0% found this document useful (0 votes)
267 views150 pages

From Exam Website

The document contains a series of questions and answers about network administration topics including AAA authentication, access control lists, Ethernet duplex modes, TCP handshake process, and IP packet fields. It covers configuring unique user credentials and privilege levels for network devices, supported AAA authentication methods, ACL rule numbering and filtering behavior, improving network performance by configuring full duplex modes, identifying the transport layer's role in flow control, and interpreting the meaning of the TTL field in IP packets.

Uploaded by

mohammad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
267 views150 pages

From Exam Website

The document contains a series of questions and answers about network administration topics including AAA authentication, access control lists, Ethernet duplex modes, TCP handshake process, and IP packet fields. It covers configuring unique user credentials and privilege levels for network devices, supported AAA authentication methods, ACL rule numbering and filtering behavior, improving network performance by configuring full duplex modes, identifying the transport layer's role in flow control, and interpreting the meaning of the TTL field in IP packets.

Uploaded by

mohammad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 150

opic 1 - Single Topic

Question #1Topic 1
An administrator currently manages AR2200 devices in the network through a
single password, however the company wishes to introduce another two
administrators and provide unique user credentials and privilege levels for telnet
access to the network devices.
What action can be taken? (Choose three)

 A. Configure three users under the AAA-view, and assign each a different
password.
 B. The authentication mode must be changed to AAA.
 C. Each administrator must be assigned a privilege level.
 D. A public IP address must be assigned to each user for telnet access

Hide Solution    Discussion   1


Correct Answer: ABC

Question #2Topic 1
Which of the following authentication methods are supported for Telnet users?
(Choose three)

 A. Password authentication
 B. AAA local authentication
 C. MD5 authentication
 D. No authentication

Hide Solution    Discussion  


Correct Answer: ABD

Question #3Topic 1
On Huawei AR G3 Series routers, which authentication modes does AAA
support? (Choose all that apply.)

 A. None
 B. Local
 C. Radius
 D. 802.1X

Hide Solution    Discussion  


Correct Answer: ABC

Question #4Topic 1

Refer to the configuration output. RTA has been configured using AAA as shown,
and associated with the "huawei" domain. For users in the huawei domain, which
authentication-scheme will be used?

 A. au1
 B. au2
 C. au1 will be used. When au1 is deleted, users will use au2
 D. au2 will be used. When au2 is deleted, users will use au1

Hide Solution    Discussion   1


Correct Answer: B

Question #5Topic 1
A user accesses a server supporting AAA, for which the authorization mode on
the AAA server has been configured using the command "authorization-mode
hwtacacs if-authenticated".
Which of the following statements regarding this command are true? (Choose
three).

 A. If the hwtacacs server fails to respond, the user will be authenticated
using local authentication.
 B. If the hwtacacs server fails to respond, the user will be authenticated
using remote authentication.
 C. If the hwtacacs server fails to respond, the user will bypass
authentication.
 D. The hwtacacs server will authorize the user.

Hide Solution    Discussion  


Correct Answer: ABD

Question #6Topic 1
Which of the following descriptions regarding eSight is not correct?

 A. eSight is used to monitor and manage enterprise networks.


 B. eSight supports only Huawei devices.
 C. eSight supports WLAN management and monitoring of hotspot
coverage.
 D. eSight supports the backup of configuration files and network traffic
analysis.

Hide Solution    Discussion  


Correct Answer: B

Question #7Topic 1
What of the following statements is correct regarding access control list types
and ranges?

 A. A basic ACL value ranges from 1000-2999


 B. An advanced ACL value ranges from 3000-4000
 C. A layer 2 ACL value ranges from 4000-4999
 D. An interface ACL value ranges 1000-2000

Hide Solution    Discussion   1


Correct Answer: C

Question #8Topic 1
Which of the following parameters is not used by Advanced ACL?

 A. Source interface
 B. Destination port number
 C. Protocol number
 D. Time-range

Hide Solution    Discussion  


Correct Answer: A

Question #9Topic 1

Refer to the configuration output. Which of the following statements regarding


ACL 2001 is correct?

 A. Packets from network 10.0.1.0/24 network will be denied.


 B. Packets from network 10.0.1.0/24 network will be permitted.
 C. Packets destined for network 10.0.1.0/24 will be denied.
 D. Packets destined for network 10.0.1.0/24 will be permitted.

Hide Solution    Discussion  


Correct Answer: B

Question #10Topic 1

Refer to the configuration output. A network administrator configured the ACL on


router RTA, as shown.
Which of the following statements regarding the rule order are correct? (Choose
two).

 A. The rule-number of the first rule is 1


 B. The rule-number of the first rule is 5
 C. The rule-number of the second rule is 2
 D. The rule-number of the second rule is 10

Hide Solution    Discussion  


Correct Answer: BD
Question #11Topic 1
Following a failure of services in the network, an administrator discovered that
the configuration in one of the enterprise routers had been changed.
What actions can be taken by the administrator to prevent further changes?
(Choose three)

 A. The administrator should limit access by setting the login privilege of


users to 0.
 B. The administrator should configure AAA to manage user authorization
on the router.
 C. The administrator should configure an ACL to allow only the
administrator to manage the router.
 D. The administrator should configure port-security on the router.

Hide Solution    Discussion  


Correct Answer: ABC

Question #12Topic 1

Refer to the configuration output. Which of the following statements is correct


regarding the configuration of the ACL on RTA?

 A. Packets from network 20.1.1.0/24 network will be denied.


 B. Packets from network 20.1.1.0/24 network will be permitted.
 C. Packets destined for network 20.1.1.0/24 will be denied.
 D. Packets destined for network 20.1.1.0/24 will be permitted.

Hide Solution    Discussion  


Correct Answer: A
Question #13Topic 1

Refer to the configuration output. Which of the following statements are correct
regarding the configuration of the ACL on RTA? (Choose two).

 A. Packets from network 172.16.1.1/32 will be denied.


 B. Packets from network 172.16.1.0/24 will be denied.
 C. Packets from network 172.17.1.0/24 will be denied.
 D. Packets from network 172.18.0.0/16 will be denied.

Hide Solution    Discussion   1


Correct Answer: AD

Question #14Topic 1
The network administrator wants to improve the performance of network
transmission, what steps can the administrator take? (Choose two)

 A. Change the work mode to full duplex of each end station.


 B. Link the end stations together using a switch.
 C. Change the work mode to half duplex of each end station.
 D. Link the end stations together using a hub.

Hide Solution    Discussion  


Correct Answer: AB

Question #15Topic 1
On Huawei switch, which of the following commands can be used to set port
duplex mode as "auto negotiation"? (Choose two)

 A. duplex negotiation auto


 B. duplex auto-negotiation
 C. duplex auto
 D. undo duplex

Hide Solution    Discussion  


Correct Answer: CD

Question #16Topic 1
The network administrator wishes to transmit data between two end stations. The
network interface cards of both devices operates at 100Mbps however one
supports half duplex while the other uses full duplex mode.
What will occur as a result?

 A. The end stations cannot communicate.


 B. The end stations can communicate, but data may be lost during
transmission of large amounts of traffic.
 C. The end stations will operate normally
 D. The end stations can communicate, but speed is different during
transmission of large amounts of traffic.

Hide Solution    Discussion  


Correct Answer: B

Question #17Topic 1
An Ethernet port can work one of three duplex modes, whereas an Optical
Ethernet port only supports one single mode.
Which of the following represents this mode?

 A. Full-duplex
 B. Half-duplex
 C. Auto-negotiation
 D. Simplex

Hide Solution    Discussion  


Correct Answer: A

Question #18Topic 1
While inspecting packets in the network, a network administrator discovers a
frame with the destination MAC address of 01-00-5E-A0-B1-C3.
What can the administrator determine from this?

 A. The MAC address is a unicast address.


 B. The MAC address is a broadcast address
 C. The MAC address is a multicast address.
 D. The MAC address is incorrect.

Hide Solution    Discussion   1


Correct Answer: C

Question #19Topic 1
According to OSI reference model, which layer is responsible for end to end error
checking and flow control?

 A. Physical layer
 B. Data link layer
 C. Network layer
 D. Transport layer

Hide Solution    Discussion   1


Correct Answer: D

Question #20Topic 1
Which of the following mechanisms are used for flow control? (Choose three)

 A. Acknowledgement
 B. Buffering
 C. Source quench messages
 D. Windowing

Hide Solution    Discussion  


Correct Answer: BCD
Question #21Topic 1

Refer to the capture output. The administrator has captured three packets in the
network. Which statement regarding the captured packets is incorrect?

 A. This packets represent a TCP three-way handshake process.


 B. 10.0.12.1 is the telnet server, while 10.0.12.2 is the telnet client.
 C. The three packets contain no application data.
 D. 10.0.12.1 uses port 50190 to buid the telnet connection.

Hide Solution    Discussion  


Correct Answer: B

Question #22Topic 1
An Ethernet frame is captured by network protocol analyzer tool and the value of
Type/Length field is 0x0800.
Which of the following statements about the frame are correct? (Choose two)

 A. The frame structure of the frame is Ethernet_II


 B. The frame structure of the frame is 802.3
 C. Its upper layer protocol is IP
 D. Its upper layer protocol is IPX

Hide Solution    Discussion  


Correct Answer: AC

Question #23Topic 1
Which of the following descriptions regarding the TTL field of the IP packet is
correct?

 A. The TTL defines how many packets the source can send.
 B. The TTL defines the duration during which the source can send
packets.
 C. The TTL value will decrement by 1 each time the packet is routed.
 D. The TTL value will increment by 1 each time the packet is routed.
Hide Solution    Discussion  
Correct Answer: C

Question #24Topic 1
Which of the following statements are correct about TTL field in IP packet?
(Choose two)

 A. The maximum value of TTL is 65535.


 B. Normally, it's impossible for a router to receive a packet whose TTL is
zero.
 C. The main purpose of TTL is to prevent IP packets from circulating
endlessly in a network which can consume a lot of bandwidth.
 D. TTL value will be decremented as a packet is passed through the
network devices such as hub, LAN switch and router.

Hide Solution    Discussion  


Correct Answer: BC

Question #25Topic 1
In the case of Huawei router, what is the "-i" parameter in a Ping command
issued on a VRP operating system used to set?

 A. Interface for sending an Echo Request packet


 B. Source IP address for sending an Echo Request packet
 C. Interface for receiving an Echo Reply packet
 D. Destination IP address for receiving an Echo Reply packet

Hide Solution    Discussion  


Correct Answer: A

Question #26Topic 1
To provide the information about the IP addresses that a user packet traverses
along the path to the destination, which of the following does Tracert record in
each expired ICMP TTL packet?

 A. Destination port
 B. Source port
 C. Destination IP address
 D. Source IP address

Hide Solution    Discussion  


Correct Answer: D

Question #27Topic 1
Which of the following statements regarding the verification of IP connectivity are
false? (Choose three)

 A. The ping 127.0.0.1 command can be used to check whether the


network cable is correctly inserted into the host's Ethernet port.
 B. The ping command with the host IP address as the destination can be
used to verify that the TCP/IP protocol suite is functioning correctly.
 C. The ping command can be used to verify connectivity between the host
and the local gateway.
 D. The command "ipconfig /release" can be used to check connectivity
problems between the host and the local gateway.

Hide Solution    Discussion   5


Correct Answer: ABD

Question #28Topic 1
A network administrator uses the ping command to check for points of failure in
the network.
Which protocols will be used during this process? (Choose two)

 A. ICMP
 B. TCP
 C. ARP
 D. UDP

Hide Solution    Discussion  


Correct Answer: AC

Question #29Topic 1
A network administrator recently used tracert to trace the path to the destination
IP address of an external website, however the trace path displayed only a
timeout result.
Which of the following statements correctly explains the reason for this? (Choose
two)

 A. The source router had shutdown the ICMP function.


 B. This destination IP address does not exist.
 C. The gateway cannot find a route to the destination.
 D. This is a normal phenomenon.

Hide Solution    Discussion  


Correct Answer: BC

Question #30Topic 1

A network administrator uses the ping command to test connectivity to the


destination 10.0.0.2 on a Huawei AR series router.
Which statement regarding the output is correct?

 A. The network administrator used the command ping -c 2 -s 800 10.0.0.2


 B. The network administrator used the command ping -a 2 -v 800 10.0.0.2
 C. The path between the source and destination is not OK.
 D. The network administrator changed the default TTL value.

Hide Solution    Discussion   1


Correct Answer: A
-c Specify the number of echo requests to be sent, the default is 5 -s Specify the number
of data bytes to be sent, the default is 56bytes
Question #31Topic 1
Which of the following statements explains the behavior of the ICMP redirect
function? (Choose two)

 A. When a router receives data on the interface via which the same data
needs to be forwarded, and the source is on the same segment as the
next hop, an ICMP redirect message will be sent by the router to the
source.
 B. When a router receives data on an interface, and the router's IP
address matches the destination IP of the data, an ICMP redirect
message will be sent by the router to the source.
 C. When a router receives data on the interface via which the same data
needs to be forwarded, and the source is on the same segment as the
next hop, an ICMP Redirect message will be sent by the source to the
router.
 D. When a router receives data on the interface via which the same data
needs to be forwarded, and the source is on a different segment from the
next hop, an ICMP redirect message will be sent by the router to the
source

Hide Solution    Discussion  


Correct Answer: AD

Question #32Topic 1
Host A wishes to send data to host C, and generates an ARP request to obtain
the destination MAC address.
Which statement is true?

 A. The destination IP address of the ARP request is Host C.


 B. The destination MAC address of this ARP request is Host C.
 C. The destination IP address for the ARP request is a broadcast IP
address.
 D. The destination MAC address of this frame is the MAC address of
G0/0/0 on RTA.

Hide Solution    Discussion   4


Correct Answer: A

Question #33Topic 1
An ARP request is sent by host A to obtain the destination MAC address of host
D.
Which statement is true about regarding the ARP reply?

 A. The destination MAC address of this frame is the MAC address of


Switch A.
 B. The destination IP address of this packet is the VLANIF1 IP address of
Switch A.
 C. The destination MAC address of this frame is the MAC address of Host
A.
 D. The destination IP address of this packet is a broadcast IP address.

Hide Solution    Discussion   6


Correct Answer: C

Question #34Topic 1
Which of the following applications can be used to detect the path along which
the data packets are transmitted from the source to the destination?

 A. Route
 B. Netstat
 C. Tracert
 D. Send

Hide Solution    Discussion  


Correct Answer: C

Question #35Topic 1
How many probe packets are sent for each TTL value by default when "tracert" is
used to detect the path along which packet is sent from source to destination?

 A. 3
 B. 4
 C. 6
 D. 8

Hide Solution    Discussion  


Correct Answer: A

Question #36Topic 1
Which of the following types can ICMP packets be classified into? (Choose two)

 A. ICMP transport packet


 B. ICMP error reporting packet
 C. ICMP query packet
 D. ICMP application packet

Hide Solution    Discussion  


Correct Answer: BC
Question #37Topic 1
On VRP platform, which of the following parameters can be used together with
the "ping" command to specify the source address of an echo request message?

