Download as pdf or txt
Download as pdf or txt
You are on page 1of 106

Http://www.passcert.

com
The safer , easier way to help you pass any IT exams.

Exam : H12-821_V1.0-ENU

Title : HCIP-Datacom-Core
Technology V1.0

Version : V9.02

1 / 105
The safer , easier way to help you pass any IT exams.

1.About the OSPF calculating the shortest path tree phase, which of the following description is true?
A. Stub network segment is calculated in the first stage, router node and transit network segment are
calculated in the second stage
B. The routing node and Transiti network segment are calculated in the first stage, Stub network segment
is calculated in the second stage
C. The Stub segment is calculated in the first stage, the routing node is calculated in the second stage
D. The routing node is calculated in the first stage, the stub network segment is calculated in the second
stage
Answer: B

2.About the description of IGMP Snooping working mechanism, which of the following statement is true?
A. The Layer 2 switch establishes and maintains the PIM routing table at Layer 2 by continuously
monitoring IGMP messages
B. When IGMP Snooping is not running, multicast messages will be broadcast on the layer 2. After IGMP
Snooping is running, the messages will no longer be broadcast on the layer 2, but will be multicast on the
layer 2.
C. If the host sends an IGMP leave message, the switch will add the host to the corresponding multicast
table
D. If a host sends an IGMP host report message, the switch will delete the multicast entry corresponding
to the host
Answer: B

3.How many Bytes is the minimum total length of the address in IS-IS?
A. 2
B. 8
C. 20
D. 16
Answer: C

4.On the VRP platform, when we introduce OSPF routing to ISIS, if COST is not specified, the cost value
will be set to 16.
A. True
B. False
Answer: B

5.BGPAS_PATH property is a selectable transition property.


A. True
B. False
Answer: B

6.A network engineer outputs the following information when troubleshooting the OSPF protocol. Based
on this to determine which cause the adjacency relationship cannot be established normally?

2 / 105
The safer , easier way to help you pass any IT exams.

A. The area code does not match


B. Process numbers are discordance
C. The IP address code of the interface is discordance
D. Router ID conflict
Answer: A

7.As shown in the figure, in a pure IPv6 environment, if you want to realize the communication between
PC1 and PC2, which of the following addresses can be configured on PC1 and P2 respectively?

A. 2001:FDC:1/64 2001:FDC::2/64
B. 2001:FDC::1/64 2001:FDC1::2/64
C. F. D00:1AC0:872E::1/64 FDO0:2BE1:2320::1/64
D. F. E80::1/64 FE80::2/64
Answer: B

8.Four routers are running IS-S and the adjacency relation has been established, and the level of area
number and router are marked as shown, which of the following statements are true?

3 / 105
The safer , easier way to help you pass any IT exams.

A. Both R2 and R3 will have the Level-1’s LSP of ATT set


B. R1 does not have the LSP generated by R4, so R1 can only communicate with R4 through the default
route
C. Both R2 and R3 will have the Level-1’s LSP of ATT set
D. R2 and R3 learn default routes from each other, and there is a routing loop in this network
Answer: A

9.A switch runs the RSTP protocol, and its related configuration information is shown in the figure.
According to the command configuration, please point out that for Instance 1, the role of the switch is:

A. Root switch
B. Non-root switch
C. Switch
D. Unable to judge
Answer: A

10.The following is a part of the configuration of a router, which of the following regarding the
configuration is true?

4 / 105
The safer , easier way to help you pass any IT exams.

A. The packet with the source address of 1.1.1.1 matches the first ACL statement rule 0, and the matching
rule is allow.
B. The packet with source address of 1.1.1.3 matches the third ACL statement rule 2, and the matching
rule is deny.
C. The data packet with the source address of 1.1.1.4 matches the fourth ACL statement rule 3, and the
matching rule is allow.
D. The packet with the source address of 1.1.1.2 matches the second ACL statement rule 1, and the
matching rule is allow
Answer: A

11.Which of the following statement about OSPF neighbor information is incorrect?

A. The router id of the neighbor is 2.2.2.2


B. This router is Master
C. The address of DR is 10.1.1.1
D. The router id of this router is 1.1.1.1
Answer: B

12.As show in the figure, which of the following statements is true?

5 / 105
The safer , easier way to help you pass any IT exams.

A. R1 and R2 can establish adjacency, but cannot complete routing calculations


B. R1 and R2 can establish adjacency and can complete routing calculations
C. R1 and 2 cannot establish adjacency, because the network type of the interface is not consistent
D. R1 and R2 cannot establish adjacency, because OSPF process ID is not consistent
Answer: A

13.As shown in the figure, the data traffic before roaming is forwarding as the STA-HAP- upper network,
and the forwarding method is direct forwarding, and the home agent is configured on the AP. After
three-layer roaming, what is the direction of data forwarding traffic?

A. STA-FAP-FAC-HAC-HAP- upper network


B. STA-FAP-FAC-HAC- Upper Network
C. STA-FAP-FAC- Upper Network
D. STA-FAP-FAC-HAC-HAP-HAC- upper network

6 / 105
The safer , easier way to help you pass any IT exams.

Answer: A

14.As shown in the figure, SWA, SWB, and SWC all run RSTP. What are the port roles of the GEO/O/2
port on SWB and the GEO/D/1 port on SWC?

A. Backup port, Root port


B. Alternative port, Backup port
C. Root port, Designate port
D. backup port, alternative port
Answer: D

15.The following information is the output of a router, which of the following regarding the information is
true?

A. The community attribute value carried by the destination network segment 1.1.1.0/24 is no-export,
indicating that the route entry cannot be advertised to any BGP neighbors
B. The community attribute value carried by the destination network segment 5.1.1.0/24 is no-advertise,
indicating that the route entry cannot be advertised to any other BGP peers
C. The community attribute value carried by the destination network segment 1.1.1.0/24 is no-export,
indicating that the route entry can be advertised to any BGP neighbor
D. The community attribute value carried by the destination network segment 5.1.1.0/24 is no-advertise,

7 / 105
The safer , easier way to help you pass any IT exams.

indicating that the route entry cannot be advertised outside the local AS
Answer: B

16.A router is running the IS-IS, the output information shown in FIG, which of the following statements is
incorrect?

A. The System-ID of the neighbor router is 0002.0200.2002


B. This router is DIS
C. The area code of this router is 49.0001
D. System-lD of this router is 0100.0000.1001
Answer: B

17.As shown in the figure below, the firewall received the message from PC1 to PC2, which of the
following statement is true?

A. The message cannot match the security policies rule1 and rule2, it will match the default policy of the
firewall, and the firewall will forward the message
B. The default security policy of the firewall is to match all, and the action is to deny

8 / 105
The safer , easier way to help you pass any IT exams.

C. The message will match the new security strategy rule2, and the firewall will forward the message
D. The message will match the security policy rule 1
Answer: C

18.As shown is an IP packet header, which of the following statement is true?

A. The protocol number is 51, which means that the packet after the IP Header is the AH header
B. The packet must be an IPsec VPN packet installed only with AH
C. The protocol number 51, which means that the message after the IP Header is the ESP header
D. The message is a lpsec VPN message, and the data part of the message is encrypted
Answer: C

19.The following is part of the output information of the Huawei router, regarding the output information,
which of the following description is incorrect?

A. PIM-SM running on the gigabitethernet 1/0/0 interface of the router


B. The PIM state of the router gigabitethernet 1/0/0 running interface is UP
C. The router gigabitethernet 1/0/0 interface is running PIMv2
D. The DR on the interface is 10.1.1.1
Answer: D

9 / 105
The safer , easier way to help you pass any IT exams.

20.The four routes are running lS-IS and the adjacency relationship has been established, the level of the
area number and routers as shown, which of the following statements is true?

A. The LSP of R4 does not exist in the LSDB of the R1 router


B. The LSP of R3 does not exist in the LSDB of the R2 router
C. The LSP of R4 does not exist in the LSDB of the R3 router
D. The LSP of R4 does not exist in the LSDB of the R2 router
Answer: A

21.Four routers are running IS-IS and have established adjacency relationships. The area numbers and
router levels are marked as shown in the figure. If route penetration is configured on the R3 device, what
is the cost value from R4 to 0.0.2.2/32?

A. 40
B. 50
C. 80
D. 30
Answer: B

22.The four routers are running IS-S and have established adjacency. The area number and router level
are marked as shown in the figure. What is the cost value from R4 to 10.0.2.2/32?

10 / 105
The safer , easier way to help you pass any IT exams.

A. 40
B. 10
C. 20
D. 30
Answer: D

23.A router is running the IS-IS, the output information shown in the figure, which of the following
statements is true?

A. The period of the s4/0/0 interface sending llH is 30s


B. The circuit-leve1 of the s4/0/0 interface is Level-1
C. The Cost value of the s4/0/0 interface is 20
D. s4/0/0 interface supports IPv6
Answer: B

11 / 105
The safer , easier way to help you pass any IT exams.

24.In the network shown in the figure, the R1 device is configured with route penetration, then the R1
device sends the LSP of Leve1-2 to R3, so that R3 can learn the entire network route.

A. True
B. False
Answer: B

25.As shown in the figure, four routers in the same LAN are running lS-IS, where R1 is DIS, then R2, R3,
R4 establish adjacency relationship with R1 respectively, and no adjacency relationship is established
between R2, R3, and R4.

A. True

12 / 105
The safer , easier way to help you pass any IT exams.

B. False
Answer: B

26.The following is part of the output information of the router RTB. Which of the following regarding the
description of the output information is false?

A. The last host sending the Report message is 225.1.1.2


B. The number of dynamically joined multicast groups on the interface is 1
C. The display igmp group command is used to view the IGMP multicast information, including the
multicast group information dynamically joined through the member report and the multicast group
information statically joined through the command line
D. The multicast address to join is 255.1.1.2
Answer: A

27.The output information of a router below, which of the following regarding the description of this
information is true?

A. The MED value of the route to the destination network 5.1.1.0/24 is 50


B. The MED value of the route to the destination network 1.1.1.0/24 is 100
C. The next hop of the route to the target network 5.1.1.0/24 is 1.1.1.1 , and the route is optimal
D. The next hop of the route to the target network 1.1.1.0/24 is 1.1.1.1, and the route is optimal
Answer: C

28.The following is the BGP information output by a router. Which of the following rearding the description
of this information is wrong?

13 / 105
The safer , easier way to help you pass any IT exams.

A. The Router ID of the router is 1.1.1.9


B. The display bgp network command is used to display the routing information advertised by BGP
through the network (BGP)
C. The AS number of the router is 10
D. The router introduced the network segment 4.4.4.0/24 through the import-route command
Answer: D

29.The following is a router BGP output information, which of the following regarding the description of
this information is false?

A. It may be caused by an incorrect neighbor address


B. Error Type shows that it is caused by an error in the neighbor relationship
C. The error occurred at 12:40:39 on March 22, 2010
D. The router's neighbor address is 10.1.1.5
Answer: A

30.As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails
and the port is in Down state. At this time, which of the following processes will the network go through to
achieve stability?

14 / 105
The safer , easier way to help you pass any IT exams.

A. The standby port on the SWC becomes the new root port and enters the Forwarding state after passing
through the Learning state
B. SWC re-elects the root port and directly enters the Forwarding state
C. The standby port on the SWC becomes the new root port and directly enters the Forwarding state
D. SWC re-elects the root port and enters the Forwarding state after passing through the Learning state
Answer: C

31.There are the following states in the process of BGP neighbor establishment. Then the sequence of
the state machine to establish a successful connection is:
1. Active
2. OpenConfirm
3. Idle
4. Establish
5. OpenSent
A. 3-1-2-5-4
B. 1-3-5-2-4
C. 3-5-1-2-4
D. 3-1-5-2-4
Answer: D

32.As shown in the figure, the stateful inspection firewall will forward the second TCP three-way
handshake message in the figure.

15 / 105
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: B

33.As shown in the figure, the stateful inspection firewall will forward the message because the message
conforms to the firewall session state.

A. True
B. False
Answer: B

34.The router receives two BGP routes with the following attributes, please select the best route
according to the BGP routing rules:

A. The best route is route M, due to its AS_Path is shorter than route N
B. The best route to route N, due to its MED is smaller than route M
C. The best route to route N, due to its AS_Path is longer than route N
D. The best route to route M, due to its MED is larger than route N
Answer: A

35.Regarding the special area of OSPF, which of the following description of is incorrect?
A. The Totally Stub Area allows the ABR to advertise the default Type 3 LSA, but does not accept the
Type 5 LSA and the refined Type 3 LSA
B. The NSSA Area is different from the Stub area because this area allows the import of autonomous
system external routes, and the ABR advertises LSA7 notifications to this area.
C. The difference between the Stub area and the Totally stub area is that the stub area allows detailed
routing information between areas
D. The difference between a Totally Stub area and an NSSA area is that the Totally Stub area does not
accept inter-area routing information.

16 / 105
The safer , easier way to help you pass any IT exams.

Answer: B

36.Regarding the description of OSPF neighbor relationship and adjacency relationship, which of the
following statement is true?
A. The adjacency is maintenance by the DD message of OSPF
B. OSPF routers must establish an adjacency before exchanging Hello packets
C. Neighbor relationship is a relationship selected from adjacency relationships for the purpose of
exchanging routing information
D. Not all neighbor relationships can become adjacency relationships
Answer: D

37.Which of the following does not belong to the IGP?


A. RIP
B. IS-IS
C. BGP
D. OSPF
Answer: C

38.What are the key components of building an IP wide area bearer network solution with Huawei
NetEngine smart router?
A. iMaster NCE-Fabric
B. iMaster NCE-IP
C. iMaster NCE-Campus
D. iMaster NCE-WAN
Answer: D

39.In the VRRP hot backup, which of the following statement regarding the AC used to establish the
address of the CAPWAP tunnel is true?
A. Physical address of the main AC
B. The physical address of the standby MC
C. Any address configured in AC can be used
D. VRRP virtual addresses of the active and standby ACs
Answer: D

40.The default priority of VRRP devices in the backup group is:


A. 0
B. 200
C. 150
D. 100
Answer: D

41.The advantages of address translation technology do not include:


A. Address translation can enable internal network users (private IP addresses) to access the same
Internet

17 / 105
The safer , easier way to help you pass any IT exams.

B. Address translation can shield users on the internal network and improve the security of the internal
network
C. Address translation can make many hosts in the internal LAN share a IP address to access the Internet
D. Address translation can handle the case of IP header encryption
Answer: D

42.The role of the switch in the stacking system not include:


A. Main switch
B. Candidate switch
C. Slave switch
D. Standby switch
Answer: B

43.Which of the following tools is used to filter routing information and set routing attributes for the routing
information that passes the filter?
A. route-policy
B. as-path-filter
C. policy-based-route
D. IP-prefix
Answer: A

44.Regarding the description of the routing tool, which of the following statement is incorrect?
A. route- policy can only match routes and data packets, and cannot be used to modify routing attributes
or data packet forwarding behavior
B. The prefix list (ip- prefix) matches the destination address of the routing information
C. Access Control List (ACL) is used to match the IP routing information or the address of the data packet
D. as-path-filter is used to match the AS-PATH attribute in BGP routing information, so it can only be used
to filter BGP routes
Answer: A

45.Will setting the community attribute of the route through the routing policy affect the route selection?
A. It can be indirectly affected. You can classify routes by setting the Community attribute of the route, and
then set different routing-related attributes according to the category, such as Local_Pre, MED, etc., so as
to achieve the purpose of influencing routing
B. It cannot be affected because the Community attribute of the route is a non-transitional attribute and
cannot be transmitted between routers
C. It can be indirectly affected. You can classify routes by setting the community characteristics of routing,
and then set different routing-related attributes according to the category. These attributes only include
Loacal_Pre and MED, so as to achieve the purpose of influencing the routing
D. After the router receives the route update with the Commmity attribute of No_ Advertise, it will not be
published outside the local AS
Answer: A

46.Regarding the description of the summary automatic command and BGP aggregation, which of the

18 / 105
The safer , easier way to help you pass any IT exams.

following is incorrect?
A. This command is used to realize automatic aggregation, and its priority is higher than manual
aggregation
B. After configuring this command, BGP will aggregate routes according to natural network segments
C. This command is used to enable automatic aggregation of locally imported routes
D. After configuring this command, BGP only sends aggregated routes to the peer
Answer: A

47.There is a message in the BGP protocol that is periodically sent between BGP neighbors to maintain
the neighbor relationship. This kind of news is:
A. Update
B. Hello
C. open
D. Keepalive
Answer: D

48.In the case of without enabling BGP path load sharing, which BGP routes will be sent to BGP
neighbors?
A. All BGP routes learned from all neighbors
B. Only the best route preferred by BGP
C. Only routes learned from IBGP
D. Only routes learned from EBGP
Answer: B

49.Using the authentication in BGP configuration, how to configure?

A. The same MD5 password must be used between a pair of BGP peers
B. All routers in the AS must use the same password
C. All BGP peers on a router must use the same password
D. All routers in the same AS must use the same password
Answer: A

50.About the description of the Keepalive message of BGP, which of the following is incorrect?
A. Keepalive packet contains only one BGP data header
B. By default, the keepalive interval is 180s
C. Keepalive messages are mainly used to confirm the operating status of peer routers and the availability
of links
D. Keepalive is periodically sent between two BGP neighbors
Answer: B

51.In the IS-IS broadcast network, which multicast MAC address does the Level-1 router use as the
destination address for sending IIH?
A. 0180-c200-0000
B. 0180-c200-0015

19 / 105
The safer , easier way to help you pass any IT exams.

