Professional Documents
Culture Documents
It Huawei Compilation
It Huawei Compilation
Which of the following functions can be enabled on access switches to prevent employees
from accessing small routes carrying DHCP functions?
DHCP snooping
Which Technology is used to allow only fixed users to log in to the network when you use
Telnet or Web to manage devices?
ACL
Which routing protocols can be used to ensure network connectivity within a campus
network?
Static route
OSPF
ISIS
Fixed Ip addresses can be allocated to special terminals such as servers and printers.
Right
For small sized campuses the network architecture is simplified as much as possible
Right
For the centralized NMS SNMPv3 add orientations and encryption which greatly
improves NMS security
Right
The start network has strong robustness and is not easy to fail
Wrong
Two computers are connected through a network cable to from the simplest network.
Right
The open System interconnections reference model divides a network into seven layers
from the bottom layer to top layer. Which of the following are the layers from bottom layer
to top layer?
Physical layer data link layer, network layer, transport layer, session layer,
presentation layer, and application layer
Which of the following flags in the TCP header participate in the TCP three-way
handshake?
SYN
ACK
ARP reply packets are broadcast so that all host can receive them.
Wrong
Common data link layers protocol include Ethernet PPPo3, and PPP
Right
To disconnect a TCP connection you only need to disconnect the connection in one
direction
Wrong
Which of the following methods can be used to log in to the device through the CLI?
Console
SSH
Telnet
The startup saved configuration file command specifies a configurations file for next
startup
Right
By default command level 0 - 3 are registered and user levels 0-15 are registered
Right
By default, what operations does the switch perform after receiving an unknown unicast
frame?
Learn the mapping between the source Mac address of the data frame and the
interface and flood the date frame
Which of the following ARP packets used to request the MAC address corresponding to
the IP address?
ARP request
Which of the following fields are contained in an Ethernet frame in the IEEE 802.3
Format?
Source MAC
Destination MAC
FCS
Length
Which of the following statement about the MAC address learning mechanism of a switch
are correct?
Mac address learning is enabled by default
The switch automatically learns the source MAC address of the packets
received by the interface
Mac address learning can be disabled on the switch
When a terminal receives a data frame, it checks the destination MAC address in the frame
header. Which of the following data frames can be received?
The destination MAC address is the local MAC address
The destination MAC address is the multicast MAC address listened by the local
devices
The destination MAC address is a broadcast MAC address
The switch floods data frames whose destination MAC addresses are unknown unicast mac
addresses and broadcast MAC addresses.
Right
The switch isolates the collision domain, and the router isolates broadcast domain
Right.
Which of the following 802.11 protocols can work only on the 5 GHz frequency band?
802.11ac
What CAPWAP packets does the AC use to deliver configuration files to APs?
Configure Update Response
IF the PVID of a trunk interface is 5 and the port trunk allow-pass vlan 10 20 command is
run on the interface, which VLANs can transmit traffic?
1/10/20
Each AC needs to specify its sources IP address to establish a CAPWAP tunnel with the
AP. How many WLAN sources Ip addresses can be specified for an AC?
1
The CAPWAP tunnel establishes two tunnels: The data tunnel and the control tunnel.
Keepalive packets are used for keepalives regardless of the tunnels
Wrong
The AP needs to be authenticated when it goes online. The authentication modes include
MAC address authentication and SN authentication.
Right
The bridge IDs of SW1, SW2, SW3, and SW4 are 4096.4c1f-11bc-102a,4096.4c1f-aabc-
102b, 4096.4c1f-aabc-001a, and 8192.4c1f-aabc-112b, if four switches are on the same layer
2 network and STP is enabled, which of the following is the root bridge?
SW3
The root bridge ID, bridge ID, interface Id, and root path cost (RPC) are four important
fields for configuring BPDU priorities. Which of the following is the preferred sequence for
configuring BPDUs on a switch?
Root Bridge ID, RPC bridge ID, and Interface ID
Which of the following statement about the STP root port are correct?
Non-Root bridge can have only one root port
The root port is a non-root bridge port used to received BPDUs
Non- root bridges in STP can also actively send configuration BPDUs
Wrong
You can manually set the priority of the switch BID to 1000.
Wrong
Generally it takes 50 seconds to restore a root bridge fault and 30 seconds to restore a
direct link fault
Right
Which of the following interface configuration parameters does not require the same
configuration of the member interface in a an aggregation group?
Spanning tree configuration
Which of the following statement about active link election in LACP mode is false?
The actor enables the active interface and disables in the inactive interface. The
actor informs the peer of the election result through the physical interface
status.
Which link aggregation mode can implement link backup on Huawei Switches?
Static LACP mode
Which of the following modes is used to send LACP packets to the peer end? ()
Multicast
Which of the following fields is used to select the Actor in the LACPDU?