 A. -a
 B. -s
 C. -d
 D. -n

Hide Solution    Discussion   5


Correct Answer: A

Question #38Topic 1
A router functioning as a Proxy receives an ARP request packet, but finds that
the destination address in the packet is not intended for itself. In this case, what
will the router do? (Choose two)

 A. Discard the packet.


 B. Check for a route that matches the destination address.
 C. Forward its MAC address to the ARP request sender after finding that a
route to the destination address is available.
 D. Broadcast the ARP request packet.

Hide Solution    Discussion  


Correct Answer: BC

Question #39Topic 1
Two end stations in a point-to-point network perform address resolution.
Which of the following statements is correct?

 A. The destination address of an ARP request from each station will be a


unicast MAC address.
 B. The destination address of an ARP request from each station will be a
broadcast IP address.
 C. The destination address of an ARP reply from each station will be a
unicast MAC address.
 D. The destination address of an ARP reply from each station will be a
broadcast MAC address.

Hide Solution    Discussion  


Correct Answer: C
Question #40Topic 1
What will the destination MAC address be at the moment a frame is transmitted
by the host, when the router is the IP destination?

 A. The MAC address of the switch.


 B. The MAC address of the router interface G0/0/0.
 C. The MAC address of the host.
 D. The destination MAC address will be a broadcast MAC address.

Hide Solution    Discussion   3


Correct Answer: D
Question #41Topic 1
Which of the following statements about gratuitous ARP packets are true?
(Choose two)

 A. A system can determine whether conflicting IP addresses are used by


sending a gratuitous ARP packet
 B. A gratuitous ARP packet uses the same format as an ARP request
packet.
 C. A gratuitous ARP packet can help to update an IP address.
 D. A gratuitous ARP packet uses the same format as an ARP reply
packet.

Hide Solution    Discussion  


Correct Answer: AB

Question #42Topic 1
UDP is connectionless oriented, which of the following must be used in order to
ensure reliability?

 A. Internet Protocol
 B. Application Layer Protocol
 C. Network Layer Protocol
 D. Transmission Control Protocol

Hide Solution    Discussion   4


Correct Answer: B

Question #43Topic 1
Refer to the graphic.

The administrator has configured an IP address for Host A and Host B, but had
forgotten to configure a default gateway.
What effect will this have on the hosts?
 A. Neither host will be affected, and therefore will be able to communicate
with the peer.
 B. Host A will be unable to connect to the router's G0/0/0 interface.
 C. Hosts will be unable to communicate unless arp-proxy is enabled on
the router.
 D. The host will be unable to reach neither the local nor remote network
destinations.

Hide Solution    Discussion  


Correct Answer: C

Question #44Topic 1
Refer to the graphic.

A host has established a telnet connection with the router attached to interface
G0/0/0.
Which of the following statements are correct? (Choose all that apply.)

 A. The destination MAC address of a frame sent by the host will be the
MAC address of the router interface G0/0/0.
 B. The destination MAC address of a frame sent by the host will be the
MAC address of the switch.
 C. The destination port number in a segment header will have a value of
80.
 D. The destination IP address of a packet will be the IP address of the
Router interface G0/0/0.
Hide Solution    Discussion  
Correct Answer: AD

Question #45Topic 1
The administrator uses the ping command on the host to test connectivity to the
website www.huawei.com.
The command line shows a request time out. The administrator displays the ARP
entries for the host.
Which entry will be found in the ARP cache table of the host?

 A. The MAC address of the destination www.huawei.com will exist in the


ARP cache.
 B. The MAC address of the switch will exist in the ARP cache.
 C. The IP address of the destination www.huawei.com will exist in the
ARP cache.
 D. The MAC address of router interface G0/0/0, will exist in the ARP
cache.

Hide Solution    Discussion  


Correct Answer: D

Question #46Topic 1
When R2 forwards data to R3 from R1, which of the following items will change?
(Choose two)

 A. The source MAC address


 B. The destination MAC address
 C. The source IP address
 D. The destination IP address

Hide Solution    Discussion  


Correct Answer: AB

Question #47Topic 1
If Host B also configured the IP address as "192.168.1.1/24", an IP address
config will occur.
What will happen as a result?

 A. Host B will send an ICMP request to the destination with the configured
IP address. If a reply is received, the host will notify of an address conflict.
 B. Host A will send a gratuitous ARP request to resolve the MAC address
of the destination 192.168.1.1, for which Host B will reply.
 C. Host B will send a gratuitous ARP request to resolve the MAC address
of the destination 192.168.1.1, for which Host A will reply.
 D. Host A will ignore any received ARP request intended for destination
192.168.1.1.

Hide Solution    Discussion  


Correct Answer: C

Question #48Topic 1

Refer to the graphic. A switch attempts to forward a frame to the MAC destination
5489-98ec-f011. What operation will occur on the switch?

 A. The switch will send a request to obtain the MAC address of 5489-
98ec-f011.
 B. The switch will report that the destination is unreachable and report this
to the source.
 C. The switch will flood the frame via all ports, with exception of the port
on which the frame was received.
 D. The switch will drop the frame because it does not have an entry in its
MAC address table.

Hide Solution    Discussion  


Correct Answer: C

Question #49Topic 1
Host A has been connected to a four port switch A on port G0/0/1and configured
with an IP address.
When Host A initially forwards a frame, what action will be taken by Switch A?

 A. Switch A will drop this frame.


 B. Switch A will attempt to flood the frame to all ports except for the G0/0/1
interface.
 C. Switch A will forward the frame via ports G0/0/1, G0/0/2 and G0/0/3.
 D. Switch will receive this frame before returning the frame to G0/0/1.
Hide Solution    Discussion  
Correct Answer: B

Question #50Topic 1
A server is linked to port interface G0/0/1 of a switch. The administrator wishes to
allow only this server to be linked to this interface on the switch.
Which method can be used to achieve this?

 A. Configure a static ARP entry using the server's IP address and MAC
address in the switch.
 B. Configure a static MAC address binding entry of the server's MAC
address and the interface in the switch.
 C. Configure the default gateway of the switch to be the same as the
server's IP address.
 D. It is not possible to enable a single device to be associated with an
interface.

Hide Solution    Discussion  


Correct Answer: B
Question #51Topic 1
An administrator connects two switches together in a local enterprise network.
The ports of one switch support Fast Ethernet, while the ports of the other switch
support Gigabit Ethernet. Hosts connected to one switch are able to
communicate, however communication between the two switches fails.
What is the possible reason for this?

 A. The ports have disabled auto-negotiation.


 B. One port is supporting auto-negotiation, while auto-negotiation is
disabled on the port of the other switch.
 C. The port of one switch is operating using half duplex mode, while the
port of the other switch is using full duplex mode.
 D. A Fast Ethernet port cannot communicate directly with a Gigabit
Ethernet port.

Hide Solution    Discussion   2


Correct Answer: A

Question #52Topic 1
A layer 2 LAN switch generates CAM table entries according to the ( ) of the
received frame.

 A. Source MAC address


 B. Destination MAC address
 C. Source IP address
 D. Destination IP address

Hide Solution    Discussion   2


Correct Answer: A

Question #53Topic 1
Which of the following statements about collision domains and broadcast
domains are correct? (Choose three)

 A. Devices connected to the same hub form a collision domain


 B. Devices connected to the same hub form a broadcast domain
 C. Devices connected to the same bridge form a collision domain
 D. Devices connected to the same bridge form a broadcast domain
 E. Devices connected to the same router form a broadcast domain

Hide Solution    Discussion  


Correct Answer: ABD

Question #54Topic 1
Which of the following statements regarding layer-2 switch is incorrect?

 A. The switch learns MAC addresses automatically.


 B. The layer-3 header is modified before the received packet is
transmitted.
 C. The layer-2 header is modified before the received packet is
transmitted.
 D. The layer-2 LAN switch operates at data link layer.

Hide Solution    Discussion   2


Correct Answer: B

Question #55Topic 1

Refer to the display output. What can be determined based on the output of the
display command?

 A. Interface Gigabit Ethernet 0/0/0 is connected to a wrong cable


 B. Interface Gigabit Ethernet 0/0/0 is not associated with an IP address
 C. Interface Gigabit Ethernet 0/0/0 is not associated with a dynamically
defined route.
 D. Interface Gigabit Ethernet 0/0/0 has been manually shut down by an
administrator.

Hide Solution    Discussion  


Correct Answer: D

Question #56Topic 1
Which of the following statements regarding static and dynamic routing is
incorrect?

 A. The static route can be easily configured and managed on the


enterprise network.
 B. The use of dynamic routing is more convenient for the administrator to
manage the network following network convergence.
 C. The static route can automatically recover when a link failure is
encountered.
 D. Dynamic routing will use more resources than static routes.

Hide Solution    Discussion  


Correct Answer: C

Question #57Topic 1
Which of the following are routed protocols? (Choose all that apply.)

 A. IP
 B. OSPF
 C. BGP
 D. IPX

Hide Solution    Discussion   4


Correct Answer: AD

Question #58Topic 1
Which of the following statements regarding the routing table are correct?
(Choose all that apply.)

 A. The next hop in the routing table is redundant because the outgoing
interface can be used for packet forwarding.
 B. The routes from generated by different protocols have different
preferences.
 C. The metrics of different routing protocols are comparable.
 D. The metrics of different routing protocols are not comparable

Hide Solution    Discussion  


Correct Answer: BD

Question #59Topic 1
Which of the following commands can be used to display the routing table on a
Quidway router?

 A. display ip path
 B. display ip routing-table
 C. display interface
 D. display current-configuration
Hide Solution    Discussion  
Correct Answer: B

Question #60Topic 1
Which of the following entries is not included in the routing table?

 A. source address
 B. next hop
 C. destination address
 D. cost

Hide Solution    Discussion  


Correct Answer: A

Question #61Topic 1
Which of the following problems are caused by routing loops? (Choose three)

 A. Slow convergence
 B. Packets circulate between routers
 C. Router restarting
 D. Inconsistency of routing information

Hide Solution    Discussion  


Correct Answer: ABD

Question #62Topic 1
An administrator wishes to manage the router in the remote branch office, which
method can be used?

 A. Telnet
 B. FTP
 C. Console Connection
 D. DHCP

Hide Solution    Discussion  


Correct Answer: A

Question #63Topic 1
The administrator cannot use telnet to manage the AR2200. The administrator is
able to verify connectivity to the router and has been informed that other
administrators have no difficulties using telnet.
Which statements describe the possible reasons for this problem? (Choose all
that apply.)

 A. The user's status has been blocked


 B. The user's privilege level has been changed to 0.
 C. The user has been deleted.
 D. The telnet service in the AR2200 router has been disabled.

Hide Solution    Discussion  


Correct Answer: AC

Question #64Topic 1
A user logged into a VRP supported device through telnet, but when attempting
to configure the device, found that he is unable to use the system-view command
to enter the system-view.
What are the possible reasons for this? (Choose two)

 A. The device's VTY interface only provides permission for some telnet
users to run the system-view command.
 B. The user's telnet software restricts use of this command.
 C. The user's privilege level is lower than the level associated with the
system-view command.
 D. The system-view command privilege level is lower than the level
associated with the user.

Hide Solution    Discussion  


Correct Answer: AC

Question #65Topic 1
The users who log on the router through Telnet are not permitted to configure IP
address.
What is the possible reason?

 A. Communication failures occur between the user and the router.


 B. The authentication mode of Telnet is set incorrectly.
 C. Privilege level of Telnet is set incorrectly.
 D. SNMP parameters are set incorrectly.

Hide Solution    Discussion  


Correct Answer: C

Question #66Topic 1
Which of the following statements are correct? (Choose two)

 A. A single collision domain exists between RTA and SWC.


 B. A single broadcast domain exists between SWA and SWB.
 C. A single collision domain exists between SWA and SWC.
 D. A single broadcast domain exists between SWA and SWC.

Hide Solution    Discussion  


Correct Answer: CD

Question #67Topic 1
On the interface serial 1/0/1 of RTA, the command "ip address unnumbered
interface loopback 0" has been configured.

Which following statements are correct? (Choose two).

 A. The IP address of interface serial 1/0/1 is 10.1.1.1/24


 B. The IP address of interface serial 1/0/1 is 10.1.1.1/32
 C. The route entry 10.1.1.0/24 exists in RTA's routing-table
 D. The route entry 10.1.1.0/24 does not exist in RTA's routing-table

Hide Solution    Discussion  


Correct Answer: BD

Question #68Topic 1
Refer to the graphic.

The host has a problem establishing a telnet connection with the router attached
to interface G0/0/0. Which of the following steps can be used to help the
administrator identify the problem? (Choose two)

 A. Check whether the host has configured the gateway IP address.


 B. Check whether the switch has configured the gateway IP address.
 C. Use the ping tool to check connectivity between host and router.
 D. Check the telnet server configuration is right on the router.

Hide Solution    Discussion  


Correct Answer: CD

Question #69Topic 1
Which of the following methods are supported by VRP platform to configure the
router? (Choose three)
 A. Through the Console port
 B. Through Telnet
 C. Through the AUX port
 D. Through FTP

Hide Solution    Discussion  


Correct Answer: ABC

Question #70Topic 1
The administrator wishes to update the configuration file of an AR2200 router
using a USB cable.
How can this be achieved? (Choose all that apply.)

 A. The administrator should connect the USB cable between the terminal
and the mini USB port of the AR2200 router.
 B. The administrator should connect the USB cable between the terminal
and the USB port of the AR2200 router.
 C. The AR2200 router cannot support configuration updates through a
USB cable.
 D. The administrator should install the mini USB drivers on the terminal
after connecting the USB.

Hide Solution    Discussion  


Correct Answer: AD
Question #71Topic 1
The administrator wishes to manage a network through telnet from a user's
terminal to a router.
How can this be achieved?

 A. A connection should be established between the ethernet port of the


terminal and the console port of the router.
 B. A connection should be established between the ethernet port of the
terminal and the ethernet port of the router.
 C. A connection should be established between the console port of the
terminal and the ethernet port of the router.use console cable connect pc's
ethernet port and router's console port.
 D. A connection should be established between the COM port of the
terminal and the console port of the router.

Hide Solution    Discussion  


Correct Answer: B

Question #72Topic 1
Whilst configuring a device, an administrator experiences trouble remembering
certain commands.
Which of the following will help support the administrator? (Choose two)

 A. TAB
 B. question mark
 C. ctrl+b
 D. ctrl+c

Hide Solution    Discussion  


Correct Answer: AB

Question #73Topic 1

Refer to the configuration output. The administrator configured the device using
the commands in the configuration output. Regarding these commands, which
statement is false?