C. 0100-5EOO-0001
D. 0180-c200-0014
Answer: D

52.Which of the following statement about OSPF protocol packets is incorrect?


A. The header format of all OSPF packets is the same
B. All OSPF packet headers carry the Router-ID field
C. The OSPF protocol uses five types of messages to complete the transmission of routing information
D. OSPF packets are encapsulated in UDP packets, and the port number is 89
Answer: D

53.Regarding the ABR in OSPF, which of the following description is wrong?


A. ABR cannot generate Type 3, Type 4, or Type 5 LSA
B. Convert the Type 1 and Type 2 LSAs in the connected non-skeletal area into Type 3 LSAs and publish
them to the backbone area
C. The Type 1, Type 2, and Type 3 LSA in the backbone area of the ABR are converted to Type 3 LSA and
published to the connected non-skeletal area
D. There are multiple LSDBs on the ABR, and the ABR maintains one LSDB for each area
Answer: A

54.Which of the following description of the OSPF default route is false?


A. OSPF routing can be issued by the area border router (ABR) Type3 default Summary LSA, used to
guide the routers in the area to forward packets between areas
B. The Autonomous System Boundary Router (ASBR) publishes Type5 external province ASELSA, or
Type7 external default NSSALSA, which is used to guide the routers in the autonomous system (AS) to
access the outside of the autonomous system
C. When the router does not have an exact matching route, it can forward packets through the default
route
D. Due to the hierarchical management of OSFP routing, the priority of Type5/7 missing routing is higher
than Type3 routing
Answer: D

55.Regarding the LSA header information on the AS-External-LSA of OSPF, which of the following
statement is incorrect?
A. Link State lD represents the destination network address
B. Forwarding Address is always 0.0.0.0
C. Advertising Router represents the Router ID of ASBR
D. Net mask represents the net mask of the destination network segment
Answer: B

56.Which function does the switch control plane not include?


A. Business processing
B. Routing calculation
C. System loading

20 / 105
The safer , easier way to help you pass any IT exams.

D. Traffic statistics
Answer: C

57.By default, for routers running IS-IS in a broadcast network, how many seconds does the DIS send
CSNP packets?
A. 10
B. 3.3
C. 30
D. 40
Answer: A

58.When OSPF runs in a broadcast network, DR and BDR need to be elected.


Then in which of the following statements will DR and BDR elections be conducted?
A. 2-way status
B. Exchange status
C. Full state
D. Init status
Answer: A

59.Regarding the OSPF protocol packets, which of the following statement is false?
A. The OSPF protocol uses five types of messages to complete the transmission of routing information
B. All OSPF packet headers carry the Router-ID field
C. OSPF packets are encapsulated in UDP packets, and the port number is 89
D. The header format of all OSPF packets is the same
Answer: C

60.The MAC address of a certain PC is 5489-98FB-65D8. The administrator wants this PC to obtain the
specified IP address 192.168.1.11/24 from the DHCP server. So the command configured by the
administrator should be:
A. dhcp static-bind ip-address 192.168.1.11 24 mac-address 5489-98FB-65D8
B. dhcp server static-bind ip-address 192.168.1.11 mac-address 5489-98FB-65D8
C. dhcp server static-bind ip-address 192.168.1.11 255.255.255.0 mac-address 5489-98FB-65D8
D. dhcp static-bind ip-address 192.168.1.11 mac-address 5489-98FB-65D8
Answer: B

61.Which of the following is not the main function of NDP?


A. Path MTU discovery
B. Neighbor status tracking
C. Duplicate address detection
D. Address
Answer: A

62.The configuration command for VRRP and BFD linkage is:


A. vrrp vrid 1 track bfd-session session-name 1 reduced 100

21 / 105
The safer , easier way to help you pass any IT exams.

B. bfd-session vrrp vrid 1 track session-name 1 reduced 100


C. vrrp vrid 1 track bfd-session-name 1 reduced 100
D. track vrrp vrid 1 bfd-session session-name 1 reduced 100
Answer: A

63.Regarding the description of the security level of the firewall security zone, which of the following is
false?
A. In the same system, two security zones are not allowed to configure the same security level
B. The security level can only be set for the custom security zone
C. Once the security level is set, it is not allowed to change
D. The newly created security zone, the system defaults its security level to 1
Answer: D

64.The command to configure VRRP preemption delay is:


A. vrrp vrid 1 preempt-mode timer delay 20
B. vrrp twist 1 hour delay 20
C. vrrp vrid 1 preempt-timer 20
D. vrrp vrid 1 preempt-delay 20
Answer: A

65.Compared with routers and switchies, what are the unique modules for firewall forwarding?
A. Switching network board
B. MPU
C. LPU
D. SPU
Answer: D

66.About the description of Network Address Port Translation (NAPT) and the Translate only network
addresses (No-PAT), which of the following statement is true?
A. No-PAT supports protocol address translation at the network layer
B. No-PAT only supports protocol port conversion at the transport layer
C. After NATP translation, for external users, all messages will only come from the same 1P address
D. NAPT only supports protocol address translation at the network layer
Answer: C

67.When the IPv6 address of the host is configured by using stateless address configuration, and other
parameters except the address are obtained through DHCPv6, how to set the M bit and 0 bit in the RA
message?
A. M=1, 0=1
B. M=0, 0=O
C. M=1, 0=O
D. M=O, 0=1
Answer: D

22 / 105
The safer , easier way to help you pass any IT exams.

68.Regarding the description of the Hello message in PIM-SM, which of the following is false?
A. The routers periodically use Hello messages to keep in touch
B. In the PIM-SM network, the newly started multicast router needs to use Hello messages to discover
neighbors and maintain neighbor relationships
C. The Hello message is sent to the multicast address 224.0.0.5
D. Election of DR in multi-router network segment through Hello message
Answer: C

69.The RSTP protocol provides a variety of protection functions. For example, when the border port is
configured to be protected, the processing method after the border port receives the BPDU message is:
A. Forward BPDU packets as required
B. Obtain related information after BPDU message
C. Close the port
D. Directly discard BPDU packets
Answer: C

70.Among the commonly used routing policy tools for BGP, what can be used to match a specific
AS_path?
A. filter-policy
B. ip-prefix
C. ip as-path-filer
D. community-filter
Answer: C

71.The following description about BGP, OSPF, ISIS, which the description is true?
A. BGP neighbor relationship is established based on TCP session, and the port number used is 179
B. ISIS runs based on IP protocol, the protocol number adopted is 89
C. BGP runs based on UDP sessions, and the port number used is 179
D. OSPF runs based on IP protocol, the protocol number adopted is 90
Answer: A

72.Regarding the description of IBGP neighbors and EBGP neighbors, which of the following is false?
A. If the two exchange BGP packets peers belong to different autonomous systems, then the two peers
are EBGP peer
B. If the two exchange BGP packets peers in the same autonomous system, then the two peers are IBGP
peer
C. IBGP peers must be physically directly connected
D. Two routers running BGP must have IP connectivity to establish a TCP session
Answer: C

73.When configuring the BGP, if such a warning is generated: " BGPI6ESTABLISHED:OID[oid] The BGP
FSM enters the Establishedstate”, which of the following description is true?
A. Indicates that the BGP neighbor has been established
B. The warning message is abnormal and must be dealt with

23 / 105
The safer , easier way to help you pass any IT exams.

C. Explain that this type of alarm is generated due to TCP problems


D. Explain that there is a problem due to OPEN message negotiation between BGP neighbors
Answer: A

74.Regarding BGP reliable routing updates, which of the following description of is ture?
A. BGP works on top of UDP, and the transport layer protocol is 179
B. BGP does not need to periodically advertise routing information
C. BGP sends complete routing table information every time a route is updated
D. BGP uses multicast updates
Answer: B

75.The Link ID of the Type 3 of LSA is:


A. Described ABR 's Router ID
B. The port IP address of the DR on the network segment where it is located
C. Described destination network segment
D. Generate the Router ID of this LSA’s router
Answer: C

76.Which of the following strategies or tools cannot be applied to OSPF?


A. access-list
B. prefix-list
C. route-policy
D. as-path filter
Answer: D

77.There are many employees in an enterprise building, and they usually start to access the company's
WLAN network in the lobby when they go to work. As each employee walks to their respective
workstations, everyone's mobile terminal also roams to their respective network coverage areas by
roaming.
In order to ensure that the IP address of each terminal is fixed as much as possible, what is the
recommended approach?
A. Without configuring VLAN Pool, configure a static IP address for each mobile terminal
B. Configure VLAN Pool and configure Hash algorithm
C. Configure VLAN Pool and configure sequential algorithm
D. Configure VLAN Pool and configure the algorithm arbitrarily
Answer: C

78.Which of the following description about VRRP is incorrect?


A. VRRP determines the status of each router in the virtual router based on priority
B. If the Master already exists, Backup will also preempt
C. When two routers with the same priority compete for the Master at the same time, compare the size of
the interface IP address, and the one with the larger interface address is elected as the Master
D. If the Backup router works in non-preemptive mode, as long as the Master router does not fail, the
Backup router will not become the Master router even it is subsequently configured with a higher priority.

24 / 105
The safer , easier way to help you pass any IT exams.

Answer: B

79.Which of the following attacks is not a network layer attack?


A. ICMP attack
BA RP spoofing attack
C. IP spoofing attack
D. Smurf attack
Answer: B

80.The IP protocol number of the VRRP message is:


A. 116
B. 114
C. 112
D. 118
Answer: C

81.In the inter-domain report filtering, which option of the following is the tree breeding outbound
direction?
A. trust—untrust
B. untrust—dmz
C. trust—local
D. untrust—trust
Answer: A

82.In PIM-SM, regarding RP, which of the following description is false?


A. The initial multicast stream of all groups in the shared tree is forwarded to the receiver through the RP
B. One RP can support multiple multicast services at the same time, and one multicast group can
correspond to multiple RPs
C. RP can be responsible for the forwarding of several or all multicast groups, and there can be one RP in
the network
D. All members of the group and multicast sources that send multicast data to the group converge to a
unique RP
Answer: B

83.Regarding the description of the permanent multicast address, which of the following is false?
A. All routers running OSPF protocol listen on 224.0.0.5
B. All hosts and routers in the network segment listen to 224.0.0.1
C. All routers listen on 224.0.0.2
D. All routers running the PIM protocol listen to 224.0.0.100
Answer: D

84.Which of the following regarding the stacked MAD detection is false?


A. When stacking systems act as agents for each other to perform MAD detection, the two stacking
systems can use the same Domain ID

25 / 105
The safer , easier way to help you pass any IT exams.

B. MAD detection methods are divided into direct connection detection and proxy detection
C. MAD proxy detection requires all stack members connected to the proxy device, and added the linked
link to a Eth-Tunk
D. MAD direct connection detection can pass through the intermediate device, also can adopt the
full-mesh method
Answer: A

85.Which of the following tools cannot be used for route filtering?


A. policy-based-route
B. ip community-filter
C. IP-Prefix
D. route-policy
Answer: A

86.Which of the following description of BGP features is false?


A. BGP is an external routing protocol, which used to transfer routing information between ASs
B. BGP is a link state protocol
C. BGP has rich routing filtering and routing strategies
D. BGP supports CIDR
Answer: B

87.In the IS-IS broadcast network, which multicast MAC address does the Level-2 router use as the
destination address for sending lH?
A. 0180-c200-0016
B. 0180-c200-0014
C. 0180-c200-0015
D. 0100-5E00-0002
Answer: C

88.Which of the following description about verifying whether a received Hello message is legal is
incorrect?
A. If the network type of the receiving port is a point-to-point type or a virtual link, the Network Mask field is
not checked
B. The RouterDeadIntera1 field in the received Hello message must be consistent with the configuration
of the receiving port
C. If the network type of the receiving port is broadcast, point-to-multipoint or NBMA, the Network Mask
field in the received Hello message and the interface end may be inconsistent
D. The E-bit in the Options field of the received Hello message must be consistent with the configuration
of the relevant area
Answer: C

89.Which of the following OSPF messages carry master-slave relationship information?


A. LSA Update message
B. LSA Request message

26 / 105
The safer , easier way to help you pass any IT exams.

C. D.D message
D. Hello message
Answer: C

90.Which of the following IEEE 802.11 standards corresponds to Wi-Fi 6?


A. 802.11ac
B. 802.11b
C. 802.11n
D. 802.11ax
Answer: D

91.When configuring dual-link hot backup, the engineer configured the CAPWAP heartbeat detection
interval to be 20 seconds, and the dual-link backup function is enabled, then what is the time for the AP
detecting that the active link times out to perform the active/standby switchover?
A. 75 seconds
B. 20 seconds
C. 60 seconds
D. 90 seconds
Answer: C

92.The default interval for sending BFD detection packets is:


A. 100ms
B. 1000ms
C. 5s
D. 10s
Answer: B

93.Which of the following description of VRRP is false?


A. When using the protocol, you need to configure the virtual router number and virtual IP address on the
router, and directly use the real MAC of the main router, so that a virtual router is added to this network
B. VRRP is a kind of redundant backup protocol. It is designed for LANs with multicast or broadcast
capabilities (such as Ethernet) to ensure that when the next hop router device of a host in the LAN fails,
another router can be used in a timely manner. Instead, to maintain the continuity and reliability of network
communication
C. A virtual router is composed of a main router and several backup routers. The main router realizes the
real forwarding function. When the main router fails, a backup router will become the new main router and
take over its work.
D. The host on the network communicates with the virtual router, and there is no need to know all the
information of the physical router on this network
Answer: A

94.The command to configure VRRP to track the state of the physical interface is.
A. track vrrp vrid 1 interface Gigabitethernet0/0/0
B. vrrp vrid 1 interface Gigabitethernet0/0/0

27 / 105
The safer , easier way to help you pass any IT exams.

C. vrrp vrid 1 track interface Gigabitethernet0/0/0


D. vrrp vrid 1 interface Gigabitethernet0/0/0 track
Answer: C

95.When the stateful inspection firewall forwarding a subsequent packet (non-first packet), which is
mainly based on the following items?
A. Route table
B. OFIB table
C. MAC address table
D. Session table
Answer: D

96.The ACL command ac1 [number] ac1-number [ match-order {autol config}], where ac1-numnbe is
used to specify the number of the access control list, and the value range of ac1-number of the basic
access control list is ().
A. 1000~3999
B. 0~1000
C. 3000~3999
D. 2000 ~2999
Answer: D

97.Which of the following tools cannot be directly referenced by the apply clause of route-policy?
A. IP-Prefix
B. day
C. community
D. origin
Answer: A

98.Which of the following about the default routing of each protocol is incorrect?
A. BGP can deliver default routes
B. ISIS can issue default routes
C. OSPF cannot deliver default routes
D. Static default route can be configured
Answer: C

99.Which of the following about the description of the information contained in the OPEN message in the
EGP is incorrect?
A. OPEN message contains local AS number information
B. OPEN message contains VERSION information
C. OPEN message contains Hold time message
D. OPEN message contains only BGP message header
Answer: D

100.In a broadcast type network, what is the default time interval for DIS to send Hello?

28 / 105
The safer , easier way to help you pass any IT exams.

A. 5s
B. 10s
C. 40s
D. 3.3s
Answer: D

101.Which of the following about the IS-IS protocol statement is false?


A. IS-IS protocol supports CLNP network
B. IS-IS protocol supports IP network
C. IS-IS protocol packets are directly encapsulated by the data link layer
D. The ls-ls protocol is a link state protocol running between ASs
Answer: D

102.For the information output by the display ospf peer, which of the following description is true?
<Huawei=display ospf peer
OSPF Process 1 with Router ID 10.1.1.2
Neighbors
Area 0.0.0.0 interface 10.1.1.2(Gigabitethernet1/0/0)'s neighbors
Router ID: 10.1.1.1
Address:10.1.1.1
State: Full Mode: Nbr is Slave Priority: 1
DR: 10.1.1.1BDR: None MTU: 0
Dead timer due in 38 sec
Retrans timer interval: 5Neighbor is up for 00: 00:04
Authentication Sequence: [0]
A. After negotiation during the DD exchange process, the local end becomes a slave
B. Address: 10.1.1.1 means the local interface address is 10.1.1.1
C. Router ID means that the local router ID is 10.1.1.1
D. Designated router (DR) for the address is 10.1.1.1
Answer: D

103.About LSA3, LSA4 and LSA5, which of the following description is true?
A. LSA5 will not change after traversing different areas, while LSA3 will change
B. LSA3, LSA4 and LSA5 will not change after traversing different areas
C. LSA3 will not change after traversing different areas, while LSA4 and LSA5 will change
D. LSA4 will not change after traversing different areas, while LSA3 and LSA5 will change
Answer: A

104.Which of the following about OSPF is true?


A. OSPF LSA is updated regularly every 30 minutes
B. OSPF floods an LSU every 5s
C. OSPF uses Bellman-Ford algorithm, each router runs the algorithm independently
D. OSPF itself does not have a confirmation mechanism, so OSPP relies on the underlying protocol,
namely TCP confirmation.

29 / 105
The safer , easier way to help you pass any IT exams.

