Free Huawei H12-211 Questions V14 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

The safer , easier way to help you pass any IT exams.

1. A network administrator has captured a data frame in the network with the destination MAC address of
01-00-5E-A0-B1-C3. The correct statement about this MAC address is ().
A. It is a unicast MAC address
B. It is a broadcast MAC address
C. It is a multicast MAC address
D. It is an illegal MAC address
Answer: C

2. Which of the following is not the working principle of CSMA/CD?


A. Listen While Talk
B. RRetransmission after a fixed time delay
C. Conflict suspension
D. Retransmission after random delay
E. Listen Before Talk
Answer: B

3. The IPv4 address of the host is 200.200.200.201/30. Which host with the following IPv4 address and its
communication do not need to be forwarded by the router?
A. 200.200.200.1
B. 200.200.200.202
C. 200.200.200.200
D. 200.200.200.203
Answer: B

4. If the Ethernet data frame is Length/Type=0x0806, which of the following statement is correct? (Multiple
Choice)
A. This data frame is an Ethernet II frame.
B. This data frame is an IEEE 802.3 frame
C. The source MAC address of this data frame must not be FFFF-FFFF-FFFFF.
D. The destination MAC address of this data frame must be FFFF-FFFF-FFFFF.
Answer: AC

5. When a router enabled with Proxy ARP function receives an ARP request packet and finds that the
requested IP address is not its own, what actions are performed? (Multiple Choice)
A. If there is a route to the destination address, send its own MAC address to the ARP requester.
B. Discard the message
C. Broadcast ARP request message
D. Find if there is a route to the destination address or not
Answer: AD

6. Which of the following storage media are commonly used by Huawei routers? (Multiple Choice)
A. SDRAM
B. NVRAM
C. Flash

1 / 6
The safer , easier way to help you pass any IT exams.

D. Hard Disk
E. SD Card
Answer: ABCE

7. The VRP operating system commands are divided into four levels: access level, monitoring level,
configuration level, and management level. Which level can run various business configuration
commands but cannot operate the file system?
A. Access level
B. Monitoring level
C. Configuration level
D. Management level
Answer: C

8. On the VRP interface, you cannot use the command delete or unreserved vrpcfg.zip to delete files. You
must empty them in the recycle bin to delete files completely.
A. TRUE
B. FALSE
Answer: B

9. The switch MAC address table is existing as follows, which of the following statements is
correct?

A. The MAC address 5489-9885-1838 is manually configured by the administrator.


B. The MAC address 5489-9811-0b49 is manually configured by the administrator
C. The MAC address 5489-3891-1450 is manually configured by the administrator.
D. After the switch is restarted, all MAC addresses need to be re-learned.
Answer: B

10. As shown in the figure below, the switch starts the STP protocol. When the network is stable, which of
the following statements are correct? (Multiple Choice)

2 / 6
The safer , easier way to help you pass any IT exams.

A. SWB is the root bridge in this network


B. SWA is the root bridge in this network
C. Both ports of SWB are in Forwarding state.
D. Both ports of SWC are in Forwarding state.
Answer: BC

11. The STP protocol is enabled on both switches shown in the figure below. An engineer made the
following conclusions on this network. Do you think what is the correct conclusion? (Multiple Choice)

A. The G0/0/2 port of SWB is stable in the Forwarding state.


B. The G0/0/2 port of SWA is stable in the Forwarding state.
C. Both ports of SWB are designated ports.
D. The G0/0/3 port of SWA is stable in the Forwarding state.
E. Both ports of SWA are designated ports.
Answer: ABDE

12. Compared to STP protocol, which kind of port role is added in RSTP protocol? (Multiple Choice)
A. Alternate port
B. Backup port
C. Root port
D. Designated port
Answer: AB

3 / 6
The safer , easier way to help you pass any IT exams.

13. As shown in the figure, the two switches use the default parameters to run STP. On Switch A, the
configuration command STP root primary is used. On the switch B, the configuration command STP
priority 0 is used. Which of the following ports will be blocked?

A. G0/0/2 of switch A
B. G0/0/1 of switch B
C. G0/0/1 of switch A
D. E0/0/3 of HUB
Answer: A

14. Which of the following parameters does not the configuration BPDU packet of the STP protocol?
A. Port ID
B. Bridge ID
C. VLAN ID
D. Root ID
Answer: C

15. By default, how many seconds are the Forward Delay of STP protocol?
A. 20
B. 15
C. 10
D. 5
Answer: B

16. Which of the following parameters are used in the switched network that runs the STP protocol when
performing spanning tree calculations? (Multiple Choice)
A. Root path cost
B. Port ID
C. Bridge ID
D. Forward Delay
Answer: ABC

17. In the STP protocol, assume that all switches are configured with the same priority. The MAC address
of switch 1 is 00-e0-fc-00-00-40, and the MAC address of switch 2 is 00-e0-fc-00-00-10, the MAC address
of switch 3 is 00-e0-fc-00-00-20, and the MAC address of switch 4 is 00-e0-fc-00-00-80, then the root
switch should be ().

4 / 6
The safer , easier way to help you pass any IT exams.

A. Switch 1
B. Switch 2
C. Switch 3
D. Switch 4
Answer: B

18. The network shown in the figure below, the MAC address of the switch has been marked. Enter the
command stp root secondary on the SWD switch. Which of the following switches will become the root
bridge of this network?

A. SWA
B. SWB
C. SWC
D. SWD
Answer: D

19. Both the two switches shown in the following figure have STP enabled. Which port will eventually be in
the Blocking state?

A. G0/0/2 port of SWA


B. G0/0/3 port of SWA
C. G0/0/2 port of SWB
D. G0/0/3 port of SWB

5 / 6
The safer , easier way to help you pass any IT exams.

Answer: D

20. The network as shown in the following figure, after the OSPF protocol is stable, what is the neighbor
status of Router A and Router B?

A. 2-way
B. Down
C. Full
D. Attempt
Answer: C

6 / 6

You might also like