 A. The administrator wishes to enable management through the console


interface.
 B. Following configuration, the administrator cannot manage the device
remotely.
 C. A user that logs-in through the console interface is assigned the highest
privilege level.
 D. The password of a user logged in through console is "˜cipher
huawei2012'.

Hide Solution    Discussion  


Correct Answer: D

Question #74Topic 1
Which of the following is abbreviation of VRP?
 A. Versatile Routine Platform
 B. Virtual Routing Platform
 C. Virtual Routing Plane
 D. Versatile Routing Platform

Hide Solution    Discussion  


Correct Answer: D

Question #75Topic 1
Which of the following must be used to establish the configuration environment
when a router is powered on for the first time?

 A. SSL
 B. SSH
 C. Console port
 D. Telnet

Hide Solution    Discussion  


Correct Answer: C

Question #76Topic 1
Which of the following parameter settings for terminal emulation are correct when
configuring a Huawei router through the Console port?

 A. 4800bps, 8 data bits,1 stop bits, odd parity check, and no flow control
 B. 9600bps, 8 data bits, 1 stop bits, no parity check, and no flow control
 C. 9600bps, 8 data bits, 1 stop bits, even parity check, and hardware flow
control
 D. 19200bps, 8 data bits, 1 stop bits, no parity check, and no flow control

Hide Solution    Discussion  


Correct Answer: B

Question #77Topic 1
Which of the following commands is used to enter the system-view from the user
view on a Huawei router?

 A. system-view
 B. enable
 C. configure terminal
 D. interface system
Hide Solution    Discussion  
Correct Answer: A

Question #78Topic 1
On VRP platform, the command lines are classified into four levels in increasing
priority: Visit level, Monitoring level, Configuration level, and Management level.
At which level, the operator is permitted to configure service but is not permitted
to operate the file system?

 A. Visit level
 B. Monitoring level
 C. Configuration level
 D. Management level

Hide Solution    Discussion   1


Correct Answer: C

Question #79Topic 1
On Huawei VRP platform, which of the following can be used to invoke the
history command saved by the command line interface? (Choose two)

 A. Up cursor key < >


 B. Left cursor key < >
 C. Ctrl+P
 D. Ctrl+U

Hide Solution    Discussion  


Correct Answer: AC

Question #80Topic 1
Which of the following commands can be used to view the current configurations
on a Huawei router?

 A. display current-configuration
 B. display saved-configuration
 C. view saved-configuration
 D. show startup-configuration

Hide Solution    Discussion  


Correct Answer: A
Question #81Topic 1
The administrator wishes to change name of the router. Under which view should
the administrator be in order to achieve this?

 A. User-view
 B. System-view
 C. Interface-view
 D. Protocol-view

Hide Solution    Discussion  


Correct Answer: B

Question #82Topic 1
<Huawei> system-view
[Huawei]command-privilege level 3 view user save
Refer to the command output. What is the result of the shown command?

 A. The command adjusts the save command of a user to privilege level 3.


 B. The command adjusts the save command in the user view to privilege
level 3.
 C. The command adjusts the user view command privilege level to 3, and
saves the configuration.
 D. The command adjusts the privilege level of a user to 3, and saves the
configuration.

Hide Solution    Discussion  


Correct Answer: B

Question #83Topic 1
<Huawei>system-view
[Huawei]history-command max-size 20
Refer to the command output. Which statements regarding the shown command
are true? (Choose two)

 A. The command is used to adjust the size of the history command buffer.
 B. The default value of the history command buffer is 5.
 C. The command should be configured in the user-interface view.
 D. Once configured, commands totaling up to 20 bytes can be saved in
the buffer.

Hide Solution    Discussion  


Correct Answer: AC

Question #84Topic 1
An AR2200 router is required to be reconfigured from scratch. Which steps are
needed to achieve this? (Choose all that apply.)

 A. Reset the saved configuration.


 B. Clear the current configuration.
 C. Reboot the AR2200.
 D. Assign the configuration file to be used at next startup.

Hide Solution    Discussion  


Correct Answer: AC

Question #85Topic 1
An administrator has been requested to replace the configuration file of a router
in the network. The administrator has been instructed that after logging into the
router, he must first permanently erase the current configuration file config.zip
from the system.
Which command should he use to achieve this?

 A. delete /force config.zip


 B. delete /unreserved config.zip
 C. reset config.zip
 D. clear config.zip

Hide Solution    Discussion   1


Correct Answer: B

Question #86Topic 1
Which of the following commands can switch a view from the system view to the
user view?

 A. System-view
 B. Router
 C. Quit
 D. User-view

Hide Solution    Discussion  


Correct Answer: C
Question #87Topic 1
Which of the following storage devices are supported by Huawei router? (Select
four)

 A. SDRAM
 B. NVRAM
 C. Flash
 D. Hard Disk
 E. CF Card

Hide Solution    Discussion  


Correct Answer: ABCE

Question #88Topic 1
Which of the following storage devices is used to store the startup configuration
files in a router?

 A. SDRAM
 B. NVRAM
 C. Flash
 D. BootROM

Hide Solution    Discussion  


Correct Answer: B

Question #89Topic 1
<Huawei>reset saved-configuration
Warning: The action will delete the saved configuration in the device.
The configuration will be erased to reconfigure. Continue? [Y/N]:
Refer to the configuration output. Which of the following statements are true?
(Select two answers)

 A. A user should enter "˜Y' when wishing to clear the saved configuration
file.
 B. The saved-configuration file that the device starts with can be erased.
 C. The saved-configuration will be deleted after typing N
 D. The saved-configuration file will be replaced with the current-
configuration.

Hide Solution    Discussion  


Correct Answer: AB

Question #90Topic 1
When a router is powered on, the router reads the configuration file saved in the
default save directory to get itself initialized. If the configuration file does not exist
in the default save directory, what does the router use to initialize itself?

 A. New configuration file


 B. Initial configuration file
 C. Default parameters
 D. Current configuration file

Hide Solution    Discussion  


Correct Answer: C
Question #91Topic 1

Refer to the display output. Which statement is false?

 A. The current configuration file has not been saved.


 B. The current startup system software is ar2220-v200r003c00spc200.cc
 C. The next startup system software cannot be changed.
 D. The next startup system software can be changed by using the "startup
system software <startup-softwarename>.cc" command.

Hide Solution    Discussion  


Correct Answer: C

Question #92Topic 1
<Huawei>
Warning: Auto-Config is working. Before configuring the device, stop Auto-
Config. If you perform configurations when Auto-Config is running, the DHCP,
routing,
DNS, and VTY configurations will be lost. Do you want to stop Auto-Config? [y/n]:
When an administrator first initializes the router, a warning is displayed. Which
statement regarding this warning is correct?

 A. If Auto-Config is required, the administrator should select "˜y'.


 B. If Auto-Config is not required, the administrator should select "˜n', for
which subsequent configuration of the DHCP server, routing, DNS server
and VTY user configuration is lost.
 C. When a device is started for the first time, the Auto-Config function is
active.
 D. When a device is started for the first time, the Auto-Config function is
inactive.
Hide Solution    Discussion  
Correct Answer: C

Question #93Topic 1
An AR2200 router in the company network cannot boot. In order to resolve this,
the administrator wishes to update the VRP software.
What should he/she do?

 A. The administrator should use a console cable to connect the router and
host, and directly upgrade the device.
 B. The administrator should use FTP to transfer the VRP software, by
configuring the AR2200 router as an FTP client.
 C. The administrator should use DHCP to boot the AR2200, and then use
the AR2200 router as a TFTP client to download the VRP software from
the server.
 D. The administrator should use the telnet command on the client to
remote access the device, and upgrade the VRP software.

Hide Solution    Discussion   3


Correct Answer: B

Question #94Topic 1
<Huawei>
Warning: Auto-Config is working. Before configuring the device, stop Auto-
Config. If you perform configurations when Auto-Config is running, the DHCP,
routing,
DNS, and VTY configurations will be lost. Do you want to stop Auto-Config? [y/n]:
Refer to the output. When the administrator first starts the router, a system notice
is displayed, however after rebooting this router, the notice disappeared. What is
the reason for this? (Choose all that apply.)

 A. This notice only appears during the very first device startup.
 B. The administrator has configured the device and saved the
configuration, causing the notice to disappear.
 C. The administrator selected "˜n' and did not save the configuration.
 D. The administrator selected "˜y' and saved the configuration.

Hide Solution    Discussion  


Correct Answer: BD

Question #95Topic 1
An end system is unable to communicate with a DHCP server following the
startup process.
Which IP address may be used by the client?

 A. 0.0.0.0
 B. 127.0.0.1
 C. 169.254.2.33
 D. 255.255.255.255

Hide Solution    Discussion  


Correct Answer: C

Question #96Topic 1

Refer to the configuration output. The administrator wishes to configure the


DHCP server pool in order to assign an IP address to the customer's terminal
device.
Which command should be included in the configuration to provide the minimal
lease period for IP addresses?

 A. dhcp select relay


 B. lease day 1
 C. lease 24
 D. lease 0

Hide Solution    Discussion  


Correct Answer: B

Question #97Topic 1
A DHCP server has been established in the enterprise network. After the client
has obtained an IP address from the DHCP server, the user decided to modify
the
IP address manually.
In what way may this affect the enterprise network? (Choose two).

 A. The client may experience an IP address conflict.


 B. The client may access the network normally.
 C. The client's interface connection will shutdown.
 D. The client will associate with another DHCP server.
Hide Solution    Discussion  
Correct Answer: AB

Question #98Topic 1
A DHCP server in the enterprise network is being used to allocated IP addresses
to hosts. An administrator discovers however that some hosts are obtaining IP
addresses outside of the scope of the DHCP server's address pool.
What are the possible reasons for this? (Choose three).

 A. Another DHCP server exists in the network and is allocating IP


addresses to hosts that happen to be within a closer proximity than the
authorized DHCP server.
 B. The hosts were unable to discover a DHCP server and therefore
generated their own address in the 169.254.0.0 address range.
 C. The hosts were unable to discover a DHCP server and therefore
generated their own address in the 127.254.0.0 address range.
 D. All addresses from the DHCP pool have been assigned.

Hide Solution    Discussion  


Correct Answer: ABD

Question #99Topic 1

Refer to the configuration output. Following configuration, a host is connected to


the interface Gigabit Ethernet 0/0/1 of the router. Which IP address will the client
obtain?

 A. An IP address from network 10.10.10.0/24 will be assigned.


 B. An IP address from network 10.20.20.0/24 will be assigned.
 C. The host will be unable to obtain an IP address.
 D. An IP address may be assigned from either 10.10.10.0/24 or
10.20.20.0/24.
Hide Solution    Discussion  
Correct Answer: A

Question #100Topic 1
The IP addresses of clients in the network are deployed via a DHCP server.
When a host reboots, which message will the host first send to the DHCP
server?

 A. DHCP DISCOVER
 B. DHCP REQUEST
 C. DHCP OFFER
 D. DHCP ACK

Hide Solution    Discussion   4


Correct Answer: B
Question #101Topic 1
A DHCP Unique Identifier (DUID) in DHCPv6 can be configured in VRP using
which formats? (Choose two).

 A. DUID-LL
 B. DUID-LLT
 C. DUID-EN
 D. DUID-LLC

Hide Solution    Discussion   2


Correct Answer: AB

Question #102Topic 1
Which of the following statements about the information contained in a Database
Description packet are true? (Choose three)

 A. A Database Description packet contains all information about each


LSA.
 B. A Database Description packet contains only the header of an LSA.
 C. The header of an LSA is the unique identifier of the LSA.
 D. The header of an LSA is only a small portion of all the data of the LSA.

Hide Solution    Discussion  


Correct Answer: BCD

Question #103Topic 1
What is the default authentication mode for the default_admin domain?

 A. None
 B. Local
 C. Radius
 D. 802.1X

Hide Solution    Discussion  


Correct Answer: B

Question #104Topic 1
How many domains can be configured on a Huawei router?

 A. 30
 B. 31
 C. 32
 D. 33

Hide Solution    Discussion   1


Correct Answer: A

Question #105Topic 1
An authenticator router has been configured with two domains named "Area1"
and "Area2", following which a user is created with the username "huawei" and
the password "hello" for authentication. Which domain does this user belongs to?

 A. Area1 domain
 B. Area2 domain
 C. default domain
 D. default_admin domain

Hide Solution    Discussion  


Correct Answer: C

Question #106Topic 1
In order to check if the interface serial 1/0/0 is working in either DCE or DTE
mode, command ( ) is used.

 A. display mode serial 1/0/0


 B. display controller
 C. display interface serial 1/0/0
 D. display current-config

Hide Solution    Discussion  


Correct Answer: C

Question #107Topic 1
How is mapping performed on a DTE device in a Frame Relay network?

 A. The local DLCI number is mapped to a remote IP address.


 B. The local IP address is mapped to a remote DLCI number.
 C. The local DLCI number is mapped to a local IP address.
 D. The remote DLCI number is mapped to a remote IP address.

Hide Solution    Discussion  


Correct Answer: A

Question #108Topic 1
If Frame Relay implements dynamic address mapping for the PVC, which
protocol will be used?

 A. LMI protocol
 B. ARP protocol
 C. RARP protocol
 D. InARP protocol

Hide Solution    Discussion  


Correct Answer: D

Question #109Topic 1
Which command should be used to check the mapping between protocol
addresses and frame relay addresses?

 A. display fr interface
 B. display fr map-info
 C. display fr inarp-info
 D. display interface brief

Hide Solution    Discussion  


Correct Answer: B

Question #110Topic 1
Which of the following protocols is used in Frame Relay to map the address to
DLCI dynamically?

 A. ARP protocol
 B. RARP protocol
 C. InARP protocol
 D. Map protocol

Hide Solution    Discussion  


Correct Answer: C
Question #111Topic 1
Which of the following parameters must be specified when configuring static
mapping for Frame Relay network? (Choose two)

 A. Local DLCI
 B. Remote DLCI
 C. Local network layer protocol address
 D. Remote network layer protocol address

Hide Solution    Discussion  


Correct Answer: AD

Question #112Topic 1
Which of the following regarding Frame Relay DLCI are correct? (Choose three)

 A. DLCI is locally significant


 B. DLCI is allocated by DTE
 C. The range of DLCI value that can be used is from 16-1007
 D. The same DLCI can be configured on different physical interfaces

Hide Solution    Discussion  


Correct Answer: ACD

Question #113Topic 1
Which of the following commands is used to enable dynamic address mapping
protocol in the interface encapsulated with Frame Relay?

 A. fr inarp
 B. fr reverse-arp
 C. inverse-arp
 D. reverse-arp

Hide Solution    Discussion  


Correct Answer: A

Question #114Topic 1
What is the meaning of 200 in the command "fr map ip 10.1.1.2 200"?

 A. remote logical channel ID


 B. local DLCI
 C. remote interface ID
 D. remote node ID

Hide Solution    Discussion  


Correct Answer: B

Question #115Topic 1
Which of the following commands can be used to display mapping relationship
between network address and DLCI?