Answer: A

105.Which of the following OSPF areas can only reach other areas through the default route?
A. Backbone area
B. totally stub area
C. NSSA
D. Non-backbone area
Answer: B

106.Regarding the matters needing to be attention in configuring the Stub area, which of the following
description of is true?
A. The virtual link can traverse the stub area
B. If an area is configured as a stub area, all routers in the area must be configured with stub area
attributes
C. The backbone area can be configured as a stub area
D. ASBR can exist in the stub area
Answer: B

107.About OSPF 's ASBR Summary-LSA information description, which of the following is false?
A. Metric indicates that the overhead of ABR to reach the ASBR of OSPF
B. Advertising Router represents the ABR 's Router ID
C. Link State ID indicates the Router ID of ASBR
D. The Advertising Router fields in the ASBR-Summary-LSA of all areas are the same
Answer: D

108.A medium-sized campus network manages the network through the SNMP protocol. Which version of
SNMP does the campus manage?
A. All versions can be implemented
B. SNMPv1
C. SNMPv2C
D. SNMPv3
Answer: D

109.When the BFD detection interval at both ends is 30ms and 40ms respectively, which of the following
descriptions is correct?
A. The bfd session cannot be established
B. bfd session can be established, 40ms after negotiation
C. The bfd session can be established, and they can be sent at intervals according to their own time
D. bfd session can be established, 30ms after negotiation
Answer: B

110.Which is not included in the three elements of the server map table of the USG series firewalls?
A. Destination port number
B. Agreement number

30 / 105
The safer , easier way to help you pass any IT exams.

C. Destination IP
D. Source IP
Answer: D

111.A socket is composed of a 5-tuple, so which of the following options does not belong to the scope of
the 5-tuple?
A. Source IP
B. Source MAC
C. Destination IP
D. Destination port
Answer: B

112.What is the meaning of B in the FLAG field in the forwarding table?


A. Available routes
B. Static routing
C. Black hole routing
D. Gateway routing
Answer: C

113.Which of the following types of equipment is suitable for Huawei's IP wide area bearer network
solution?
A. NetEngine 8000
B. NetEngine AR6000
C. CE12804
D. AirEngine 5760-22w
Answer: A

114.Which description is wrong about VRRP?


A. The routers in the VRRP group elect a Master based on priority
B. If the Master router fails, the Backup router in the virtual router will re-elect a new Master based on the
priority
C. Because the priority range is 1-255, when the priority value in the VRRP notification message received
by the Backup device is 0, Backup will discard the message without any processing.
D. The Master router notifies its virtual MAC address to the device or host connected to it by sending a
gratuitous ARP packet
Answer: C

115.What is the BFD version number supported by the VRP version?


A. version 3
B. Version 2
C. Version 1
D. Version 4
Answer: C

31 / 105
The safer , easier way to help you pass any IT exams.

116.If two devices are connected, and one of the devices supports the BFD detection function, and the
other device does not, which feature of EFPD can be used by the device that supports the BED detection
function to achieve link connectivity detection?
A. Two-way detection
B. Interface status linkage
C. One-arm echo
D. Quick handshake
Answer: C

117.Which layer of data packets does the packet filtering firewall inspect?
A. Link layer
B. Application layer
C. Network layer
D. Physical layer
Answer: C

118.Intranet users of a company use the No-pat method of NAT to access the Internet. If all public IP
addresses are used, what will happen to intranet users who subsequently go online?
A. Squeeze out the previous user and force the NAT conversion to go online
B. Synchronize packets to other NAT translation devices for NAT translation
C. Automatically switch NAT to PAT and then surf the Internet
D. Subsequent intranet users will not be able to access the Internet
Answer: D

119.When the payload is an ICMPv6 packet, if the extended header is not considered, what is the value of
the Next Header field in the IPv6 header?
A. 68
B. 58
C. 55
D. 78
Answer: B

120.The following is a partial configuration of a router. Which description of this configuration is correct?
[HUAWEI] ip ip-prefix plpermit 10.0.192.0 8 greater-equal 17 less-equal 18
A. In the 10.0.192.0/8 network segment, the route with a mask length of 20 will be matched to the prefix
list, and the matching rule is allow
B. In the 10.0.192.0/8 network segment, the route with a mask length of 18 will be matched to the prefix
list, and the matching rule is allow
C. In the 10.0.192.0/8 network segment, the route with a mask length of 19 will be matched to the prefix
list, and the matching rule is allow
D. In the 10.0.192.0/8 network segment, the route with a mask length of 21 will be matched to the prefix
list, and the matching rule is allow
Answer: B

32 / 105
The safer , easier way to help you pass any IT exams.

121.The following is part of the configuration information of the router Huawei. Which description is wrong
about the configuration information?
[HUAWEI] ip as-path-filter 2 permit_200_300
[HUAWEI]route-policy test permit node 10
[HUAWE]-route-policy] if-match as-path-filter 2
A. Define a Route-Policy named test, the node serial number is 10
B. Set the AS path filter with sequence number 2 to allow AS200 and AS300 to be included in the routing
information
C. Node 10 of the Route-Policy references AS path filter 2 and defines an if-match clause
D. The Route-Policy can only be called in the OSPF process
Answer: D

122.Which of the following scenarios is not suitable for deploying interface policy routing?
A. In the scenario of multiple ISP outlets in the corporate network, different network segments of the
intranet access the Internet through different ISP outlets
B. Modify the traffic originated locally-hop
C. On the core switch, draw the traffic from the internal network and external network to the AC device
that is connected to the bypass
D. On the core switch, the traffic of mutual access between the internal network and the external network
is dragged to the side-mounted security detection device
Answer: B

123.Which description is wrong about the BGP Keepalive message?


A. Keepalive is periodically sent between two BGP neighbors
B. Keepalive messages are mainly used to confirm the operating status of peer routers and the availability
of links
C. Keepalive message contains only one BGP data header
D. By default, the keepalive interval is 180s
Answer: D

124.Which of the following Hello messages is not included in the IS-IS protocol?
A. Leve1-1 LAN lH
B. P2PIlIH
C. Leve1-2 LANIIH
D. P2MP llH
Answer: D

125.What problem does IGMP Snooping mainly solve?


A. IGMP Report message legality issue
B. There are a large number of receiver hosts on the network segment, and the router will receive a large
number of IGMP Report messages.
C. Solve the problem of multicast data message broadcasting on Layer 2 devices, which is used to
manage and control the forwarding of multicast data messages
D. The receiver host only supports the IGMPv2 protocol, but the SSM multicast model is used in the

33 / 105
The safer , easier way to help you pass any IT exams.

network
Answer: C

126.Which of the following statements about stack splitting is wrong?


A. If the main and standby switches are in two stacking systems after the stack is split, the stack system
where the original main switch is located will update the topology and re-designate the standby switch.
The original standby switch will be promoted to the master in the new stacking system, and the new
standby switch will be elected at the same time
B. After the stack splits, the MAC addresses of the two stacking systems will definitely change
immediately
C. After the split, multiple stack systems will have the same IP address and MAC address. To avoid
network failures, the stack will perform MAD detection. The party that fails the MAD detection competition
will close all physical ports except for reserved ports.
D. If the master and backup switches are still in the same stack system after the stack is split, the slave
switches separated from the original master and backup switches will re-elect the master and backup
transfer machines due to the timeout of the protocol packets.
Answer: B

127.Use the IP prefix list as shown in the figure for route matching. Which of the following routes can be
matched?
ip ip-prefix List1 index 10 permit 192.168.1.0 24 greater-equal 24 less-equal 27
A. 192.168.2.0/24
B. 192.168.3.0/25
C. 192.168.1.0/27
D. 192.168.1.0/23
Answer: C

128.Regarding the description of the characteristics of the routing strategy, which is correct?
A. Application command policy- based-route
B. Forwarding according to the routing table based on the destination address
C. Manual hop-by-hop configuration is required to ensure that packets are forwarded according to the
policy
D. Based on the forwarding plane, serving the forwarding strategy
Answer: B

129.The BGP protocol uses the peer default-route-advertiset command to advertise routes to neighbors.
At the same time, regarding the changes in the DGP routing table, which is correct?
A. local BGP generating a routing table - the default route, send the results according to the following
routing IP routing table
B. No impact, no default route is generated in the local BGP routing table
C. Generate an active default route in the local BGF routing table, and deliver the originating IP routing
table
D. An inactive default route is generated in the BGF routing table in the local area, but not sent to the IP
routing table

34 / 105
The safer , easier way to help you pass any IT exams.

Answer: B

130.In the description of the default priority of each protocol under the VRP platform, which is correct?
A. The priority of OSPF routing is 15
B. The priority of ISIS routing is 10
C. The priority of static routing is 60
D. The priority of BGP routing is 20
Answer: C

131.The following is a router BGP error output information, which description of this information is wrong?
<HUAWEL>display bgp error Error Type: Peer Error Date/Time:2010-03-2211:40:39 Peer
Address:10.1.1.2Error lnfo Router-id conflict
A. Error Type display because the neighbor relationship False caused
B. The router's neighbor address is 10.1.1.2.
C. False may be caused by the wrong AS number of the peer
D. The error occurred at 11:40:39 on March 22, 2010
Answer: C

132.The content contained in the UPDATE message, which of the description is wrong?
A. UPDATE contains the local AS number
B. UPDATE contains path attributes
C. UPDATE contains information about withdrawing the routing prefix
D. UPDATE contains reachable route prefix information
Answer: A

133.How long is the default DHCP address pool lease period?


A. 1 month
B. 1 hour
C. 1 week
D. 1 day
Answer: D

134.The BFD control message is encapsulated in a UDP message for transmission, so the destination
port number of the multi-hop BFD control message is?
A. 5784
B. 3784
C. 4784
D. 2784
Answer: C

135.What is the security level of the DMZ in the USG series firewall?
A. 85
B. 5
C. 50

35 / 105
The safer , easier way to help you pass any IT exams.

D. 100
Answer: C

136.The following statements about different types of firewalls, which is wrong?


A. The stateful inspection firewall needs to be configured with security policies in both the " go " and "
back " directions of packets
B. The packet filtering firewall must perform ACL matching check for each data packet passing through
the firewall
C. Proxy firewall proxy business between internal network and external network users
D. Stateful inspection firewall only checks the security policy of the first packet that does not hit the
session
Answer: A

137.What is the security level of the Untrusts zone in the USG series firewall?
A. 10
B. 50
C. 15
D. 5
Answer: D

138.Which of the following statements about the concept of multicast is wrong?


A. Multicast router: router or layer three switch that supports layer 3 multicast function
B. Multicast group, a set identified by IP multicast address
C. The group refers to the source, the sender of information, needs to join the multicast group to provide
the forwarding of group refers to group messages
D. Multicast group members, multicast group members can be widely distributed anywhere in the network
Answer: C

139.Which of the following properties must exist in BGP 's Update message?
A. AS-PATH
B. LOCAL-PREF
C. MED
D. PrefVal
Answer: A

140.Which of the following BGP routing attributes is not a recognized attribute?


A. AS_ PATH
B. Origin
C. MED
D. Local_Pref
Answer: C

141.Regarding the OSPF multi-process description, which is wrong?


A. Multiple different OSPF processes can run on the same router, and they do not affect each other and

36 / 105
The safer , easier way to help you pass any IT exams.

are independent of each other


B. An interface of a router can only belong to one OSPF process
C. The routing interaction between different OSPF processes is equivalent to the routing interaction
between different routing protocols
D. Different OSPF routers establish neighbors, and the process numbers must be the same
Answer: D

142.Which is wrong about RIB and FIB?


A. FIB directly guides the forwarding of packets
B. The next hop in RIB is the IP address of the interface directly connected to the neighbor
C. FIB is generated by RIB
D. RIB does not directly guide the forwarding of packets
Answer: B

143.A company newly purchased a network device. As a network administrator, what method is usually
used to configure the device for the first time?
A. FTP
B. TeInet
C. SNMP
D. Console port login
Answer: D

144.In a stateful inspection firewall, when the stateful inspection mechanism is turned on, when the
second packet (SHN+ACK) of the three-way handshake arrives at the firewall, if there is no corresponding
session table on the firewall, which of the following statements is correct?
A. If the firewall security policy allows packets to pass, create a session table
B. By default, after the status function is turned off, and the permission policy is configured, you can pass
C. The message must pass through the firewall and establish a session table
D. If the firewall security policy allows packets to pass, the packets can pass through the firewall
Answer: B

145.Which is wrong about the NDP address function in the following description?
A. Two ICMPv6 messages, neighbor solicitation and neighbor advertisement, are used in the address
process
B. The address realizes the function from the IPv6 address to the link layer address
C. When sending a neighbor solicitation message, the destination address must be the neighbor's
solicited node multicast address
D. When sending a neighbor solicitation message, the source address must be the link-local address of
the local interface
Answer: D

146.Which of the following statements about multicast packet forwarding is correct?


A. The source address of the multicast packet is a unicast address
B. In the multicast transmission mode, the destination address of the message can clarify the location of

37 / 105
The safer , easier way to help you pass any IT exams.

the receiver
C. RPF check failure indicates that the multicast data packet is received from the sub-optimal interface,
but the inbound interface will still receive the multicast traffic and forward it downstream
D. The IGMP Snooping function cannot control the range of multicast traffic flooding in the Ethernet
Answer: A

147.RSTP provides different protection functions in different scenarios. Which of the following is wrong?
A. After the BPDU protection function is enabled on the switching device, if the edge port receives the
RST BPDU, the edge port will be set as a non-edge port, and the spanning tree calculation will be
performed again
B. After the anti-TC-BPDU packet attack function is enabled, the number of times the switching device
processes TC BPDU packets in a unit time can be configured
C. The designated port with root protection function enabled, its port role can only be maintained as the
designated port
D. Start the designated port of root protection. When the port receives a better RSTBPDU, the port will
enter the Discarding state and no longer forward packets. If the port does not receive a better RST BPDU
within a period of time, it will automatically return to the normal Forwarding state
Answer: A

148.In the RSTP protocol, when the network topology changes, the mechanism for responding to
changes in the topology is?
A. The MAC table remains unchanged
B. Delete the entire MAC address table
C. Modify the lifetime of the MAC address table
D. Partial deletion of the MAC address table
Answer: D

149.The command format of the prefix list (IP-Prefx) is ip ip-prefx ip-prefix-name [index index-mnumber]
permit/deny] ipv4-address mask-length [greater-equal greater-equal-value] [less -equal less-equalvalue],
if only greater-equal is specified but less-equal is not specified, the prefix range is:
A. [0. greater-equal-value]
B. Unlimited
C. [mask-length, greater-equal-value]
D. [greater-equal-value.32]
Answer: D

150.When a router running BGP receives a route with an unreachable next hop, how to deal with it?
A. Refuse to join the BGP routing table, and silently discard
B. Receive the route, add it to the BGP routing table, participate in the BGP routing rules, it may be
selected as the best route, and add it to the IP routing table
C. Receive the route and add it to the BCP routing table. But this route will not be selected by BCP and
will not be added to the IP routing table
D. Send an error message to the router that issued the Update
Answer: C

38 / 105
The safer , easier way to help you pass any IT exams.

151.The following description of the BGP UPDATE message, which is wrong?


A. The UPDATE message is sent in the form of multicast
B. UPDATE message can carry multiple reachable routing information
C. Generally, the UPDATE message is sent after Keepalive
D. UPDATE message is used to transfer routing information between BGP peers
Answer: A

152.Which TLV does IS-IS use to describe the IP Interface Address?


A. 129
B. 128
C. 131
D. 132
Answer: D

153.Which of the following descriptions of the OSPF protocol is wrong?


A. There are four connection types described by Router-LSA: P2P/TransNet/StubNetl virtual link
B. It is only allowed to advertise routing information between backbone areas and non-backbone areas,
and it is not allowed to advertise routing information directly between non-backbone areas
C. Each OSPF router uses only one Router-LSA to describe the local active connection status belonging
to an area
D. The Link State ID described in the third type of LSA is the router-id of the ABR
Answer: D

154.Which of the following statements about the OSPF protocol is wrong?


A. OSPF protocol supports area division
B. OSPF supports load sharing for equal-cost routes
C. OSPF packets are encapsulated in IP packets and can be sent in the form of unicast or multicast
D. OSPF is an exterior gateway protocol based on link state
Answer: D

155.When two routers exchange database information through DD messages, a master-slave


relationship is first formed, and the one with the larger router id must be the master.
A. TRUE
B. FALSE
Answer: A

156.In a large-scale WLAN network, if the VLAN Pool uses HASH to allocate VLAN, the number of users
in each VLAN will be evenly divided.
A. TRUE
B. FALSE
Answer: B

157.The DHCP relay is responsible for forwarding DHCP messages between the DHCP server and the

39 / 105
The safer , easier way to help you pass any IT exams.

DHCP client, and assists the DHCP server in dynamically assigning network parameters to the DHCP
client.
Answer: A

158.When two devices with the same priority compete for the role of Master at the same time, the device
with the interface with the smaller IP address should be selected as the Master device
A. TRUE
B. FALSE
Answer: B

159.The interface IP address and virtual IP address of VRRP can be the same
A. TRUE
B. FALSE
Answer: A

160.When pinging the IP address of a certain interface of the firewall on the firewall, these messages will
be handed over to the internal module of the firewall for processing and will not be forwarded.
A. TRUE
B. FALSE
Answer: A

161.IGMP Snooping cannot solve the bandwidth waste of multicast traffic on the Layer 2 switch, that is,
whether IGMP Snooping is configured on the Layer 2 switch has no effect on the multicast traffic.
A. TRUE
B. FALSE
Answer: B

162.When IGMP query is configured with SSM Mapping rules, SSM services can only be provided to
member hosts running IGMPv2
A. TRUE
B. FALSE
Answer: B

163.After a switch is powered on to join a running stack system, this behavior is called stack join.
A. TRUE
B. FALSE
Answer: A

164.If a modular switch only supports the use of cluster cards on the main control board to establish a
cluster connection, it means that the modular switch uses CSS2 stacking technology.
A. TRUE
B. FALSE
Answer: B

40 / 105
The safer , easier way to help you pass any IT exams.

