the system view to configure the SSM group
address range
B. Run the ssm-policy basic-acl-number command in the system view to configure the SSM group address
range
C. Run the ssm-policy advanced-acl-number command in the PIM view to configure the SSM group address
range
D. Run the ssm-policy basic-acl-number command in the PIM view to configure the SSM group address range

002591BC9A38C8BBCFC618EE290DAB95
Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 44
Which Multicast Protocols use Reverse Path Forwarding (RPF) information when sending multicast traffic
streams towards receivers within HW routers?

A. PIM Dense Mode


B. DVMRP
C. Multicast OSPF
D. PIM Sparse Mode

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

QUESTION 45
Routers HW1 and HW2 are IP Multicast routers. These routers use (S, G) entries for multicast packet
forwarding. Which of the following address types are used in the “S” entry?

A. The block of administratively scoped multicast addresses


B. Source Specific multicast addresses
C. SDP/SAP addresses
D. Any class A, Class B, or Class C host address
E. GLOP addresses

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 46
Which of the following are differences between PIM-SM and PIM-DM?

A. PIM-SM has RPTs and SPTs but PIM-DM has only RPTs
B. BSRs/RPs exist only on a PIM-SM network, not on a PIM-DM network
C. PIM-SM is applicable to a network with few receivers; PIM-DM is applicable to a network with a larger
number of receivers
D. Whether in PIM-SM or PIM-DM mode, receiver hosts must join multicast groups through IGMP

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 47
A (*,G) multicast entry is associated with which multicast type of feature within the HW IP multicast network?

A. Shared tree
B. Dense Mode
C. Source tree
D. Sparse Mode
E. Dense Tree
F. PIM bidirectional

Correct Answer: ADF


Section: (none)
Explanation

Explanation/Reference:

QUESTION 48
The HW network consists of Network A and B that are connected via Router HW1 and Router HW2. The HW
network is shown in the following exhibit. To set up an IPSec VPN between routers HW1 and HW2, which of
the following crypto access-lists must be configured on Router HW1 in order to send LAN to LAN traffic across
the encrypted VPN tunnel?

A. rule permit ip source 10.1.2.0 0.0.0.255 destination 10.1.1.0 0.0.0.255


B. rule permit ip source 10.1.1.0 0.0.0.255 destination 192.168.1.2 0
C. rule permit ip source 198.168.1.1 0 destination 192.168.1.2 0
D. rule permit ip source 10.1.1.0 0.0.0.255 destination 10.1.2.0 0.0.0.255
E. rule permit ip source 192.168.1.1 0 destination 10.1.2.0 0.0.0.255

Correct Answer: D
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:

QUESTION 49
To configure AAA, you need to define a RADIUS server. The RADIUS server is configured as follows:
[Huawei]radius-server template EXAM
[Huawei-radius-EXAM] radius-server shared-key cipher HUAwei123
[Huawei-radius-EXAM] radius-server authentication 10.7.66.66 1812
[Huawei-radius-EXAM] radius-server authorization 10.7.66.66 1812
[Huawei-radius-EXAM] radius-server accounting 10.7.66.66 1813
[Huawei-radius-EXAM] radius-server retransmit 2

A. FALSE
B. TRUE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 50
Which of the following lists, in the correct order, the protocols that use TCP ports 443, 179, 137, 110, and 23?

A. HTTPS, BGP, NetBios Name Server, POP3, Telnet


B. Finger, DHCP Server, NetBios Name Server, POP3, Telnet
C. BGP, POP3, SNMP, TFTP, Telnet
D. LDAP, SNMP, TFTP, POP3, Telnet
E. HTTPS, SNMP, POP3, DNS, Telnet

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 51
Switches use IPSG to verify the source address of IP packets. IPSG obtains the binding table by listening to the
address resolution process.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 52
Which of the following statements are false about Weighted Round Robin (WRR)?

002591BC9A38C8BBCFC618EE290DAB95
A. WRR is a congestion management technology
B. WRR prevents congestion on the network
C. WRR ensures important traffic being forwarded first
D. WRR ensures that all queues being serviced
E. WRR cannot be used on gigabit-ethernet interfaces

Correct Answer: BE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 53
Which of the following are functions of Random Early Discard (RED)?

A. Avoiding global synchronization for TCP traffic


B. Performs rate limiting on the specified data traffic
C. Ensuring that high priority traffic gets sent first
D. Preventing starvation in lower priority queues
E. Minimizing packet delay jitter

Correct Answer: AE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 54
Which of the following statements is false about the DSCP field?

A. When the DSCP value is EF, data is forwarded in expedited forwarding mode
B. CS in DSCP classifies data based on eight priorities
C. DSCP can represent the data priority as well as the packet drop probability
D. The DSCP value can be 0. When the value is 0, the default packet forwarding mechanism is used

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 55
You must ensure that mission critical traffic is prioritized in the HW network. The IP precedence of a packet can
be determined by which of the following?

A. The three most significant bits of the ToS byte


B. All 8 bits of the ToS byte
C. The three least significant bits of the ToS byte
D. Bit 4, 5, and 6 of the ToS byte

Correct Answer: A

002591BC9A38C8BBCFC618EE290DAB95
Section: (none)
Explanation

Explanation/Reference:

QUESTION 56
To improve delay and jitter on frame relay links, we can fragment and assemble the frame between multiple
PVCs. This is similar to what happens with PPP multilink.

A. FALSE
B. TRUE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 57
Which of the following statements are true?

A. SNMPv2c has privacy and uses usernames for authentication


B. SNMPv3 has privacy and uses community for authentication
C. SNMPv3 has privacy and uses usernames for authentication
D. SNMPv1 has no privacy and uses community for authentication
E. SNMPv2c has privacy and uses usernames for authentication

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 58
A new Syslog server is being installed in the HW network to accept network management information. What
characteristics apply to these Syslog messages?

A. Its transmission is acknowledgment


B. Its transmission is secure
C. Its transmission is not secure
D. Its transmission is not reliable
E. Its transmission is not acknowledged
F. Its transmission is reliable

Correct Answer: CDE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 59
Which of the following statements about VRRP load balancing are false?

002591BC9A38C8BBCFC618EE290DAB95
A. When configuring priorities, you must ensure that the same router server as the master router in three
VRRP backup groups
B. To implement load balancing, default network gateways of hosts on a LAN must be configured as IP
addresses of different virtual routers
C. Multiple VRRP backup groups can be created on an interface of a router. The router can serve as the
master router in on VRRP backup group and the backup router in other VRRP backup groups.
D. VRRP local balancing requires that at least two virtual routers transmit services at the same time.

Correct Answer: ABC


Section: (none)
Explanation

Explanation/Reference:

QUESTION 60
On a BGP/MPLS Ipv4 VPN, OSPF, LDP, and static routes are configured. Which of the following protocols
must be enabled with GR to achieve NSF on PEs?

A. Static routes
B. MPLS LDP
C. OSPF
D. BGP

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 61
SWA and SWB are connected through two physical Ethernet links. SWA has the following interface
configurations:

The two links are aggregated.


Assume that the configuration on SWB is correct. Given this information, which of the following statements are
true?

A. GigabitEthernet1/0/1 and GigabitEthernet1/0/1 can be added to the same LAG without changing the current
configurations.
B. After link aggregation is configured on SWA and SWB, if MSTP is enabled on them, GigabitEthernet1/0/1
and GigabitEthernet1/0/2 enter the Forwarding state in MSTP.
C. GigabitEthernet1/0/1 and GigabitEthernet1/0/2 can be added to the same LAG only after the configuration
of GigabitEthernet1/0/2 is changed to be the same as that of GigabitEthernet1/0/1.
D. GigabitEthernet1/0/1 and GigabitEthernet1/0/2 cannot be added to the same LAG because the allowed
VLANs are different.

002591BC9A38C8BBCFC618EE290DAB95
Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 62
Which of the following command outputs indicates that a loop has occurred on a switch?

A.

B.

C.

002591BC9A38C8BBCFC618EE290DAB95
D.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Reference: http://support.huawei.com/onlinetoolweb/ptmngsys/Web/tsrev_ce/en/content/ce/08_edesk_dc_mac-
address_flapping/edesk_dc_mac-address_flapping_edesk002.html

QUESTION 63
Which of the following statements regarding the process of sending and receiving data frames on a port in
access link-type is true?

A. Tagged data frames that are received are directly discarded.


B. Only untagged data frames are received.
C. VLAN tags are removed before data frames are sent.
D. A switch learns the destination MAC address in the data frames when they are received on the switch’s
port.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 64
How long will a Huawei running RSTP wait before aging out the BPDUs on an interface?

A. Hello time interval


B. 6 seconds
C. MaxAge interval
D. BPDUs on the interface will not be aged out
E. Forward delay

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000088827?section=j00h

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 65
Which of the following statements regarding LACP are true?

A. You can run the following commands to delete member interfaces from an Eth-Trunk:
interface GigabitEthernet0/0/1
shutdown
interface GigabitEthernet0/0/1
undo eth-trunk 1
interface GigabitEthernet0/0/1
undo shutdown
B. You can run the following commands to prevent frequent flapping due to physical link faults on an Eth-
Trunk:
interface eth-trunk 1
lacp preempt enable
lacp preempt delay delay-time
C. You can run the following commands to add member interfaces to an Eth-Trunk:
interface GigabitEthernet0/0/1
shutdown
interface eth-trunk 1

trunkport GigabitEthernet0/0/1
interface GigabitEthernet0/0/1
undo shutdown
D. You can run the following commands to enable load balancing based on source IP addresses for an Eth-
Trunk:
interface eth-trunk 1
load-balance src-dst-ip

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 66
Which of the following statements regarding PPPoE data frames are true?

A. The Ethernet_Type field has a fixed value of 0x8863.


B. The Session_ID field of a PPP session must be the value specified in the Discovery phase and cannot be
changed.
C. When PPPoE is used to transmit session data, Code must be set to 0x0.
D. After a PPPoE session is set up, all Ethernet packets are unicast.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 67
As shown in the figure below, R1 and R2 are connected through a PPP link, and the IP addresses on the
directly connected interfaces are not on the same network segment. R1 and R2 can communicate with each
other through the directly connected interfaces. However, communication on the Ethernet link fails if the IP
addresses on the directly connected interfaces are on the same network segment. What are the causes of this?

002591BC9A38C8BBCFC618EE290DAB95
A. The Ethernet header does not need to be encapsulated into data packets between R1 and R2 that are
directly connected through a POS interface, and ARP does not need be used to obtain MAC addresses.
B. R1 and R2 that are directly connected through a POS interface learn the MAC address of each other using
LCP, and ARP does not need to be used to obtain MAC addresses.
C. R1 and R2 that are directly connected through a POS interface learn the 24-bit subnet route of each other
through IPCP.
D. R1 and R2 that are directly connected through a POS interface learn the 32-bit host route of each other
through IPCP.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 68
Routes received from AS100 match the AS-Path filter configured using the ip as-path-filter 10 permit_100$
command.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 69
On a broadcast network, DIS election starts only after the neighbor relationship is established.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 70
Which of the following attributes cannot be directly referenced by the if-match clause of route-policies?

002591BC9A38C8BBCFC618EE290DAB95
A. Community-filter
B. IP-prefix
C. AS-Path-filter
D. Regular expression

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Reference: http://support.huawei.com/enterprise/pages/doc/subfile/docDetail1.jsp?
contentId=DOC1000027467&partNo=10152

QUESTION 71
The figure shows router data. Which of the following statements is false?

A. The system ID of R3 is 0003.0000.0000.


B. R3 is a level-1-2 router.
C. R3 is the DIS of a Level-1 link.
D. R3 is the DIS of a Level-2 link.

Correct Answer: C
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:

QUESTION 72
Which of the following configurations regarding OSPFv3 route aggregation are true?