 A. display fr interface
 B. display fr
 C. display fr map-info
 D. display fr brief

Hide Solution    Discussion  


Correct Answer: C

Question #116Topic 1
Which of following may be the reasons that cause Frame Relay PVC to work
abnormally? (Choose three)

 A. Same DLCI number is configured on the same router


 B. LMI type mismatch
 C. Frame Relay encapsulation type mismatch
 D. Incorrect configuration of the DLCI number

Hide Solution    Discussion  


Correct Answer: BCD

Question #117Topic 1
An administrator wishes to update the VRP software of company's AR2200
router. How can this be achieved? (Choose three)

 A. The administrator can use FTP to transfer the VRP software, with the
AR2200 router as the FTP client.
 B. The administrator can use FTP to transfer the VRP software, with the
AR2200 router as the FTP server.
 C. The administrator can use TFTP to transfer the VRP software, with the
AR2200 router as the TFTP server.
 D. The administrator can use TFTP to transfer the VRP software, with the
AR2200 router as the TFTP client.

Hide Solution    Discussion  


Correct Answer: ABD

Question #118Topic 1
An administrator wishes to implement new features in the network, but the VRP
version of one AR2200 router is out of date. The administrator needs to upgrade
the VRP software.
Which of the following options regarding file transfer is false?

 A. The AR2200 router can function as a TFTP client to support the


upgrade.
 B. The AR2200 router can function as the TFTP server to support the
upgrade.
 C. The AR2200 router can function as the FTP server to support the
upgrade.
 D. The AR2200 router can function as an FTP client to support the
upgrade.

Hide Solution    Discussion  


Correct Answer: B

Question #119Topic 1
FTP and TFTP can be used to update the system file on Huawei routers. Which
of the following statements are correct? (Choose three)

 A. Huawei router can be configured as FTP Client


 B. Huawei router can be configured as FTP Server
 C. Huawei router can be configured as TFTP Client
 D. Huawei router can be configured as TFTP Server

Hide Solution    Discussion  


Correct Answer: ABC

Question #120Topic 1
An administrator discovered he/she was unable to use TFTP to transfer files to
the router.
Which of the following describes the likely reason for this?
 A. The TFTP service had been disabled on the router.
 B. TCP port 69 of the server had been blocked.
 C. UDP port 69 of the server had been blocked.
 D. The username and password had been modified.

Hide Solution    Discussion   2


Correct Answer: C
Question #121Topic 1

FTP may be used to upgrade a router's VRP image.


Which of the following transmission modes should be used to achieve this?

 A. binary mode

 B. ASCII mode

 C. byte mode

 D. letter mode

Hide Solution    Discussion  

Correct Answer: A

Question #122Topic 1

A client failed to transfer a file to the FTP server, but found the IP connectivity
was without problem. The client assumed that the problem was with the port
configuration.
The blocking of which ports would likely cause this problem? (Choose two)

 A. 21

 B. 80

 C. 20

 D. 50649

Hide Solution    Discussion  

Correct Answer: AC

Question #123Topic 1

When using VRP, which of the following commands is used to configure the data
link layer encapsulation type of a serial interface as HDLC?

 A. encapsulation hdlc

 B. link-protocol hdlc
 C. hdlc enable

 D. link-protocol ppp

Hide Solution    Discussion  

Correct Answer: B

Question #124Topic 1

If AH and ESP are both required to protect data streams between IPsec peers,
how many Security Associations (SA) are required in total?

 A. 1

 B. 2

 C. 3

 D. 4

Hide Solution    Discussion  

Correct Answer: D

Question #125Topic 1

Two routers establish an IPsec tunnel, which of the following does not need to be
the same on both peering devices?

 A. Encapsulation mode

 B. Transform mode

 C. Proposal name

 D. authentication algorithm

Hide Solution    Discussion  

Correct Answer: C

Question #126Topic 1

Which of the following formats represent an accurate condensing of the IPv6


address 2031:0000:720C:0000:0000:09E0:839A:130B? (Choose two).
 A. 2031:0:720C:0:0:9E0:839A:130B

 B. 2031:0:720C:0:0:9E:839A:130B

 C. 2031::720C::9E0:839A:130B

 D. 2031:0:720C::9E0:839A:130B

Hide Solution     Discussion   4

Correct Answer: AD

Question #127Topic 1

Which of the following IPv6 addresses can be configured on a router's interface?


(Choose two).

 A. fe80:13dc::1/64

 B. ff00:8a3c::9b/64

 C. ::1/128

 D. 2001:12e3:1b02::21/64

Hide Solution    Discussion  

Correct Answer: AD

Question #128Topic 1

The IPv6 address architecture does not include which of the following address
types?

 A. unicast

 B. multicast

 C. broadcast

 D. anycast

Hide Solution    Discussion  


Correct Answer: C

Question #129Topic 1

Which of the following descriptions regarding IPv6 addresses are correct?


(Choose two)

 A. IPv6 addresses are 64 bits in length.

 B. IPv6 addresses are 128 bits in length.

 C. IPv6 extension headers are processed in order.

 D. IPv6 extension headers are processed randomly.

Hide Solution    Discussion  

Correct Answer: BC

Question #130Topic 1

Interface G0/0/1 on RTA contains a MAC address of 00e0-fc03-aa73 and is


configured with the IPv6 address 2001::2E0:FCFF:FE03:AA73. Which method is
most likely to have been used to configure the interface IPv6 address?

 A. DHCPv6

 B. Auto-link

 C. ARP

 D. EUI-64

Hide Solution    Discussion  

Correct Answer: D
Question #131Topic 1

In a small network supporting IPv6, a network administrator wishes implement


RIPng.
Which of the following commands should be used to enable this protocol?

 A. [RTA-GigabitEthernet0/0/0]ripng 1 enable

 B. [RTA]ripng 1 enable

 C. <RTA>ripng 1 enable

 D. [RTA-ripng-1]ripng 1 enable

Hide Solution    Discussion  

Correct Answer: A

Question #132Topic 1

In a network supporting IPv6, OSPF no longer supports which feature?

 A. multiple areas

 B. Router-ID

 C. authentication

 D. multicast updates

Hide Solution    Discussion  

Correct Answer: C

Question #133Topic 1

The network administrator has decided to configure link aggregation in the


enterprise network.
Which of the following represent advantages of link aggregation? (Choose three)

 A. Load balancing.

 B. Improved bandwidth.

 C. Enhanced reliability.
 D. Improved security.

Hide Solution    Discussion  

Correct Answer: ABC

Question #134Topic 1

In port aggregation, "multiple" ports are aggregated to form a port aggregation


group so that all the member ports in the group share the outgoing/incoming
load.
At which layer is port aggregation implemented?

 A. Physical Layer

 B. Data Link Layer

 C. Network Layer

 D. Transport Layer

Hide Solution    Discussion  

Correct Answer: B

Question #135Topic 1

What benefits does port aggregation yield? (Choose three)

 A. Improves link bandwidth

 B. Implements load sharing

 C. Improves network reliability

 D. Facilitates data copy for analysis

Hide Solution    Discussion  

Correct Answer: ABC

Question #136Topic 1

What is the maximum number of member interfaces supported by a single Eth-


Trunk?

 A. 6
 B. 8

 C. 10

 D. 12

Hide Solution    Discussion  

Correct Answer: B

Question #137Topic 1

The Eth-Trunk frame forwarding mechanism used to prevent changes in the data
sequence forwards frames based on which of the following parameters?

 A. The same source or destination IP address.

 B. The same source or destination MAC address.

 C. The same protocol type.

 D. The same source or destination port number.

Hide Solution    Discussion  

Correct Answer: AB

Question #138Topic 1

In Layer 2 mode, the transmission rate of an Eth-Trunk interface is determined by


which of the following? (Choose all that apply.)

 A. Maximum number of Up member links

 B. Minimum number of Up member links

 C. Number of Up member interfaces

 D. Number of interfaces.

Hide Solution    Discussion  

Correct Answer: AC

Question #139Topic 1
The network administrator wishes to forward data over an Eth-trunk, however
associated member interfaces operate at different rates. In terms of the resulting
behavior, which of the following is true?

 A. The two switches will not be able to communicate.

 B. The higher rate member interfaces may incur packet loss.

 C. The Eth-Trunk will work normally.

 D. The lower rate member interfaces may incur packet loss.

Hide Solution     Discussion   1

Correct Answer: D

Question #140Topic 1

The network administrator attempts to add interface G0/0/1 on Switch A to Eth-


trunk 1, however the command fails.
Which of the following may cause this?

 A. The interface is operating in half-duplex mode.

 B. The interface has been shutdown.

 C. The interface is already associated with another Eth-trunk.

 D. The interface is an access port.

Hide Solution    Discussion  

Correct Answer: CD

Question #141Topic 1

A network requires a solution to allow 50 private IP addresses to be translated,


however only a single public address is available for use.
Which translation method can be used to support this requirement?

 A. Static NAT
 B. Dynamic NAT

 C. Easy-IP

 D. NAPT

Hide Solution     Discussion   6

Correct Answer: C

Question #142Topic 1

NAPT allows for multiple internal addresses to be mapped to a single public


address.
How does NAT distinguish between the different private addresses when
mapping to the same public address?

 A. The source MAC address is used.

 B. The destination MAC address is used.

 C. The source port number is used.

 D. The destination port number is used.

Hide Solution    Discussion  

Correct Answer: C

Question #143Topic 1

A web server in a private network is required to provide HTTP services to public


users. The network administrator is required to configure NAT on RTA.

Which configuration should be used?

 A. [RTA-Serial1/0/1]nat server protocol tcp global 202.10.10.1 www inside


192.168.1.1 8080
 B. [RTA-Serial0/0/1]nat server protocol tcp global 192.168.1.1 www inside
202.10.10.1 8080

 C. [RTA-Gigabitethernet0/0/1]nat server protocol tcp global 202.10.10.1


www inside 192.168.1.1 8080

 D. [RTA- Gigabitethernet0/0/1]nat server protocol tcp global 192.168.1.1


www inside 202.10.10.1 8080

Hide Solution    Discussion  

Correct Answer: A

Question #144Topic 1

The network administrator needs to configure static NAT on RTA, in order to


allow Host A to communicate with Host C.

Which command is correct?

 A. [RTA-Serial1/0/1]nat outbound 200.1.1.10

 B. [RTA-Serial1/0/1]nat static global 200.1.1.10 inside 192.168.1.0

 C. [RTA-Serial1/0/1]nat static global 192.168.1.1 inside 200.1.1.10

 D. [RTA-Serial1/0/1]nat static global 200.1.1.10 inside 192.168.1.1

Hide Solution    Discussion  

Correct Answer: D

Question #145Topic 1
[RTA-GigabitEthernet0/0/0]nat outbound 2000 address-group 1
Refer to the configuration output. What does the value "2000" refer to?

 A. It represents the ACL number.

 B. It represents the NAT number.

 C. It represents the translated port number.

 D. It represents the number of bytes that can be translated before the
address is returned to the public address pool.

Hide Solution    Discussion  

Correct Answer: A

Question #146Topic 1

NAPT uses the same public address but different port numbers to translate
private addresses.
Which statement regarding the port number is correct?

 A. It is necessary to configure port number mapping manually.

 B. It is only necessary to configure the port number range.

 C. It is not necessary to configure port numbers.

 D. An access control list is needed to assign port numbers.

Hide Solution    Discussion  

Correct Answer: C

Question #147Topic 1

A configured internal host of a private network wishes to access the internet.


What must be configured on the enterprise network egress router in order to
achieve this? (Choose all that apply.)

 A. NAT Easy IP

 B. DHCP

 C. BGP
 D. Default route

Hide Solution    Discussion  

Correct Answer: AD

Question #148Topic 1

Which of the following statements are correct about NAT? (Choose three)

 A. NAT is the abbreviation for "Network Address Translation".

 B. NAT is used for translation between private and public network


addresss.

 C. When hosts inside a private network access the outside network, NAT
is not required.

 D. NAT provides an effective way to solve the problem of insufficient IP


addresses.

Hide Solution    Discussion  

Correct Answer: ABD

Question #149Topic 1

Which of the following technologies can allow a host with IP address 10.0.0.1 to
access the internet?

 A. Static route

 B. Dynamic route

 C. Route import

 D. NAT

Hide Solution    Discussion  

Correct Answer: D

Question #150Topic 1

Which of the following items can be translated by NAPT?


 A. MAC address + port number

 B. IP address + port number

 C. Only MAC address

 D. Only IP address

Hide Solution    Discussion  

Correct Answer: B

Question #151Topic 1

Which of the following statements about a designated port working in RIPv2


multicast mode are true? (Choose three)

 A. The port receives only RIPv2 multicast packets.

 B. The port does not receive RIPv1 broadcast packets.

 C. The port does not receive RIPv2 broadcast packets.

 D. The port receives only RIPv1 multicast packets.

Hide Solution    Discussion  

Correct Answer: ABC

Question #152Topic 1

Which of the following statements regarding the router ID in OSPF are incorrect?
(Choose three)

 A. The router IDs of OSPF routers in the same area must be the same,
but can be different in different areas.

 B. The router ID must be the IP address of an OSPF router interface.

 C. The router ID must be configured manually.

 D. A router running OSPF must have a router ID for it to operate properly.
Hide Solution     Discussion   5

Correct Answer: ABC

Question #153Topic 1

Which of the following statements regarding Designated Routers in OSPF are


correct? (Choose three)

 A. DR is elected by all the routers in the same network segment.

 B. If the priorities of two routers are different, the router with the lower
priority will be elected as DR.

 C. If the priorities of two routers are equal, the router with the higher
Router ID will be elected as DR.

 D. DR and BDR must be adjacent.

Hide Solution    Discussion  

Correct Answer: ACD

Question #154Topic 1

On the VRP platform, which of the following commands is used to configure the
Router ID of a router as 1.1.1.1?

 A. <Huawei>router id 1.1.1.1

 B. [Huawei]router id 1.1.1.1

 C. [Huawei]router-id 1.1.1.1

 D. [Huawei]router id 1.1.1.1 255.255.255.255

Hide Solution     Discussion   2

Correct Answer: B

Question #155Topic 1

Which of the following OSPF versions is specific to IPv6?

 A. OSPFv1
 B. OSPFv2

 C. OSPFv3

 D. OSPFv4

Hide Solution    Discussion  

Correct Answer: C

Question #156Topic 1

The administrator wishes to configure OSPF on a router in the network however


the router has no loopback interface.
Which value will be used as the router ID?