165.MQC, like PBR, can only be called under the three-layer interface of the device.
A. TRUE
B. FALSE
Answer: B

166.Routes injected into BGP by re-issuing the command, the Origin attribute of which is Incomplete
A. TRUE
B. FALSE
Answer: A

167.BGP neighbors are neighbor relationships established through UDP.


A. TRUE
B. FALSE
Answer: B

168.The import-route limit command cannot limit the maximum number of external routes that can be
imported in an OSPF process.
A. TRUE
B. FALSE
Answer: B

169.The ABR in the OSPF stub area does not flood the fifth type LSA and the fourth type LSA into the stub
area, and draws a default LSA to the stub area to guide how data packets reach the destination outside
the AS
A. TRUE
B. FALSE
Answer: A

170.In the OSPF routing protocol, the asbr-summary command can be followed by the not-advertise
parameter, which means that aggregated routes are not advertised.
A. TRUE
B. FALSE
Answer: A

171.For two routers running IS-IS, the adjacency relationship can be established only when the time
interval of lH transmission is the same
A. TRUE
B. FALSE
Answer: B

172.The default value of the ospfdr-prioritye command is 1, and the value range is 0~255.
A. TRUE
B. FALSE
Answer: A

41 / 105
The safer , easier way to help you pass any IT exams.

173.In OSPF broadcast or NBMA network types, devices with a large DR Priority may not necessarily
become DR.
A. TRUE
B. FALSE
Answer: A

174.After the modular switch receives the business message, it is processed by the upstream interface
board, then processed by the downstream interface board, and finally sent from the interface.
A. TRUE
B. FALSE
Answer: A

175.iMaster NCE-Campus supports the management of Huawei network equipment through NETCONF
and the management of third-party equipment through SNMP
A. TRUE
B. FALSE
Answer: A

176.The following is about the dual-link hot standby configuration. When configuring the priority of the AC,
the greater the priority value, the higher the actual priority of the AC
A. TRUE
B. FALSE
Answer: B

177.In the MAC-based Portal authentication scenario, when a user successfully performs Portal
authentication, he can disconnect from the network and reconnect within a certain period of time, and he
can directly access through MAC authentication without entering the username and password to perform
Porta1 authentication again.
A. TRUE
B. FALSE
Answer: A

178.After dividing an interface of the firewall into the Untrust security zone, the interface belongs to the
Untrust zone and no longer belongs to the Local zone
A. TRUE
B. FALSE
Answer: A

179.After the IGMP proxy device receives a report message from a multicast group, if it does not find the
corresponding multicast group, the IGMP proxy device will send a report message for the multicast group
to the access device, and send it to the access device. Add the multicast group to the forwarding table.
A. TRUE
B. FALSE

42 / 105
The safer , easier way to help you pass any IT exams.

Answer: B

180.The first 4 bits of the IP multicast address are fixed 1110, corresponding to the high 25 bits of the
multicast MAC address. Among the last 28 bits of the IP multicast address, only 23it is mapped to the
MAC address, so 5 bits of address information are lost. The direct result is that 32 IP multicast addresses
are mapped to the same MAC address.
A. TRUE
B. FALSE
Answer: A

181.IGMP3 not only supports the past group query of IGMPv1 version and the specific group query of
IGMPv2 version, but also supports the specified source/group query of IGMPv3 version
A. TRUE
B. FALSE
Answer: A

182.IGMPv1 defines a mechanism for electing queriers when there are multiple routers in a shared
network.
A. TRUE
B. FALSE
Answer: B

183.For the link state routing protocol, when filter-policy import is used, the filtered link state information
cannot be calculated as a route, and its neighbors cannot receive complete link state information.
A. TRUE
B. FALSE
Answer: B

184.In the routing rules of BGP, the manually aggregated route generated by the aggregate command
has a higher priority than the automatically aggregated route generated by the summary automatic
command.
A. TRUE
B. FALSE
Answer: A

185.In the OSPF routing protocol, the asbr-summary command can be followed by the not-advertise
parameter. The meaning of this parameter is not to advertise aggregated routes.
A. TRUE
B. FALSE
Answer: A

186.In the OSPF routing protocol, the asbr-summary command can be followed by the not-advertise
parameter. The meaning of this parameter is not to advertise aggregated routes.
A. TRUE

43 / 105
The safer , easier way to help you pass any IT exams.

B. FALSE
Answer: A

187.The ABR in the OSPF fully stub area does not flood the third, fourth, and fifth type LSA to the area.
Therefore, the ABR in the fully stub area needs to manually delegate a default route to the area to guide
how data packets reach the outside of the AS destination.
A. TRUE
B. FALSE
Answer: B

188.The ABR in the NSSA area will not flood the fourth and fifth type LSAs to the NSSA, but will flood the
seventh type LSA to other areas.
A. TRUE
B. FALSE
Answer: B

189.ICMPv6 has two types: Error Messages and Information Messages.


A. TRUE
B. FALSE
Answer: A

190.IPv6 link-local addresses can be generated through stateless automatic configuration.


A. TRUE
B. FALSE
Answer: B

191.IPv6 link-local addresses can be generated through stateless automatic configuration.


A. TRUE
B. FALSE
Answer: B

192.The shortest path from the multicast source to the receiver becomes the shortest path tree SPT.
A. TRUE
B. FALSE
Answer: A

193.There are 4 port roles defined in RSTP, among which the part role values in the flags field of the
Alternative port and Backup port in the STP packet are always 01.
A. TRUE
B. FALSE
Answer: A

194.If the router-id is configured in both the system view and the BGP view of the router, because the
BGP view has a higher priority, BGP uses the router-id in the BGP view.

44 / 105
The safer , easier way to help you pass any IT exams.

A. TRUE
B. FALSE
Answer: A

195.When the Hold time supported by two BGP neighbors is inconsistent, the neighbors will negotiate to
adopt the lowest Hold time interval that both ends can support.
A. TRUE
B. FALSE
Answer: A

196.When the BGP versions supported by two BGP neighbors are inconsistent, the neighbors will
negotiate to adopt the highest BGP version that both ends can support.
A. TRUE
B. FALSE
Answer: B

197.By default in VRP, when the route-policy of BGP is changed, manual operations are required to
resend the update message to the neighbor.
A. TRUE
B. FALSE
Answer: B

198.In the OSPF routing domain, in broadcast networks and NBMA networks with at least two routers,
one router must be designated as DR and the other as BDR.
A. TRUE
B. FALSE
Answer: B

199.In the OSPF routing protocol, the unit of the bandwidth-reference command is Mbps.
A. TRUE
B. FALSE
Answer: A

200.By default, the OSPF port cost is related to the port bandwidth. The calculation formula is
bandwidth-reference/bandwidth. The cost is only calculated by OSPF and cannot be changed manually.
A. TRUE
B. FALSE
Answer: B

201.The next-hop address of the routing entry in the routing table must be in the same network segment
as the address of its direct connection port.
A. TRUE
B. FALSE
Answer: B

45 / 105
The safer , easier way to help you pass any IT exams.

202.In the BGP routing rules, the route with the higher Local_Pref value is preferred.
A. TRUE
B. FALSE
Answer: B

203.VPN technology that can only provide Layer 2 network interconnection.


A. TRUE
B. FALSE
Answer: B

204.When two routers establish a pair of logical BGP peers through a multi-hop physical link, the peer
connect-interface command must be used.
A. TRUE
B. FALSE
Answer: A

205.On the broadcast or NBMA network, not all neighbors will establish adjacency.
A. TRUE
B. FALSE
Answer: A

206.On-board AC refers to the built-in AC capability of Huawei agile switches, which realizes the
integrated management of wired and wireless services, and the unified management of wired and
wireless business traffic is centralized by the agile switch
A. TRUE
B. FALSE
Answer: A

207.In VRRP, when the device status changes to Master, it will immediately send gratuitous ARP to
refresh the MAC table entries of the downstream device, thereby directing the user's traffic to this device.
A. TRUE
B. FALSE
Answer: A

208.The routing tool route-policy can filter and set BGP attributes based on pre-defined conditions, so it is
often used to define policies for BGP peers, and it is often used during route generation. All the configured
routes are denied to pass the route-policy.
A. TRUE
B. FALSE
Answer: A

209.With regard to the dual-link hot standby configuration, when configuring the priority of an AC, the
higher the priority value, the higher the actual priority of the AC.

46 / 105
The safer , easier way to help you pass any IT exams.

A. TRUE
B. FALSE
Answer: B

210.RPF has the function of preventing multicast forwarding loops.


A. TRUE
B. FALSE
Answer: A

211.Different from STP, RSTP has only one BPDU type, its value is 2, and there is no TCN BPDU.
A. TRUE
B. FALSE
Answer: A

212.The BGP Speaker only advertises the changed routes to neighbors.


A. TRUE
B. FALSE
Answer: A

213.OSPF supports area authentication and interface authentication. If both authentication methods are
configured at the same time, interface authentication is better than area authentication.
A. TRUE
B. FALSE
Answer: A

214.If the DR Priority is set to 0, then in the OSPF routing domain, the router is allowed to be elected as
DR or BDR, but with the lowest priority.
A. TRUE
B. FALSE
Answer: B

215.In the OSPF routing protocol, the types of LSA involved in the calculation of intra-area routes are only
Router LSA, Network LSA and Summary LSA.
A. True
B. False
Answer: B

216.In the MSTP protocol, each MST Instance uses the RSTP algorithm separately to calculate a
separate spanning tree.
A. True
B. False
Answer: A

217.By default, VRP automatically aggregates the routes imported by BGP.

47 / 105
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: B

218.If IGP routing wants to become a BGP routing, it can only be done through the network command.
A. True
B. False
Answer: B

219.The state inspection firewall uses the session table to track the active TCP sessions and UDP
sessions, and the firewall security policy determines which sessions are established, and the data
packets will only be forwarded when they are associated with the session.
A. True
B. False
Answer: A

220.Both policy routing and routing strategy can affect the forwarding process of data packets, but they
affect the data packets in different ways. Policy routing is based on policy forwarding, based on the
forwarding plane. The routing strategy is based on the control plane, serving routing protocols and routing
tables.
A. True
B. False
Answer: A

221.OSPF supports multiple processes. Multiple different OSPF processes can run on the same router.
They do not affect each other and are independent of each other. The routing interaction between
different OSPF processes is equivalent to the routing interaction between different routing protocols.
A. True
B. False
Answer: A

222.In order to avoid inter-area loops, OSPF stipulates that it is not allowed to advertise routing
information directly between two non-backbone areas. It is only allowed to advertise routing information
within a regional city or between a backbone area and a non-backbone area. Therefore, each district
border router (ABR) must be connected to the backbone area
A. True
B. False
Answer: A

223.It is possible to prevent the HSB backup channel between the active and standby ACs from being
interrupted and unperceivable through mechanisms such as sending active and standby service packets
and retransmissions.
A. True
B. False

48 / 105
The safer , easier way to help you pass any IT exams.

Answer: B

224.When the virtual router responds to the ARP request, it uses the real MAC address of the main router.
A. True
B. False
Answer: B

225.Fast detection technology can detect communication failures with neighboring equipment as early as
possible, so that the system can take measures in time to ensure uninterrupted business.
A. True
B. False
Answer: A

226.Which of the following description about AS_PATH is wrong?


A. When there are two or more routes to the same destination in the router, the advantages and
disadvantages of these routes can be compared with each other through this attribute, and the longer the
AS_PATHA path is super preferred
B. AS_PATH refers to the list of ASs experienced by BGP routing in the transmission path
C. BGP not accept AS_ PATH of the present contained AS Number routes
D. AS_ PATH is a recognized attribute in BGP
Answer: A

227.When the MTU of the interconnection interface of the two routers in the broadcast network does not
match, and the interface is configured with ospf mtu-enablet, which of the following description about the
status change of the neighbor relationship between the two routers is true?
A. The neighbor relationship status of the two devices stays at 2-way
B. The neighbor relationship between the two devices stays at Exstart
C. The neighbor relationship between two devices can enter Full
D. The neighbor relationship status of the two devices stays in the Init state
Answer: B

228.ASPF (Application Specific Packet Filter) is a packet filter based on the application layer. It checks the
application layer protocol information and monitors the connected application layer protocol status, and
implements a special security mechanism through the Server Map table. Which of the following
statements about ASPF and Server map table is wrong?
A. ASPF dynamically creates and deletes filtering rules
B. ASPF dynamically allows multi-channel protocol data to pass through the Servermap table
C. ASPF monitors the messages in the communication process
D. The Server-map table entry in the five-tuple realizes a function similar to the session table
Answer: D

229.Which of the following strategies or tools cannot be applied to OSPF?


A. as-path filter
B. access-list

49 / 105
The safer , easier way to help you pass any IT exams.

C. route policy
D. prefix-list
Answer: A

230.Under which of the following situations will a router running IS-IS not generate an LSP?
A. Modify the IP address of the IS-IS interface
B. Change the sysmane of the router
C. IS-IS neighbor is UP or Dowm
D. Modify the Cost value of the IS-IS interface
Answer: C

231.Which of the following types of LSAs can carry tag information for external routes?
A. LSA3
B. LSA2
C. LSA5
D. LSA4
Answer: C

232.It can be used in a variety of routing protocols. Which of the following routing tool consisting of
if-match and apply clauses?
A. route-policy
B. IP-Prefix
C. commnityfilter
D. as-path-filter
Answer: A

233.During the operation of DHCP, multiple message types will be exchanged, so which of the following
messages are not sent from the client to the server?
A. DHCP NAK
B. DHCP REQUEST
C. DHCP RELEASE
D. DHCP DISCOVER
Answer: A

234.Which of the following statement about equipment for the exchange of forwarding plane is incorrect?
A. Realize packet encapsulation and decapsulation
B. Composed of main control board and interface board
C. Provide high-speed non-blocking data channels
D. Statistics of messages can be realized
Answer: B

235.Which of the following description about configuration commands for the default routing issued by
each protocol is wrong?
A. In the ISIS protocol, the default-route-advertise command is used to advertise the default route

50 / 105
The safer , easier way to help you pass any IT exams.

information to neighbors
B. In static routing, the ip route- static default preferencer command is used to generate a default route on
the current router
C. In the OSPF protocol, the default-route- advertised command is used to advertise the default route
information to the normal OSPF area
D. In the BGP protocol, the default-route imported command is used to enable the function of importing
provincial routes into the BGP routing table
Answer: B

236.Which of the following description of the VRRP master device is wrong?


A. Periodically send VRRP packets
B. Even if the router is already the Master, it will be preempted by the priority Backup router
C. Forward IP packets whose destination MAC address is a virtual MAC address
D. Respond to the ARP request for the virtual IP address with the virtual MAC address
Answer: C

237.The multicast destination address of VRRP packets is ().


A. 224.0.1.18
B. 224.0.0.18
C. 224.0.0.20
D. 224.0.1.20
Answer: B

238.OSPF runs directly on the TCP protocol, using TCP port number 179.
A. True
B. False
Answer: B

239.In multicast routing (*; G) routing table entries can guide message forwarding.
A. True
B. False
Answer: B

240.The function of routing protocol priority is to assign different priorities to the routes discovered by
different protocols, so that when a router learns the same route from different routing protocols at the
same time, it can have a priority order of selection.
A. True
B. False
Answer: A

241.One of the features of OSPF is that it only supports MD5 authentication.


A. True
B. False
Answer: B

51 / 105
The safer , easier way to help you pass any IT exams.

242.The RSTP mid-side port does not need to wait for the forwarding delay, and can directly enter the
forwarding state. If the edge port receives the BPDU, the edge port will be directly closed and enter the
Aerror-dowm state.
A. True
B. False
Answer: B

243.A VRRP virtual router can only have a virtual IP address.


A. True
B. False
Answer: B

244.In the WL AN network, enabled HSB backup group, after the AP has been online on the active AC,
then Offline on the standby AC and add the AP information, AP status on the standby AC is Fault. At this
time, you need to execute the undo hsb enable command in the HSB backup group view of the standby
AC to disable the HSB active/standby backup function, and then execute the hsb enable command to
enable the HSB active/standby backup function. At this time, the information on the active AC will be
backed up to Standby AC to achieve consistent backup of active and standby information, the AP status
on the AC will be displayed as standby.
A. True
B. False
Answer: A

245.The IGMP protocol runs between the IP host and the multicast router directly connected to it,
maintaining the membership of the multicast group
A. True
B. False
Answer: A

246.SSH uses asymmetric addition AES and DES to realize the security of data transmission, and uses
HMAC to ensure complete data integrity verification.
A. True
B. False
Answer: B

247.To achieve the traffic filtering function, can use traffic-flter or MQC. Compared with traffic-filter, MQC
can be called in more views.
A. True
B. False
Answer: A

248.Which of the following description about the way of BFD session establish is wrong?
A. BFD sessions can only be established dynamically

52 / 105
The safer , easier way to help you pass any IT exams.

B. Statically configuring a BFD session refers to configuring BFD session parameters through the
command line, including local identifiers and remote identifiers, etc.
C. When a BFD session is dynamically established, the local identifier is dynamically allocated.
D. The system distinguishes between static BFD sessions and dynamic BFD sessions by dividing the
identifier area.
Answer: A

249.Which of the following description about OSPF routing aggregation is wrong?