A. [Huawei]ospfv3 1
[Huawei-ospfv3-1]asbr-summary fc00:0:0:: 48 cost 20 tag 100
B. [Huawei]ospfv3 1
[Huawei-ospfv3-1]abr-summary fc00:0:0:: 48 cost 400
C. [Huawei]ospfv3 1
[Huawei-ospfv3-1]area 1
[Huawei-ospfv3-1-area-0.0.0.1]abr-summary fc00:0:0:: 48 cost 400
D. [Huawei]ospfv3 1
[Huawei-ospfv3-1]area 1
[Huawei-ospfv3-1-area-0.0.0.1]asbr-summary fc00:0:0:: 48 cost 20 tag 100
E. [Huawei]interface gigabitethernet 1/0/0
[Huawei- Gigabitethernet1/0/0]asbr-summary fc00:0:0:: 48 cost 20

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000102430?section=k00a

QUESTION 73
On a Huawei device, when an external route is imported to IS-IS and the tag of the external route is set, the IS-
IS metric type does not need to be changed, and the default style is retained.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 74
As shown in the following topology, EBGP runs between AS100, AS200, AS300, and AS400, and peer
relationships have been established between them. When AS400 receives a BGP route to the network
segment 1.1.1.1/32 from AS100, which of the following is the correct value of the AS_Path attribute?

002591BC9A38C8BBCFC618EE290DAB95
A. 100,200,300,400
B. 300,200,100
C. 400,300,200,100
D. 100,200,300

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 75
If no area is divided, which of the following statements regarding the link-state routing protocol are true?

A. Routers in the same routing domain may repeatedly receive the same link state information.
B. Routers in the entire routing domain have the same LSDB.
C. Each router establishes a routing domain topology.
D. Each router learns routing entries from updated routing information and adds them to the routing table.
E. The router sends all link state information from a neighbor to all other neighbors to ensure data
synchronization in the database.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 76
A route selection tool can define multiple entries. Which of the following tools will automatically generate a
deny-any entry at the end of the configuration?

A. Route policy
B. IP-prefix
C. Community-filter
D. AS-Path-filter

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 77
The figure shows the topology and configuration. Which of the following methods can be used to exclude the
specific route 10.0.3.3/32 from the routing table of R1?

002591BC9A38C8BBCFC618EE290DAB95
A. On R2, configure a filter-policy, use the ACL applied to the filter-policy to match 10.0.3.3/32, and apply the
filter-policy to the export direction.
B. Configure route summarization on R2 and summarize routes as 10.0.0.0/16.
C. On R1, configure a filter-policy, use the ACL applied to the filter-policy to match 10.0.3.3/32, and apply the
filter-policy to the import direction.
D. Configure route summarization on R3 and summarize routes as 10.0.0.0/16.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 78
If the Option field in the OSPFv3 Hello packet sent from GigabitEthernet0/0/0 of router A is 0x000013, which of
the following statements are true?

A. GigabitEthernet0/0/0 of router A belongs to an NSSA.


B. GigabitEthernet0/0/0 of router A participates in IPv6 route calculation.

002591BC9A38C8BBCFC618EE290DAB95
C. Router A supports flooding of AS-external-LSAs.
D. Router A is an OSPFv3 device enabled with the forwarding capability.

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 79

As shown in the following figure, R1, R2, and R3 run OSPF and advertise their loopback interface addresses
into OSPF. Which of the following statements is false?

A. The filter import command can be executed on R2 in Area 0 to filter loopback interface routes of R3.
B. The filter-policy import command can be executed on R1 to filter loopback interface routes of R3.
C. The filter export command can be executed on R2 in Area 1 to filter loopback interface routes of R3.
D. The filter-policy export command can be executed on R2 to filter loopback interface routes of R3.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 80
After IS-IS area authentication is configured, which of the following IS-IS packets will carry authentication
information?

A. IS-IS Level-1 SNPs and LSPs


B. IS-IS Level-1 Hello PDUs
C. IS-IS Level-2 Hello PDUs
D. IS-IS Level-2 SNPs and LSPs

Correct Answer: A
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:
Reference: https://support.huawei.com/enterprise/mx/doc/EDOC1100027150?section=j03h&topicName=is-is-
authentication

QUESTION 81
Which of the following statements regarding Filter-policy is true?

A. An IP-prefix list can be used to filter routes or filter traffic.


B. Filter-policy can be used on an ASBR in OSPF to filter Type 5 and Type 7 LSAs.
C. Filter-policy can filter received or advertised link state information, and route attributes can be modified.
D. Only the default routes match the IP prefix list configured using the ip- ip-prefix 1 deny 0.0.0.0 less-equal 32
command.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 82
Which of the following AS-_Path attribute values can be matched by the AS-Path filter configured using ip as-
path filter 1 permit .*(100|400$command?

A. 100
B. 3100
C. 300 4200
D. 1234 1400

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 83
Which of the following statements regarding the stub area and NSSA in OSPF is false?

A. The Type 5 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.
B. The Type 3 LSA can be flooded to a stub area and an NSSA.
C. The Type 4 LSA cannot be flooded to a stub area and an NSSA.
D. The Type 7 LSA cannot be flooded to a stub area, but can be flooded to an NSSA.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 84
After the shutdown command is run on one of two directly connected devices that establish an IBGP peer
relationship, the BGP connection will not be torn down immediately.

002591BC9A38C8BBCFC618EE290DAB95
A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 85
Type 5 LSAs in OSPF are used to transmit external routes. Which of the following statements regarding Type 5
LSAs is false?

A. Type 5 LSAs are advertised by ASBRs and flooded on OSPF networks except stub areas and NSSAs.
B. Filtering policies can be configured on ABRs or ASBRs to filter Type 5 LSAs.
C. A Type 5 LSA contains the FA address, which is 0.0.0.0. The FA address is reserved only and does not
take effect.
D. Routers in the same area as the ASBR can calculate external routes through intra-area LSAs and Type 5
LSAs.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 86
Which of the following statements regarding the stub area in OSPF are true?

A. A virtual link cannot pass through a stub area.


B. A backbone area cannot be configured as a stub area.
C. Type 7 LSAs cannot be flooded to a stub area.
D. A stub area contains no ASBR.

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/de/doc/EDOC1000141870/4c544c36/example-for-
configuring-an-ospf-stub-area

QUESTION 87
Which of the following statements regarding BGP confederations is false?

A. By default, sub-AS numbers of a confederation are advertised to BGP peers outside the confederation.
B. A BGP confederation divided an AS into several sub-ASs. ASs outside a confederation still consider the
confederation as an AS.
C. Confederations can easily detect routing loops inside an AS because EBGP is run between sub-AS’s.
D. Sub-ASs within a BGP confederation can use private AS numbers. For Huawei NE and AR routers, a
maximum of 32 sub-ASs can be configured in a BGP confederation.

Correct Answer: A

002591BC9A38C8BBCFC618EE290DAB95
Section: (none)
Explanation

Explanation/Reference:

QUESTION 88
Which layers are shared in the OSI reference model and TCP/IP model?

A. Presentation layer
B. Application layer
C. Transport layer
D. Session layer
E. Data link layer

Correct Answer: BCE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 89
In an existing OSPF network, which types of LSAs cause the SPF calculation?

A. Type 1 LSA
B. Type 3 LSA
C. Type 4 LSA
D. Type 2 LSA
E. Type 5 LSA

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 90
Which of the following statements regarding IS-IS route leaking are true?

A. IS-IS route leaking can be configured in IPv6 environments.


B. In IS-IS route leaking, the routes to be leaked cannot be summary routes.
C. IS-IS route leaking will not cause neighbor flapping.
D. IS-IS route is used to prevent route loops.
E. IS-IS route leaking can be configured on Level-1 routers.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 91

002591BC9A38C8BBCFC618EE290DAB95
Which of the following statements regarding IS-IS LSP fragment extension is true?

A. LSP fragment extension enables an IS-IS router to generate multiple LSP fragments to carry more IS-IS
information.
B. An IS-IS router can generate a maximum of 1024 LSP fragments.
C. LSP fragment extension is implemented by adding virtual systems, with a maximum of 1000 virtual systems
supported.
D. LSP fragment extension is also valid for Hello PDUs.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 92
Which of the following statements regarding IS-IS route summarization is true?

A. Route summarization can be configured and takes effect on all types of routers.
B. Route summarization takes effect only on Level-2 routers.
C. Route summarization takes effect only on Level-1 routers.
D. Route summarization takes effect only on Level-1-2 routers.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1100069334/8552081d/configuring-is-is-route-
summarization

QUESTION 93
Which of the following statements is true according to the topology shown?

002591BC9A38C8BBCFC618EE290DAB95
A. Routing entries 10.0.3.3/32 and 10.0.0.0/16 exist in the IP routing table of R1.
B. Routing entries 10.0.2.2/32 and 10.0.3.3/32 exist in the IP routing table of R1.
C. Because routing summarization is configured on R2, only the routing entry 10.0.0.0/16 exists in the IP
routing table of R1.
D. Routing entries 10.0.2.2/16 and 10.0.0.0/16 exist in the IP routing table of R1.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 94
Which of the following statements regarding BGP attributes is true?

A. A route can have only one value for the Community attribute.
B. The number of the neighboring AS is displayed to the right of the AS_path list of a BGP routing entry.
C. The Local_Pref attribute is exchanged only between EBGP peers and is not advertised other ASs.
D. When advertising a route learned from an EBGP peer to an IBGP peer, the BGP speaker does not change
the Next_Hop attribute of the route.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 95
Many transition technologies have been adopted to replace IPv4 addresses on networks with IPv6 addresses.
These technologies are categorized into IPv4/IPv6 coexistence technologies and IPv4/IPv6 interoperability

002591BC9A38C8BBCFC618EE290DAB95
technologies. Which of the following technologies are considered to be IPv4/IPv6 coexistence technologies?

A. NAT64
B. ISATAP
C. IPv6 over IPv4
D. Dual Stack

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 96
Does the following figure correctly show the process of obtaining the link-layer address using NDP?

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 97

002591BC9A38C8BBCFC618EE290DAB95
You are assigned the task of compressing an IPv6 address as much as possible. If the original IPv6 address is
2013:0000:130F:0000:0000:09C0:876A:130B, which of the following is the IPv6 address in its compressed
format?

A. 213::13F::9C0:876A:13B
B. 2013::130F::09C0:876A:130B
C. 2013:130F:0:0:9C0:876A:130B
D. 2013:0:130F:0:0:09C0:876A:130B
E. 2013:0:130F::09C0:876A:130B

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 98
Which of the following statements regarding the packet processing method in the MPLS network model are
false?

A. The device discards IP packets that enter the MPLS domain.


B. An LSR does not remove any label.
C. A Label Switched Path (LSP) is determined and established through various protocols during the packet
forwarding process.
D. Both LERs and LSRs distribute labels.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 99
On an intra-AS MPLS BGP VPN, data packets are encapsulated with two MPLS labels before being sent to the
public network. Which of the following statements regarding the labels is false?

A. By default, a router assigns the same label value to all VPNv4 routes destined for the remote PE.
B. The egress PE uses the inner label to determine the egress CE which packets are sent.
C. Two labels are used on an MPLS BGP VPN: public network label (outer label) and VPN label (inner label).
D. VPN labels are distributed by MP-BGP when routing information is transmitted. Public network labels are
distributed by LDP.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 100
As shown in the figure below, an enterprise wants to implement secure access between the headquarters and
branches through MPLS VPN. VPN traffic of branches must be forwarded through the headquarters for traffic
monitoring. Which of the following statements regarding this solution is false?

002591BC9A38C8BBCFC618EE290DAB95
A. When the Hub-CE and Hub-PE use EBGP to transmit routing information, the Hub-PE must be able to
accept routes with the AS number repeated once so that routes advertised by the Hub-CE can be received.
B. OSPF can be used to exchange routing information between Hub-CEs and Hub-Pes as well as between
Spoke-Pes and Spoke-CEs.
C. BGP can be used to exchange VPN routing information between CEs and Pes.
D. The MP-IBGP peer relationship can be established between Spoke-Pes to exchange VPN routing
information.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 101
Which of the following statements regarding the inter-AS MPLS VPN are false?

002591BC9A38C8BBCFC618EE290DAB95
A. In inter-AS VPN Option B mode, an MP-EBGP peer relationship needs to be established between two
ASBRS.
B. In inter-AS VPN Option B mode, two ASBR-Pes are interconnected through multiple interfaces (including
sub-interfaces), each interface is associated with one VPN, and each ASBR-PE considers the remote
device as a CE.
C. In inter-AS VPN Option A mode, the routes advertised between two ASBRs are common IPv4 routes.
D. In inter-AS VPN Option C solution 2, if only LDP is used to advertise public network labels, three labels
need to be used during packet forwarding.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 102
Which of the following statements regarding LDP reliability is false?