 A. The lowest IP address of the router's active interfaces.

 B. The highest IP address of the router's active interfaces.

 C. The IP address of the management interface.

 D. The priority value of the router.

Hide Solution    Discussion  

Correct Answer: B

Question #157Topic 1

An administrator of a company supporting a large enterprise network wishes to


implement OSPF on the network as opposed to RIP. Which of the following
points should the administrator use to support his reasoning for this change?
(Choose three)

 A. OSPF has no hop count limitation.

 B. OSPF has a lower routing update overhead.

 C. OSPF has a simpler configuration.

 D. OSPF supports faster convergence.

Hide Solution    Discussion  


Correct Answer: ABD

Question #158Topic 1

Which of the following statements regarding single area OSPF are correct?
(Choose three)

 A. An IP address needs to be configured on a loopback interface of each


router before configuring an OSPF area.

 B. The value of an area can be from 0.0.0.0 to 255.255.255.255.

 C. A single area can be configured using any supported area number.

 D. All of the links of the network need to be advertised in Area 0.

Hide Solution    Discussion  

Correct Answer: BCD

Question #159Topic 1

10.0.1.0/24 O_ASE 150 2 D 10.0.23.3 Serial2/0/0


Refer to the display output. Which of the following statements regarding route
shown are true? (Choose two)

 A. The address 10.0.23.3 has been configured on the peer's serial 2/0/0
interface.

 B. The route preference has been changed by the administrator.

 C. The metric for the route 10.0.1.0 indicates that two hops are needed.

 D. The route has been learned via the OSPF protocol.

Hide Solution     Discussion   1

Correct Answer: AD

Question #160Topic 1

Which of the following statements regarding link-state database and routing-table


of a "single" OSPF area are correct? (Choose two)

 A. The link-state databases that all routers build are identical.


 B. The link-state databases that all routers build are different.

 C. The routing-tables that all routers calculate are different.

 D. The routing-tables that all routers calculate are identical.

Hide Solution    Discussion  

Correct Answer: AC
Question #161Topic 1

Which of the following steps are necessary to configure OSPF on a Huawei


router? (Choose three)

 A. Configuration of a router ID

 B. Enabling of an OSPF process

 C. Specifying an OSPF area

 D. Configuration of the network segments within each area

Hide Solution    Discussion  

Correct Answer: BCD

Question #162Topic 1

Which of the following statements regarding the DR in an OSPF network are


correct? (Choose two)

 A. There must be at least one DR in an OSPF area.

 B. A DR must be elected among the routers through the negotiations that
are defined by OSPF protocol.

 C. Only the router with highest priority will be elected as DR.

 D. Only NBMA or Broadcast networks need to elect DR.

Hide Solution     Discussion   2

Correct Answer: BD

Question #163Topic 1
Which of the following VRP commands can be used to enter area 0 view?
(Choose two)

 A. [Huawei]ospf area 0

 B. [Huawei-ospf-1]area 0

 C. [Huawei-ospf-1]area 0.0.0.0

 D. [Huawei-ospf-1]area 0 enable

Hide Solution    Discussion  

Correct Answer: BC

Question #164Topic 1

Which of the following commands is used to display the OSPF neighbor


relationship establishment?

 A. display ospf neighbor

 B. display ospf brief

 C. display ospf peer

 D. display ospf interface

Hide Solution    Discussion  

Correct Answer: C

Question #165Topic 1

With what kind of routers does a DRother router exchange link state information
and route information? (Choose two)

 A. DR

 B. BDR

 C. DRother

 D. All OSPF neighbors


Hide Solution    Discussion  

Correct Answer: AB

Question #166Topic 1

An OSPF area is a collection of a group of routers and networks. OSPF defines


that routers that have the same ( ) belong to the same OSPF area.

 A. neighbors

 B. LSDB

 C. LSA

 D. adjacency

Hide Solution    Discussion  

Correct Answer: B

Question #167Topic 1

Which of the following statements about router IDs are true? (Choose two)

 A. The routers contained in the same LSDB have the same router ID.

 B. Each router in an OSPF network must have a unique router ID.

 C. Two routers in different OSPF areas can have the same router ID.

 D. A router ID is expressed in a 32-bit dotted decimal format.

Hide Solution    Discussion  

Correct Answer: BD

Question #168Topic 1

OSPF allows for "multiple" processes. By default, OSPF selects a process whose
number is ( ).

 A. 0

 B. 1
 C. 10

 D. 100

Hide Solution    Discussion  

Correct Answer: B

Question #169Topic 1

In a network supporting IPv6, OSPF no longer supports which feature?

 A. multiple areas

 B. Router-ID

 C. authentication

 D. multicast updates

Hide Solution    Discussion  

Correct Answer: C

Question #170Topic 1

Two routers are configured with OSPFv3. OSPFv3 is enabled on all interfaces of
each router.
Which of the following is true in the event that the network administrator does not
configure a Router-ID?

 A. The IP address of the loopback 0 interface will be used as the router ID.

 B. The IP address of the loopback 1 interface will be used as the router ID.

 C. The IP address of interface G0/0/0 will be used as the router ID.

 D. No router ID will be assigned to the router.

Hide Solution     Discussion   2

Correct Answer: D
Question #171Topic 1

Refer to the graphic. Which of the following statements is correct when this router
forwards the packet to the destination host 9.1.4.5?

 A. The router selects the first entry to match the destination address of the
packet because the preference of OSPF is higher than the preference of
RIP.

 B. The router selects the second entry to match the destination address of
the packet because the cost of RIP is lower than that of OSPF.

 C. The router selects the second entry to match the destination address of
the packet because the outgoing interface is an Ethernet interface. The
forwarding speed of an Ethernet interface is faster than the forwarding
speed of a serial interface

 D. The router selects the second entry to match the destination address of
the packet because the router will match the most specific address.

Hide Solution    Discussion  

Correct Answer: D

Question #172Topic 1

According to the default value of route preference on the VRP platform, which of
the following represent the correct sequence for direct route, static route, RIP
and
OSPF if they are listed from high preference to low preference?

 A. Direct, Static, RIP, OSPF

 B. Direct, OSPF, Static, RIP

 C. Direct, OSPF, RIP, Static

 D. Direct, RIP, Static, OSPF

Hide Solution    Discussion  


Correct Answer: B

Question #173Topic 1

A router has learned two routes for the same network with the same prefix. One
route has been learned via OSPF with a metric of 4882, while the other route has
been learned via RIPv2 with a metric of 4.
Which route (s) will be found in the routing table?

 A. The RIPv2 route.

 B. The OSPF and RIPv2 routes.

 C. The OSPF route.

 D. Neither of these routes will be found in the routing table.

Hide Solution     Discussion   1

Correct Answer: C

Question #174Topic 1

Assume that the router has learnt the best route to the same destination by using
RIP, OSPF and Static Route respectively. By default, the Huawei router will
select the route learnt via ( ) as the best route.

 A. RIP

 B. OSPF

 C. RIPv2

 D. Static route

Hide Solution    Discussion  

Correct Answer: B

Question #175Topic 1

After checking the OSPF neighbor state, the administrator discovers that the
router has established a TWOWAY state with the peering router.
What can be understood from this information? (Choose two)

 A. The routers are configured using the same process ID


 B. The routers are configured using the same area ID

 C. The routers are configured using wrong router ID

 D. The routers are considered DROthers in a broadcast network

Hide Solution     Discussion   3

Correct Answer: CD

Question #176Topic 1

What functions does a Hello packet of OSPF implement? (Choose two)

 A. Neighbor discovery

 B. Deletion of unreachable neighbors

 C. Maintaining of neighbor relationships

 D. Negotiation of parameters among adjacent ports

Hide Solution    Discussion  

Correct Answer: AC

Question #177Topic 1

Two routers are connected through serial interfaces and support PPP
encapsulation.
Which parameters must be negotiated to establish the PPP connection? (Choose
three).

 A. MRU

 B. Authentication password

 C. Magic-Number

 D. IP address

Hide Solution     Discussion   5

Correct Answer: ACD
Question #178Topic 1

What are the three protocol components defined by PPP? (Choose three).

 A. Data encapsulation.

 B. LCP

 C. NCP

 D. IPCP

Hide Solution     Discussion   1

Correct Answer: ABC

Question #179Topic 1

Two routers are connected via serial interfaces, for which the link-protocol is
PPP. The network administrator wishes to configure PPP authentication to
improve security on this link.
Which PPP authentication method provides a more secure solution?

 A. CHAP

 B. PAP

 C. MD5

 D. SSH

Hide Solution     Discussion   1

Correct Answer: A

Question #180Topic 1

If PPP authentication fails, which type of packet will be sent to the authenticated
peer by the authenticator?

 A. Authenticate-Ack

 B. Authenticate-Nak

 C. Authenticate-Reject
 D. Authenticate-Reply

Hide Solution    Discussion  

Correct Answer: B

Question #181Topic 1

Two routers are connected via serial interfaces and the link-protocol is PPP, but
the MRU of two serial interfaces are different, in PPP LCP negotiated stage, what
will happen?

 A. LCP negotiation will fail

 B. Negotiation will use the smaller value

 C. Negotiation will use the larger value

 D. Negotiation will use 1500

Hide Solution    Discussion  

Correct Answer: B

Question #182Topic 1

PPP is more secure than HDLC because PPP supports authentication protocols
such as ( ). (Choose two)

 A. PAP

 B. MD5

 C. CHAP

 D. SSH

Hide Solution    Discussion  

Correct Answer: AC

Question #183Topic 1

When both ends running PPP protocol detect that the physical link is active, the
link state will transit from dead to establish.
Which of the following protocols is used to negotiate the link parameters during
this phase?

 A. IP

 B. DHCP

 C. LCP

 D. NCP

Hide Solution    Discussion  

Correct Answer: C

Question #184Topic 1

A serial interface of a Huawei router currently using HDLC needs to assign PPP
as the encapsulation protocol.
Which of the following commands is required to be configured at the serial
interface view?

 A. link-protocol ppp

 B. encapsulation ppp

 C. enable ppp

 D. address ppp

Hide Solution    Discussion  

Correct Answer: A

Question #185Topic 1

When using VRP, which of the following commands is used to configure the PPP
authentication method as PAP?

 A. ppp pap

 B. ppp authentication-pap

 C. ppp authentication-mode pap


 D. ppp pap-authentication

Hide Solution    Discussion  

Correct Answer: C

Question #186Topic 1

When configuring the PPP authentication method as PAP, which of the following
operations are necessary? (Choose three)

 A. Add the user name and password of the authenticated party to the local
user list.

 B. Configure the encapsulation type of the interface connected to the peer


as PPP.

 C. Configure PPP authentication method as CHAP.

 D. On the authenticated party end, configure the user name and password
that are sent to authenticator.

Hide Solution    Discussion  

Correct Answer: ABD

Question #187Topic 1

In the PPP protocol, which of the following encryption algorithms is used by


CHAP?

 A. DES

 B. MD5

 C. AES

 D. None

Hide Solution     Discussion   1

Correct Answer: B

Question #188Topic 1

What is the function of the "ip address ppp-negotiate" command?


 A. Enables the function of requesting for an IP address from the peer
device.

 B. Enables the function of accepting the request for an IP address from


the remote device.

 C. Enables the function of statically allocating IP addresses to the peer.

 D. None of the above.

Hide Solution    Discussion  

Correct Answer: A

Question #189Topic 1

Two routers have established a point-to-point network using PPP. The


administrator has configured the routers to run OSPF in the same area with the
same router ID, what behavior will occur as a result of the configuration?

 A. The routers will build a neighbor relationship even though both routers
are using the same router ID.

 B. VRP will notify of a router ID conflict between the two routers.

 C. The routers will build an adjacency even though both routers are using
the same router ID.

 D. The routers will not send hello packets to each other because they are
using the same router ID.

Hide Solution    Discussion  

Correct Answer: B

Question #190Topic 1

The PPPoE session establishment process can be divided into which stages?
(Choose all that apply.)

 A. Discovery stage

 B. DHCP stage

 C. PPPoE Session stage


 D. PPP connecting stage.

Hide Solution    Discussion  

Correct Answer: AC

Question #191Topic 1

To establish multiple PPP point-to-point connections in the Ethernet network, a


PPPoE server establishes connections with multiple PPPoE clients on one
Ethernet port.
How does PPPoE differentiate between each connection?

 A. MAC address.

 B. IP address and MAC address

 C. MAC address and ppp-id

 D. MAC address and session-id

Hide Solution    Discussion  

Correct Answer: D

Question #192Topic 1

When configuring a router as a PPPoE client, which configuration is not


necessary?

 A. Configuration of the dialer-rule

 B. Configuration of the dialer interface

 C. Configuration of an IP address on the dialer interface

 D. Configuration of a password on the dialer interface

Hide Solution    Discussion  


Correct Answer: C

Question #193Topic 1

In the PPPoE discovery stage, the PPPoE server assigns a session-id to the
PPPoE client in which packet?

 A. PADI

 B. PADO

 C. PADR

 D. PADS

Hide Solution    Discussion  

Correct Answer: D

Question #194Topic 1

Which command can be used to check the PPPoE client session status?

 A. display ip interface brief

 B. display current-configuration

 C. display pppoe-client session packet

 D. display pppoe-client session summary

Hide Solution    Discussion  

Correct Answer: D

Question #195Topic 1

[Huawei]rip 1
[Huawei-rip-1]version 2
Refer to the command output. An administrator wishes to configure RIP. Which
other command needs to configured for RIP routes to be advertised?

 A. import-route GigabitEthernet 0/0/1

 B. network 192.168.1.0 0.0.0.255


 C. network GigabitEthernet 0/0/1

 D. network 192.168.1.0

Hide Solution    Discussion  

Correct Answer: D

Question #196Topic 1

A RIP router receives the routing update information from its neighbor.
Which of the following statements regarding routing update are correct? (Choose
three)

 A. The received route that is not in the routing table will be added only
when its hop count value is less than 16.

 B. The received route that already exists in the routing table will be
updated only when the next hop is the router's neighbor and the cost value
is smaller.

 C. The received route that already exists in the routing table will be
updated only when the next hop is not the router's neighbor and the cost
value is smaller.

 D. The received route that already exists in the routing table will be
updated only when the next hop is the router's neighbor and the cost value
has been changed.

Hide Solution     Discussion   2

Correct Answer: ACD

Question #197Topic 1

Which of the following commands is used to display the current running state and
configuration of RIP?

 A. display protocol rip

 B. show rip

 C. display rip

 D. display this rip


Hide Solution    Discussion  

Correct Answer: C

Question #198Topic 1

A user can view the information for the RIP protocol on a router. What does "Age
time" in the returned result of the command mean?

 A. The interval of updating an RIP packet

 B. The aging time of an RIP route

 C. The suppression time of an RIP route

 D. The time spent on switching between RIP routes

Hide Solution    Discussion  

Correct Answer: B

Question #199Topic 1

After a command for displaying RIP route information is entered on a router, peer
192.168.1.2 on Serial1/0/0 is displayed in the returned result.
What does 192.168.1.2 stand for?