A. Any router in OSPF can perform route aggregation operations
B. Inter-area route aggregation refers to the aggregation of routing information of the same prefix, and
only one route is advertised to other areas
C. OSPF has two route aggregation methods: ABR aggregation and ASBR aggregation
D. Through route aggregation, routing information can be reduced, thereby reducing the size of the
routing table and improving the performance of the router
Answer: A

250.Which of the following scenarios is suitable for SD-WAN solutions?


A. Enterprise branch interconnection
B. Internal interconnection of enterprise data center networks
C. Wireless network deployment in the enterprise campus
Answer: A

251.Which of the following description about configuring a roaming group is wrong?


A. After enabling the Master Controller function, the AC joins the roaming group by default and can
manage other ACs
B. Master Controller is a logical role, which can be assumed by any common entity AC
C. Member ACs need to designate an AC as their Master Controller
D. Master Controller manage each AC via CAPWAP tunnels
Answer: A

252.Which version of IGMP is needed in SSM?


A. IGMPv1
B. IGMPv3
C. IGMPv2
D. IGMPv4
Answer: B

253.Which of the following tools is used to filter routing information and set routing attributes for the
routing information that passes the filter?
A. IP-Prefix
B. route-policy
C. policy-based-route
D. as-path-filter
Answer: B

53 / 105
The safer , easier way to help you pass any IT exams.

254.Which of the following description of the prefix list is wrong?


A. The prefix list can match the prefix number and prefix length
B. The prefix list can be used for packet filtering
C. The prefix list can be used to filter IP prefixes
D. The prefix list has a stronger matching function for the routing mask than the access control list
Answer: B

255.performing source NAT configuration, and when there is no-pat configuration parameters, which the
following statement is correct?
A. Only the destination IP address conversion
B. Simultaneous conversion of source IP address and source port
C. Only source IP address conversion
D. Perform destination IP address and destination port conversion
Answer: C

256.In the process of IS-IS, configured filter-policy 2000 export, which of the following statement on the
role of the command is wrong?
A. It needs to be used in conjunction with route import, which is used to advertise only part of the imported
external routes to neighbors
B. This command will filter the link state information released to the outside world
C. If this command is not configured, the device will advertise all the routes imported by the external
routing protocol to the S-IS by default
D. It will restrict the external release of routing entries generated by the device itself
Answer: D

257.During the operation of the DHCP protocol, the process from the client application to obtaining an IP
address is ().
A. ③-②-①-④
B. ①-②-③-④
C. ①-④-③-④
D. ③-④-①-②
Answer: A

258.The following information is output to a route, which of the following description about the information
is correct?
A. The router has an IBGP neighbor relationship with neighbor 2.2.2.2
B. The Router ID of the router is 1.1.1.1
C. The AS number where the router is located is 100
D. The router negotiates with its neighbors and uses BGP version 3
Answer: C

259.The edge port in RSTP does not need to wait for the forwarding delay, and can directly enter the
forwarding state. If the edge port receives the BPDU, the edge port will be directly closed and enter the

54 / 105
The safer , easier way to help you pass any IT exams.

error down state.


A. True
B. False
Answer: B

260.D. DoS attack means that the attacker controls a large number of zombie hosts and sends a large
number of carefully constructed attack messages to the target network, so that the attacked has the effect
of refusing to provide services to the requests of normal users.
A. True
B. False
Answer: A

261.By default, the VRRP of Huawei AR routers runs in preemptive mode.


A. True
B. False
Answer: A

262.When running OSPFv3 on a Huawei router, the OSPFv3 process will automatically select an
interface address as the router ID of the process.
A. True
B. False
Answer: B

263.Two level-1 routers in different areas can form a neighbor relationship.


A. True
B. False
Answer: B

264.The router directly instructs the forwarding of data according to the forwarding table.
A. True
B. False
Answer: B

265.In dual-link hot backup, AP will establish a CAPWAP link with the main AC and backup AC.
A. True
B. False
Answer: B

266.Multiple BGP processes cannot be configured on a router.


A. True
B. False
Answer: A

267.Which of the following description of the Hello message in PIM-SM is wrong?

55 / 105
The safer , easier way to help you pass any IT exams.

A. The routers periodically use Hello messages to keep in touch


B. In the PIM-SM network, the newly started multicast router needs to use Hello messages to discover
neighbors and maintain neighbor relationships
C. The Hello message is sent to the multicast address 224.0.0.5
D. Election of DR in multi-router network segment through Hello message
Answer: C

268.The RSTP protocol provides a variety of protection functions. For example, when the edge port is
configured in the protected state, after the edge port receives the BPDU message, what is the processing
method?
A. Forward BPDU packets as required
B. Get relevant information after BPDU message
C. Close the port
D. Directly discard BPDU packets
Answer: C

269.Among the commonly used routing policy tools for BGP, which of the following can be used to match
a specific AS_path?
A. filter-policy
B. ip-prefix
C. ip as-path-filer
D. community-filter
Answer: C

270.Which of the following description about BGP, OSPF, ISIS is correct?


A. BGP neighbor relationship is established on the basis of TCP session, and the port number adopted is
179.
B. ISIS runs on the basis of the IF protocol, and the protocol number adopted is 89.
C. BGP runs on the basis of UDP sessions, and the port number adopted is 179.
D. OSPF runs on the basis of IP protocol, and the protocol number adopted is 90.
Answer: A

271.Which of the following description of IBGP neighbors and EBGP neighbors is wrong?
A. If the two exchange BGP packets peers belong to different autonomous systems, then the two peers
are EBGP peer
B. If the two exchange BGP packets peers belong to the same autonomous system, then the two peers
are IBGP peer
C. IBGP peers must be physically directly connected
D. Two routers running BGP must have IP connectivity to establish a TCP session
Answer: C

272.When the configuration BGP time, if such a warning is generated: "BGPI6ESTABLISHED: the OID
[OID] of The BGP The Establishedstate Enters the FSM, which of the following description is correct?
A. Indicates that the BGP neighbor has been established

56 / 105
The safer , easier way to help you pass any IT exams.

B. The warning message is abnormal and must be dealt with


C. Explain that this type of alarm is generated due to TCP problems
D. Explain that there is a problem due to OPEN message negotiation between BGP neighbors
Answer: A

273.Which of the following description about BGP reliable routing updates is correct?
A. BGP works on top of UDP, and the transport layer protocol is 179
B. BGP does not need to periodically advertise routing information
C. BGP sends complete routing table information every time when a route is updated
D. BGP uses multicast updates
Answer: B

274.The Link ID of the third type of LSA is ().


A. described ABR 's Router ID
B. The port IP address of the DR on the network segment where it is located
C. Described destination network segment
D. the Router ID which generates this LSAde router
Answer: C

275.Which of the following strategies or tools cannot be applied to OSPF?


A. access-list
B. prefix-list
C. route-policy
D. as-path filter
Answer: D

276.There are a large number of employees in an enterprise building, and they usually start to connect to
the company's WLAN network in the lobby when they go to work. As each employee walks to their
respective workstations, each person's mobile terminal roams through roaming to their respective
network coverage areas.
In order to ensure that the IP address of each terminal is fixed as much as possible, what is the
recommended approach?
A. Without configuring VLAN Pool, configure a static IP address for each mobile terminal
B. Configure VLAN Pool and configure Hash algorithm
C. Configure VLAN Pool and configure sequential algorithm
D. Configure VLAN Pool and configure the algorithm arbitrarily
Answer: C

277.Which of the following description of VRRP is wrong?


A. VRRP determines the status of each router in the virtual router based on priority
B. If the Master already exists, Backup will also preempt.
C. When two routers with the same priority compete for the Master at the same time, compare the size of
the interface IP address, and the one with the larger interface address is elected as the Master
D. If the Backup router works in non-preemptive mode, as long as the Master router does not fail, the

57 / 105
The safer , easier way to help you pass any IT exams.

Backup router will not become the Master router even if it is subsequently configured with a higher priority.
Answer: B

278.Which of the following attacks is not a network layer attack?


A. ICMP attack
B. ARP spoofing attack
C. IP spoofing attack
D. Smurf attack
Answer: B

279.What is the IP protocol number of the VRRP message?


A. 116
B. 114
C. 112
D. 118
Answer: C

280.In inter-domain packet filtering, which of the following is used to enter the outbound direction?
A. trust—untrust
B. untrust—dmz
C. trust—local
D. untrust—trust
Answer: A

281.In PIM-SM, which of the following description about RP is wrong?


A. The initial multicast stream of all groups in the shared tree is forwarded to the receiver through the RP
B. One RP can support multiple multicast services at the same time, and one multicast group can
correspond to multiple RPs
C. RP can be responsible for the forwarding of several or all multicast groups, and there can be one RP in
the network
D. All members of the group and multicast sources that send multicast data to the group converge to a
unique RP
Answer: B

282.Which of following description of the permanent multicast address is wrong?


A. All routers running OSPF protocol monitor 224.0.0.5
B. All hosts and routers in the network segment monitor 224.0.0.1
C. All routers monitor 224.0.0.2
D. All routers running the PIM protocol monitor 224.0.0.100
Answer: D

283.Which of the following statements about stacked on MAD detection is wrong?


A. When stacking systems act as agents for each other to perform MAD detection, the two stacking
systems can use the same Domain ID

58 / 105
The safer , easier way to help you pass any IT exams.

B. MAD detection methods are divided into direct connection detection and proxy detection
C. MAD proxy detection requires that all stack members are connected to the proxy device, and the
connected links are added to an Eth-Tunk
D. MAD direct connection detection can be through intermediate devices or full-mesh methods
Answer: A

284.Which of the following tools cannot be used for route filtering?


A. policy-based-route
B. ip community-filter
C. IP-Prefix
D. route-policy
Answer: A

285.Which of the following description of BGP characteristics is wrong?


A. BGP is an external routing protocol used to transfer routing information between ASs
B. BGP is a link state protocol
C. BGP has rich routing filtering and routing strategies
D. BGP supports CIDR
Answer: B

286.In the IS-IS broadcast network, which multicast MAC address does the Level-2 router use as the
destination address for sending lH?
A. 0180-c200-0016
B. 0180-c200-0014
C. 0180-c200-0015
D. 0100-5EO0-0002
Answer: C

287.Which of the following description about verifying whether a received Hello message is legal is
wrong?
A. If the network type of the receiving port is a point-to-point type or a virtual link, the Network Mask field is
not checked
B. The RouterDeadIntera1 field in the received Hello message must be consistent with the configuration
of the receiving port
C. If the network type of the receiving port is broadcast, point-to-multipoint or NBMA, the Network Mask
field in the received Hello message may be inconsistent with that of the interface.
D. The E-bit in the Options field of the received Hello message must be consistent with the configuration
of the relevant area
Answer: C

288.Which of the following OSPF messages carry master-slave relationship information?


A. LSA Update message
B. LSA Request message
C. DD message

59 / 105
The safer , easier way to help you pass any IT exams.

D. Hel1o message
Answer: C

289.Which of the following IEEE 802.11 standards corresponds to wi-Fi 6?


A. 802.11ac
B. 802.11b
C. 802.11n
D. 802.11ax
Answer: D

290.When configuring dual-link hot backup, the engineer configured the CAPWAP heartbeat detection
interval to be 20 seconds, and the dual-link backup function is enabled, then how long does the AP detect
the timeout of the main link and perform the main-standby switchover?
A. 75 seconds
B. 20 seconds
C. 60 seconds
D. 90 seconds
Answer: C

291.The default interval for sending BFD detection packets is ().


A. 100ms
B. 1000ms
C. 5s
D. 10s
Answer: B

292.Which of the following description of VRRP is wrong?


A. When using the protocol, you need to configure the virtual router and virtual IP address on the router,
and directly use the real MAC of the main router, so that a virtual router is added to the network
B. VRRP is a redundant backup protocol, designed for LANs with multicast or broadcast capabilities (such
as Ethernet) to ensure that when the next hop router device of a host in the LAN fails, another router can
be used in a timely manner Instead, so as to maintain the continuity and reliability of network
communication
C. A virtual router is composed of a main router and several backup routers. The main router realizes the
real forwarding function. When the main router fails, a backup router will become the new main router and
take over its work.
D. The host on the network communicates with the virtual router, and there is no need to know all the
information of the physical router on this network
Answer: A

293.Which of the following command is to configure VRRP to track the state of the physical interface?
A. track vrrp vrid 1 interface Gigabitethernet0/0/0
B. vrrp vrid 1 interface Gigabitethernet0/0/0
C. vrrp vrid 1 track interface Gigabitethernet0/0/0

60 / 105
The safer , easier way to help you pass any IT exams.

D. vrrp vrid 1 interface Gigabitethernet0/0/0 track


Answer: C

294.When the stateful inspection firewall forwards subsequent data packets (not the first packet), which of
the following is the main basis?
A. Route table
B. OFIB table
C. MAC address table
D. Session table
Answer: D

295.The ACL command ac1 [number] ac1-number [match-order{autol config}], where ac1-numnbe is
used to specify the number of the access control list, and the value range of ac1-number of the basic
access control list is () .
A. 1000~3999
B. 0~1000
C. 3000~3999
D. 2000 ~2999
Answer: D

296.Which of the following tools cannot be directly referenced by the apply clause of route-policy?
A. IP-Prefix
B. day
C. community
D. origin
Answer: A

297.Which of the following description about the default routing of each protocol is wrong?
A. BGP can deliver default routes
B. ISIS can issue default routes
C. OSPF cannot deliver default routes
D. Static default route can be configured
Answer: C

298.Which of the following description of the information contained in the OPEN message in the EGP is
wrong?
A. OPEN message contains local AS number information
B. OPEN message contains VERSION information
C. OPEN message contains Hold time message
D. OPEN message contains only BGP message header
Answer: D

299.In a broadcast type network, what is the default time interval for DIS to send Hello?
A. 5s

61 / 105
The safer , easier way to help you pass any IT exams.

B. 10s
C. 40s
D. 3.3s
Answer: D

300.Which of the following statement about the IS-IS protocol is wrong?


A. IS-IS protocol supports CLNP network
B. IS-IS protocol supports IP network
C. IS-IS protocol packets are directly encapsulated by the data link layer
D. The ls-ls protocol is a link state protocol running between ASs
Answer: D

301.For the information output by the display ospf peer below, which of the following description is
correct?
<Huawei=display ospf peer
OSPF Process 1 with Router ID 10.1.1.2
Neighbors
Area 0.0.0.0 interface 10.1.1.2(Gigabitethernet1/0/0)'s neighbors
Router ID: 10.1.1.1
Addres:10.1.1.1
State: Full Mode:Nbr is Slave Priority: 1
DR:10.1.1.1BDR: None MTU: 0
Dead timer due in 38 sec
Retrans timer interval: 5Neighbor is up for 00: 00:04
Authentication Sequence: [0]
A. After negotiation during the DD exchange process, the local end becomes Slave
B. Address:10.1.1.1 means the local interface address is 10.1.1.1
C. Router ID means that the local router ID is 10.1.1.1
D. Designated router (DR) for the address is 10.1.1.1
Answer: D

302.About LSA3, LSA4 and LSA5, which of the following description is correct?
A. LSA5 will not change after traversing different areas, while LSA3 will change
B. LSA3, LSA4 and LSA5 will not change after traversing different areas
C. LSA3 will not change after traversing different areas, while LSA4 and LSA5 will change
D. LSA4 will not change after traversing different areas, while LSA3 and LSA5 will change
Answer: A

303.Which of the following description about OSPF is correct?


A. OSPF LSA is updated regularly every 30 minutes
B. OSPF floods an LSU every 5s
C. OSPF uses Bellman-Ford algorithm, each router runs the algorithm independently
D. OSPF itself does not have a confirmation mechanism, so OSPP relies on the underlying protocol,
namely TCP confirmation.

62 / 105
The safer , easier way to help you pass any IT exams.

Answer: A

304.Which of the following OSPF areas can only reach other areas through the default route?
A. Backbone area
B. totally stub area
C. NSSA
D. Non-backbone area
Answer: B

305.Among the matters needing attention in configuring the Stub area, which of the following description
is correct?
A. The virtual link can traverse the stub area
B. If an area is configured as a stub area, all routers in the area must be configured with stub area
attributes
C. The backbone area can be configured as a stub area
D. ASBR can exist in the stub area
Answer: B

306.About OSPF 's ASBR Summary-LSA information description, which of the following is wrong?
A. Metric indicates that the ABR to reach the ASBR of OSPF overhead
B. Advertising Router represents the ABR 's Router ID
C. Link State ID indicates the Router ID of ASBR
D. The Advertising Router fields in the ASBR-Summary-LSA of all areas are the same
Answer: D

307.In PIM-DM, which combination of working mechanisms constructs SPT? (Multiple choice)
A. Pruning
B. Grafting
C. State refresh
D. Diffusion
Answer: ABCD

308.Regarding the description of the VRRP slave device, which of the following is correct? (Multiple
choice)
A. When receiving a VRRP message with priority 0, Slave will directly switch to Master
B. The slave responds to the IP packet whose destination IP address is the virtual IP address
C. When the slave receives the VRRP message sent by the Master, it can judge whether the status of the
Master is normal
D. The slave will discard IP packets whose destination MMC address is the virtual MAC address
Answer: ACD

309.The network is as shown in the figure, and SWA, SWB, SWC, and SWD run RSTP, then which of the
following statement is correct? (Multiple choice)

63 / 105
The safer , easier way to help you pass any IT exams.