Device priority
Device MAC address
Which of the following physical parameters must be consistent at both ends of an Ethernet
trunk link
A number of aggregated links
Rate of the aggregated links
Duplex mode of the aggregated links
To ensure the minimum bandwidth you can set the minimum number of active interface in
a link aggregation group
Right
Two devices form a cluster and are virtualized into a single logical device. The simplified
networking does not require protocols such as MSTP and VRRP, simplifying network
configurations. In addition, inter-device link aggregation implements fast convergence and
improves reliability
Right
Which of the following packets is used by ICMP to detect the connectivity between the
sources and destination Ip addresses?
ICMP Echo
Which of the following IP addresses can be manually configured and used by host
interfaces?
10.2.3.4
192.168.100.254
When the TTL field of an IP packet is 0, the router discards the packet
Right
ICMP Defines various error messages for diagnosing network connectivity problems. Base
on the error messages, the sources device may determine the cause of the data transmission
failure.
Right
Run the display IP routing table command to check the IP routing table. Which of the
following is not included in the command output?
advRouter
When a device learns two routes to the same destination, which of the following parameters
is used to distinguish the routes?
Priority
According to the longest match principle, which of the following routes does not packet
with the destination Ip address 172.16.10.1 match?
172.16.10.0/24
When forwarding a packet, the router discards the pacers if no specific route is found and
no default route is available
Right
When forwarding a packet a router can forward the packet based on the source address
Wrong
Which packets are used by OSPF to discover and maintain neighbor relationship.
Hello
By default what is the OSPF cost of a 1.544 Mbit/s serial interface, FE interface, or GE
interface
64,1,1
Which of the followings entries is used by OSPF to store link status information?
OSPF LSDB
Which of the following statements about the router ID is OSPF are correct?
The prerequisites for the normal running OSPF is that the router has the router
ID
On a broadcast network, the final status of DRs between others is 2-ways and does not
enter the full state.
Right
Compared with IPv4, IPv6 has a large number of address spaces. What is the length of an
IPv6 address?
128
Compared with the IPv4 header, which of the following fields is added to the IPv6 basic
header?
Flow Label
An IPv6 unicast address consists of a network prefix and an interface identifier. Common
IPv6 unicast addresses, such as global unicast addresses and link-local addresses, must be
64 bits.
True
IPv6 uses ICMPv6 NS and NA packets to replace the IPv4 address resolution function of
ARP.
True
When IPv6 uses stateless address autoconfiguration, information such as domain names
can be obtained.
False
Which of the following statements about routing and forwarding of Layer 3 switches is
incorrect?
Based on the routing table, the Layer 3 switch directly forwards the packet to the
next hop without re-encapsulating the data frame.
Which of the following types of interfaces can be used to implement inter-VLAN
communication through sub-interfaces?
Trunk
Hybrid
During Layer 3 communication, the source and destination MAC addresses are replaced
each time the packets pass through a Layer 3 device.
True
The Layer 3 switch can properly connect to the router and run a dynamic routing protocol.
True
By default, a sub-interface for VLAN tag termination is not enabled with ARP broadcast
and cannot forward broadcast packets. To allow the sub-interface to forward broadcast
packets, run the arp broadcast enable command on the sub-interface.
True
On a Layer 3 device, you can run the undo port switch command to change a Layer 2
interface to a Layer 3 interface.
True
Layer 2 interfaces do not have MAC addresses, but Layer 3 interfaces have MAC
addresses.
True
Which of the following 802.11 protocols can work only on the 5 GHz frequency band?
802.11ac
What CAPWAP packets does the AC use to deliver configuration files to APs?
Configuration Update Response
Each AC needs to specify its source IP address to establish a CAPWAP tunnel with the AP.
How many WLAN source IP addresses can be specified for an AC?
1
The CAPWAP tunnel establishes two tunnels: the data tunnel and the control tunnel.
Keepalive packets are used for keepalive regardless of the tunnels.
False
The AP needs to be authenticated when it goes online. The authentication modes include
MAC address authentication and SN authentication.
True
What is the default step for ACL rule IDs?
5
If the number of an ACL is 4010, which of the following fields can the ACL match?
Source and destination MAC addresses and Layer 2 protocol types
An AR2220 router uses the following ACL configuration to filter data packets. Which of
the following statements is correct? [RTA]acl 2001 [RTA-acl-basic-2001]rule permit source
10.0.1.0 0.0.0.255 [RTA-acl-basic-2001]rule deny source 10.0.1.0 0.0.0.255 [RTA-acl-basic-
2001]rule permit source 10.0.1.0 0.0.0.3
Packets on the 10.0.1.0/24 network segment will be rejected
The following ACLs are used on RTA to match route entries, which of the following
network traffic will be denied? [RTA]acl 2002 [RTA-acl-basic-2002]rule deny source
172.16.1.1 0.0.0.0 [RTA-acl-basic-2002]rule deny source 172.16.0.0 0.0.255.255 [RTA-acl-
basic-2002]rule permit source any
172.16.1.1/32
172.16.1.0/24
172.16.0.0/24
An advanced ACL can match the source and destination port numbers of packets and filter
TCP packets with a specified destination port number.
True
The command rule permit source 192.168.1.0 0.0.0.254 is used to match all Even IP
addresses in the network segment.