A. By default, the policy for manually configuring LDP FRR specifies that backup routes with 32-bit addresses
should trigger the setup of a backup LDP LSP.
B. Synchronization between LDP and IGP requires suppression of IGP route advertisement to achieve
consistent LDP and IGP.
C. LDP FRR can generate an LSP as the backup of the primary LSP based on Label Mapping messages that
are not from the optimal next hop. LDP FRR establishes forwarding entries for the backup LSP.
D. LDP Graceful Restart (GR) leverages the separation of the forwarding plane and control plane by MPLS to
ensure uninterrupted traffic transmission during a protocol restart or active/standby switchover.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 103
The display mpls lsp command is run on a router to check LSP information. The command output is as follows:

Which of the following statements is true?

002591BC9A38C8BBCFC618EE290DAB95
A. When sending a data packet with the destination IP address 4.4.4.4, the router sends it directly without any
label added.
B. After receiving a data packet with label 1024, the router changes the label to label 1027 and then sends the
packet.
C. When sending a data packet with the destination IP address 2.2.2.2, the router sends it directly without any
label added.
D. When sending a data packet with the destination IP address 3.3.3.3, the router adds label 1026 to the
packet before sending it.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 104
If PIM-SM is enabled on a multicast network, only after multicast tress are established between the multicast
source and receivers, the receiver can receive multicast data. Which of the following statements regarding the
trees are true?

A. An RPT is established between the RP and receivers.


B. An SPT is established between the RP and receivers.
C. An SPT is established between the multicast source and RP.
D. An RPT is established between the multicast source and RP.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:

QUESTION 105
SSM is enabled on the entire IP multicast network. Which of the following statements regarding SSM are true?

A. No RP is required.
B. Only the RTP is used for SSM.
C. SSM is recommended when multiple sources are available on the network and the multicast route is simple.
D. SSM is applicable to one-to-many applications.
E. Only the SPT is used for SSM.

Correct Answer: AD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 106
What advantages does IGMPv2 have over IGMPv1?

A. The Source-Specific Query message is added.


B. The Group-Specific Query message is added.

002591BC9A38C8BBCFC618EE290DAB95
C. The Leave message is added.
D. The maximum response time field is added.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 107
Which of the following operations can implement fast fault detection on a multicast network?

A. Shorten the holdtime of Join or Prune messages.


B. Shorten the interval for sending Join or Prune messages.
C. Shorten the interval of PIM Hello messages.
D. Set up BFD for PM sessions between PIM SM neighbors.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 108
Which of the following attacks are DoS (Denial of service) attacks?

A. Single-packet attacks
B. Flood attacks
C. Man-in-the-middle attacks
D. Source IP address spoofing attacks.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 109
A Local Area Network Denial (LAND) attacker sends a SYN packet in which the source and destination
addresses are the same as the target host’s address and the source port is the same as the destination port.
While the receiver waits for the final ACK packet from the sender, the connection is in half-connected mode,
which wastes limited TCP resources at the receive end.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 110
Which of the following is not included in a digital certificate?

A. Digital envelope
B. Issuer
C. Public key information
D. Digital signature

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 111
Which of the following are single-packet attacks?

A. Malformed packet attacks


B. Special control packet attacks
C. Scanning and snooping attacks
D. DDoS attacks

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 112
A bookstore provides a wired network for customers to learn online. However, some users are suddenly unable
to access the network. After troubleshooting, it is found that all the IP addresses in the DHCP address pool
have been used up. Which of the following is the best way to solve the problem?

A. Configure static ARP binding entries


B. Configure IPSG
C. Configure DAI
D. Limit the maximum number of DCHP snooping binding entries that can be learned on an interface.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 113
Assume that the traffic shaping rate is set to 100 Mbit/s on an interface and that the input bandwidth and PIR of
each service are configured as shown in the table below.

What is the bandwidth allocated to the EF queue after the first round of scheduling?

002591BC9A38C8BBCFC618EE290DAB95
A. 30 Mbit/s
B. 90 Mbit/s
C. 25 Mbit/s
D. 15 Mbit/s

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 114
The network administrator defines a traffic policy as follows:

The router port to which the traffic policy is applied has been idle for about 10 seconds. In this case, if there is
suddenly a large amount of c1 burst traffic, what is the number of bytes in the green packets?

A. 32 Kbytes
B. 256 Kbytes
C. 80128 Kbytes
D. 48128 Kbytes

002591BC9A38C8BBCFC618EE290DAB95
Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 115
Which of the following type of SNMP messages sent to the NMS is reliable?

A. Get
B. GetBulk
C. Trap
D. Inform
E. Response

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 116
Assume that BGP/MPLS IPv4 VPN configured with OSPF, LDP, and static routing has been deployed on a PE
router. To enable the NSF function, which of the following protocols need to be configured to enable the GR
function on the PE router?

A. OSPF
B. MPLS LDP
C. BGP
D. Static routing

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 117
The VRRP priority cannot be set to 0, so the device that sends a VRRP packet with priority 0 stops participating
in the VRRP group and notifies the backup device to become the master device right away, without waiting for
the Master_Down_Interval timer to expire?

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000088755?section=j006

QUESTION 118

002591BC9A38C8BBCFC618EE290DAB95
Which of the following functions cannot be implemented using the EVPN Type2 route?

A. Host MAC address advertisement


B. Host ARP advertisement
C. Host IP route advertisement
D. BUM packet forwarding

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 119
Which of the following statements regarding the VXLAN gateway is false?

A. VXLAN Layer 3 gateways can be classified into centralized and distributed gateways.
B. VXLAN Layer 3 gateways allow their inter-subnet VXLAN communication and access to external networks.
C. VXLAN Layer 2 gateways are bound to VPN instances.
D. VXLAN Layer 2 gateways enable tenants to access VXLAN and are used for communication between
subnets on the same VXLAN.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/it/doc/EDOC1000180270/f334b5b3/gateway-classification

QUESTION 120
Subnets of one subnet is as follows: RT=10:10 both and TR=1000:1000 export in the EVPN instance and
RT=100:100 in the VPN instance. Which of the following configurations can be made for another subnet?

A. 1000:1000 both in the EVPN instance


B. 1000:1000 both evpn in the VPN instance
C. 10:10 both in the VPN instance
D. 1000:1000 export in the EVPN instance

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 121
A VXLAN tunnel can be established between two VTEPs and shared by all VXLAN Network Identifiers (VNIs)
between two NVE nodes.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)

002591BC9A38C8BBCFC618EE290DAB95
Explanation

Explanation/Reference:

QUESTION 122
Which of the following statements regarding the IPv6 over VXLAN network is false?

A. The IPv6 over VXLAN network indicates that the VXLAN overlay network is an IPv6 network.
B. The IPv6 Over VXLAN network does not generate ND entries.
C. Tunnels between Layer 2 and Layer 3 VXLAN gateways are deployed on an IPv4 network.
D. The IPv6 over VXLAN network enables tenants to have sufficient IP address resources.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 123
A Bridge Domain (BD) in a VXLAN can map to multiple VNIs.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 124
Which of the following statements regarding the BFD one-arm-Echo function are true? (Choose two.)

A. Local and remote discriminators must be configured for this function.


B. After this function is enabled, the destination and source IP addresses of BFD packets are the same.
C. This function is applicable when one device supports BFD and the other device does not.
D. The default destination IP address of a BFD packet is 224.0.0.184.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 125
Router HW1 functions as an MPLS LSR router on the carrier’s network. The router receives a labelled packet,
but the label entry does not exist in the router’s LFIB. Given this information, how will the router process the
packet?

A. Router HW1 discards the packet.


B. Router HW1 uses the default label to forward the packet.
C. Router HW1 removes the label, searches the FIB, and uses the destination IP address to forward the

002591BC9A38C8BBCFC618EE290DAB95
packet.
D. Router HW1 uses LDP to create an LSP and creates a path in its LFIB for the label carried in the packet.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 126
Which of the following statements regarding the basic MPLS forwarding process is false?

A. When an IP packet enters an MPLS domain, the device checks whether the tunnel ID corresponding to the
destination IP address of the packet is 0x0. If so, the MPLS forwarding process starts.
B. By default, the egress node supporting PHP allocates the label with the value of 3 to the penultimate hop.
C. A transit node replaces a label on the top of the label stack in an MPLS packet with the label assigned by
the next hop.
D. When an IP packet enters an MPL5 domain, the MPLS edge device inserts a new label between the Layer
2 header and the IP header of the packet.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 127
In which of the following scenarios will gratuitous ARP packets be sent?

A. A host connected to the switch sends a ping packet.


B. The DHCP client receives an acknowledgment message from the server
C. A new host with an IP address is connected to the network.
D. The master and backup devices are elected in VRRP.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 128
What is the function of Route Target (RT) on an MPLS VPN?

A. Allows the remote PE to determine which VPNv4 routes should not be imported to a specific VRF instance.
B. Allows the remote CE to determine which VPNv4 routes be imported to a specific VRF instance.
C. Allows the remote PE to determine which VPNv4 routes be imported to a specific VPN routing and
forwarding (VRF) instance.
D. Allows the remote CE to determine which VPNv4 routes should not be imported to a specific VRF instance.

Correct Answer: C
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:

QUESTION 129
The function of the Hop Limit field in an IPv6 basic header is similar to the function of which field in an IPv4
header?

A. Protocol
B. Time to Live
C. Flags
D. Identification

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 130
On the network shown in the figure below, SW1, SW2 and SW3 are deployed. SW1 is the root bridge, link
congestion occurs between SW1 and SW2, and SW2 cannot receive configuration BPDUs sent by the root
bridge. Given this information, which of the following spanning tree protection mechanisms needs to be
configured to prevent problems caused by link congestion?

A. Defense against TC BPDU attacks


B. Root protection
C. BPDU protection
D. Loop protection

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 131
Which of the following statements regarding OSPF route filtering is false?

A. The filtering of Type 3 LSAs needs to be configured on ABRs in OSPF.

002591BC9A38C8BBCFC618EE290DAB95
B. In a NSSA, when external routes are imported to the OSPF router and LSAs are advertised to its neighbors,
LSA filtering can be performed on the ASBR or ABR.
C. All LSAs, except Grace LSAs, can be filtered based on interfaces in the inbound and outbound directions.
D. When routes are calculated based on the LSDB, the filter-policy import command can be executed to filter
routes. This filtering mode affects only the addition of routes in the routing table, and has no impact on the
OSPF LSDB.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 132
Which messages are sent to the agent by the network management station (NMS) running SNMPv1?

A. Trap, Get, and Set messages


B. Only Trap messages
C. Get, Set, and GetNext messages
D. Get, Set, and GetBulk messages
E. Get, Set, and GetNext, and GetBulk messages

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 133
What are the differences between traffic policing and traffic shaping?

A. For traffic shaping, you can adjust the usage of the buffer for the traffic that exceeds the CIR.
B. For traffic policing, you can adjust the usage of the buffer for the traffic that exceeds the CIR.
C. For traffic shaping, the router buffers excess packets until the bandwidth is available again.
D. Traffic policing uses the token bucket algorithm and traffic shaping uses the SPD algorithm.
E. Traffic shaping is applied in the inbound direction and traffic policing is applied in the outbound direction.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 134
Which of the following statements regarding URPF, IPSG, and DAI are false?

A. IPSG checks the source IP addresses and source MAC addresses of IP packets, and DAI checks only the
mapping between IP addresses and MAC addresses.
B. DAI binding entries cannot be manually configured.
C. URPF can be used to defend against DDoS attacks from forged sources.
D. IPSG checks IP packets to defend against attacks using spoofed source IP addresses, and DAI checks
ARP packets to filter out attack sources.

002591BC9A38C8BBCFC618EE290DAB95
Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 135
By default, WRED is configured on a newly deployed Huawei router. Which of following statements regarding
WRED are true?

A. When traffic exceeds the minimum threshold, WRED starts to discard all inbound traffic (tail drop).
B. Traffic with low bandwidth is more likely to be discarded than traffic with high bandwidth.
C. WRED selectively discards multiple TCP flows to avoid global synchronization.
D. WRED can be used to set different drop thresholds and packet loss rations for data packets with different
priorities.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 136
Which of the following statements regarding RADIUS are true?