A. After receiving the BPDU, the edge port will participate in the calculation of the spanning tree again
B. After being configured as an edge port, the interface can quickly enter the forwarding state
C. The edge port can be opened on the GE0/0/2 port of SWB, so that the interface connected to the
terminal can quickly enter the forwarding state
D. The edge port can be opened on the GE0/0/2 port of SWC, so that the interface connected to the
terminal can quickly enter the forwarding state
Answer: ABD

310.A router running IS-IS outputs the information as shown in figure, which of the following statements is
correct? (Multiple choice)

A. The S4/0/0 interface of this router has established the neighbor relationships of Leve1-1 and Level-2 at
the same time
B. The S4/0/0 interface of this router only establishes the neighbor relationship of Leve1-1
C. The GE0/0/0 interface of this router has established a neighbor relationship between Leve1-1 and
Leve1-2 at the same time
D. The GE0/0/0 interface of this router only establishes the neighbor relationship of Leve1-1
Answer: AC

311.In the network shown in the figure, R1 and R2 run IS-IS and establish an adjacency relationship. The
Loopback0 interface of R2 enables IS-IS, and the Loopback3 interface of R2 does not enable IS-IS. Do as
follows in the IS-IS process of R2 the configuration shown in figure, which of the following statement is
correct? (Multiple choice)

64 / 105
The safer , easier way to help you pass any IT exams.

A. The 10.0.2.2/32 and 10.0.2.3/32 routes do not exist in the routing table of R1
B. There is no route 10.0.2.3/32 in the R1 routing table
C. There is a 10.0.2.2/32 route in the routing table of R1
D. There is a 10.0.2.3/32 route in the routing table of R1
Answer: BC

312.The four routers are running IS-IS and have established adjacency relationship. The area number
and router level are marked as shown in the figure. R1 and R2 are PPP links, R2 is DIS. Which of the
following statement is correct? (Multiple choice)

A. R2 sends LSP to R3 and R4 in unicast mode


B. If R1 sends an LSP message, R2 needs to send PSNP to confirm
C. R3 sends CSNP periodically to help achieve Level-2 LSDB synchronization
Answer: BC

313.In the RSTP network shown in the figure \. According to the configuration of the SWC in the figure, it
can be judged that the type of the E0/1 port of the SWC is (). (Multiple choice)

65 / 105
The safer , easier way to help you pass any IT exams.

A. Edge port
B. Preparation port
C. Designated port
D. Root port
Answer: AC

314.As shown below, the firewall received from PC1 to PC2 packets, which of the following statement is
correct? (Multiple choice)

A. The message cannot match any security policy


B. The message matches the security policy rule 1, and the firewall will forward the message
C. There is no configuration source in the security policy rule2, and the security domain shows that it
matches any security domain
D. The packet matches the security policy rule 2 and will be discarded by the firewall
Answer: CD

315.a router running IS-IS, the following picture shows the router sends Hello message, which of the
following statements is correct? (Multiple choice)

66 / 105
The safer , easier way to help you pass any IT exams.

A. The system ID of the router is 0050.0600.7008


B. The interface address of the router is 10.6.7.5
C. The area code of the router is 00.0001
D. This router is a LEVEL-1-2 router
Answer: AC

316.As shown in the figure, PC1 and PC2 belong to the same network segment of the host, which of the
following description on PC1 and PC2 between IPv6 of the neighbor state is correct? (Multiple choice)

A. If the C address information of PC2 can be queried on PC1, the neighbor relationship may be Stale at
this time
B. If the PC1 can query to PC2 of C address information, the neighbor relationship at this time is
Reachable
C. PC1 and PC2 exist between neighbors may be five kinds of state, they are Incomplete, Reachable,
Stale, Delay, Probe
D. If the MAC address information of PC2 can be queried on the PC, the neighbor relationship may be
Probe at this time.
Answer: AC

317.The network administrator on a router BGP Ministry living information, neighbor information is shown

67 / 105
The safer , easier way to help you pass any IT exams.

in the figure, which of the following statements about the information is correct? (Multiple choice)

A. The router did not receive the BGP routing prefix from the peer
B. The Router ID of the local router is 1.1.1.1
C. and peer 3.3.3 3 received, number of packets sent, respectively 10, 20
D. and peer 3.3.3.3 neighbor relationship are IBGP peer
Answer: BCD

318.In the network as shown in the figure, all switches run the RSTP protocol. If the E1 interface of SWB
fails, when the RSTP process, then what will happen? (Multiple choice)

A. SWB deletes the port entry of the port whose purpose is E1 in the MAC address table
B. On all non-edge forwarding ports, send topology change notifications (Topology Change Notification) to
notify other switches that topology changes have occurred in the network
C. Recalculate the spanning tree, SWB elects E2 as the root port
D. Send topology change notifications (Topology Change Notification) on all forwarding ports to notify
other switches that topology changes have occurred in the network
Answer: ABC

319.When using a routing policy for route filtering, which routes the prefix of the following options in
matching the following IP-Prefix will be denied out? (Multiple choice)
[HUAWEI] ip ip-prefix aa index 10 deny 0.0.0.0 24 less-equal 32
[HUAWEI] ip ip-prefix aa index 20 permit 0.0.0.0 0 less-equal 32
A. 1.1.1.1/26
B. 1.1.1.2/16

68 / 105
The safer , easier way to help you pass any IT exams.

C. 1.1.1.1/32
D. 1.1.1.1/24
Answer: ACD

320.Which of the following routing prefixes meet the following IP-Prefix conditions? (Multiple choice)
[HUAWEI] ip ip-prefix test index 10 permit 20.0.0.0 16 greater equal 24 less-equal 28
A. 20.0.1.0/24
B. 20.0.1.0/23
C. 20.0.1.0/25
D. 20.0.1.0/28
Answer: ACD

321.As shown in the figure, there are the following configurations under BGP, which of the following
descriptions are wrong? (Multiple choice)
[HUAWEI-bgp] timer keepalive 30 hold 90
[HUAWEI-bgp] peer 1.1.2 timer keepalive 10 hold 30
A. Timer takes the minimum value, so the final result is that the timer value of peer 1.1.1.2 takes
keepalive10 hold 30
B. Peer configuration takes precedence, so the final result is that the timer value of peer 1.1.1.2 takes
keepalive 10 hold 30
C. Global configuration takes precedence, so the final result is that the timer value of peer 1.1.1.2 takes
keepalive 30 hold 90
D. The default configuration is timer Keepalive 60 hold180, so pee r1.1.12 has a faster detection speed
for Peer connection failure than the default value
Answer: AC

322.A certain network runs IS-IS. The L SP information of a router R4 in the network is shown in the figure.
Which of the following statements is correct? (Multiple choice)

69 / 105
The safer , easier way to help you pass any IT exams.

A. The LSP is the LSP generated by the pseudo node


B. The cost of R4 to reach the external route is 64
C. The external route described by this LSP is 10.0.4.3/32
D. The System ID of R4 is 4004.0000.0004
Answer: BCD

323.The three routers are running IS-IS and have established adjacency relationships. The area numbers
and router levels are marked as shown in the figure. If the road between R1 and R2 is interrupted, which
of the following statements is correct? (Multiple choice)

A. R1 sets the Age of the L SP generated by R2 to 0


B. The default route in the R2 routing table will disappear
C. R1 runs the SPF algorithm to delete R2 from the SPF trunk
D. The default route in the R2 routing table still exists
Answer: BC

324.As shown in the figure, the management VLAN of LAN is VLAN 10. AP obtains IP address through
DHCP, and the network segment is 10.1. 1.0/24 AP, AC and AR are respectively DHCP client, DHCP relay
device and DHCP server. (Multiple choice)

Which of the following is the correct configuration of the DHCP relay device and DHCP server?
A. [AC] dhcp server group AP [AC-dhcp-server-group-AP] dhcp-server 172.21.1.2
[AC-dhcp-server-group-AP] quit [AC] interface Vlanif 10 [AC-Vlanif10] dhcp select relay [AC-Vlanif10]
dhcp relay server-select AP [AC-Vlanif10] quit
B. [AR] ip pool AP [AR-ip-pool-AP] network 172.21.1.0 mask 24 [AR-ip-pool-APJ gateway-list 172.21.1.2
[AR-ip-pool-AP] excluded-ip-address 172.21.1.1 [AR-ip-pool-AP] quit [AR] interface GigabitEthernet 0/0/1
LAR-GigabitEthernet0/0/1] dhcp select global [AR-GigabitEthernet0/0/1] quit [AR]ip route-static 10.1.1.0
255.255.255.0 172.21.1.1
C. [Ac]dhcp server group AP [AC-dhcp-server-group-AP] dhep-server 10.1.1.2 [AC-dhcp server group-AP]
quit [AC] interface Vlanif 10 [AC-V1anif10] dhcp select relay [AC-Vlanif10] dhcp relay server-select AP
[AC-Vlanif10] quit
D. [AR] ip pool AP [AR-ip pool-AP] network10.1.1.0 mask 24 [AR-ip-pool-AP] gateway-list 10.1.1.2

70 / 105
The safer , easier way to help you pass any IT exams.

[AR-ip-pool-AP] excluded ip-address 10.1.1.1 [AR-ip-pool-AP] quit [AR] interface GigabitE thernet 0/0/1
[AR-GigabitEthernet0/0/1] dhcp select global [AR-Gigabi tEthernet0/0/1] quit [AR] ip route-static 10.1.1.0
255.255.255.0 172.21. 1.1
Answer: AD

325.Which routes among the following options satisfy the following ACL parents? (Multiple choice)
[HUAWEI] acl number 2001
[HUAWEI-acl-basic- 2001] rule 0 permit source 10.1.1.0 0.0.254.255
A. 10.1.2.1/32
B. 10.1.3.1/32
C. 10.1.1.1/32
D. 10.1.4.1/32
Answer: BC

326.Which port role that cannot be in the forwarding state in RSTP? (Multiple choice)
A. Alternate Port
B. Designated Port
C. RootPort
D. Backup Port
Answer: AD

327.Which statement about IGMP Proxy is correct? (Multiple choice)


A. IGMP Proxy can detect link status in conjunction with NQA to achieve rapid switching between active
and standby links
B. IGMP Proxy is usually deployed on the device between the member hosts that access the device
C. The downstream interface of the IGMP Proxy device generates multicast forwarding entries based on
the information of member hosts joining and leaving the multicast group
D. The IGMP Proxy device cannot replace the IGMP querier to send query messages to downstream
member hosts to maintain group membership
Answer: ABC

328.In a large-scale WLAN three-layer network, which of the following statements about the description of
the DHCP server is wrong? (Multiple choice)
A. In a large-scale WLAN network, it is generally recommended to use AC as a DHCP server
B. In a large-scale WLAN network, it is recommended to deploy an independent DHCP server
C. In a large-scale WLAN network, the AP can obtain the AC's IP address from the DHCP server through
the option43 parameter
D. In a large VLAN network, the AP can obtain the AC's IP address from the DHCP server through the
option60 parameter
Answer: AD

329.Which of the following descriptions of the AC roaming group is wrong? (Multiple choice)
A. The AC of the roaming group needs to be deployed-Master Controller
B. The AC of the roaming group use DTLS extended tunnels to encapsulate and transmit roaming related

71 / 105
The safer , easier way to help you pass any IT exams.

information
C. Master Contoller must be an AC in the roaming group
D. STA can only roam between ACs in the same roaming group
Answer: BC

330.Which of the following LSAs only spread in a single area? (Multiple choice)
A. AS ExternalLSA
B. Summary LSA
C. RouterLSA
D. Network LSA
Answer: CD

331.After the dual-system hot backup is configured, the main and backup channels cannot be established.
The information on the active device cannot be backed up to the backup device normally, causing the
dual-system hot backup function to be abnormal. What is the possible cause of the failure? (Multiple
choice)
A. The source IP address and source port number of the local end are inconsistent with the destination IP
address and destination port number of the opposite end
B. The retransmission times and retransmission intervals of the active and standby service packets at
both ends are inconsistent
C. The priority of the two AC is the same
D. TCP channel is not established
Answer: ABD

332.Regarding the description of VRRP load sharing, which is correct? (Multiple choice)
A. Load sharing method refers to the establishment of two or more backup groups, and multiple routers
carry services at the same time
B. When configuring priorities, the VRRP masters of the three virtual routers can be on different routers
C. Multiple virtual routers can be created on one interface of the router, so that the router can be used as
a master router in one virtual router, and at the same time as a backup router in other virtual routers.
D. The load sharing method means that multiple routers undertake services at the same time, so the load
sharing method requires two or more virtual routers
Answer: AB

333.Which protocol modules can BFD detection be linked with? (Multiple choice)
A. OSPF
B. VRRP
C. BGP
D. Static routing
Answer: ABCD

334.In a certain network environment, there are both switches running RSTP and switches running SIP.
Which of the following phenomena will appear in the network? (Multiple choice)
A. If it is a Huawei switching equipment, RSTP will switch to STP mode. After the STP switching

72 / 105
The safer , easier way to help you pass any IT exams.

equipment is evacuated from the network, the switching equipment running RSTP can be migrated back
to the RSTP working mode
B. RSTP can interoperate with STP, but the advantages of RSTP such as rapid convergence are lost at
this time
C. RSTP and STP are not interoperable and will perform independent operations
D. If it is a Huawei switching device, STP will switch to RSTP mode, and can be equipped with a switching
device that runs RSTP. After being evacuated from the network, the switching device running STP can
migrate back to RSTP mode.
Answer: AB

335.Regarding BGP MED, which of the following descriptions are correct? (Multiple choice)
A. B. The default value of MED for GP routing is 0
B. By default, BGP routing rules can compare the distance between routes from different autonomous
systems.
C. By default, if the MED value is not set in the route attribute, press the process. If the bestroute
med-none-as maximim command is configured. Then the maximum value of MED is 4294967295.
D. In BGP routing rules, the priority of MED is lower than AS-Path, Preferred-Value, Local-Preference,
Origin
Answer: CD

336.OSPF can support multiple network types. Which of the following network types need to elect DR and
BDR? (Multiple choice)
A. NBMA
B. P2MP
C. BROADCAST
D. P2P
Answer: AC

337.Which routes in the following options meet the following ACL conditions? (Multiple choice)
A. 10.1.1.1/32
B. 10.1.2.1/32
C. 10.1.3.1/32
D. 10.1.4.1/32
Answer: AC

338.Among the commonly used routing policy tools for BGP, what can be used to filter routes? (Multiple
choice)
A. traffic-policy
B. ip extcommunity-filter
C. filter-policy
D. route-policy
Answer: BCD

339.Which of the following SA descriptions of various messages are wrong? (Multiple choice)

73 / 105
The safer , easier way to help you pass any IT exams.

A. DD only contains the summary information of LSA, that is, it contains LS Type, LS ID, Advertising
Router and LS Sequence Number
B. LS Request message only has LS Type, Ls ID and Advertising Router
C. LS Update message contains complete LSA information
D. LS Ack message contains complete LSA information
Answer: AD

340.The output information of a router is as follows. Which of the following statements is correct? (Multiple
choice)
<R1>display ospf interface Gigabitethernet 0/0/0
OSPF Process 1 with Router D 10.1.1.1
Interface: 10.0. 12.1 (Gigabitetherneto/0/0)
Cost: 1 State: DR Type: Broadcast MTU: 1500
Priority: 1
Designated Router: 10.0. 12.1
Backup Designated Router: 10.0.12.2
Timers: Hello 10, Dead 40, Poll 120, Retransmit 5, Transmit Delay 1
A. This router is DR
B. The interface address of this router is 10.1.12.1
C. The Router-ID of this router is 10.1.1.1
D. The network type of this interface is broadcast
Answer: ABCD

341.Which of the following about OSPF AS-External-LSA is correct? (Multiple choice)


A. Net mask is set to all 0
B. Link State ID is set as the destination network segment address
C. Advertising Router is set to ASBR Router ID
D. Use Link State ID and Advertising Router to uniquely identify an AS-External-LSA
Answer: BC

342.In the N+1 backup network of WLAN, which of the following statements about option43 is correct?
(Multiple choice)
A. The command to configure the option43 parameter field of the DHCP server to the IP addresses of the
primary and standby ACs is option43 sub-0ption 2 ip-address ip-address &<1-8>
B. If the AC of the IP address advertised by option 43 does not respond to the AP, the AP will find that the
AC will immediately fail
C. After the option 43 field is configured, the AP will only send unicast Discovery Request messages to
the AC IP address advertised by option 43
D. To configure the option 43 field, the AP needs to be notified of the IP addresses of the primary AC and
backup AC to which it belongs, and also the IP addresses of other primary ACs.
Answer: AC

343.Which of the following description of roaming is correct? (Multiple choice)


A. APs that implement wireless roaming do not need to have signal coverage overlapping areas

74 / 105
The safer , easier way to help you pass any IT exams.

B. APs that implement wireless roaming must have signal coverage overlapping areas
C. APs that implement wireless roaming must be in the same extended service set (ESS)
D. APs that implement wireless roaming must be in the same basic service set (BSS)
Answer: BC

344.When the administrator configures VRRP, which of the following are not mandatory? (Multiple choice)
A. Preemption mode
B. Preemption delay
C. Virtual IP address
D. Priority of virtual routers
Answer: ABD

345.As a network administrator, which of the following protocols can be used for network device
configuration? (Multiple choice)
A. LLDP
B. SNMP
C. NETCONF
D. SSH
Answer: BCD

346.The session-based state detection firewall has different processing procedures for the first packet
and subsequent packets. Which of the following descriptions is correct? (Multiple choice)
A. When the status check mechanism is turned on, subsequent packages also need to be checked for
security policies
B. When a packet arrives at the firewall, it will look up the session table. If there is no match, the firewall
will perform the first packet processing flow
C. When the stateful inspection mechanism is turned on, when the firewall processes TCP packets, only
SYN packets can establish a session
D. When a packet arrives at the firewall, it will look up the session table. If it matches, the firewall will
perform subsequent packet processing procedures
Answer: BCD

347. Which of the following dynamic routing protocols can be applied to IPv6 networks? (Multiple choice)
A. Is-ls
B. BGP6
C. IS-ISv6
D. OSPFv3
Answer: BCD

348.What are the comparison items of the main switch election in the stack? (Multiple choice)
A. Operating status
B. Stack ID
C. MAC address
D. Stacking priority

75 / 105
The safer , easier way to help you pass any IT exams.