 A. Address of a RIP neighbor

 B. Address of the port with the RIP protocol enabled

 C. Next hop address of the RIP route

 D. Transmission address of the RIP protocol

Hide Solution    Discussion  

Correct Answer: A

Question #200Topic 1
Refer to the debug output. Following configuration of R2, the administrator
discovers that the behavior is not as expected and performs debugging. Based
on the output from the debug, what is the source of the problem?

 A. R2 has configured an ACL to block the route to network 1.0.0.0

 B. R2 has enabled split horizon.

 C. R1 is using authentication, however R2 is not.

 D. R2 is operating using RIPv2, while R1 is using RIPv1.

Hide Solution    Discussion  

Correct Answer: D

Question #201Topic 1

Which of the following statements about a designated port working in RIPv2


multicast mode are true? (Choose three)

 A. The port receives only RIPv2 multicast packets.

 B. The port does not receive RIPv1 broadcast packets.

 C. The port does not receive RIPv2 broadcast packets.

 D. The port receives only RIPv1 multicast packets.

Hide Solution    Discussion  


Correct Answer: ABC

Question #202Topic 1

When a network administrator configures STP in the network, BPDU begin to be


sent by switch. Which of the following statements regarding the BPDU frame are
correct?

 A. A BPDU uses the IEEE 802.3 standard frame type

 B. A BPDU uses the Ethernet II standard frame type

 C. The BPDU frame's control field is 3

 D. The destination MAC address field of a BPDU frame is a broadcast


address

Hide Solution     Discussion   2

Correct Answer: A

Question #203Topic 1

In the case of Huawei router, the Tracert command uses UDP to encapsulate
probe packets.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #204Topic 1

The broadcast address of the subnet 192.168.1.0/25 is 192.168.1.128.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: B
Question #205Topic 1

A network administrator wishes to assign an IP address to a router interface


G0/0/0. Which of the following IP addresses can be assigned?

 A. 192.168.10.112/30

 B. 237.6.1.2/24

 C. 145.4.2.55/26

 D. 127.3.1.4/28

Hide Solution    Discussion  

Correct Answer: C

Question #206Topic 1

If a network's address is 192.168.1.0, the broadcast address of the network is


192.168.1.255.

 A. True

 B. False

Hide Solution     Discussion   2

Correct Answer: A

Question #207Topic 1

In the VRP system, what are the functions of Ctrl+Z?

 A. Return from the system view to the user view

 B. Exit from the current view

 C. Exit from the interface view

 D. Exit from the console interface view

 E. Return to the user view

Hide Solution     Discussion   6


Correct Answer: A

Question #208Topic 1

In standard STP mode, which of the following ports on non-root switches forward
the BPDUs with TC bits set generated by the root switch?

 A. Root port

 B. Backup port

 C. Designated port

 D. Alternate port

Hide Solution     Discussion   2

Correct Answer: A

Question #209Topic 1

Assuming all STP enabled switches have the same bridge priority. The MAC
address of switch A is 00-e0-fc-00-00-40, the MAC address of switch B is 00-e0-
fc-
00-00-10, the MAC address of switch C is 00-e0-fc-00-00-20, and the MAC
address of switch D is 00-e0-fc-00-00-80.
Which switch will be elected as the root switch?

 A. Switch A

 B. Switch B

 C. Switch C

 D. Switch D

Hide Solution     Discussion   1

Correct Answer: B

Question #210Topic 1

As specified by the RSTP protocol, when a root port fails, which type of port will
function as a new root port and enters the forwarding state without any delay?

 A. Forwarding Port
 B. Alternate Port

 C. Backup Port

 D. Edge Port

Hide Solution    Discussion  

Correct Answer: B

Question #211Topic 1

In STP, the priority of the STP root switch ranges from 0 to 65536.

 A. True

 B. False

Hide Solution     Discussion   4

Correct Answer: A

Question #212Topic 1
Refer to the graphic. Which statements correctly explains the forwarding
behavior between RTA and RTE? (Choose all that apply)

 A. When the network uses OSPF, data will be forwarded along the path
via S1/0/0

 B. When the network uses RIPv2, data will be forwarded along the path
via S1/0/0

 C. When the network uses OSPF, data will be forwarded along the path
from via E0/0/1

 D. When the network uses RIPv2, data will be forwarded along the path
via S2/0/0

Hide Solution     Discussion   1

Correct Answer: BC

Question #213Topic 1

Refer to the graphic. RTA and RTB are running RIPv1. RTA has advertised
10.0.0.0 and 192.168.1.0 to the RIP network. Which routes will exist in the IP
routing table of RTB? (Choose all that apply)

 A. 10.0.0.0/8

 B. 192.168.1.1/32

 C. 10.1.12.1/32

 D. 192.168.1.0/24

Hide Solution     Discussion   1

Correct Answer: AD

Question #214Topic 1

Which of the following configurations regarding static route are correct? (Choose
all that apply)

 A. ip route-static 129.1.0.0 16 serial 0

 B. ip route-static 10.0.0.2 16 129.1.0.0

 C. ip route-static 129.1.0.0 16 10.0.0.2

 D. ip route-static 129.1.0.0.255.255.0.0 10.0.0.2

Hide Solution     Discussion   2

Correct Answer: ACD

Question #215Topic 1

Refer to the graphic. An administrator has configured RIPv2 in the two routers.
What will happen after configuring the following commands: (Choose all that
apply)

 A. RTA will have the route learned from the RTB

 B. RTB will have the route learned from the RTA

 C. RTA will have no neighbor relationship with RTB

 D. RTB will have no neighbor relationship with RTA

Hide Solution    Discussion  

Correct Answer: AD

Question #216Topic 1

Refer to the graphic. OSPF is used on four routers that are in the same area and
on the same network segment. In this scenario, OSPF selects one DR and
multiple BDRs to ensure backup.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: B

Question #217Topic 1

On Huawei devices, you can use the undo summary command to prohibit
automatic route summarization of RIPv2.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #218Topic 1

Which of the following configurations regarding default route configuration is


correct?
 A. [Quidway] ip route-static 0.0.0.0 0.0.0.0 172.16.2.1

 B. [Quidway] ip route-static 0.0.0.0 255.255.255.255 172.16.2.1

 C. [Quidway-GigabitEthernet0/0/1] ip route-static 0.0.0.0 0.0.0.0


172.16.2.1

 D. [Quidway] ip route static 0.0.0.0 0.0.0.0 172.16.2.1

Hide Solution    Discussion  

Correct Answer: A

Question #219Topic 1

Which of the following WLAN standards support operation in the 5GHz range?
(Choose all that apply)

 A. 802.11a

 B. 802.11b

 C. 802.11g

 D. 802.11n

Hide Solution    Discussion  

Correct Answer: AD

Question #220Topic 1

On Huawei switches, you can run the vlan batch command to create multiple
VLANs in batches.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A
Question #221Topic 1

According to the topology and configuration of interconnected interfaces of


switches shown in the figure, the data frame tagged with VLAN 10 can be
forwarded correctly between the two switches.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #222Topic 1

The network administrator creates VLAN 10 and assigns an IP address to


VLANIF10. When using the command "display ip interface brief", the
administrator finds that VLANIF10 is down. What should be done to enable
VLANIF10?
 A. Use the command "undo shutdown" under the interface view for
VLANIF10

 B. Assign a physical interface that has either an active of inactive physical


state to VLAN 10

 C. Assign only a physical interface that has an active physical state to


VLAN 10

 D. Add an interface that has an active physical state and a trunk port
associated with VLAN 10

Hide Solution     Discussion   2

Correct Answer: C

Question #223Topic 1

A network administrator wishes to implement VLAN 10 to isolate certain users. It


is common however for these users to often change their physical location.
Which of the following VLAN implementations should be used?

 A. Port based VLAN assignment

 B. Protocol based VLAN assignment

 C. MAC based VLAN assignment

 D. IP subnet based VLAN assignment

Hide Solution    Discussion  

Correct Answer: C

Question #224Topic 1

Refer to the graphic. GE0/0/1 and GE0/0/2 on the switch are configured as
hybrid interfaces. Which of the following statements are true? (Choose all that
apply)
 A. The administrative department and the finance department cannot
communicate with each other because the VLANs of the two departments
are different.

 B. The data frames sent by the administrative department carry tagged


VLAN 20 on the switch.

 C. On the switch, the data frames sent by the finance department carry
tagged VLAN 20.

 D. The switch can be a Layer 2 or Layer 3 switch because


communications do not need to be transmitted through a Layer 3 gateway.

 E. If GE0/0/1 and GE0/0/2 on the switch are changed to trunk ports, the
administrative department and finance department can communicate with
each other.

Hide Solution     Discussion   3


Correct Answer: BC

Question #225Topic 1

On the VRP, what is the function of the "interface vlanif <vlan-id>" command?

 A. It is used to create a VLANIF interface

 B. It is used to create a VLANIF interface and enter the VLANIF interface
view

 C. It is used to configure a VLAN for a VLANIF interface

 D. There is no such command

Hide Solution    Discussion  

Correct Answer: B

Question #226Topic 1

InARP resolves the protocol address of the remote device on each virtual circuit,
including IP addresses and IPX addresses.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #227Topic 1

On an FR network, the DLCI identifies a virtual circuit on an interface. The DLCI


must be unique during planning and deployment.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: B

Question #228Topic 1
If AAA authentication is used on Huawei devices and the remote server does not
respond, the authentication can be performed on network devices.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #229Topic 1

An ACL does not filter traffic generated by the Huawei device towards other
devices, but only filters forwarded traffic, including traffic generated by other
devices to access the Huawei device.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #230Topic 1

Which of the following statements are true about ACL deployment on Huawei
devices? (Choose all that apply)

 A. ACL can only be used in the outbound direction of an interface

 B. The same ACL can be used on multiple interfaces

 C. The ACL rules can only be configured in the following sequence: 10,
20, 30"¦

 D. ACLs cannot be used to filter OSPF traffic because OSPF does not use
UDP to encapsulate packets

 E. ACLs can be used to match with the TCP/UDP port IDs of packets and
to designate the port ID range

Hide Solution    Discussion  


Correct Answer: BE

Question #231Topic 1

SNMP packets are encapsulated in TCP packets.

 A. True

 B. False

Hide Solution     Discussion   1

Correct Answer: B

Question #232Topic 1

In OSPFv3, router IDs can be used automatically generated by the system.

 A. True

 B. False

Hide Solution     Discussion   5

Correct Answer: A

Question #233Topic 1

VLSM can expand any IP network segment, including Class D addresses.

 A. TRUE

 B. FALSE

Hide Solution    Discussion  

Correct Answer: B

Question #234Topic 1
Refer to the graphic, 00e0-fc99-9999 is a specific host MAC address learned by
a switch through ARP and the host changes the IP address three times.

 A. TRUE

 B. FALSE

Hide Solution     Discussion   1

Correct Answer: A

Question #235Topic 1

There are two routers (RTA and RTB) between the source device and destination
device. The Tracert command is used to detect the path between the two
devices. During detection of the first hop (RTA), the source device sends a UDP
packet with a TTL of 1 to an interface with a large interface number on the
destination device. The TTL turns to 0 when the packet arrives at RTB, upon
which RTA sends an ICMP ______ message to the source device.

 A. Time Exceeded.

 B. Echo Request.

 C. Echo Reply.

 D. Port Unreachable.

Hide Solution    Discussion  

Correct Answer: A

Question #236Topic 1

Which of the following statements are true about ICMP messages? (Multiple
Choice)

 A. ICMP messages can record time, including the original time, packet
receiving time, and packet sending time.
 B. ICMP messages are encapsulated in IP packets but not at the transport
layer.

 C. ICMP messages include error messages, control messages,


request/response messages, and update messages.

 D. ICMP does not support redirection.

 E. ICMP messages cannot be used to detect a path's MTU.

Hide Solution    Discussion  

Correct Answer: BC

Question #237Topic 1

If a network's broadcast address is 172.16.1.255, which of the following


addresses can be the network address?

 A. 172.16.2.0

 B. 172.16.1.253

 C. 172.16.1.128

 D. 172.16.1.1

Hide Solution    Discussion  

Correct Answer: C

Question #238Topic 1

On the command line interface of Huawei AR routers, the role of the Save
command is to Save the current system time.

 A. TRUE

 B. FALSE

Hide Solution    Discussion  

Correct Answer: B

Question #239Topic 1
Which of the following technologies is used to bind MAC addresses to interfaces
on a switch?

 A. SEP.

 B. Port security.

 C. ACL.

 D. NAT.

Hide Solution    Discussion  

Correct Answer: B

Question #240Topic 1

In RSTP, a backup port can replace a faulty root port.

 A. TRUE

 B. FALSE

Hide Solution     Discussion   3

Correct Answer: A

Question #241Topic 1

During STP calculation, the port cost is associated with port bandwidth. Which of
the following statements about the relation between port cost and port bandwidth
is true?

 A. Port cost decreases when port bandwidth increases.

 B. Port cost increases when port bandwidth increases.

 C. Port cost is consistent with port bandwidth.

 D. Port cost varies randomly according to port bandwidth.

Hide Solution    Discussion  


Correct Answer: A

Question #242Topic 1

Which of the following descriptions about STP are incorrect? (Multiple Choice)

 A. A layer-2 switching network can have only one designated switch.

 B. All the ports of the root switch are root ports.

 C. All the ports of the root switch are designated ports.

 D. The switch with the smallest priority value is elected as non-root switch.

Hide Solution     Discussion   2

Correct Answer: BD

Question #243Topic 1

Which of the following statements about static route preference on Huawei


devices is false?

 A. Static route preference ranges from 0 to 255.

 B. Default static route preference is 60.

 C. Static route preference is either internal or external. Administrators can


modify external preferences.

 D. If static route preference is 255, the route cannot be used.

Hide Solution     Discussion   1

Correct Answer: A

Question #244Topic 1
Refer to the graphic, which of the following statements is true about OSPF
topology and configuration?

 A. A stable OSPF neighbor relationship can be set up between R1 and


R2.

 B. After the default network type of the interface on R1 is restored to


broadcast, a stable OSPF neighbor relationship can be set up between R1
and R2.

 C. After the default network type of the interface on R1 is restored to


broadcast and the hello packet sending interval is changed to 10s, a
stable OSPF neighbor relationship can be set up between R1 and R2.

 D. Compared with R1, R2 is more likely to become the DR because the


DR priority of the interface on R2 is lower than that of R1.

Hide Solution    Discussion  

Correct Answer: C

Question #245Topic 1

Refer to the graphic. An administrator has configured OSPF on the two routers,
following which he then implements the command silent-interface s0/0/1 on RTA.
What effect will this command have on the network? (Multiple Choice)

 A. The link information advertised by RTB will be maintained in the Link


State Database of RTA.

 B. The OSPF neighbor relationship will fail between two routers.

 C. The configuration will not affect the OSPF neighbor relationship


between the two routers.

 D. The link information advertised by RTB will no longer be maintained in


the Link State Database of RTA.