A. Authentication, authorization, and accounting are separated in RADIUS protocol.


B. RADIUS authentication, and Portal authentication cannot be used together because users can be
authenticated using the Portal server when Portal authentication is enabled.
C. MAC address authentication does not require a user name and password. Therefore, users cannot be
authenticated through RADIUS when using MAC address authentication.
D. RADIUS supports user access in wired and wireless modes.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 137
Router HW1 and Router HW2 are connected to Network A and Network B respectively. Referring to the figure,
if you want to set up an IPsec VPN tunnel between HW1 and HW2, which of the following ACL rules needs to
be configured on HW1 to transmit the traffic across networks A and B pass through the encrypted VPN tunnel?

002591BC9A38C8BBCFC618EE290DAB95
A. rule permit ip source 10.1.2.0.0.0.0.255 destination 10.1.1.0.0.0.0.255
B. rule permit ip source 10.1.1.0.0.0.0.255 destination 10.1.2.0.0.0.0.255
C. rule permit ip source 10.1.1.0.0.0.0.255 destination 192.168.1.2.0
D. rule permit ip source 192.168.1.1.0 destination 10.1.2.0.0.0.0.255
E. rule permit ip source 192.168.1.1.0 destination 192.168.1.2.0

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 138
The HTTP protocol is based on TCP. Therefore, TCP flood attacks and HTTP flood attacks are defended
against in the same way.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 139
A DR needs to be elected from a set of candidate PIM-SM routers for multicast data forwarding on the source
side or the receiver side. Which of the following statements regarding DR election rules is true?

A. The PIM-SM router with the lowest DR priority is elected as the DR.
B. The PIM-SM router with the smallest IP address is elected as the DR.
C. The PIM-SM router with the longest interface mask is elected as the DR.
D. DR priorities of the PIM-SM routers are compared first. If their DR priorities are the same, their interface IP
addresses are then compared.

Correct Answer: D
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:

QUESTION 140
If PIM-SM is enabled on a multicast network, an RP needs to be configured. The RP can be configured as a
dynamic or static RP. Which of the following statements regarding RP configuration is true?

A. No BSR needs to be configured when a dynamic RP is configured.


B. When a static RP is configured, you need to configure a BSR that advertises RP information.
C. The BSR needs to be configured as the RP backup when a dynamic RP is configured.
D. RP information needs to be specified on all PIM routers when a static RP is configured.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 141
If host HW1 on the network wants to join a video conference, what will the host do?

A. The host multicasts an IGMPv2 Membership Report message that carries the expected multicast address
to the local network.
B. The host multicasts an IGMPv2 Membership Report message with the multicast address for all PIM routers
(224.0.0.2) to the local network.
C. The host unicasts an IGMPv2 Membership Report message to the default router on the local network.
D. The host unicasts an IGMPv2 Membership Report message to the RP.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 142
Which of the following statements correctly describes the corresponding MPLS TTL processing mode?

A. On an MPLS VPN, if the structure of the MPLS backbone network needs to be shielded, the Uniform mode
is recommended for VPN packets.
B. In Uniform mode, when IP packets enter an MPLS network, the ingress node decrements the IP TTL by one
and the MPLS TTL field has a fixed value.
C. The TTL field in an MPLS label serves the same function as that in an IP packet header. That is, the TTL is
used to prevent loops on an MPLS network.
D. In Pipe mode, when IP packets enter an MPLS network, the ingress node decrements the IP TTL by one
and copies this new value to the MPLS TTL field.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 143
Which of the following statements regarding CE dual-homing features is false?

A. The VRFs of two PEs connected to the same CE can belong to different VPNs.
B. In the CE dual-homing networking, loops may occur. You can use route-tag resolve this issue.
C. A CE dual-homing network where a CE is connected to two PEs ensure high network reliability.
D. A CE connects to the backbone network through two links that work in load balancing or primary/secondary
mode.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000178425/455e0daa/example-for-
configuring-ce-dual-homing

QUESTION 144
Level-1-2 IS can transmit Level-2 LSPs to a level-1 area. If the ATT bit in the Level-2 LSPs is set to 1, the
Level-1 IS in the area can communicate with devices in other areas through the Level-1-2 IS.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 145
A network administrator is planning to use an automatic 6to4 tunnel to transmit IPv6 network. If the IPv4
address of the router interface is 138.14.85.210, the corresponding tunnel address should be
2001:8a0e:55d2:1:230:65ff:fe2c:9a6.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 146
Two community filters are configured as follows:

ip community-filter 1 permit 100:1 200:1


ip community-filter 2 permit 100:1
ip community-filter 2 permit 200:1

Which of the following statements regarding the community filters are true? (Choose two.)

A. A BGP route matches community-filter 2 only when it carries the Community attribute values of 100:1 and
200:1.

002591BC9A38C8BBCFC618EE290DAB95
B. A BGP route matches community-filter 1 only when it carries the Community attribute value of 100:1 or
200:1, or both.
C. A BGP route matches community-filter 1 only when it carries the Community attribute values of 100:1 and
200:1.
D. A BGP route matches community-filter 2 only when it carries the Community attribute values of 100:1 and
200:1, or both.

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 147
Which of the following statements regarding RD filters are true? (Choose two.)

A. The relationship between the rules of an RD filter is “OR.”


B. If an RD filter is configured but the RD of routes does not match any RD defined in the RD filter, the default
matching result is “permit.”
C. Routes are filtered according to the configuration order of multiple rules.
D. If an RD filter is not configured but used to filter routes, the matching result is “deny”.

Correct Answer: AC
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000174046/26892fde/routing-policy-
configuration-commands

QUESTION 148
Which of the following statements is true regarding the domain authentication mode md5 hello command in the
IS-IS process?

A. This command enables IS-IS Hello PDUs to carry authentication information.


B. IS-IS SNP and LSP can be flooded normally only when the domain authentication mode and password of all
routers in the same routing domain are MD5 and hello.
C. IS-IS authentication cannot be applied to IPv6 environments.
D. Routing domain authentication enables Level-1 and Level-2 SNPs and LSPs to carry authentication
information.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 149
Which of the following statements regarding OSPFv3 are true?

A. The LSAck packet contains the LSA header information, which is used for acknowledging the receipt of an
LSA.
B. The Hello packet must contain interface ID of sending interface.
C. The Option field of Hello and DD packets is extended to 24 bits.

002591BC9A38C8BBCFC618EE290DAB95
D. The LSR packet contains the complete LSA header information, which is used for request updating LSAs.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 150
If an ABR is a Type 5/7 LSA translator in an NSSA, the ABR can aggregate Type 5 LSAs converted from Type
7 LSAs.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 151
Which of the following statements regarding BGP route reflectors (RRs) are true?

A. An RR advertises routes learned from a client to all connected non-clients and clients.
B. A backbone network is divided into multiple reflection clusters. Each RR is configured as a non-client of the
other RR, and establishes full-mesh IBGP connections with each other.
C. Cluster_List is an optional non-transitive attribute and is used to prevent loops in a cluster.
D. The Originator_ID attributes is generated by an RR to prevent loops between clusters.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 152
When router R1 runs OSPF and they display ip routing-table command is executed on R1 to check the routing
table, which of the following statements regarding OSPF information in the routing table is true?

A. In the routing table, the routing entries identified by the O_ASE identifier can be learned only through route
import.
B. In the routing table, the routing entries identified by the OSPF identifier can be learned through Type 1/2/3/5
LSAs.
C. A. In the routing table, the routing entries marked OSPF can be learned only through Type 1 LSAs.
D. A. In the routing table, the routing entries identified by the OSPF identifier can be learned only through Type
3 LSAs.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 153
IS-IS elects a DIS on a broadcast network. Which of the following statements regarding DIS are true? (Choose
three.)

A. DIS preemption is supported. After successful DIS preemption, LSPs do not need to be flooded.
B. IS-IS elects the DIS by comparing preferences. If the preferences are the same, IS-IS compares MAC
addresses.
C. On a broadcast network, the DIS sends Hello PDUs at a frequency that is three times the frequency of non-
DIS routers.
D. The DIS periodically sends CSNPs to ensure LSDB synchronization.

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 154
In which scenarios can an AS-Path-filter be used? (Choose three.)

A. apply clause in a route-policy


B. Filtering routes received from BGP peers based on the AS_Path attribute. For example, the peer X.X.X.X
as-path-filter import command.
C. if-match clause in a route-policy
D. Filtering routes sent to BGP peers based on the AS_Path attribute. For example, the peer X.X.X.X as-path-
filter export command.

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 155
Routers R1 and R2 run BGP. Both the routers reside in AS 65234. Routes of R2 exist in the BGP routing of R1
but do not exist in the IP routing table of R1. What is the cause of this problem?

A. BGP is disabled on both R1 and R2.


B. Multi-hop BGP is disabled on R1.
C. The routes are not optimal.
D. The BGP peer relationship between R1 and R2 is in Down state.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 156
As shown in the figure, in IPv4 and IPv6 environments, the value of the SEL field in the IS-IS NET address is
always 00.

002591BC9A38C8BBCFC618EE290DAB95
A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 157
In the figure, the first record shows an LSP in the LSDB of a router, and the second record shows a newly
received LSP. Which of the following statements is false?

A. The router adds the newly received LSP to the LSDB.


B. The router will ignore the LSPs received from neighbors.
C. The router sends PSNPs if it is a point-to-point network.
D. If it is a broadcast network, the DIS adds the summary information of the newly received LSP to the next
CSNP.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 158
Which of the following statements about BGP load balancing are false? (Choose three.)

A. The AS_Path attribute values of equal-cost routes for load balancing must be different.

002591BC9A38C8BBCFC618EE290DAB95
B. When BGP load balancing is implemented, the local device can change the next-hop address of routes to
its own address when advertising the routes to IBGP peer groups only if the peer next hop-local command
is configured.
C. Load balancing can be implemented among BGP routes with different origins but having the same
destination network segment.
D. Load balancing can be implemented among IBGP routes and EBGP routes having the same destination on
the public network.

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 159
BGP can automatically summarize only routes with the Origin attribute being Incomplete.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 160
Which of the following statements route import is false?

A. Importing IBGP routes into the OSPF process may cause routing loops.
B. By default, the metric of external routes imported into the OSPF process is 1 and the type of imported
external routes is Type 2.
C. BGP can generate routes in either Import or Network mode. The Network mode is more precise than the
Import mode.
D. After IS-IS Level-2 routes are imported to an IS-IS Level-1 area, routing loops occur if no route import policy
is manually configured.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 161
Which of the following statements regarding BGP route summarization is true? (Choose two.)

A. Routes in the local BGP routing table can be manually aggregated.


B. After the aggregate ipv4-address mask command is configured, only summary routes are advertised and
specific routes are not advertised.
C. By default, automatic BGP route summarization is enabled.
D. BGP supports manual aggregate and automatic summarization of IPv6 routes.

Correct Answer: AD

002591BC9A38C8BBCFC618EE290DAB95
Section: (none)
Explanation

Explanation/Reference:

QUESTION 162
The IS-IS overload bit is set on R3. Which of the following statements are true? (Choose three.)

A. Before the timeout of the overload timer on R3, R1 and R2 do not add the LSPs generated by R3 to the
SPF tree.
B. The direct route of R3 is ignored by R1 and R2 due to the setting of the overload bit.
C. LSPs of R3 cannot be flooded to R1 and R2.
D. Routes imported to R3 through the import-route command cannot be advertised.
E. When a router is experiencing a memory shortage, the system automatically sets the overload bit in the
sent LSPs regardless of whether you have the set-overload command.

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 163
Which of the following statements regarding CHAP authentication in the PPP protocol are true? (Choose three.)

A. If no user name is configured for the authenticated party, the password does not need to be configured on
the interface of the authenticated party.
B. The MD5 algorithm is used to calculate a hash based on the authentication sequence ID, a random number,
and the key.
C. Authentication requires three-way handshake. Only the user name is transmitted on the network, not the
password.
D. The user name must be configured on the interface of the authenticated party.

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 164
Which of the following statements regarding 802.1s deployment is true?

