0% found this document useful (0 votes)
143 views6 pages

HICA Datacom 03

The document contains questions and answers about networking topics such as OSPF, ACLs, VLANs, routing, and more. Some key points: - OSPF needs to elect a DR and BDR in non-broadcast multi-access (NBMA) and point-to-multipoint network types. - ACLs on Huawei devices can match TCP/UDP port numbers and ranges, and the same ACL can be applied to multiple interfaces. - In OSPF, if the neighbor status is stable, the neighbor status between routers will be 2-way. - Bridge priority is used for root bridge election in the spanning tree protocol.

Uploaded by

Asma Elmangoush
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
143 views6 pages

HICA Datacom 03

The document contains questions and answers about networking topics such as OSPF, ACLs, VLANs, routing, and more. Some key points: - OSPF needs to elect a DR and BDR in non-broadcast multi-access (NBMA) and point-to-multipoint network types. - ACLs on Huawei devices can match TCP/UDP port numbers and ranges, and the same ACL can be applied to multiple interfaces. - In OSPF, if the neighbor status is stable, the neighbor status between routers will be 2-way. - Bridge priority is used for root bridge election in the spanning tree protocol.

Uploaded by

Asma Elmangoush
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

HICA-DATAcom H12-811 V8.02.

9. In which of the following network types does the OSPF protocol need to elect DR and BDR?
(Multiple choice)

 Point to multipoint correct


 NBMA correct
 Point-to-point type
 Broadcast type correct

11. When deploying ACL on Huawei devices, which of the following description is correct?
(Multiple choice)

 ACL can match the TCP/UDP port number of the message, and can specify the range of
port numbers correct
 The same ACL can be called under multiple interfaces correct
 When ACL defines rules, it can only proceed in the order of 10, 20, and 30
 ACL cannot be used to filter OSPF traffic, because OSPF traffic does not use UDP
protocol encapsulation
 When calling ACL under the interface, it can only be applied to the outbound direction

12. In the network shown in the figure below, when the OSPF neighbor status is stable, what is
the neighbor status of Router B and Router C?

 Attempt
 2-way correct
 Fu11
 Down

13. Which parameter is used in the spanning tree protocol for root bridge election?
 Port ID
 Bridge priority correct
 Root path cost
 Bridge ID

14. MIB (Management Information Base) is a virtual database that exists only in NMS.

 True
 False correct

15. Now it is necessary to implement a Python automation script Te1net to the device to view the
device running configuration. Which of the following statements is wrong?

 Telnetlib can achieve this function.


 Use telnet.Telnet (host) to connect to the Telnet server.
 can use telnet.write(b"display current-configuration
") to input the command to view the current configuration of the device.
 telnet.c1ose() is used after a command entered every time, the function is that the user
waits for the switch to return information. correct

16. The network administrator of a certain company wants to uniformly divide the users who
often access the company network from different switches into VLAN 10 when they frequently
change office locations. Which of the following methods should be used to divide VLANs?

 Divide VLAN based on protocol


 Divide VLAN based on MAC address
 Divide VLAN based on port
 Divide VLAN based on subnet correct
18. The administrator plans to implement route backup by configuring static floating routes,
what is the correct way to achieve this?

 The administrator needs to configure different metric values for the main static route and
the standby static route
 The administrator needs to configure different TAGs for the main static route and the
standby static route
 The administrator only needs to configure two static routes
 The administrator needs to configure different protocol priority values for the main static
route and the standby static route
correct

19. There are hosts in a private network that need to access the Internet. In order to achieve this
requirement, which of the following configurations should the administrator do on the edge
router of the network? (Multiple Choice)
 Default route correct
 STP
 DHCP
 NAT correct

21. Which of the following statements about the division of OSPF protocol area is wrong?

 Area 0 is the backbone area, and other areas must be connected to this area
 The LSDBs in the routers in the same OSPF area are completely consistent
 Dividing OSPF areas can reduce the LSDB scale of some routers
 Only ABR can be used as ASBR correct

22. NFV (Network Functional Virtualization), network function virtualization realizes the
deployment of network applications in a software-based way.

 True correct
 False

23. UDP cannot guarantee the reliability of data transmission, and does not provide functions
such as message sequencing and flow control. It is suitable for flows with low transmission
reliability requirements but high transmission speed and delay requirements.

 True correct
 False

25. VRP operating system commands are divided into 4 levels: access level, Monitoring level,
Configuration level, and Management level. Which level can run various business configuration
commands but cannot operate the file system?

 Configuration level correct


 Monitoring level
 Access level
 Management level

26. Using a traditional landline to make calls is a way of network communication.

 True correct
 False

Mastering the basic operations of the file system is crucial for network engineers to efficiently
manage the configuration files and VRP system files of devices. Which of the following
statements is true about these files?
 A PAF file effectively controls product features and resources. The common file name
extension is .bin.
 A configuration file stores configuration commands. The common file name extension
is .cc.

28. In what state does the OSPF protocol determine the master-slave relationship of DD packets?

 ExStart
 Full
 2-way correct
 Exchange

29. The following two configuration commands can realize the router RTA to the same
destination 10.1.1.0 routing master and backup backup.

【 RTA 】 ip route-static 10.1.1.0 24 12.1.1.1 permanent

【 RTA 】 ip route-static 10.2.2.0 24 13.1.1.1.

 True
 False correct

32. FAT AP can independently complete wireless user access, wireless user authentication, and
business data forwarding without AC.

 True correct
 False

33. There is no channel overlap in the 14 available frame segments in the 185.2.4 GHz frame
segment.

 True correct
 False

34. In the WLAN network architecture, what is terminal equipment that supports the 802.11
standard called?

 Client
 AC
 STA correct
 AP

35. Which of the following characteristics does the OSPF protocol have? (Multiple Choice)

 Easy to produce routing loops correct


 Calculate the shortest path by number
 Support the division of areas correct
 Trigger an update correct

36. Which of the following statement about static routing is wrong?

 Cannot automatically adapt to changes in network topology


 Manual configuration by the network administrator
 Low system performance requirements
 Routers need to exchange routing information correct

37. In the network shown in the figure below, which of the following commands can be entered
on the router to enable host A to ping host B? (Multiple choice)

 RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.2


RTB: ip route-static 10.0.12.1 255.255.255.252 11.0.12.1 correct
 RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.1
RTB: ip route-static 10.0.12.1 255.255.255.252 11.0.12.2
 RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2
RTB: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1 correct
 RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1
RTB: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2

38. Which of the following IPv4 addresses can be used by a host to directly access the Internet?

 192.168.1.1/24
 172.32.1.1/24
 172.16.255.254/24
 10.255.255.254/24 correct

39. The switch becomes a logical switch after stacking and clustering, and Eth-Trunk across
physical devices can be deployed to improve network reliability.

 True correct
 False

41. As shown in the figure below, assuming the other configurations of the switch are kept in the
default state, which port of the following switch will become the designated port? (Multiple
Choice)
 SWC's G0/0/1 correct
 SWA's G0/0/3 correct
 SWC's G0/0/2
 SWB's G0/0/1 correct

42. The management of users by NAS devices is based on domains. Each user belongs to a
domain, and a domain is a group of users who belong to the same domain.

 TRUE correct
 FALSE

You might also like