Answer: ACD

349.The RSTP protocol defines different port states, including Discarding and Learning. Which
descriptions of these two port states are correct? (Multiple choice)
A. The port in the Discarding state does not learn the MAC address table
B. Ports in the Discarding state and the earning state do not learn the MAC address table
C. Ports in the Learning state do not learn the MAC address table
D. Ports in these two states do not forward data frames
Answer: AD

350.What are the routing tools that are not only used for the BGP routing protocol? (Multiple choice)
A. as-path-filter
B. ACL
C. IP-Prefix
D. community-filter
Answer: BC

351.Which of the following default route delivery methods does OSPF support? (Multiple choice)
A. Can be issued non-mandatory
B. Can only be issued by force
C. Can be sent up and down in ASBR
D. Can be sent up and down in ABR
Answer: ACD

352.Which description is correct about the prefix list? (Multiple choice)


A. The prefix list can be used for packet filtering
B. The prefix list is used to filter IP prefixes, which can match the prefix number and prefix length at the
same time
C. The prefix list is used to filter IP prefixes and cannot match the prefix number and prefix length at the
same time
D. The prefix list cannot be used for packet filtering
Answer: BD

353.Regarding the OSP command description, which is incorrect? (Multiple choice)


A. The difference between OSPF v2 and OSPF V3 configuration interface commands is that OSPF v2
can use the network command, while OSPF v3 is directly enabled on the interface
B. The stub router command is used to configure the secondary router as a stub router. The stub router
can form a neighbor relationship with non-stub routers.
C. There is no need to use router-id in OSPF v3 configuration, the configuration method is the same as
OSPF v2
D. The no-summary parameter is configured for the stub area and the totally stub area
Answer: BCD

354.The network administrator of a company checks the FIB of the router. What fields does the FIB

76 / 105
The safer , easier way to help you pass any IT exams.

contain? (Multiple choice)


A. TimeStamp
B. Protocol
C. Destination/Mask
D. Cost
Answer: AC

355.What is the sequence of the VLAN Pool assigning VLANs to the terminal? (Multiple choice)
A. The terminal accesses from the divided VLAN
B. Determine the VLAN Pool and VLAN algorithm bound to the VAP
C. Terminal access to VAP
D. Assign VLAN to the terminal according to the VLAN algorithm
Answer: ABCD

356.Which of the following statements about the BFD detection mode is correct? (Multiple choice)
A. Asynchronous mode is a commonly used BFD detection mode
B. In query mode, once a BFD session is established, the system will no longer periodically send BFD
control packets
C. Asynchronous detection mode does not support echo function
D. In asynchronous mode, the systems will send BFD control packets at the negotiated cycle. If a system
does not receive the BFD control packets from the peer within the detection time, it will declare the status
of the BFD session Down.
Answer: ABCD

357.Which of the following statements about BFD applications is correct? (Multiple choice)
A. The single-arm echo function is to detect the connectivity of the forwarding link through the loopback
operation of BFD packets
B. The linkage between BFD and OSPF is to associate BFD with OSPF, and then notify OSPF through
BFD's rapid sensing of link failures, thereby speeding up OSPF's response to network topology changes
C. BFD single-hop detection refers to the IP connectivity detection of two directly connected systems
D. BFD multi-hop detection means that BFD can detect any path between two systems. These paths may
span many hops or overlap in some parts.
Answer: ABCD

358.Which of the following trees have multi-channel protocols? (Multiple choice)


A. Telnet
B. FTP
C. H.323
D. SMTP
Answer: BC

359.Regarding the multicast ASM model and the SSM model, which of the following statements are
correct? (Multiple choice)
A. In the SSM model, the receiver already knows the specific location of the multicast source in advance

77 / 105
The safer , easier way to help you pass any IT exams.

through other means


B. SSM directly establishes a multicast forwarding tree between the receiver and the multicast source
C. In the ASM model, the receiver cannot instruct the location of the multicast source in advance
D. SSM and ASM use the same multicast address range
Answer: BC

360.Which of the following descriptions about multicast routing is correct? (Multiple choice)
A. Multicast routing protocols are divided into intra-domain multicast routing protocols and inter-domain
multicast routing protocols
B. Multicast routing forms a unidirectional loopless data transmission path from the data source to multiple
receivers, that is, the multicast distribution tree
C. Multicast routing protocol is used to establish and maintain multicast routing, and forward multicast
data packets correctly and efficiently
D. Multicast routing protocol including IGMP protocol
Answer: ABC

361.There can be multiple nodes under a route-policy. Different nodes are identified by node. Each node
can have multiple if-match and apple clauses. Which of the following descriptions are wrong? (Multiple
choice)
A. There is an "or" relationship between the if-match clauses under each node
B. The relationship between the if-match clauses under each node is "and"
C. The relationship between different nodes is "and"
D. There is an "or" relationship between different nodes
Answer: BD

362.There are many ways to establish a cluster for modular switches. What methods does Huawei
modular switches support to establish a cluster? (Multiple choice)
A. Established through the cluster card on the interface board
B. Established through the cluster card on the main control board
C. Established through the business interface on the interface board
D. Established through the cluster card on the switching network board
Answer: BCD

363.BGP is an inter-domain routing protocol. Which of the following descriptions of this protocol is correct?
(Multiple choice)
A. Does not support neighbor authentication
B. Support automatic neighbor discovery
C. Support rich routing strategies
D. BGP protocol adopts reliable transmission protocol
Answer: CD

364.Regarding BGP Local-Preference, which of the following descriptions are correct? (Multiple choice)
A. The default value of BGP routing Local-Preference is 100
B. The default value of BGP routing Local-Preference is 0

78 / 105
The safer , easier way to help you pass any IT exams.

C. In BGP routing rules, Preferred-value has a higher priority than Local-Preference, that is,
Preferred-Value is compared first
D. In the BGP routing rules, the priority of MED is higher than that of Local-Preference, that is, MED is
compared first
Answer: AC

365.In route-policy, what are the BGP attributes that can be used in the apply clause? (Multiple choice)
A. MED
B. AS-Path
C. Tag
D. Local-Preference
Answer: ABD

366.Which of the following information is carried in the BGP OPEN message? (Multiple choice)
A. Routing attributes
B. BGP Router ID
C. Hold time
D. Local Autonomous System (AS) number
Answer: BCD

367.Which metric types does IS-IS protocol support? (Multiple choice)


A. default
B. Narrow
C. wide
D. Tos
Answer: BC

368.What message types does OSPF include? (Multiple choice)


A. Link State DD
B. Hello
C. Link State Request
D. Database Description
Answer: BCD

369.Regarding the OSPF route aggregation command, which of the descriptions is correct? (Multiple
choice)
A. The abr-summary command is a command in OSPF area view
B. advertise is the default parameter of the abr-summary command, that is, if not-advertise is specified in
the abr-sumary command, the default is advertise
C. not-advertise is the default parameter of the abr-summary command, that is, if advertise is not
specified in the abr-summary command, the default is not -advertis
D. The abr-summary command is a command in the OSPF view
Answer: ABD

79 / 105
The safer , easier way to help you pass any IT exams.

370.The following is part of the router RTA configuration. Which part of the configuration description is
correct? (Multiple choice)
[RTA] ospf 100 [RTA-ospf-100] silent-bitEthernet 1/0/0
A. Disable interface gigabi tethernet 1/0/0 from sending OSPF packets
B. Cannot form a neighbor relationship with the directly connected neighbor of the interface
C. The direct route of interface gigabitethernet 1/0/0 can still be advertised
D. The interface cannot send HELLO packets
Answer: ABD

371.Which of the following description of roaming is wrong? (Multiple choice)


A. The working channels of the two APs before and after roaming must be the same
B. The working channels of the two APs before and after the immersion can be different
C. When roaming, the STA that associates with the new AP sends an association request and contains
the information of the original associated AP
D. When roaming, the STA that associates with the new AP sends a re-association request and contains
the information of the original associated AP
Answer: AC

372.What are the conditions for matching firewall security policies? (Multiple choice)
A. Source and destination security zone
B. Source and destination IP address
C. Application
D. Packet length
Answer: ABC

373.Which of the following parameters are not necessary when configuring BGP Peer? (Multiple choice)
A. Password
B. description
C. as number
D. peer IP Address
Answer: AB

374.Which of the following values can be set for the security level of the customized security zone of the
USG series firewall? (Multiple choice)
A. 150
B. 100
C. 40
D. 80
Answer: CD

375.Which statement about IGMP Proxy is correct? (Multiple choice)


A. IGMP Proxy can detect link status in conjunction with NOA to achieve rapid switching between active
and standby links
B. IGMP Proxy is usually deployed on the device between the member hosts that access the device

80 / 105
The safer , easier way to help you pass any IT exams.

C. The downstream connection of the IGMP Proxy device generates multicast forwarding entries based
on the information of member hosts joining/leaving the multicast group
D. The IGMP Proxy device cannot replace the IGMP querier to send query messages to downstream
member hosts to maintain group membership
Answer: ABC

376.Which of the following are the advantages of using stacking and clustering technology to build a
campus network? (Multiple choice)
A. Business interruption time is greatly reduced
B. Improved network equipment and link utilization
C. Simplifies network management and reduces the complexity of network deployment planning
D. Can effectively reduce network power consumption
Answer: ABC

377.Which of the following types of equipment belong to Huawei data center switches? (Multiple choice)
A. CloudEngine 16800
B. CloudEngine S12700E
C. CloudEngine 12800
D. NetEngine AR6121
Answer: AC

378.In a large-scale WLAN three-layer network, which of the following description about the DHCP server
is incorrect? (Multiple choice)
A. In a large-scale WLAN network, it is generally recommended to use AC as a DHCP server
B. In a large-scale WLAN network, it is recommended to deploy an independent DHCP server
C. In a large-scale WLAN network, the AP can obtain the AC's IP address from the DHCP server through
the option43 parameter
D. In a large VLAN network, the AP can obtain the AC's IP address from the DHCP server through the
option60 parameter
Answer: AD

379.What parameters can the DHCPv6 server assign to the DHCPv6 client? (Multiple choice)
A. STP server address
B. DNS server address
C. Gateway address
D. IPv6 address prefix
Answer: BCD

380.RTA is the source DR router and RIB is the RP router. The multicast source sends multicast data to
RTA, but the multicast source registered with it through the PIMRegister message cannot be seen on the
RIB. What are the possible reasons? (Multiple choice)
A. There is no single-pointer route from RTB to RTA, which causes RIB's RPF check of the source to fail
B. The multicast network dynamically elects the RP, but the RTA's RPF check on the BSR fails
C. The RP elected by RTA is not RTB

81 / 105
The safer , easier way to help you pass any IT exams.

D. The multicast network is statically configured with RP, but the RTA router is not statically configured
with RP
Answer: ABCD

381.Regarding BGP recognized arbitrary attributes, which of the following descriptions are correct?
(Multiple choice)
A. It is not required to be in the Update message, and it can be determined according to the specific
situation whether to add to the Update message. All BGP routers must be identified
B. BGP router may not recognize
C. Must be transmitted between BGP neighbors
Answer: AB

382.Which of the following attributes meet the following conditions? The BCP router may not support
these attributes, but it will still receive these attributes and pass them to other peers. (Multiple choice)
A. Community
B. Ageregator
C. Multi_Exit_Disc
D. Local_Pref
Answer: AB

383.What are the main components of the SNAP address used by the IS-IS protocol? (Multiple choice)
A. SEL
B. SEL
C. DSCP
D. SYSTEM ID
Answer: ABD

384.Modify which of the following parameters, IS-IS neighbor relationship needs to be re-established?
(Multiple choice)
A. Modify the cost value of the IS-IS interface
B. Modify the IF address of the IS-IS interface
C. Modify the level of the IS-IS interface
D. Modify the sending interval of llH on the IS-IS interface
Answer: BC

385.Which of the following descriptions of the LSA age field is correct? (Multiple choice)
A. The unit of LSA age is second, the LS age of LSA in LSDB increases with time
B. If the LS age of an LSA reaches LSRefreshTime (30min), the producer of this LSA needs to regenerate
an instance of the LSA
C. The unit of LSA age is second, the LS age of LSA in LSDB decreases with time
D. If the LS age of an LSA reaches LSRefreshTime (30min), any router can regenerate an instance of the
LSA for this LSA
Answer: AB

82 / 105
The safer , easier way to help you pass any IT exams.

386.For the following understanding of DR/BDR, which is wrong? (Multiple choice)


A. The network address monitored by DR other is 2240.0.6
B. In the broadcast network, DR and BDR must be elected. Without either DR or BDR, the broadcast
network cannot work normally
C. The power of the multicast address monitored by DR other is 224.0.0.5
D. All DR other only establish adjacency with DR and BDR
Answer: AB

387.Which statement is wrong about the VRRP timer? (Multiple choice)


A. Skew_Time=(255-Priority)/255
B. By default, the VRRP preemption delay is 1 second
C. MASTER_DOWN = (3* ADVER_INTERVAL) + Skew_time
D. By default, the period of VRRP notification messages is 2 seconds
Answer: ABD

388.What are the differences between IGMP versions? (Multiple choice)


A. IGMPv1 does not support specific group queries, while IGMPv2 supports
B. IGMPv1/v2/v3 cannot support the SSM model
C. IGMPv1/v2 cannot elect a querier by itself, while IGMPv3 can
D. For members to leave, IGMPv2/Nv3 can leave voluntarily, but IGMPv1 cannot
Answer: AD

389.Which of the following categories can ACL be divided into? (Multiple choice)
A. User-defined ACL
B. Basic ACL
C. Layer 2 ACL
D. Advanced ACL
Answer: ABCD

390.The advanced access control list is a series of sequential rules composed of permit l deny statements.
These rules can match IP packets according to which of the following attributes? (Multiple choice)
A. Destination port number
B. Source address
C. Destination address
D. Source port number
Answer: ABCD

391.What functions can Huawei iMaster NCE products achieve? (Multiple choice)
A. Can manage equipment across manufacturers
B. Network automation
C. Provide a variety of open API interfaces
D. Predictive maintenance based on big data and Al
Answer: ABC

83 / 105
The safer , easier way to help you pass any IT exams.

392.Which statements are correct about the VRRP protocol version? (Multiple choice)
A. VRRPv2 is only applicable to IPv4
B. VRRPv3 is only applicable to IPv6
C. VRRPv3 does not support authentication
D. VRRPv2 supports authentication
Answer: ACD

393.Which of the following statements about MSTP is correct? (Multiple choice)


A. MSTP supports compatible operation with RSTP
B. MSTP can achieve load sharing of traffic between different LANs
C. Compared with RSTP.MSTP has more port roles
D. The BPDU format of MSTP is the same as RSTP
Answer: ABC

394.Which of the following descriptions of MED is correct? (Multiple choice)


A. The default value of MED is 0
B. The default value of MED is 100
C. MED can only be delivered within this AS
D. MED is an optional non-transitional attribute
Answer: AD

395.What are the benefits of OSPF area division? (Multiple choice)


A. Routers in an area can understand the topology details outside their area
B. It can reduce the size of LSDB and thus reduce the consumption of router memory
C. LSA can also be reduced with the division of areas, reducing the consumption of router CPU
D. A large number of LSA flooding is restricted to a single area
Answer: BCD

396.What is the role of the Hello message in PIM-SM? (Multiple choice)


A. Neighbors' capability negotiation
B. Establish and maintain neighbor relations
C. Register with RP
D. Election network segment BDR
Answer: AB

397.Regarding RP, which of the following statements is correct? (Multiple choice)


A. All routers in the PIM-SM network need to know the location of the RP
B. RP in PIM-SM network can only be specified manually
C. RP is elected by the BSR router
D. RP is the root of the RPT tree
Answer: AD

398.Regarding BGP route announcement, which of the following descriptions is wrong? (Multiple choice)
A. Only routes learned from IGP can be advertised to other BGP neighbors

84 / 105
The safer , easier way to help you pass any IT exams.

B. All BGP routes learned from all BGP neighbors are announced to other BGP neighbors.
C. Only the best route preferred by BGP can be announced to other BGP neighbors
D. By default, routes learned from IBGP are not forwarded to other IBGP neighbors
Answer: AB

399.Which of the following statements about VLAN hot backup is wrong? (Multiple choice)
A. In dual-link hot backup, the priority of the active and standby ACs can be configured to be the same to
achieve backup in load sharing mode
B. When configuring VRRP hot backup, you can configure the priority of VRRP to determine the primary
and backup colors of the AC device
C. When configuring VRRP hot standby, the active and standby ACs must be on the same Layer 2
network
D. In VRRP hot backup, the active and standby ACs can be on different Layer 2 networks and
communicate with each other through Layer 3 for backup
Answer: AD

400.In order for the non-directly connected EBGP neighbors to be established normally, which of the
following configurations must be included? (Multiple choice)
A. peer ebgp-max-hop
B. Peer connect-interface
C. peer ignore
D. peer as-number
Answer: AD

401.Which description of Route Policy is correct? (Multiple choice)


A. The if-match clause is used to match the matching conditions of the node, and the apply clause is used
to define the routing behavior that passes the filter.
B. The filter rule relationship of if-match clauses is "and", that is, all i-match clauses of the node must
match
C. The relationship between Route-Policy nodes is "or", as long as one node's filtering is passed, the
Route-Policy can be passed
D. A Route-Policy is composed of multiple nodes. A section can include multiple if-match and apply
clauses
Answer: ABCD

402.Which description is correct about the characteristics of a high-availability network? (Multiple choice)
A. Once a failure occurs, the business can only be restored through manual intervention
B. Can recover quickly after failure
C. No failure
D. Do not fail frequently
Answer: BD

403.Among the following BGP attributes, which are the recognized mandatory types of attributes?
(Multiple choice)

85 / 105
The safer , easier way to help you pass any IT exams.