A. Multiple bridges share a spanning tree instance.


B. Each VLAN owns a spanning tree instance.
C. Multiple VLANs share a spanning tree instance.
D. All VLANs share a spanning tree instance.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 165
Based on the key configurations, as shown in the figure, R1 and R2 establish a Level-2 neighbor relationship.
Which of the following statements regarding routing entries on R2 are true?

002591BC9A38C8BBCFC618EE290DAB95
A. 2020:: /64 will be displayed in the IP routing table.
B. 2021:: /64 will be displayed in the IP routing table.
C. 2019:: /64 will not be displayed in the IP routing table.
D. 2022:: /64 will not be displayed in the IP routing table.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 166
For Huawei S series switches, to control which member switch becomes the master switch of a stack, first
power on the switch you wish to be the master switch, and then wait 20 seconds before powering on the other
member switches.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000088745?section=j00b

QUESTION 167
A network with the typology shown in the figure below is set up in a lab. On the network, SW1 uses the default
configurations, and STP disables on SW2. Given this information, which of the following statements is true?

A. Go/0/2 of SW2 enters the Discarding state.


B. G0/0/1 of SW1 enters the Discarding state.
C. G0/0/1 of SW2 enters the Discarding state.
D. No interface is blocked.
E. G0/0/2 of SW1 enters the Discarding state.

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 168

002591BC9A38C8BBCFC618EE290DAB95
Huawei switches SWA and SWB are connected through seven physical Ethernet links and are configured with
static link aggregation. On SWA, the interface and are configured in the following sequence: Ethernet 1/0/1,
Ethernet 1/0/2, Ethernet 1/0/3, Ethernet 1/0/4, Ethernet 1/0/5, Ethernet 1/0/6,
Ethernet 1/0/7. If only six ports are supported in a LAG on SWA and SWB, which of the following statements is
true?

A. If the configurations of different ports are consistent, SWA selects one of the seven ports at random to be
the Unselected port of the LAG.
B. If the configurations of different ports are consistent, Ethernet 1/0/6 is the Unselected port of the LAG.
C. If the configurations of different ports are consistent, Ethernet 1/0/7 is the Unselected port of the LAG.
D. If the configurations of different ports are consistent, Ethernet 1/0/1 is the Unselected port of the LAG.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 169
An MSTP switch considers an RSTP switch to be an MSTP region that consists of only one switch and parses
RST BPDUs into MST BPDUs, in which IRPC is 0.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 170
On an RSTP-enabled switch, if the network topology changes, which of the following statements regarding
changes to the Layer 2 forwarding entries learned by the switch is true?

A. All entries, apart from the entries related to edge ports, are deleted.
B. If the aging time is set to 15 seconds, all the aged entries are deleted.
C. All entries, apart from the entries related to edge ports and the entries related to the port that receives the
TC BPDU, are deleted.
D. All entries are deleted.
E. Only the entries related to the port that receives the TC BPDU are deleted.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 171
The figures below show an enterprise’s Layer 2 networking architecture and information displayed when
engineers check the device status after communication between departments fails.

002591BC9A38C8BBCFC618EE290DAB95
What are the possible causes of this communication failure?

A. The switches have different region names.


B. The switches have different instance-VLAN mapping configurations.
C. The switches have different revision levels.
D. The switches have different BPDU sending intervals.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 172
You are performing troubleshooting on a LAN and suspect that the error is caused by mismatching working
modes.

Which of the following switch interface errors indicate that the working modes of the 10/100/1000 Ethernet
interfaces do not match?

A. Alignment error
B. Excessive collisions
C. Undersized frame
D. Late collisions
E. FCS error

002591BC9A38C8BBCFC618EE290DAB95
Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 173
The ip ip-prefix ip-prefix-name [ index index-number ] {permit | deny} ipv4 address mask-length [ greater-equal
greater-equal-value ] [ less-equal- less-equal-value ] command is used to configure an IP prefix list for route
filtering.

If the less-equal parameter of an IP prefix list is specified in this command but the greater-equal parameter is
not specified, what is the range of the created IP prefix list?

A. [mask-length, less-equal-value]
B. [less-equal-value, 32]
C. Unlimited
D. [0, less-equal-value]

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 174
An OSPF router is connected to Area 0 and Area 1, and Area 1 is configured as a stub area.

Which type of LSAs are in Area 1?

A. Type 1, Type 2, and Type 5 LSAs


B. Type 1, Type 2, and Type 3 LSAs
C. Type 3 and Type 4 LSAs
D. Type 7 LSA
E. Type 1 and Type 2 LSAs

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 175
According to the following scenario, which of the following statements are true?

002591BC9A38C8BBCFC618EE290DAB95
A. R1 and R2 cannot establish a neighbor relationship.
B. R1 has both Level-1 and Level-2 LSDBs.
C. R1 has a route to the IP address 10.0.2.2/32 of loopback0 on R2.
D. R1 can successfully ping the IP address of loopback0 on R2.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 176
Which of the following statements regarding OSPFv3 Router-LSAs is true?

A. The data part of a Router-LSA contains the interface IDs of the local router and its neighbors’ router ID.
B. When LS type in the LSA header is 0x0001, the data part of the LSAs is a Router-LSA.
C. Similar to OSPFv2, the Option field exists in an LSA header rather than the data part of a Router-LSA.
D. The data part of a Router-LSA contains the link-local address.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 177
Which of the following statements regarding IS-IS route summarization is true?

002591BC9A38C8BBCFC618EE290DAB95
A. Route summarization takes effect only on Level-1-2 routers.
B. Route summarization can be configured and takes effect on all types of routers.
C. Route summarization takes effect only on Level-1 routers.
D. Route summarization takes effect only on Level-2 routers.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 178
Which of the following statements regarding OSPFv3 is false?

A. Multiple instances can be run on a single link.


B. Each OSPFv3 process runs independently in a router.
C. The OSPFv3 packet header contains the Instance ID field.
D. Multiple instances can be run in the same OSPFv3 process on a interface.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 179
Router HW1 runs BGP, and has IBGP peers and EBGP peers configured.

Which of the following statements regarding the IBGP peers and EBGP peers are true?

A. The router sends BGP updates learned from each IBGP peer to the other IBGP and EBGP peers.
B. The IBGP peers must be directly connected. Otherwise, multi-hop IBGP must be configured on the router.
C. The EBGP peers can establish peer relationships through loopback interfaces.
D. The router sends BGP updates learned from each EBGP peer to the other EBGP and IBGP peers.
E. The EBGP peers must be directly connected. Otherwise, multi-hop EBGP must be configured on the router.

Correct Answer: DE
Section: (none)
Explanation

Explanation/Reference:

QUESTION 180
Which of the following statements regarding IS-IS GR is true?

A. A new TLV is defined to support IS-IS GR.


B. IS-IS GR is enabled by default.
C. IS-IS GR uses four timers.
D. IS-IS GR uses CSNPs for event notification and neighbor relationship maintenance.

Correct Answer: A

002591BC9A38C8BBCFC618EE290DAB95
Section: (none)
Explanation

Explanation/Reference:

QUESTION 181
What are the possible causes for an establishment failure of an IBGP peer relationship between two routers?

A. Multi-hop IBGP is not configured.


B. There is no reachable IGP route between the routers.
C. Authentication fails.
D. The BGP protocol versions are different.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 182
The router data is as follows. Which of the following statements is true?

A. IS-IS IPv4 and IS-IS IPv6 are enabled on Eth0/0/1 of R3.


B. Ge0/0/0 of R3 and neighbor routers are in different areas.
C. R3 is the Level-1 DIS and Level-2 DIS for the link where Eth0/0/0 resides.
D. The circuit-level of Eth0/0/0/1 on R3 is Level-1-2.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 183

002591BC9A38C8BBCFC618EE290DAB95
Which of the following statements regarding LSDB synchronization on an IS-IS broadcast network is true?

A. R2 functions as the DIS and sends Hello PDUs at an interval three times that of non-DIS routers.
B. R2 functions as the DIS and does not receive PSNPs from other routers.
C. R2 functions as the DIS and periodically sends CSNPs.
D. R1 and R3 maintain the LSDB consistency by sending PSNPs periodically.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 184
Which of the following statements regarding IS-IS authentication are true?

A. After area authentication is configured on a router, IIH PDUs, SNPs, and LSPs sent by the router must carry
an authentication TLV.
B. Interface authentication can authenticate Level-1 and Level-2 Hello PDUs.
C. After interface authentication is configured on a router, IIH PDUs sent by the router must carry an
authentication TLV.
D. Two routers can establish a neighbor relationship when they are configured with area authentication and
interface authentication, respectively, and are configured with the same authentication password.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 185
A BGP connection goes down after being successfully set up.

What is not possible cause for this problem?

002591BC9A38C8BBCFC618EE290DAB95
A. Negotiation of parameters in Open packets fails.
B. Mandatory attributes in Update packets are missing.
C. Error BGP packets are received.
D. After the BGP connection is set up, no Keepalive packet is received within the negotiated holdtime.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 186
On an OSPF broadcast network, four routers (RTA, RTB, RTC, and RTD) are deployed on the same network
segment. The DR priorities of RTA, RTB, RTC, and RTD are 2, 1, 1, and 0 respectively, and router IDs are
192.168.1.1, 192.168.3.1, and 192.168.4.1 respectively.

Which router is selected as the BDR if OSPF is enabled on the four routers?

A. RTC
B. RTB
C. RTD
D. RTA

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 187
When a Layer 2 switch sends IP packets originating from one VLAN to another, which of the following fields is
rewritten?

A. Layer 3 TTL
B. Layer 3 source IP address
C. Layer 3 transport protocol
D. Layer 2 TTL
E. Layer 3 destination IP address

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 188
Both IS-IS CSNPs and OSPF DD packets describe the brief information about link state databases in MA
network.

Which of the following statements regarding the two types of packets is true?

A. After CSNPs and DD packets are received by the peer router, the peer router needs to send an

002591BC9A38C8BBCFC618EE290DAB95
acknowledgement message; otherwise, the packets need to be retransmitted.
B. Once the neighbor relationship is established, CSNPs and DD packets are not sent.
C. The master/slave relationship in OSPF DD packet exchange is not bound to DR/BDR; and CSNPs are
generated only by the DIS.
D. After CSNPs and DD packets are received by the peer router, the peer router does not need to send an
acknowledgment message.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 189
Which of the following address prefixes indicates that the address is a globally unique and globally routable
IPv6 unicast address, similar to a public IPv4 address?

A. ::1/128
B. FE80::/10
C. FC00::/7
D. 2000::/3

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 190
Which of the following technologies use tunnels to allow for communication between devices with IPv6
addresses?

A. ISATAP
B. 6to4
C. NAT64
D. Dual Stack

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 191
Synchronization between LDP and IGP suppresses reachable IGP route advertisement to implement network
convergence and ensure LDP and IGP are along the same path. This minimizes traffic loss and improves
network reliability.

A. TRUE
B. FALSE

Correct Answer: A

002591BC9A38C8BBCFC618EE290DAB95
Section: (none)
Explanation

Explanation/Reference:

QUESTION 192
Which of the following statements regarding MPLS is false?

A. MPLS supports multi-layer nesting. The value of the S bit of the innermost label is 1.
B. The label space range of dynamic signaling protocols such as LDP and MP-BGP from 16 to 1023.
C. When an IP packet is transmitted on an MPLS network that uses TTL processing in pipe mode, the TTL
value of the IP packet decrements by 1 only at the ingress and egress nodes of the MPLS network.
D. The MPLS label is 20 bits long and is used for packet forwarding.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 193
The output of the display in vpn-instance verbose command for displaying detailed information about all VPN
instances on a network device is as follows.

Which of the following statements are false?

002591BC9A38C8BBCFC618EE290DAB95
A. The device assigns a label to each route of the VPN instance vpna.
B. GigabitEthernet1/0/0 is bound to the VPN instance vpna.
C. The total number of locally configured VPN instances for which IPv6 address families are enabled is 1.
D. The VPN instance vpna does not receive VPN routes with RT being 2:1.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 194
Which of the following statements correctly describe the LDP LSP establishment process?