True
If ACL 3500 is manually configured on a device, the ACL cannot be used to control the
source and destination port numbers.
False
Which of the following are the transport layer protocols and authentication port numbers
used by RADIUS?
UDP,1812
If the Telnet service has been configured on the network device, but the user cannot
remotely access the network device, what are the possible causes?
The network device is unreachable.
The password entered by the user is different from the password configured on the
AAA server.
The number of Telnet users has reached the maximum limit.
When receiving a network access request from a user, the NAS determines the domain to
which the user belongs based on the user name and controls the user based on the AAA
scheme corresponding to the domain.
True
If a common user for local authentication is not associated with a user-defined domain, the
user belongs to the default domain.
True
The AAA accounting mode is non-accounting, local accounting, and remote accounting.
False
Which of the following address translation technologies can use only the current address of
an interface as the public address for NAT?
Easy IP
Which NAT technology can be deployed on egress network devices to allow external users
to access a TCP port on the internal server?
NAT Server
Which of the following NAT technologies can be used to enable external users to
proactively access a server on the intranet?
Static NAT
NAT Server
NAPT not only translates IP addresses but also port numbers to implement 1:n mapping
between public addresses and private addresses.
True
Which of the following packets does the DHCP server use to carry the IP address assigned
to the client during DHCP interaction?
DHCP Offer
What is the default destination port number of the FTP control channel?
21
After a DHCP client receives a DHCP ACK packet, which packet does the DHCP client
send to the DHCP server if it finds that the IP address to be used already exists on the
network?
DHCP Decline
Which of the following FTP commands should be used to download files from the FTP
server on the router?
get
Which of the following parameters can be allocated by the DHCP server to the client?
DNS server address
Gateway address
Local IP address
Mask
Next
Which of the following DHCP packets are broadcast?
DHCP Discover
DHCP Request
The FTP working mode can be active or passive. TCP port 20 is used in both modes.
False
FTP uses TCP for transmission, and TFTP uses UDP for transmission.
True
In the NTP network structure, the number indicates the clock precision. The value 1
indicates the highest clock precision, and the value 15 indicates that the clock is not
synchronized.
True
If a packet with mismatched parameters is received during LCP negotiation, which packet
is used by PPP to respond?
Configure-Nak
On a multipoint access network such as Ethernet, the PPPoE server can set up PPP
connections with multiple PPPoE clients through one Ethernet port. Therefore, the PPPoE
server must set up a unique session identifier for each PPP session to distinguish different
connections. What parameters are used to establish a session identifier for PPPoE?
MAC address and session ID
During the establishment of a PPP session, when the physical layer is available, what phase
does the PPP link enter?
Establish
During CHAP authentication, the password configured for a user is carried in plain text in
PPP packets.
False
Next
Which of the following packets is used by SNMPv2c to proactively send alarms to the NMS
and require the NMS to respond explicitly?
Inform
Compared with SNMPv1, SNMPv2c uses which of the following packets to query OID
information in batches?
GetBulk
Which of the following are the attributes of managed devices defined in the MIB database?
OID
Object status
Object access permission
Data type of the object
Compared with SNMPv1 and SNMPv2c, SNMPv3 has the following security features:
Supports user authentication using the MD5 algorithm.
Data encryption using des is supported.
Network devices with SNMP enabled run the Agent process. The NMS management
process interacts with the Agent process through SNMP packets.
True
NETCONF establishes secure connections based on Secure Shell (SSH) or Transport Layer
Security (TLS).
True
Huawei iMaster NCE is a network automation and intelligence platform that integrates
management, control, analysis, and AI functions.
True
In the SDN architecture, which of the following interfaces is used to communicate with
SDN switches?
SBI
In the OpenFlow architecture, which of the following are the types of packets sent from the
controller to the switch?
Controller-to-Switch
Symmetric
An OpenFlow switch forwards packets based on flow tables. In addition to the destination
MAC address and destination IP address, multiple fields can be used to match packets.
True
SDN and NFV technologies are the development trends of current networks. The two
technologies are inseparable.
False
NCE integrates the functions of traditional eSight, Agile Controller, and analyzer.
True
To improve code modularity and code utilization, we can use classes to describe a set of
properties and methods of the same type. The keyword for defining a class is?
class
Which of the following methods is used to write data in the Telnetlib module?
write()Ne
In Python programs, code indentation represents the scope of code blocks. If a block of
code contains two or more statements, the statements must have the same indentation.
True
The Python program written on the Windows platform cannot run on the Unix platform.
False
To save IP addresses, how many bits are used in the subnet mask of the interconnection IP
address of network devices on an enterprise network?
30
Which of the following functions can be enabled on access switches to prevent employees
from accessing small routes carrying DHCP functions?
DHCP Snooping
Which routing protocols can be used to ensure network connectivity within a campus
network?
Static route
OSPF
ISIS
Fixed IP addresses can be allocated to special terminals, such as servers and printers.
True
For the centralized NMS, SNMPv3 adds authentication and encryption, which greatly
improves NMS security.
True
Next
Next
Next