Hide Solution     Discussion   2

Correct Answer: B

Question #246Topic 1

In an RIP process on a Huawei device, which of the following configurations are


correct for advertising network 10.1.1.1/30? (Multiple Choice)

 A. network 10.1.1.0

 B. undo summary network 10.1.1.0

 C. version 2 undo summary network 10.0.0.0

 D. undo summary network 10.1.0.0

 E. network 10.0.0.0

Hide Solution     Discussion   3

Correct Answer: B

Question #247Topic 1
The following configuration commands implement route backup on RTA for a
route to the same destination 10.1.1.0.

 A. TRUE

 B. FALSE

Hide Solution    Discussion  

Correct Answer: B

Question #248Topic 1

Refer to the command output. Which statement is true regarding this command?

 A. The configuration represents a static route to the 192.168.1.1 network

 B. The configuration represents a static route to the 10.0.12.0 network.

 C. The preference value of this configured route is 100.

 D. If the router has learned the same destination network via a dynamic
routing protocol, the static route will always take precedence.

Hide Solution    Discussion  

Correct Answer: B

Question #249Topic 1

Which of the following network types does OSPF support? (Multiple Choice)

 A. Point-to-Point.

 B. Broadcast.

 C. Non-Broadcast Multi-Access.

 D. Point-to-Multipoint.

Hide Solution     Discussion   3


Correct Answer: ABC

Question #250Topic 1

A DHCP Offer packet can carry only one DNS server address.

 A. TRUE

 B. FALSE

Hide Solution    Discussion  

Correct Answer: B

Question #251Topic 1

Refer to the graphic. Host A and Host B use VLAN routing to facilitate
communication. What must be configured on interface G0/0/1.1 of RTA to
achieve this?
 A. dot1q termination vid 1.

 B. dot1q termination vid 10.

 C. dot1q termination vid 20.

 D. dot1q termination vid 30.

Hide Solution    Discussion  

Correct Answer: B

Question #252Topic 1

Refer to the configuration output. Which following statements are correct?


(Multiple choice)

 A. VLAN 1 cannot pass over interface Gigabit Ethernet 0/0/1.

 B. VLAN 1 can pass over interface Gigabit Ethernet 0/0/1.

 C. Prior to changing the link-type to access, the command "undo port trunk
allow-pass vlan all" must be used to renew the default configurations.

 D. Prior to changing the link-type to access, the command "undo port trunk
allow-pass vlan 2 to 4096" must be used to renew the default
configurations.

Hide Solution     Discussion   3

Correct Answer: AD

Question #253Topic 1

Link aggregation is a common technique in enterprise network. Which of the


following description is the advantages of link aggregation? (Multiple Choice)

 A. Improves link bandwidth.

 B. Implements load sharing.

 C. Improves network reliability.


 D. Facilitates data copy for analysis.

Hide Solution    Discussion  

Correct Answer: ABC

Question #254Topic 1

On Huawei switches, VLAN 4095 cannot be created and VLAN 1 cannot be


deleted.

 A. TRUE

 B. FALSE

Hide Solution    Discussion  

Correct Answer: A

Question #255Topic 1

Refer to the graphic, after the ping 10.1.1.2 command is executed on R1, LSW1
receives a tagged data frame from VLAN 10 on LSW2.

 A. TRUE
 B. FALSE

Hide Solution    Discussion  

Correct Answer: B

Question #256Topic 1

Refer to the graphic, which of the following statements are true about VLAN
configuration on Huawei switches? (Multiple Choice)

 A. Client1 belongs to VLAN 10 and the VLAN assignment command on


LSW1 is correct.

 B. Client2 belongs to VLAN 20, and the MAC address-based VLAN


assignment command on LSW1 is correct.

 C. Client3 is in VLAN 30, and the VLAN assignment command on LSW1 is


correct.

 D. Client4 belongs to VLAN 40, and the VLAN assignment command on


LSW1 is correct.

 E. Client4 does not belong to VLAN 40, and the VLAN assignment
command on LSW1 is incorrect.
Hide Solution     Discussion   3

Correct Answer: ACD

Question #257Topic 1

Which of the following statements is true about the PPP configuration and
deployment?

 A. PPP cannot be used to deliver IP addresses.

 B. PPP supports both CHAP and PAP authentication.

 C. PPP cannot change the keepalive time.

 D. PPP does not support bidirectional authentication.

Hide Solution    Discussion  

Correct Answer: B

Question #258Topic 1

According to the following topology and configuration, R1 and R2 are connected


through low-speed serial cables and PPP is used to encapsulate data link layer
packets. When the Holdtime values of R1 and R2 are different, PPP negotiation
and communication fail.

 A. TRUE

 B. FALSE

Hide Solution     Discussion   2


Correct Answer: A

Question #259Topic 1

Refer to the graphic. IPsec VPN uses ESP to encrypt which fields?

 A. TCP, Data and ESP Trailer.

 B. ESP, TCP and Data.

 C. ESP, TCP, Data and ESP Trailer.

 D. ESP, TCP, Data, ESP Trailer and ESP Auth.

Hide Solution    Discussion  

Correct Answer: A

Question #260Topic 1

The authentication, authorization and accounting schemes and HWTACACS or


RADIUS server templates created on AR routers take effect only after being
applied to a domain.

 A. TRUE

 B. FALSE

Hide Solution    Discussion  

Correct Answer: A

Question #261Topic 1
Which SNMP version focuses on two main aspects, namely security and
administration. The security aspect is addressed by offering both strong
authentication and data encryption for privacy. The administration aspect is
focused on two parts, namely notification originators and proxy forwarders.

 A. SNMPv1
 B. SNMPv2
 C. SNMPv2c
 D. SNMPv3

Hide Solution    Discussion  


Correct Answer: D

Question #262Topic 1
Which of the following route entries can be aggregated into 10.0.0.24/29?
(Choose all that apply.)

 A. 10.0.0.25/30
 B. 10.0.0.23/30
 C. 10.0.0.26/30
 D. 10.0.0.22/30

Hide Solution    Discussion  


Correct Answer: AC

Question #263Topic 1
According to the configuration of single-armed routing in the following figure, the
administrative department and finance department can communicate with each
other even the proxy ARP is disabled on the subinterface on R1.

 A. True
 B. False

Hide Solution    Discussion  


Correct Answer: B

Question #264Topic 1
Refer to the graphic.

In the private network, RTA dynamically assigns a public address from the
address pool to hosts without port translation. Host C wishes to access the public
network while addresses are assigned to Host A and Host B. What will occur as
a result?

 A. The first public address will be allocated to Host C, and Host A will be
forced offline.
 B. The last public address will be allocated to Host C, and Host B will be
forced offline.
 C. Host C will be unable to forward traffic over the public network.
 D. All hosts will have access to the public network through pool address
swapping.

Hide Solution    Discussion  


Correct Answer: C

Question #265Topic 1
After the keepalive function is enabled for a GRE tunnel, the local end of the
GRE tunnel sends a keepalive packet to the remote end every 10s.

 A. True
 B. False

Hide Solution    Discussion  


Correct Answer: B

Question #266Topic 1
Refer to the graphic.

Both switches are operating using STP. With exception to those shown, all other
default parameters have been maintained. Which port will be blocked?

 A. Port G0/0/1 of switch A.


 B. Port G0/0/2 of switch B.
 C. Port G0/0/1 of switch B.
 D. Port G0/0/2 of switch A.

Hide Solution    Discussion   3


Correct Answer: C

Question #267Topic 1
Layer 2 switches are data link layer devices that identify MAC addresses of Layer
2 data frames and forward Layer 2 data frames based on MAC addresses. In
addition, they record mappings between MAC addresses and interfaces in the
MAC address table.

 A. True
 B. False

Hide Solution    Discussion  


Correct Answer: A

Question #268Topic 1
In RSTP mode, both alternate and backup ports cannot forward user traffic but
can receive, process, and send BPDU.

 A. True
 B. False

Hide Solution    Discussion  


Correct Answer: A

Question #269Topic 1
Refer to the graphic.

The switch is operating using STP. All default parameters have been maintained.
Which port will be assigned a designated port role?

 A. G0/0/1 of switch A.
 B. G0/0/2 of switch A.
 C. E0/0/1 of the hub.
 D. E0/0/2 of the hub.

Hide Solution    Discussion  


Correct Answer: A

Question #270Topic 1
How can the default route be generated? (Choose all that apply.)

 A. Manually configured.
 B. Automatically generated by the router.
 C. Generated by dynamic routing protocols.
 D. Generated by link layer protocols.

Hide Solution    Discussion  


Correct Answer: AC

Question #271Topic 1

The following figure shows a routing table. When this router receives a packet
with a destination IP address of 9.1.1.1, the router forwards the packet based on
the route 9.1.0.0/16 because the matched bit number in this route is the largest.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #272Topic 1

Refer to the graphic.

The routing table includes direct routes and static routes and the preference of
the direct routes cannot be changed.

 A. True

 B. False
Hide Solution    Discussion  

Correct Answer: A

Question #273Topic 1

Refer to the graphic.

Host A and Host B use VLAN routing to facilitate communication. When interface
G0/0/1.2 of RTA receives a frame from Host B, what will RTA do?

 A. RTA will immediately forward the frame via interface G0/0/1.1.

 B. RTA remove the VLAN tag before forwarding the frame.

 C. RTA will remove the VLAN tag and add a new tag for VLAN10 before
forwarding the frame.

 D. RTA will discard the frame.

Hide Solution     Discussion   2


Correct Answer: B

Question #274Topic 1

Refer to the configuration output.

Which of the following statements regarding the configuration output are correct?
(Choose all that apply.)

 A. The PVID on interface GigabitEthernet0/0/1 is 10.

 B. The PVID on interface GigabitEthernet0/0/1 is 1.

 C. The PVID on interface GigabitEthernet0/0/2 is 10.

 D. The PVID on interface GigabitEthernet0/0/2 is 1.

Hide Solution    Discussion  

Correct Answer: AD

Question #275Topic 1

Refer to the graphic.

VLANs 10 and 20 have been created on both SWA and SWC. VLAN 10 has
been manually created on SWB. SWB has learned VLAN 20 from SWA via
GVRP, allowing the hosts to belong to different VLANs as shown. If port Interface
G0/0/1 on SWB is changed to fixed mode, what will happen?

 A. Host A will still be able to communicate with Host C.

 B. Host B will still be able to communicate with Host D.

 C. Hosts that belong to the same VLAN will still be able to communicate.

 D. All hosts will be unable to communicate with any other host.

Hide Solution     Discussion   2

Correct Answer: A

Question #276Topic 1

On Sx7 series switches, which of the following VLANs can be removed by using
command "undo"? (Choose all that apply.)

 A. vlan 1.

 B. vlan 2.

 C. vlan 1024.

 D. vlan 4094.

Hide Solution    Discussion  

Correct Answer: BCD

Question #277Topic 1

Refer to the graphic.

A web server in a private network is required to provide HTTP services to public


users. The network administrator is required to configure NAT on RTA. Which
configuration should be used?
 A. [RTA-Serial1/0/1]nat server protocol tcp global 202.10.10.1 www.inside
192.168.1.1 8080

 B. [RTA-Serial0/0/1]nat server protocol tcp global 192.168.1.1 www.inside


202.10.10.1 8080

 C. [RTA-Gigabitethernet0/0/1]nat server protocol tcp global 202.10.10.1


www.inside 192.168.1.1 8080

 D. [RTA-Gigabitethernet0/0/1]nat server protocol tcp global 192.168.1.1


www.inside 202.10.10.1 8080

Hide Solution    Discussion  

Correct Answer: A

Question #278Topic 1

On an FR network, when the fr inarp command is executed, the interface where


static address mapping entries have been configured sends an Inverse ARP
Request packet to the remote device to replace the static address mapping
entries.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: B

Question #279Topic 1
According to the configuration on R1 shown in the following figure, the two PCs
can correctly access the ISP network.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #280Topic 1

Which of the following fields are contained in an ARP packet?

 A. Source Hardware Address

 B. Hardware Type

 C. Source Protocol Address

 D. Operation Code

Hide Solution     Discussion   4

Correct Answer: B
Question #281Topic 1

Which of the following can be displayed on the Versatile Routing Platform (VRP)
to indicate that GE port 2 on subcard 0 in slot 3 of a router?

 A. interface GigabitEthernet 3/2/0

 B. interface GigabitEthernet 3/0/2

 C. interface Ethernet 3/0/2

 D. interface XGigabitEthernet 3/0/2

Hide Solution     Discussion   1

Correct Answer: B

Question #282Topic 1

You can run the "startup saved-configuration backup.cfg" command on the user
interface of the Versatile Routing Platform (VRP) to specify the "backup.cfg" file
as the configuration file for next startup.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #283Topic 1

When a network engineer enters a command, the following information is


displayed:
Error: Unrecognized command found at '^' position. Which of the following
statements is true about such information?

 A. The parameter type is incorrect.

 B. The entered command is incomplete.

 C. The entered parameter is not specified.

 D. No keyword is found.


Hide Solution    Discussion  

Correct Answer: D

Question #284Topic 1

In RSTP mode, interfaces in the Discarding state discard received data frames
but maintain the MAC address table based on received data frames.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: B

Question #285Topic 1

Which of the following statements is true about the MAC address table of a
switch?

 A. The MAC address 5489-9811-0b49 is manually configured by the


administrator.
 B. The MAC address 5489-989d-1d30 is manually configured by the
administrator.

 C. The MAC address 5489-9885-18a8 is manually configured by the


administrator.

 D. After the switch restarts, all the MAC addresses need to be learned
again.

Hide Solution    Discussion  

Correct Answer: A

Question #286Topic 1

The MAC address table of a switch is as follows. If the switch receives a data
frame whose destination MAC address is 5489-9885-18a8 from Eth0/0/2, which
of the following statements is true?

 A. The data frame is forwarded through Eth0/0/2.

 B. The data frame is flooded.

 C. The data frame is forwarded through Eth0/0/1.

 D. The data frame is discarded.

Hide Solution    Discussion  

Correct Answer: D

Question #287Topic 1

Which of the following descriptions about STP designated ports is correct?


 A. Designated ports forward frames destined for the root switch.

 B. Designated ports represent the path leading to the root switch.

 C. Each bridge can have only one designated port.

 D. Designated ports are responsible for sending BPDU to connected


network segments.

Hide Solution    Discussion  

Correct Answer: D

Question #288Topic 1

What is the total length of the port ID in STP?

 A. 4 bits

 B. 8 bits

 C. 2 bits

 D. 16 bits

Hide Solution    Discussion  

Correct Answer: D

Question #289Topic 1

Which of the following statements are true about STP BPDUs?

 A. During initialization, each switch enabled with STP proactively sends


configuration BPDUs.

 B. BPDUs are encapsulated in Ethernet frames and the destination MAC


address is a multicast MAC address.