A. When the next hop of an LSR changes due to a change in network topology and liberal mode is used, the
LSR can use the previous label sent to a non-optimal next hop to quickly reestablish an LSP. Liberal mode
requires more memory and label space than conservative mode.
B. By default, for the same FEC, the label mapping that an LSR receives can only originate at the optimal next
hop.
C. In DoD label advertisement mode, an LSR can distribute labels to a specified FEC without having to receive
Label Request messages from its upstream device.
D. An LSP is established by binding an FEC to a label and advertising the binding relationship to the upstream
LSR.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 195
If multiple candidate RPs are configured in a multicast domain, which of the following parameters need to be
compared when electing the RP of the group from multiple candidate RPs?

A. IP address of the C-RP interface


B. Mask length of the group range that is supported by the C-RP and needs to be matched with the group
address joined by receivers
C. C-RP interface ID
D. C-RP priority

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 196
Network administrators can use CAR technology in traffic policing.

Which of the following technologies can be applied in CAR?

A. Dual buckets at dual rates


B. Single bucket at a single rate

002591BC9A38C8BBCFC618EE290DAB95
C. Three buckets at a single rate
D. Dual buckets at a single rate

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 197
Router A has an IP route with the destination network segment of 10.0.0.1/32 and outbound interface of
GigabitEthernet0/0/1. The following configuration is added:

Assume that router A receives a data packet with the destination IP address of 10.0.0.1.

Which of the following statements are true?

A. If the source IP address of the data packet is 10.0.1.2, the data packet cannot be forwarded.
B. If the source IP address of the data packet is 10.0.1.2, the data packet can be forwarded and the DSCP
value is set to CS3.
C. If the source IP address of the data packet is 10.0.1.1, the data packet can be forwarded and the DSCP
value is set to CS3
D. If the source IP address of the data packet is 10.0.1.2, the data packet can be forwarded and the DSCP
value remains unchanged.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 198
As shown in the following figure, R1 and R2 establish an EBGP peer relationship and the BFD function is
enabled. Given this information, which of the following statements is true?

A. The time taken to detect BFD packets on R1 is 660 ms.


B. The time taken to detect BFD packets on R2 is 800 ms.
C. The time taken to detect BFD packets on R2 is 600 ms.
D. The time taken to detect BFD packets on R1 is 1280 ms.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 199
Which of the following statements regarding VXLAN packets are true?

A. A VNI has 24 bits and is used to identify a VXLAN segment.


B. The destination UDP port number is 4789.
C. The outer destination IP address is the IP address of the remote VTEP in a VXLAN tunnel.
D. The source UDP port number is 4789.

Correct Answer: AB
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 200
Which packet type is used when BGP EVPN is used to establish VXLAN tunnels?

A. Type 4
B. Type 1
C. Type 2
D. Type 5
E. Type 3

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 201
Which of the following statements regarding a TCP sliding window are false?

A. The sender advertises the size of the initial window.


B. If the sender does not receive an acknowledgment message after the retransmission timer times out, it
retransmits the unacknowledged data.
C. The sliding window size can only be increased or remains unchanged.
D. A TCP sliding window allows the sender to send multiple data packets before receiving an acknowledgment
message.
E. The sender does not need to transmit packets with a complete window size.

Correct Answer: ABE


Section: (none)
Explanation

Explanation/Reference:

QUESTION 202
When DLDP detects a unidirectional fiber link, Huawei devices perform the following operations by default: The
DLDP state machine changes to the Disable state; a trap is generated; the interface is automatically blocked.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 203
Inter-device link aggregation implements reliable transmission of data traffic and mutual backup for stack
member switches. However, the bandwidth of stack cables between stacked devices is limited. Which of the
following methods can be used to improve forwarding efficiency?

A. Configure the system MAC address switchover for the stack

002591BC9A38C8BBCFC618EE290DAB95
B. Use a stack card to connect the devices to be stacked
C. Enable the function of preferentially forwarding local traffic
D. Enable multi-active detection (MAD) for the stack

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000074401?section=k004

QUESTION 204
Why does RSTP achieve faster convergence than STP?

A. RSTP convergence is not based on the timer mechanism


B. RSTP has a smaller cost value
C. RSTP has additional port states
D. RSTP has a smaller timer value

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 205
Which of the following statements regarding the processing of BPDUs in 802.1w and 802.1D is true?

A. In 802.1D, the bridge only forwards the BPDUs received from the root bridge
B. In 802.1w, the bridge only forwards the BPDUs received from the root bridge
C. In 802.1D, the bridge does not forward BPDUs
D. In 802.1w, the bridge does not forward BPDUs

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 206
Two routers are connected through serial interfaces, but they cannot ping each other. The following information
is displayed when you check the status of the connected interfaces:

002591BC9A38C8BBCFC618EE290DAB95
Given this information, why are the two routers unable to ping each other?

A. The subnet masks of the two interfaces do not match


B. The IP addresses of the two interfaces are not on the same network segment
C. The link layer protocols of the two interfaces are inconsistent
D. The link bandwidth is insufficient

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 207
Which of the following statements regarding BGP route filtering is false?

A. The relationship between the nodes of a route-policy is “OR.” That is, a route matches the routing policy as
long as it is allowed by one node.
B. On the same node of a routing policy, the relationship among multiple if-match clauses for different
attributes is “OR.”
C. After a route from a BGP peer is received and a routing policy is executed to filter out unnecessary BGP
routes, these routes will not be added to the local BGP routing table.
D. When a routing policy is configured for locally advertised routes, this policy takes effect before the routes
are added to the BGP routing table.

Correct Answer: B
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000088880?section=j00d

QUESTION 208
Which of the following statements regarding route-policies are true?

A. If more than one node is defined in a route-policy, the matching mode of at least one node must be permit
B. An advanced ACL can be used in a route-policy to filter routes
C. A route-policy can filter only default routes
D. If the entry permit :: 0 less-equal 128 is defined, all IPv6 routes are permitted

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 209
Which of the following statements regarding BGP route reflectors (RRs) are true?

A. If no RR is available, IBGP peers must be fully meshed. If an RR is available, IBGP peers do not need to be
fully meshed
B. An RR can advertise routes learned from a client to the other clients and non-clients
C. An RR can advertise routes learned from IBGP peers to all clients and non-clients
D. An RR can advertise routes learned from non-clients to all clients

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 210
The OSPFv3 Option field is carried in all LSAs.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 211
As shown in the figure, the IS-IS neighbor relationship has just been established between R1 and R2. Which of
the following statements regarding the LSDB synchronization between R1 and R2 is true?

002591BC9A38C8BBCFC618EE290DAB95
A. R1 sends a PSNP to R2
B. R1 sends an LSP to R2
C. R1 sends a Hello PDU to R2
D. R1 sends a CSNP to R2

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 212
Which of the following statements regarding control are true?

A. For node 10, the relationship between if-match community-filter 1 and if-match as-path-filter 1 is “AND.”
B. Default OSPF, IS-IS, and BGP routes can be advertised.
C. An AS-Path-filter filters routes based on the AS-Path attribute to affect route selection
D. The import-route BGP command can be used to import IBGP routes

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 213
Both IS-IS and OSPF run on a network as shown in the following figure. Route import is configured on RTB and
RTC respectively. All the routers are connected through GE interfaces. Routes to the network segment

002591BC9A38C8BBCFC618EE290DAB95
2.2.2.2/32 is imported to the OSPF process using the import-route direct command on RTD. The default
settings are retained for all the other configurations. Which of the following statements regarding this network is
false?

A. The following configuration can be performed on RTC to filter out only routes to the network segment
2.2.2.2/32 when RTC imports routes:
[RTC] ip ip-prefix 10 index 1 deny 2.0.0.0 8 less-equal 32
[RTC-isis-1]filter-policy ip-prefix 10 import
B. On RTB, adjust the IS-IS preference to 160 to avoid generation of sub-optimal routes on the network
C. The following configuration can be performed on RTC to filter out routes from RTD to the network segment
2.2.2.2/32 when RTC imports OSPF routes:
[RTC-acl-basic-2001]rule 5 deny source 2.0.0.0 0.255.255.255
[RTC-acl-basic-2001]rule 10 permit
[RTC-isis-1]filter-policy 2001 import
D. RTB learns that RTA is the next hop of the route to the network segment 2.2.2.2/32

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 214
The configurations of two routers in a company are shown. Which of the following statements regarding the
routing table of R1 is true?

002591BC9A38C8BBCFC618EE290DAB95
A. The IP routing entries whose destination network segment is 10.0.2.2/32 on R1 can be generated through
OSPF only when the IS-IS preference of R2 is changed to 5
B. If the IS-IS preference of R1 is changed of R1 is changed to 5, the IP routing entries whose destination
network segment is 10.0.2.2/32 on R1 are generated through OSPF
C. If the IS-IS preference of R1 is changed to 5, the IP routing entries whose destination network segment is
10.0.2.2/32 on R1 are generated through IS-IS
D. If the IS-IS preference of R2 is changed to 5, the IP routing entries whose destination network segment is
10.0.2.2/32 on R1 are generated through IS-IS

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 215
Based on the scenario shown, which statement about R2 is true?

002591BC9A38C8BBCFC618EE290DAB95
A. R2 can receive LSPs from R1, but cannot add the routing information in the LSPs to the routing table
B. R2 can learn all routes advertised by R1
C. R2 can learn only the route 10.1.1.0/24
D. R2 can learn the routes 10.1.2.0/24 and 10.1.3.0/24

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 216
Policy-Based Routing (PBR) needs to be configured on a router to enable specified traffic to be forwarded
through a specified interface. When PBR is used, which two types of information can be specified to enable
traffic forwarding along a specific path?

A. Type of Service and bandwidth usage


B. Source IP address and specific protocol (such as FTP and HTTP)
C. TTL and source IP address of packets
D. Source IP address and Layer 2 source address

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 217
A router is connected to two EBGP peers through two parallel serial cables. What method can be used to
achieve bidirectional load balancing between the EBGP peers?

A. Run the ebgp-load-balance command on the EBGP peers.


B. No method is needed. BGP automatically implements load balancing among different ASs through available
links.
C. Establish an EBGP peer relationship through loopback interfaces, and configure the loopback interfaces as
update sources. In each AS, import two equal-cost routes to the loopback interface of each EBGP peer to
the IGP process. In addition, run the ebgp-max-hop and next-hop-local commands.
D. Configure an EBGP peer relationship through loopback interfaces, and configure the loopback interfaces as
update sources. In each AS, enable two equal-cost routes to the loopback interface on each EBGP peer in
the IGP process. In addition, run the next-hop-local command.

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 218
OSPFv3 and IS-IS are both running on a router, and the OSPFv3 routes need to be imported into IS-IS. Given
this information, which of the following import configurations must be made?

A.

B.

C.

002591BC9A38C8BBCFC618EE290DAB95
D.

E.

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 219
Which of the following statements regarding the Multi-VPN-instance CE (MCE) is false?

A. An MCE device creates a routing table for each VPN and binds each VPN instance to it’s interfaces
B. The MCE has been bound to a VPN. Therefore, no VPN needs to be bound to the PE connected to the
MCE
C. Based on the interface for receiving routing information, the MCE determines the origin of the routing
information and adds the routing information to the routing table of the corresponding VPN
D. The MCE can connect to multiple VPNs. The MCE solution isolates services of different VPNs while
reducing the cost of network devices

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 220
In the Hub-Spoke networking of MPLS BGP VPN shown in the figure below, users want to configure branches
to communicate only with the headquarters but no other branches. To achieve this, which of the following
solutions regarding RT settings can be used?

002591BC9A38C8BBCFC618EE290DAB95
A. Headquarters: Import Target: 2:2; Export Target: 3:3
Branch 1: Import Target: 3:3; Export Target: 1:1
Branch 2: Import Target: 3:3; Export Target: 2:2
B. Headquarters: Import Target: 12:3; Export Target: 3:12
Branch 1: Import Target: 3:12; Export Target: 12:3
Branch 2: Import Target: 3:12; Export Target: 12:3
C. Headquarters: Import Target: 1:1; Export Target: 3:3
Branch 1: Import Target: 3:3; Export Target: 1:1
Branch 2: Import Target: 3:3; Export Target: 2:2
D. Headquarters: Import Target: 12:3; Export Target: 12:3
Branch 1: Import Target: 12:3; Export Target: 12:3
Branch 2: Import Target: 12:3; Export Target: 12:3

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 221
In inter-AS VPN Option B mode, two Autonomous System Boundary Routers (ASBRs) need to exchange public
network LSP labels once during packet forwarding.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/my/doc/EDOC1100033725/19aa8610/inter-as-vpn

QUESTION 222
A network administrator plans to migrate IGMPv2 to IGMPv3 on the multicast network. What advantages does
IGMPv3 have over IGMPv2?