A. MED
B. Local_Pref
C. Next_hop
D. As-Path
Answer: CD

404.RSTP has been improved on the basis of STP to achieve rapid convergence of the network topology.
But RSTP and STP are both based on a single spanning tree, and there are some shortcomings, such as?
(Multiple choice)
A. Unable to achieve load balancing of data traffic in VLAN
B. After the link is blocked, it will carry part of the traffic without causing waste of bandwidth
C. Will cause some VLAN path problems
D. Problems with sub-optimal paths
Answer: ACD

405.Which of the following descriptions are correct about two-tier roaming and three-tier roaming?
(Multiple choice)
A. If the VLAN ID associated before and after the STA is the same when roaming, it must belong to Layer
2 roaming
B. Layer 2 roaming means that the client roams in the same subnet
C. Three-tier roaming means that the client roams between different subnets
D. The VLANs on the AP service set associated with the STA before and after Layer 3 roaming must be
the same
Answer: CD

406.Which one of the following descriptions of the trigger mechanism of 802.1X authentication is correct?
(Multiple choice)
A. The authentication device can trigger authentication in multicast or unicast mode
B. 802.1X authentication can only be initiated by the client
C. 802.1X clients can trigger authentication by multicast or broadcast
D. 802.1X authentication cannot be initiated by an authentication device (such as an 802.1 switch)
Answer: AC

407.What are the traffic statistics methods? (Multiple choice)


A. Netstream
B. SNMP
C. Port mirroring
D. IP packet count
Answer: ABCD

408.Regarding the accompanying business, which of the following statements is correct? (Multiple
choice)
A. In the free mobility solution, the administrator does not need to repeat the configuration for each device
B. The controller is not only the certification center in the campus network, but also the management

86 / 105
The safer , easier way to help you pass any IT exams.

center of business strategies


C. The administrator does not need to care about the user's IP address when configuring the policy
D. The administrator can execute the business strategy on the device in the controller system-manage
the entire network strategy
Answer: ABCD

409.Which of the following descriptions of Link ID, Data, Type and Metroc in Router-L SA are correct?
(Multiple choice)
A. Data is used to describe the additional information of this connection, and different connection types
refer to different information
B. Metric describes the cost of this connection
C. Type indicates the type of connection
D. Link ID represents the local identification of this connection, and the same connection type Link ID
represents different meanings
Answer: ABCD

410.What are the three ways to send IPV4 packets? (Multiple choice)
A. Anycast
B. Multicast
C. Unicast
D. Broadcast
Answer: BCD

411.Which of the following statements is wrong about multicast MAC addresses? (Multiple choice)
A. 1 multicast MAC address correctly corresponds to 32 IP multicast addresses
B. The function of the multicast MAC address is to identify receivers belonging to the same multicast
group at the link layer
c. The high 24 bits of the multicast MAC address are 0x01005f, the 25th bit is fixed to 1, and the low 23
bits of the MAC address are the low 23 bits of the multicast IP address
D. One multicast MAC address is unique, corresponding to one IP multicast address
Answer: AB

412.RSTP converges faster than STP. Why? (Multiple choice)


A. The concept of edge ports is introduced in RSTP. Edge ports do not participate in RSTP operations and
can be directly transferred from Disable to Forwarding state.
B. If a root port in the network fails, the optimal Alternate port in the network will become the root port and
enter the Forwarding state
C. If a designated port in the network fails, the optimal Alternate port in the network will become the
designated port and enter the Forwarding state
D. In RSTP, after a port is elected as a designated port, it will first enter the Discarding state, and then
quickly enter the Forwarding state through the Proposal/Agreement mechanism
Answer: ABD

413.The route is injected into BGP through the network command. Which of the following description is

87 / 105
The safer , easier way to help you pass any IT exams.

wrong? (Multiple choice)


A. Just match the prefix, the length of the mask does not need to be strictly matched
B. The length of the mask must match exactly
C. The route cannot be an IGP route, it can only be a direct route
D. The route must exist in the IP routing table and is the best route
Answer: AC

414.Which of the following BGP attributes are not required to be included in the Update message of BGP
routing? (Multiple choice)
A. Origin
B. AS_PATH
C. Local-Preference
D. MED
Answer: CD

415.Route redistribution refers to the operation of only advertising routing information from one routing
protocol to another routing protocol.
Which of the following statements about route introduction is correct? (Multiple choice)
A. When implementing route import, route control can also be deployed to achieve flexible control of
correct business traffic
B. By importing routes, routing information can be transmitted between different routing protocols
C. The routing protocol itself has anti-loop characteristics, so there is no need to consider loop issues
when routes are imported into each other
D. When implementing route import, you need to pay attention to the routing priority agreements of
different vendors may be different
Answer: ABD

416.How does IGMPv2 router maintain the network segment group membership? (Multiple choice)
A. The router maintains a timeout timer for each group membership, refreshes the timer if it receives the
receiver host, and deletes the group membership if the timer expires
B. After receiving the eave message, the router immediately deletes the group membership
C. The router periodically sends Query messages, and the receiver host reports a Repeat message after
receiving the Query message
D. The router will query a specific group
Answer: ACD

417.Which of the following routing protocols support the release of default routes through command
configuration? (Multiple choice)
A. BGP
B. IGMP
C. ISIS
D. OSPF
Answer: ACD

88 / 105
The safer , easier way to help you pass any IT exams.

418.Which types of messages does the BGP protocol support? (Multiple choice)
A. Hello
B. Keepalive
C. Update
D. Open
Answer: BCD

419.What are the main types of ISIS Hello messages? (Multiple choice)
A. P2P LAN IIH
B. Level-1 LAN IIH
C. Level-2 LANIH
D. Level-3 LAN IIH
Answer: ABC

420.Which of the following descriptions of the OSPF protocol are correct? (Multiple choice)
A. The cost value of the second type of external route is only the AS external cost value, and the AS
internal cost value is ignored
B. AS-External-LSA does not belong to any area
C. AS-External-LSA describes the flooding scope of the route to the AS external route is outside the AS
D. AS-External-LSA describes the path from the router to the ASBR
Answer: AB

421.Which of the following descriptions about Network-Summary-LSA is correct? (Multiple choice)


A. The Metric in Network-Summary-LSA is set to the cost value from the ABR to the destination network
segment
B. The Net mask in Network-Summary-LSA is set to the net mask of the destination network segment
C. Network-Summary-LSA is generated by ASBR
D. The Link State ID in the Network-Summary-LSA is set to the IP address of the destination network
Answer: ABD

422.After the dual-system hot backup is configured, the main and backup channels cannot be established.
The information on the active device cannot be backed up to the backup device normally, causing the
dual-system hot backup function to be abnormal. The possible cause of the failure is? (Multiple choice)
A. The source IP address and source port number of the local end are inconsistent with the destination IP
address and destination port number of the opposite end
B. The retransmission times and retransmission intervals of the primary and secondary service packets at
both ends are inconsistent
C. The priority of the two ACs is the same
D. TCP channel is not established
Answer: ABD

423.Regarding the description of VRRP load sharing, which one is correct? (Multiple choice)
A. Load sharing method refers to the establishment of two or more backup groups, and multiple routers
carry services at the same time

89 / 105
The safer , easier way to help you pass any IT exams.

B. When configuring priorities, the VRRP masters of the three virtual routers can be on different routers
C. Multiple virtual routers can be created on one interface of the router, so that the router can be used as
a master router in one virtual router, and at the same time as a backup router in other virtual routers.
D. The load sharing method means that multiple routers undertake services at the same time, so the load
sharing method requires two or more virtual routers
Answer: AB

424.Which protocol modules can BFD detection be linked to? (Multiple choice)
A. OSPF
B. VRRP
C. BGP
D. Static routing
Answer: ABCD

425.In a certain network environment, there are both switches running RSTP and switches running SIP.
What will happen to the network? (Multiple choice)
A. If it is a Huawei switching equipment, RSTP will switch to STP mode. After the STP switching
equipment is evacuated from the network, the switching equipment running RSTP can be migrated back
to the RSTP working mode
B. RSTP can interoperate with STP, but the advantages of RSTP such as rapid convergence are lost at
this time
C. RSTP and STP are not interoperable and will perform independent operations
D. If it is a Huawei switching device, STP will switch to RSTP mode, and after the switching device that
can be equipped with RSTP is evacuated from the network, the switching device running STP can be
migrated back to the RSTP mode
Answer: AB

426.Regarding BGP MED, which of the following descriptions are correct? (Multiple choice)
A. The default value of BGP route MED is 0
B. By default, BGP routing rules can compare the distance between routes from different autonomous
systems.
C. By default, if the MED value is not set in the route attribute, press the process. If the bestroute
med-none-as maximum command is configured. Then handle the maximum MED value of 4294967295
D. In BGP routing rules, the priority of MED is lower than AS-Path, Preferred-Value, Local-Preference,
Origin
Answer: CD

427.OSPF can support multiple network types. Which of the following network types need to elect DR and
BDR? (Multiple choice)
A. NBMA
B. P2MP
C. B. ROADCAST
D. P2P
Answer: AC

90 / 105
The safer , easier way to help you pass any IT exams.

428.As shown in the figure, the output information of R1 is as follows, and the Router ID of the
neighboring router of R1 is ()

Answer: 10.0.2.2

429.Please match the following IGMP version with the corresponding working mechanism. (Drag and
drop)

Answer:

91 / 105
The safer , easier way to help you pass any IT exams.

430.As shown in the figure, all routers run IS-IS. R3 is a Level-1 router, R6 is a Leve1-2 router, and the
other routers are Level-1-2 routers. What are the types of neighbor relationships between routers?
Multiple choice)

92 / 105
The safer , easier way to help you pass any IT exams.

Answer:

431.RSTP redefines port roles. Please match RSTP port roles with their roles.

Answer:

432.Please match the following VRRP status with the corresponding working mechanism.

93 / 105
The safer , easier way to help you pass any IT exams.

Answer:

433.The output information of a router is as follows, please match the information on the left with the
information on the right.

94 / 105
The safer , easier way to help you pass any IT exams.

Answer:

434.Please match the following hardware modules with the corresponding functions.

Answer:

435.The MQC traffic behavior supports multiple actions on messages. Please match the actions of the
following MQC traffic behaviors with their functions.

95 / 105
The safer , easier way to help you pass any IT exams.

Answer:

436.All single switches in the stacking system are called member switches, and can be divided into
different roles according to their functions. Please match the roles of the following member switches with
their functions.

Answer:

437.All routers in a certain network run IS-S and are in Area 49.0001. The LSDB of R1 is shown in the
figure, and the Level of the four routers is judged based on this.

96 / 105
The safer , easier way to help you pass any IT exams.

Answer:

97 / 105
The safer , easier way to help you pass any IT exams.

438.The routing strategy supports multiple operations on routing attributes. Please match the parameters
of the following apply clauses with their functions. (Drag and drop)

Answer:

439.The routing strategy supports multiple operations on routing attributes. Please match the parameters
of the following apply clauses with their functions.

98 / 105
The safer , easier way to help you pass any IT exams.

Answer:

440.As shown in the figure below, the RTC announces 10.1.1.0/24 into BGP, and the RTC is the client of
the route reflector RTB, the router RT () will not receive the route entry 10.1.1.0/24 reflected by the RTB.
(Use Uppercase)

Answer: Capital letter A

99 / 105
The safer , easier way to help you pass any IT exams.

441.As shown in the figure, R1 and R2 form a VRRP backup group 1. By executing the vrrp vrid 1 vitual-ip
() command on R1, you can make it the IP address owner, let R1 be the Master and R2 as the Backup.

Answer: 192.168.1.254

442.R1, R2, R3, and R4 run IS-S, and the DIS Priority of their interfaces is shown in the figure. If the
devices are started at the same time, () is elected as D1S. (Please fill in the device name, such as R1)

Answer: R4

443.R1, R2, R3, R4 run OSPF, the area ID is as shown in the figure, then () will generate Type-3 LSA.
(Please fill in the device name, such as R1)

100 / 105
The safer , easier way to help you pass any IT exams.

Answer: R2

444.The output information of a router is as follows, please match the information on the left with the
information on the right.
Router ID of this device: ()
Router ID of the peer device: ()
The interface IP address of this device: ()
City ID to which this device belongs: ()

Answer: 10.0.1.1|10.0.2.2|10.0.123.1|0.0.0.0

445.As shown in the figure, RTA, RTB, RTC, and RTD are in the same AS. IBGP neighbor relationships
are established through direct links. RTB and RTC are route reflectors. RTA and RTC are the route
reflector clients of RTB. RTD is the route reflector client of RTC, and 10.1.1.0/24 is announced into BGP
on RTA, and the Originator ID value of the BGP route received on RTD is updated to ().

101 / 105
The safer , easier way to help you pass any IT exams.

Answer: 1.1.1.1

446.OSPF has five message types, please match the message types and functions.

Answer:

447.Execute the () saved-configuration command to clear the content of the configuration file used for the
next startup of the device, and cancel the configuration file used for the next startup of the specified
system, so that the device configuration is restored to the default value. (Please fill in the complete
command, not abbreviated, and use all lowercase English letters)
Answer: reset

448.The BGP protocol uses () messages to withdraw routing entries. (All lowercase in English)
Answer: update

449.By default, the interval for sending BGP Keepalive packets is () s. (using Arabic numerals)
Answer: 60

450.Add the interface GE1/0/1 to the trusts security zone on the Huawei firewall. At this time, the GE1/0/1
interface belongs to the () security zone. (All lowercase)
Answer: trust

451.Option 82 in the DHCP message is called the relay agent information option, from which the

102 / 105
The safer , easier way to help you pass any IT exams.

administrator can obtain a lot of information about the client. Option 82 can contain at most ()
Sub-Options.
Answer: 255

452.If roaming is realized between two APs, the same security policy forwarding mode and the same ()
must be met. (If English words are involved, please use capital letters)
Answer: SSID

453.The relationship between various rules in MQC flow classification is divided into: and or or, and the
relationship is () by default.
Answer: or

454.The security zones created by Huawei firewall by default are untrust, dmz, and local (). (All
lowercase)
Answer: trust

455.When configuring the multicast routing protocol, you need to execute the () routing-enable command
first, and then perform the related configuration of the PFIM protocol. (Please fill in the complete
command, not abbreviated, and use all lowercase English letters).
Answer: multicast

456.By default, the interval for sending PIM Hello packets on the router interface is () seconds.
Answer: 30

457.BGP prefers the route with the best Origin attribute value. Origin attribute values are: EGP, IGP, ().
Answer: incomplete

458.NAC (Network Access Control1) network access control includes three authentication methods. ()
Authentication, MAC authentication and Porta authentication. (If English words are involved, please use
capital letters)
Answer: 802.1X

459.ip ip-prefx List1 index 10 permit 10.1.0.0 24 greater-equal () less-equal 32 means that the first 24 bits
of the matching network address are the same as 10.1.0.0, and the network mask length is greater than
or equal to 26 and less than or equal to 32. (Use Arabic numerals)
Answer: 26 32

460.Please compress the address 2001:ODB8;0000:C030;0000:0000:09A0:CDEF. (If there are letters in


the answer, please use uppercase format)
Answer: 2001:ODB8::C030::09A0:CDEF

461.Please match the following BGP messages with their functions. (Multiple choice)

103 / 105
The safer , easier way to help you pass any IT exams.

A. Announce and revoke BGP routes


B. Negotiate BGP peer parameters
C. Maintain BGP peer relationship
D. Report wrong information and terminate the peer relationship
Answer: DABC

462.In the WLAN three-layer networking scenario, APs will go online through the following stages. Please
sort them in order. (Multiple choice)
A. AP discovers AC through option 43
B. AP and AC establish a CAP7AP tunnel
C. AP goes online, AC delivers service configuration to AP
D. AP obtains IP address
Answer: DABC

463.As shown in the figure, please follow the DHCPv6 four-step interactive process, drag the message to
the corresponding position R1, R2, R3, R4 in order to run OSPF, the area ID is as shown in the figure,
then () is ABR. (please Fill in the device name, such as R1) (Multiple choice)

A. Advertise
B. Reply
C. Solicit
D. Request

104 / 105
The safer , easier way to help you pass any IT exams.

Answer: CADB

464.As shown in the figure below, in order to realize that PC1 can access PC2, please complete the
corresponding command to the corresponding blank space. (Multiple choice)

A. trust
B. 23.1.1.0
C. 12.1.1.1
D. untrust
Answer: ADCB

465.In the WLAN three-layer networking scenario, APs will go online through the following stages. Please
sort them in order. (Multiple choice)
A. AP discovers AC through option 43
B. AP and AC establish a CAP7AP tunnel
C. AP goes online, AC delivers service configuration to AP
D. AP obtains IP address
Answer: DABC

105 / 105

You might also like