 C. After STP is enabled on a port, the switch periodically sends TCN


BPDUs through the designated port.

 D. STP has two types of packets: configuration BPDU and TCN BPDU.

Hide Solution     Discussion   2


Correct Answer: D

Question #290Topic 1

ICMP packets do not contain port numbers. Therefore, NAPT cannot be used.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: B

Question #291Topic 1

Which of the following protocols can be used on a Layer 2 network with


redundant links to prevent loops?

 A. UDP

 B. VRRP

 C. STP

 D. ARP

Hide Solution    Discussion  

Correct Answer: C

Question #292Topic 1

You can configure a static route on a broadcast interface by specifying the next-
hop IP address or outbound interface.

 A. True

 B. False

Hide Solution    Discussion  


Correct Answer: A

Question #293Topic 1

What are the advantages of OSPF?

 A. OSPF supports packet authentication.

 B. OSPF can load balance traffic among equal-cost routes.

 C. OSPF supports Classless Inter-Domain Routing (CIDR).

 D. OSPF supports area partition.

Hide Solution    Discussion  

Correct Answer: BCD

Question #294Topic 1

Which of the following statements are true about the default route?

 A. In a routing table, the route to 0.0.0.0 (with the mask being 0.0.0.0) is
the default route.

 B. If the destination address of a packet does not match any entry in the
routing table, the packet is forwarded through the default route.

 C. The default route can only be manually configured by the administrator.

 D. The routing table of any router must contain the default route.

Hide Solution    Discussion  

Correct Answer: AB

Question #295Topic 1

Which of the following OSPF packets can ensure LSA update reliability?

 A. DD

 B. LSR

 C. LSU
 D. LSACK

Hide Solution     Discussion   3

Correct Answer: C

Question #296Topic 1

Which layer of the OSI reference model does a router work at?

 A. Application layer

 B. Data link layer

 C. Network layer

 D. Transport layer

Hide Solution    Discussion  

Correct Answer: C

Question #297Topic 1
On the network shown in the figure, if all routers run OSPF, which router is
elected as the BDR?

 A. Router B

 B. Router A

 C. Router D

 D. Router C

Hide Solution     Discussion   2

Correct Answer: B
Question #298Topic 1

The output of the following command on router R1 is as follows.

Which of the following statements are true?

 A. The router discards the packets destined for 11.0.0.0/8.

 B. The packets destined for 12.0.0.0/8 are forwarded through


Ethernet0/0/0 on the router.

 C. The router forwards the packets destined for 12.0.0.0/8.

 D. The packets destined for 11.0.0.0/8 are forwarded through


GigabitEthernet0/0/0 on the router.

Hide Solution    Discussion  

Correct Answer: CD

Question #299Topic 1

Which of the following statements about the "ip route-static 10.0.2.2


255.255.255.255 10.0.12.2 preference 20" command is true?

 A. The destination network address of the route is 10.0.12.2/32.

 B. The mask length of the destination network address of the route is 32


bits.

 C. The preference of the route is 100.

 D. The route must exist in the routing table.


Hide Solution    Discussion  

Correct Answer: B

Question #300Topic 1

Which of the following data packets are the OSPF protocol packets encapsulated
into?

 A. HTTP packet

 B. TCP packet

 C. IP packet

 D. UDP packet

Hide Solution    Discussion  

Correct Answer: C

Question #301Topic 1

On the network shown in the figure, if all links are Ethernet links and all routers
run OSPF, how many DRs will be elected on the entire network?
 A. 2

 B. 4

 C. 3

 D. 1

Hide Solution     Discussion   1

Correct Answer: B

Question #302Topic 1

As shown in the preceding VTY configuration, the user privilege level is set to 3.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #303Topic 1

What is the main function of DHCP Discover packets?

 A. The client sends DHCP Discover packets for requesting to confirm the
configuration or renew the lease time of the IP address.

 B. The DHCP server sends DHCP Discover packets to respond DHCP


Request packets.

 C. The DHCP Discover packet carries various configuration information.


 D. The client sends DHCP Discover packets to search for the DHCP
server.

Hide Solution    Discussion  

Correct Answer: D

Question #304Topic 1

As shown in the following figure, switch A and router A are connected through
two links. The two links are aggregated in manual load balancing mode. The
aggregation port number is 1. The aggregated link needs to carry VLAN tag 100.
Switch A uses the trunk link.

Which of the following configurations need to be performed on switch A?


A.

B.

C.
D.

Hide Solution    Discussion  

Correct Answer: B

Question #305Topic 1

What is the total length of the VLAN frame defined by IEEE 802.1Q?

 A. 4

 B. 3

 C. 2

 D. 1

Hide Solution     Discussion   1

Correct Answer: A

Question #306Topic 1

Which of the following is the feature of port-based VLAN assignment?

 A. VLAN IDs are allocated based on the protocol type and encapsulation
format of data frames.

 B. The VLAN does not need to be configured again when hosts move.
 C. The VLAN tag is added to data frames based on the IP address carried
in the frames.

 D. The VLAN needs to be configured again when hosts move.

Hide Solution    Discussion  

Correct Answer: D

Question #307Topic 1

If an Ethernet data frame carries Length/Type = 0x8100, which of the following


cannot be the payload of the data frame?

 A. RSTP data frame

 B. OSPF packet

 C. ARP response packet

 D. STP data frame

Hide Solution    Discussion  

Correct Answer: AD

Question #308Topic 1

Which of the following statements about a port on a switch is/are false?

 A. If the port receives data frames without VLAN tags, the switch needs to
add VLAN tag 200.

 B. If the VLAN tag carried in a data frame is 100, the switch removes the
VLAN tag and sends the frame.

 C. The link type of the port is trunk.

 D. The port cannot send data frames carrying VLAN tag 200.
Hide Solution     Discussion   7

Correct Answer: C

Question #309Topic 1

According to the following topology and configuration, R1 and R2 are connected


through low-speed serial cables and PPP is used to encapsulate data link layer
packets. When the Holdtime values of R1 and R2 are different, PPP negotiation
and communication fail.

 A. True

 B. False

Hide Solution     Discussion   4

Correct Answer: A

Question #310Topic 1

Which of the following is/are not included in AAA?

 A. Audit

 B. Authentication

 C. Authorization

 D. Accounting
Hide Solution    Discussion  

Correct Answer: A

uestion #311Topic 1

Which of the following encapsulation modes is/are supported by IPsec VPN?

 A. Routing mode

 B. Tunnel mode

 C. Transport mode

 D. Switching mode.

Hide Solution    Discussion  

Correct Answer: BC

Question #312Topic 1

The IKE protocol is used to set up an SA for IPsec automatic negotiation. Identity
authentication can be performed when the IP address of the initiator changes
dynamically.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A

Question #313Topic 1

Which of the following SNMP packets is/are sent by the agent on the managed
device to the NMS?

 A. Get-Request

 B. Response

 C. Get-Next-Request
 D. Set-Request

Hide Solution    Discussion  

Correct Answer: B

Question #314Topic 1

The RADIUS information of the router is configured as follows.

Which of the following statements is/are correct?

 A. The IP address of the authentication server is 200.0.12.1.

 B. The IP address of the authorization server is 200.0.12.1.

 C. The source IP address of the RADIUS packets sent by the router is


200.0.12.2.

 D. The IP address of the accounting server is 200.0.12.1.

Hide Solution     Discussion   1

Correct Answer: ACD

Question #315Topic 1

Which of the following information must be configured for a DHCPv6 relay agent?

 A. DHCPv6 address pool

 B. DNS server address

 C. IPv6 address of the DHCPv6 server

 D. DHCPv6 DUID

Hide Solution    Discussion  


Correct Answer: C

Question #316Topic 1

Which of the following statements are true according to the following command
output?

 A. The OSPFv3 area ID is 0.

 B. The OSPFv3 process ID is 1.

 C. The DR priority of the local router is 1.

 D. The router ID of the neighbor is 10.0.1.1.

Hide Solution    Discussion  

Correct Answer: ABC

Question #317Topic 1
According to the following configuration of Router C, how many global unicast
address prefixes are advertised by Router C?

 A. 1

 B. 4

 C. 2

 D. 3

Hide Solution    Discussion  

Correct Answer: D

Question #318Topic 1

If the MAC address of an interface is 0EE0-FFFE-0FEC, the corresponding EUI-


64 address is ( ).

 A. 0CE0-FFFF-FEFE-0FEC
 B. 0EE0-FFFF-FEFE-0FEC

 C. 0EE0-FFFE-FFFE-0FEC

 D. 0CE0-FFFE-FFFE-0FEC

Hide Solution     Discussion   6

Correct Answer: D

Question #319Topic 1

Which of the following address types are of IPv6 addresses?

 A. Unicast address

 B. Anycast address

 C. Multicast address

 D. Broadcast address

Hide Solution    Discussion  

Correct Answer: ABC

Question #320Topic 1

Segment routing-traffic engineering (SR-ТЕ) is a new ТЕ tunneling


technology that uses SR as a control protocol. All nodes of an SR-TE tunnel,
including the ingress and transit nodes, must be aware of the tunnel and
complete label distribution and forwarding.

 A. True

 B. False

Hide Solution    Discussion  

Correct Answer: A
Question #321Topic 1

In the MPLS domain, the full name of LER is label egress router.

 A. True

 B. False

Hide Solution     Discussion   1

Correct Answer: B

Question #322Topic 1

Which area ID is used by OSPFv3 to identify the backbone area?

 A. 0

 B. 3

 C. 2

 D. 1

Hide Solution    Discussion  

Correct Answer: A

Question #323Topic 1
The output of the "display vlan" command on a switch is as follows.

Which of the following statements are true?

 A. When GE0/0/1 of the switch forwards data frames from VLAN 20, the
frames are untagged.

 B. When GE0/0/1 of the switch forwards data frames from VLAN 10, the
frames are untagged.

 C. When GE0/0/2 of the switch forwards data frames from VLAN 20, the
frames are tagged.

 D. Four VLANs are manually created.

Hide Solution    Discussion  

Correct Answer: BD

Question #324Topic 1
Which of the following authentication method is more secure for PPP?

 A. CHAP.

 B. MD5.

 C. SSH.

 D. PAP.

Hide Solution    Discussion  

Correct Answer: A

Topic 2 - More Questions.


Question #1Topic 2

Which authentication modes does AAA support? (Choose three).

 A. None

 B. Local

 C. Radius

 D. 802.1X

Hide Solution     Discussion   3

Correct Answer: ABC

Question #2Topic 2

The network administrator wants to improve the performance of network


transmission, what steps can the administrator take? (Choose two)

 A. Change the work mode to full duplex of each end station.

 B. Link the end stations together using a switch.

 C. Change the work mode to half duplex of each end station.

 D. Link the end stations together using a hub.

Hide Solution    Discussion  


Correct Answer: AB

Question #3Topic 2

Which of the following statements are correct about TTL field in IP packet?
(Choose two)
<choice ident="A">
<choice ident="B">
<choice ident="C">
<choice ident="D">

 A. The maximum value of TTL is 65535.

 B. Normally, it's impossible for a router to receive a packet whose TTL is


zero.

 C. The main purpose of TTL is to prevent IP packets from circulating


endlessly in a network which can consume a lot of bandwidth.

 D. TTL value will be decremented as a packet is passed through the


network devices such as hub, LAN switch and router.

Hide Solution    Discussion  

Correct Answer: BC

Question #4Topic 2

Host A wishes to send data to host C, and generates an ARP request to obtain
the destination MAC address.
Which statement is true?

 A. The destination IP address of the ARP request is Host C.

 B. The destination MAC address of this ARP request is Host C.

 C. The destination IP address for the ARP request is a broadcast IP


address.

 D. The destination MAC address of this frame is the MAC address of


G0/0/0 on RTA.

Hide Solution    Discussion  

Correct Answer: A
Question #5Topic 2

The administrator has configured an IP address for Host A and Host B, but had
forgotten to configure a default gateway.
What effect will this have on the hosts?

 A. Neither host will be affected, and therefore will be able to communicate


with the peer.

 B. Host A will be unable to connect to the router’s G0/0/0 interface.

 C. Hosts will be unable to communicate unless arp-proxy is enabled on


the router.

 D. The host will be unable to reach neither the local nor remote network
destinations.

Hide Solution     Discussion   3

Correct Answer: C

Question #6Topic 2

A host has established a telnet connection with the router attached to interface
G0/0/0.
Which of the following statements are correct? (Choose two)

 A. The destination address of a frame sent by the host will be the MAC
address of the router interface.

 B. The destination address of a frame will be the MAC address of the


switch interface.

 C. The destination port number in a segment header will have a value of


80.

 D. The destination IP address of a packet will be the IP address of the


network interface of the router.

Hide Solution    Discussion  

Correct Answer: AD

Question #7Topic 2
Which of the following statements are correct? (Choose two)

 A. A single collision domain exists between RTA and SWC.

 B. A single broadcast domain exists between SWA and SWB.

 C. A single collision domain exists between SWA and SWC.

 D. A single broadcast domain exists between SWA and SWC.

Hide Solution     Discussion   3

Correct Answer: CD

Question #8Topic 2

On the interface serial 1/0/1 of RTA, the command "ip address unnumbered
interface loopback 0" has been configured.
Which following statements are correct? (Choose two).

 A. The IP address of interface serial 1/0/1 is 10.1.1.1/24

 B. The IP address of interface serial 1/0/1 is 10.1.1.1/32

 C. The route entry 10.1.1.0/24 exists in RTA’s routing-table

 D. The route entry 10.1.1.0/24 does not exist in RTA’s routing-table

Hide Solution     Discussion   1

Correct Answer: BD

Question #9Topic 2

A web server in a private network is required to provide HTTP services to public


users. The network administrator is required to configure NAT on RTA.
Which configuration should be used?

 A. [RTA-Serial1/0/1]nat server protocol tcp global 202.10.10.1 www inside


192.168.1.1 8080

 B. [RTA-Serial0/0/1]nat server protocol tcp global 192.168.1.1 www inside


202.10.10.1 8080
 C. [RTA-Gigabitethernet0/0/1]nat server protocol tcp global 202.10.10.1
www inside 192.168.1.1 8080

 D. [RTA- Gigabitethernet0/0/1]nat server protocol tcp global 192.168.1.1


www inside 202.10.10.1 8080

Hide Solution    Discussion  

Correct Answer: A

Question #10Topic 2

The network administrator needs to configure static NAT on RTA, in order to


allow Host A to communicate with Host C.
Which command is correct?

 A. [RTA-Serial1/0/1]nat outbound 200.1.1.10

 B. [RTA-Serial1/0/1]nat static global 200.1.1.10 inside 192.168.1.0

 C. [RTA-Serial1/0/1]nat static global 192.168.1.1 inside 200.1.1.10

 D. [RTA-Serial1/0/1]nat static global 200.1.1.10 inside 192.168.1.1

Hide Solution     Discussion   1

Correct Answer: D

You might also like