A. IGMPv3 deletes suppression of IGMPv3 Membership Report messages

002591BC9A38C8BBCFC618EE290DAB95
B. IGMPv3 deletes the function of matching all sources through wildcard belong to specific multicast group
C. IGMPv3 enables a host to join a specified multicast group that excludes a specified multicast source
D. IGMPv3 adds Request-to-Send and Clear-to-Send messages between source and local IGMP queries
E. IGMPv3 enables a host to join a specified multicast group that includes a specified multicast source

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 223
To deploy multicast video applications on your private internal network, you need to use private multicast IP
addresses on the network.

Which range of IP addresses can be used?

A. 226.0.0.0 – 226.255.255.255
B. 241.0.0.0 – 241.255.255.255
C. 224.0.0.0 – 224.255.255.255
D. 239.0.0.0 – 239.255.255.255
E. 240.0.0.0 – 254.255.255.255

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 224
Which of the following statements regarding Security Association (SA) in IPsec is false?

A. An IPsec VPN connection can be established only when the bidirectional SA exists between IPsec peers
B. An SA is identified by three parameters: security parameter index (SPI), destination IP address, and security
protocol ID (AH or ESP)
C. You can run the display ipsec sa command to view the encryption algorithm used and traffic of interest
between IPsec peers
D. IPsec can only use symmetric encryption algorithms to encrypt and decrypt data

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 225
As shown in the figure, the routers load balances the traffic between Branch network 1 and Branch network 2.
In this case, URPF in loose mode must be configured on a physical interface to defend against attacks using
spoofed source IP addresses.

002591BC9A38C8BBCFC618EE290DAB95
A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 226
As shown in the figure, two IPv6 networks need to access the IPv4 network. An IPsec tunnel needs to be
established between the two IPv6 networks to enable communication. Which of the following encapsulation
modes can meet the preceding requirements?

A. AH+ transmission mode


B. AH+ tunnel mode
C. ESP+ tunnel mode
D. All the preceding options are incorrect

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 227
Which of the following statements regarding 802.1X authentication, RADIUS authentication, and HWTACACS
authentication are true?

002591BC9A38C8BBCFC618EE290DAB95
A. A user cannot be authenticated by both RADIUS authentication and 802.1X authentication.
B. A user cannot be authenticated by both RADIUS authentication and HWTACACS authentication.
C. A user can be authenticated by both RADIUS authentication and HWTACACS authentication. This is more
secure than using just one authentication method.
D. Users can access a network through 802.1X authentication, and can be authenticated through RADIUS
authentication.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 228
A family user has subscribed to a bandwidth of 10 Mbit/s. To improve user experience, the carrier ensures a
rate of 12 Mbit/s during tests. If token bucket technology is used to cope with this requirement, which of the
following methods is optimal?

A. cir 10000 cbs 12000 pbs 12000


B. cir 8000 pir 12000
C. cir 10000 pir 12000
D. cir 10000 cbs 10000 pbs 12000

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 229
A new office needs to use a router as the DHCP server. Which of the following items need to be configured
when the DHCP server is configured to provide the DHCP service for the office?

A. Manually binding a specified IP address to a specified terminal


B. Timeout period of a ping packet
C. Excluding idle IP addresses from the DHCP server
D. Startup file of the DHCP server
E. DHCP address pool

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 230
Which of the following statements regarding VRRP is true?

A. Both VRRPv2 and VRRPv3 support authentication


B. VRRPv3 does not support authentication, whereas VRRPv2 supports authentication
C. The VRRP priority of the master IP address owner is 255. Therefore, the priority can be a value in the range

002591BC9A38C8BBCFC618EE290DAB95
from 0 to 254.
D. VRRPv2 only applies to an IPv4 network, and VRRPv3 applies only to an IPv6 network

Correct Answer: BCD


Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1000178318/6e22bde4/vrrpv2-and-vrrpv3-
advertisement-packets

QUESTION 231
In a BGP EVPN distributed gateway scenario, which of the following packet types is required to implement VM
migration?

A. Type 1
B. Type 2
C. Type 3
D. Type 5
E. Type 4

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/my/doc/EDOC1000180270/5d103d4d/configuring-vxlan-in-
distributed-gateway-mode-using-bgp-evpn

QUESTION 232
The precedence field in VLAN (802.1Q) data encapsulation has six bits.

A. TRUE
B. FALSE

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 233
On a switch with factory default settings, its MAC address table is empty. Host A connected to the switch sends
the first unicast data frame. What operation will the switch perform after receiving the data frame?

A. The switch discards the data frame


B. The switch records the source MAC address of the data frame and floods the data frame out of all
interfaces except the one it received the frame
C. The switch buffers the data frame and forwards the data frame after the destination host sends a data
frame
D. The switch forwards the data frame out through an interface based on the destination MAC address of the
data frame

Correct Answer: B
Section: (none)

002591BC9A38C8BBCFC618EE290DAB95
Explanation

Explanation/Reference:

QUESTION 234
Which of the following configurations can be used to prevent users from connecting a hub to an access port on
a switch allowing multiple device to access the network?

A.

B.

C.

D.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 235
On a LAN running STP (802.1D), which of the following parameters will not be received by a non-root switch
from the root switch?

A. Forward delay
B. Hold time
C. MaxAge
D. Hello time
E. Root Path cost

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 236
When a router receives an LSP on a broadcast network or a P2P network enabled with IS-IS, the router needs
to send a PSNP to ensure LSDB synchronization.

A. TRUE

002591BC9A38C8BBCFC618EE290DAB95
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 237
Which of the following statements regarding OSPFv3 Link-LSAs is true?

A. The Link-LSA contains both the link-local address and all IPv6 prefixes of the interface
B. The Link-LSA contains both the link-local address of the interface and all IPv6 prefixes of the same area on
the router
C. The Option field exists in an LSA header rather than the data area of a Link-LSA
D. If the PrefixOptions field of a prefix in the Link-LSA is 0x00, the prefix is not involved in the IPv6 unicast
calculation

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 238
Assuming three routers (A, B, and C) uses BGP as the routing protocol. A sends Update packets to B and B
sends the Update packets to C. Which of the following attributes meet the following two conditions?
(1) A can select whether to carry this attribute in Update packets.
(2) If B receives an Update packet carrying this attribute, B still advertises the Update packet to C although B
cannot identify this attribute. Then, Router C may identify and use this attribute.

A. Multi_Exit_Disc
B. Local_Pref
C. Community
D. Aggregator

Correct Answer: CD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 239
Which of the following statements regarding deploying IS-IS in an IPv6 environment is true?

A. On a broadcast network, the IPv4 DIS priority and IPv6 DIS priority can be set, respectively.
B. If the isis silent command is run on an IS-IS interface, the interface does not send but receives IS-IS
packets.
C. On a broadcast network, if each router supports both IPv4 and IPv6, the IPv4 DIS and IPv6 DIS must be the
same device.
D. By default, the DIS priority of Level-1 and Level-2 broadcast interfaces is 1.

Correct Answer: A

002591BC9A38C8BBCFC618EE290DAB95
Section: (none)
Explanation

Explanation/Reference:

QUESTION 240
Which of the following statements regarding MP-BGP is false?

A. The MP_UNREACH_NLRI attribute of Update packets does not contain path information
B. MP_REACH_NLRI and MP_UNREACH_NLRI are optional transitive attributes
C. The complete MP_REACH_NLRI attribute structure contains the address family, next hop, and prefix
information
D. MP-BGP can be used to allocate labels

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 241
Which of the following statements regarding OSPFv3 LSAs are true?

A. The Link State ID of an Inter-Area-Prefix-LSA contains prefix information


B. Router-LSAs and Network-LSAs do not contain routing information
C. Inter-Area-Prefix-LSAs contain link-local information
D. When the Referenced Link State Type of an Intra-Area-Prefix-LSA is 2, the Referenced Link State ID
contains the interface ID of the DR

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 242
When a Layer 3 switch forwards IP packets between locally attached VLANs, which of the following fields is
rewritten?

A. Layer 2 TTL
B. Layer 3 transport protocol
C. Layer 3 destination IP address
D. Layer 3 source IP address
E. Layer 3 TTL

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 243

002591BC9A38C8BBCFC618EE290DAB95
Regular expressions can be used in Community-filter and AS-Path-filter to filter routes.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 244
Which of the following statements regarding an OSPF virtual link is true?

A. A virtual link can be used to solve the problem of a non-continuous Area 0


B. A virtual link uses the IP address of the outbound interface as the link address
C. A virtual link can be established in any area, and the virtual link belongs to the area after it is established
D. A virtual link with a cost of 0 is the optimal link

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 245
A Huawei router is configured to import a route into OSPF on an enterprise network. Which of the following
statements about the LSA generated from the imported route are true?

A. The Net Mask field is set to all 0s


B. The Link State ID, and Advertising Router fields can uniquely identify an LSA
C. The Advertising Router field is set to the ASBR’s Router ID
D. The Link State ID field is set to the destination network segment address

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 246
The router ISIS interfaces and peers are as follow. Which of the following statements is true?

002591BC9A38C8BBCFC618EE290DAB95
A. IS-IS IPv4 and IS-IS IPv6 are enabled on Eth0/0/1 of R3
B. The circuit-level of Eth0/0/1 on R3 is Level-1-2
C. R3 has established a L1 adjacency on GE0/0/0
D. R3 is the Level-1 DIS and Level-2 DIS for the link where Eth0/0/0 resides

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 247
As shown in the following figure, R1 can connect to the Internet through R2 or R3. EBGP connections are set
up between R1 and R2 and between R1 and R3. R2 and R3 reside in the same AS and advertise default routes
using BGP. Which of the following methods can be used to enable traffic from R1 to the Internet to be
preferentially forwarded by R2?

A. On R2, set the Local_Pref value to 150 in the egress direction of R1

002591BC9A38C8BBCFC618EE290DAB95
B. On R1, set the MED attribute value to 150 in the ingress direction of R3
C. On R1, set the Local_Pref attribute value to 150 in the ingress direction of R2
D. On R2, set the MED attribute value to 150 in the egress direction of R1

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 248
In the aggregate ipv4-address {mask | mask-length} [as-set | attribute-policy route-policy-name1 | detail-
suppressed | origin-policy route-policy-name2 | suppress-policy route-policy-name3] command, multiple
parameters can be used to affect the BGP summarized route and summarization result. Which of the following
statements regarding this command are true?

A. If the origin-policy parameter is specified, only the specific routes matching route-policy are summarized.
B. If the attribute-policy parameter is specified, attributes of the summary route can be modified.
C. If the suppress-policy parameter is specified, a summary route is generated. The if-match clause of the
route-policy can be used to filter specific routes to be suppressed. The specific routes matching route-policy
are still advertised to other BGP peers.
D. If the as-set parameter is specified, the AS_Path attribute of the summary route contains AS path
information about all specific routes to prevent loops.

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 249
To reduce the amount of OSPF data and routing information in some areas, OSPF has special area types.
Which of the following statements regarding OSPF special areas is true?

A. The ASBR-summary-LSA can be advertised to an NSSA


B. The AS-external-LSA can be advertised to a stub area
C. Any OSPF area can be configured as a special area
D. A router in a special area cannot establish an OSPF neighbor relationship with a router in a common area

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 250
Which of the following AS-paths can be matched by the AS-Path filter configured using the ip as-path-filter 1
permit ^12.*74$ command?

A. AS_Path (32 1274 23)


B. AS_Path (125 328 74 23)
C. AS_Path (123 621 743 2374)

002591BC9A38C8BBCFC618EE290DAB95
D. AS_Path (321 12 2374)

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 251
A Route Distinguisher (RD) is used to distinguish the same IP address in different VPNs. How many bits does
an RD contain?

A. 64
B. 128
C. 32
D. 16

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 252
Which of the following technologies can be used to improve the MPLS BGP VPN reliability?

A. VPN GR
B. FRR for private IP routes between Pes and CEs
C. VPN FRR
D. CE dual-homing networking at the access layer

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 253
Typically, users within a VPN only communicate with other users in the same VPN. They cannot communicate
with users on the Internet or access the Internet. Many VPN sites, however, may need to access the Internet.
Which of the following statements regarding interconnection between the VPN and the Internet are true?

A. The interconnection between the VPN and the Internet can be implemented on the PE. However, the
implementation is complex and may bring security risks. The PE is vulnerable to DoS attacks from the
Internet.
B. Directly connect the CE to the Internet on the user side. Each user site can independently access the
Internet. That is, a default route destined for the Internet is configured on the CE of each site.
C. Configure the PE to send a default route destined for the Internet to the CE, and add a default route
destined for the Internet gateway to the VPN instance routing table.
D. Isolating public network routes and VPN routes on the user side is simple, secure, and reliable.

Correct Answer: ACD


Section: (none)

002591BC9A38C8BBCFC618EE290DAB95
Explanation

Explanation/Reference:

QUESTION 254
If a multicast group has multiple receivers and the administrator enables the IGMP snooping function on the
switch connected to the receivers, how do the receivers respond after receiving General Query messages from
the querier?

A. Only the receiver whose response timer expires firstly sends a Report message
B. All receivers send Report messages
C. All receivers send Report messages only when IGMPv1 is run
D. All receivers send Report messages only when IGMPv2 is run

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 255
Which MAC address corresponds to the multicast IP address 229.130.130.1?

A. 01-00-5E-82-82-01
B. 00-00-5E-02-82-01
C. 01-00-5E-02-82-01
D. 00-00-5E-82-82-01

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 256
Which of the following statements regarding the Register message on a PIM-SM network are true?

A. The Register message is sent from a source DR


B. The Register message is sent to the RP in unicast mode
C. The Register message is sent from a receiver DR
D. The RP learns multicast source information from the Register message

Correct Answer: BD
Section: (none)
Explanation

Explanation/Reference:

QUESTION 257
IPSG static binding entries can be configured, or they can be generated when IPSG and DHCP Snooping are
used together.

002591BC9A38C8BBCFC618EE290DAB95
A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 258
To configure AAA, you need to configure a RADIUS server as follows:

[Huawei]radius-server template EXAM


[Huawei-radius-EXAM]radius-server shared-key cipher HUAwei123
[Huawei-radius-EXAM]radius-server authentication 10.7.66.66 1812
[Huawei-radius-EXAM]radius-server authorization 10.7.66.66 1812
[Huawei-radius-EXAM]radius-server accounting 10.7.66.66 1813
[Huawei-radius-EXAM]radius-server retransmit 2

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 259
As shown in the figure, Department A of Branch 1 can access the Internet, and Department B can access
headquarters resources only through the encrypted VPN. You can configure a NAT policy on the egress device
in Branch 1 to allow Department A to still access the Internet, and configure an IPsec VPN (ESP protocol) in
tunnel mode for Department B to allow Department B to access the headquarters.

A. TRUE
B. FALSE

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95
QUESTION 260
In traffic policing, dual buckets at dual rates are used. The number of tokens in bucket C is TC, and the number
of tokens in bucket P is TP. When a packet with a length of B is received, which of the following statements are
true?

A. If (TP-B) and (TC-B) are larger than 0, the packet is marked green
B. If (TP-B) is larger than 0 and (TC-B) is smaller than 0, the packet is marked yellow
C. If (TP-B) is larger than 0 and (TC-B) is smaller than 0, the packet is marked green
D. If (TP-B) and (TC-B) are smaller than 0, the packet is marked red

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1100055046/33f24bb0/token-bucket

QUESTION 261
The DSCP value of VoIP traffic on Huawei network devices needs to be set to EF. According to the RFC about
DSCP, which value should EF be set to?

A. 5 in decimal notation
B. 101110 in binary notation
C. 0xEF
D. 36 in decimal notation

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 262
Which of the following statements regarding FTP is true?

A. In FTP passive mode, the client initializes TCP control and data sessions
B. In FTP active mode, the server uses the PORT command to notify the client of the port through which data
is transmitted
C. FTP always uses a TCP session to transmit control and data information
D. FTP always uses TCP port 20 to establish a data session and TCP port 21 to establish a control session
E. FTP always uses TCP port 21 to establish a data session and TCP port 20 to establish a control session

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 263
Which of following statements regarding VRRP groups in load balancing mode are true?

A. Hosts in the same LAN need to be configured with different virtual routers as their default gateways
B. At least two virtual routers need to provide forwarding services simultaneously

002591BC9A38C8BBCFC618EE290DAB95
C. When configuring the priority, ensure that the same router functions as the master device for three VRRP
groups
D. Multiple VRRP groups can be created on an interface of a router. The router functions as a master device of
a VRRP group or a backup device of other VRRP groups

Correct Answer: ABD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 264
Which of the following route types is used to advertise external routes in BGP EVPN?

A. Type 2
B. Type 5
C. Type 1
D. Type 4
E. Type 3

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:
Reference: https://support.huawei.com/enterprise/en/doc/EDOC1100023542?section=j01d&topicName=bgp-
evpn-route-types

QUESTION 265
Assume R1 and R2 have a valid level-2 ISIS peering for IPv6 and the additional configuration shown is applied.
Which of the following statements about routing entries on R2 are true?

002591BC9A38C8BBCFC618EE290DAB95
A. 2022:: /64 will be displayed in the IPv6 routing table.
B. 2021:: /64 will be displayed in the IPv6 routing table.
C. 2019:: /64 will be displayed in the IPv6 routing table.
D. 2020:: /64 will be displayed in the IPv6 routing table.

Correct Answer: ACD


Section: (none)
Explanation

Explanation/Reference:

QUESTION 266
Which of the following combinations will provide the optimal solution for deploying a loop-free Layer 2 network?

A. TRILL + MSTP
B. Stack + link aggregation
C. Link set + MSTP
D. Stack + MSTP

Correct Answer: A
Section: (none)
Explanation

002591BC9A38C8BBCFC618EE290DAB95
Explanation/Reference:

QUESTION 267
Which of the following statements regarding MUX VLANs on Huawei switches is true?

A. A MUX VLAN consists of principal VLANs and subordinate VLANs. Subordinate VLANs are classified into
separate VLANs and isolated VLANs.
B. A principal port can communicate with all ports in a MUX VLAN.
C. MUX VLANs and super VLANs can be used together in one VLAN.
D. Each separate VLAN can be bound to multiple principal VLANs.

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 268
During troubleshooting for a LAN where Huawei devices are deployed, you find that there are a large number of
unicast frames with unknown source MAC addresses. What is the most severe impact these unicast frames
have on the switch?

A. TCAM entries are occupied


B. The power consumption is increased
C. The available MAC address entries are consumed
D. The available bandwidth is consumed
E. The memory for buffering frames is occupied

Correct Answer: E
Section: (none)
Explanation

Explanation/Reference:

QUESTION 269
Interface Serial 0 of a router is enabled for OSPF Area 1, Serial 0 is configured as a silent interface. What is the
impact of this configuration?

A. The OSPF router receives updated routes from its neighbor


B. The OSPF router establishes an available adjacency through this interface
C. The OSPF router does not add the routes learned from the interface to the local routing table
D. The OSPF router does not establish any adjacency through this interface

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 270
Which of the following route selection tools is unique for BGP?

002591BC9A38C8BBCFC618EE290DAB95
A. Route-policy
B. IP-prefix
C. ACL
D. AS-Path-filter

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 271
If no default route exists in the local IP routing table, the default-route imported command can be executed to
advertise default routes to BGP peers or BGP peer groups.

A. True
B. False

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 272
Which of the following statements about IS-IS LSDB synchronization on the broadcast network, shown in the
diagram, is true?

A. R2 functions as the DIS and periodically sends CSNPs


B. R2 functions as the DIS and sends Hello PDUs at an interval three times that of non-DIS routers
C. R1 and R3 maintain the LSDB consistency by sending PSNPs periodically

002591BC9A38C8BBCFC618EE290DAB95
D. R2 functions as the DIS and does not receive PSNPs from other routers

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 273
OSPFv3 is a version of OSPF for IPv6 and is different from OSPFv2. OSPFv3 is based on links but OSPFv2 is
based on network segments. Which of the following statements is false?

A. When an OSPFv3 router obtains routing information from a neighbor, it uses the link-local address of the
neighbor as the next hop for packet forwarding.
B. Two OSPF routers on the same physical link can still establish a neighbor relationship even if no unicast
IPv6 address is configured.
C. Two OSPF routers on the same physical link can still establish a neighbor relationship even if their IPv6
addresses are on different networks.
D. Except for virtual links, all OSPFv3 interfaces use a link-local address as the destination address of
OSPFv3 message.

Correct Answer: D
Section: (none)
Explanation

Explanation/Reference:

QUESTION 274
On a P2P network, CSNPs are not sent during the establishment of an IS-IS neighbor relationship.

A. True
B. False

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 275
IPv6 devices can obtain information such as the interface address, gateway address, and DNS address through
DHCPv6.

A. True
B. False

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 276

002591BC9A38C8BBCFC618EE290DAB95
The Next Header field only exists in the basic header of an IPv6 packet, and its function is only to indicate
whether the IPv6 packet has an extension header.

A. True
B. False

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 277
Which of the following statements regarding features of the inter-AS VPN Option C are true?

A. VPN routes are directly exchanged between the ingress PE and the egress PE, and the routes do not need
to be stored or advertised by the intermediate devices.
B. The inter-AS VPN Option C mode is not applicable to scenarios where multiple Ass are spanned.
C. A maximum of two labels are required for packet forwarding.
D. ASBRs do not store VPNv4 routes or advertise VPNv4 routes to each other.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 278
Which of the following statements correctly describe the LDP session establishment process?

A. The label switching router (LSR) with the larger transport address initiates a TCP connection.
B. After two devices receive a Keepalive message from each other, the LDP session is successfully
established.
C. LDP Neighbor Discovery Hello messages are encapsulated using TCP with the multicast destination
address of 224.0.0.2.
D. After the TCP connection is successfully established, the active party sends an Initialization message to
negotiate with the passive party about parameters used for establishing an LDP session.

Correct Answer: A
Section: (none)
Explanation

Explanation/Reference:

QUESTION 279
On an MPLS BGP VPN where MPLS Penultimate Hop Popping (PHP) is disabled, when packets arrive at the
last-hop PE, packets carry two MPLS labels which can be the same value.

A. True
B. False

Correct Answer: B
Section: (none)

002591BC9A38C8BBCFC618EE290DAB95
Explanation

Explanation/Reference:

QUESTION 280
On a multicast network, in which of the following situations can multicast traffic not be forwarded?

A. There are not any RPF route in the router


B. The upstream router discards the received PIM Join message
C. PIM is disabled on the RPF interface
D. On a multi-router egress network, the local router is not a DR

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 281
Which of the following statements regarding HTTPS is false?

A. A router cannot detect the viruses in HTTPS traffic through the IPS technology
B. HTTPS uses SSL to ensure data security
C. When a user attempts to visit a website using HTTPS, if the user’s browser cannot identify the digital
certificate of the website, the user will be unable to access the website
D. By default, the HTTPS protocol uses TCP port 443

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 282
Which of the following statements regarding optimal route selection of various protocols is true?

A. All routes learned through OSPF in the LSDB are added to the IP routing table
B. The optimal route is selected after comparison costs of routes that are learned through BGP and destined
for the same network segment
C. The optimal route is selected after comparison between preferences of routes that are learned through BGP
and OSPF and that are destined for the same network segment
D. BGP routes with unreachable next hops are also added to the IP routing table

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

QUESTION 283
Most popular Layer 2 tunneling technologies include VXLAN, TRILL, NVGRE, and MPLS.

002591BC9A38C8BBCFC618EE290DAB95
A. True
B. False

Correct Answer: B
Section: (none)
Explanation

Explanation/Reference:

QUESTION 284
Which of the following statements regarding the EVPN Type5 route is false?

A. The IP prefix field in a Type5 route can carry either the host IP address or the network segment address
B. Type5 route is the IP prefix route
C. A Type5 route carries a Layer 3 VNI
D. A Type5 route carries both Layer 2 and Layer 3 VNIs

Correct Answer: C
Section: (none)
Explanation

Explanation/Reference:

002591BC9A38C8BBCFC618EE290DAB95

You might also like