ITshit
ITshit
ITshit
To save Ip addresses, how many bits are used in the subnet mask of the interconnection Ip
address of network devices on an enterprise work?
30
2. Which of the following functions can be enabled on access switches to prevent employees
from accessing small routes carrying DHCP functions?
DHCP snooping
Equipment Layer
4.) Which Technology is used to allow only fixed users to log in to the network when you use
Telnet or Web to manage devices?
ACL
All choices
All choices
7.) Which routing protocols can be used to ensure network connectivity within a campus
network?
Static route
OSPF
ISIS
8.) Fixed Ip addresses can be allocated to special terminals such as servers and printers.
Right
9.) For small sized campuses the network architecture is simplified as much as possible
Right
10.) For the centralized NMS SNMPv3 add orientations and encryption which greatly
improves NMS security
Right
14.) Which of the following types of networks can be classifies according to geographical
coverage?
LAN
MAN
WAN
16.) the start network has strong robustness and is not easy to fail
Wrong
Right
18.) On a network switches and routers can be used interchangeably
Wrong
Right
20.) two computers are connected through a network cable to from the simplest
network.
Right
21.) The open System interconnections reference model divdies a network into seven
layers from the bottom layer to top layer. Which of the following are the layers from
bottom layer to top layer?
Physical layer data link layer, network layer, transport layer, session layer, presentation
layer, and application layer
23
25.) Which of the following flags in the TCP header participate in the TCP three-way
handshake?
SYN
ACK
26.) Which of the following are valid MAC addresses?
68-F7-23-8B-33-A2
00-00-11-11-11-AA
Right
28.) ARP reply packets are broadcast so that all host can receive them.
Wrong
29.) Common data link layers protocol include Ethernet PPPo3, and PPP
Right
30.) To disconnect a TCP connection you only need to disconnect the connection in one
direction
Wrong
32.) How many users can manage devices the console port?
35.) Which of the following methods can be used to log in to the device through the CLI?
Console
SSH
Telnet
36.) Which views are included in the commands of Huawei VRP?
37.) Users can manage devices using the CLI or web system
Right
38.) The sve command can be used only in the user view.
Right
39.) The startup saved configuration file command specifies a configurations file for next startup
Right
40.) By default command level 0 - 3 are registered and user levels 0-15 are registered
Right
42.) By default, what operations does the switch perform after receiving an unknown unicast
frame?
Learn the mapping between the source Mac address of the data frame and the interface and
flood the date frame
43.) Which of the following ARP packets used to request the MAC address corresponding to the
IP address?
ARP request
44.) Which of the following fields are contained in an Ethernet frame in the IEEE 802.3 Format?
46.) When a terminal receives a data frame, it checks the destination MAC address in the frame
header. Which of the following data frames can be received
47.) The switch floods data frames whose destination MAC addresses are unknown unicast
mac addresses and broadcast MAC addresses.
Right
48.) The switch isolates the collision domain, and the router isolataes broadcast domain
Right.
Right
Right
51.) Which of the following 802.11 protocols can work only on the 5 GHz frequency band?
802.11ac
10
53.) What CAPWAP packets does the AC use to deliver configuration files to APs?
1/10/20
Beacon
56.) Each AC needs to specify its sources IP address to establish a CAPWAP tunnel with the
AP. How many WLAn sources Ip addresses can be specified for an AC?
58.) Which of the following statement about VLAN technology are incorrect?
The VLAN technology can isolate a large collision domain into several collision domains
PCs in different VLANs cannot communicate
59.) Compared with 2.4 GHz, 5 GHz has the following advantages
60.) Which of the following measures can be taken to protect WLAN security?
Authentication
Encryption
System protection
DHCP mode
DNS mode
Broadcast mode
63.) A VLAN is a broadcast domain
Right
64.) To restrict the access off a specific host to specific resources you can configure VLANs
based on MAC addresses
Right
65.) The CAPWAP tunnel establishes two tunnels: The data tunnel and the control tunnel.
Keepalive packets are used for keepalives regardless of the tunnels
Wrong
66.) The AP needs to be authenticated when it goes online. The authentication modes include
MAC address authentication and SN authentication.
Right
67.) The bridge IDs of SW1, SW2, SW3, and SW4 are 4096.4c1f-11bc-102a,4096.4c1f-aabc-
102b, 4096.4c1f-aabc-001a, and 8192.4c1f-aabc-112b, if four switches are on the same layer 2
network and STP is enabled, which of the following is the root bridge
SW3
15s
69.) Which of the following statements about designated ports are correct?
70.) The root bridge ID, bridge ID, interface Id, and root path cost (RPC) are four important
fields for configuring BPDU priorities. Which of the following is the preferred sequence for
configuring BPDus on a switch?
Wrong
74.) Non- root bridges in STP can also actively send configuration BPDUs
Wrong
75.) You can manually set the priority of the switch BId to 1000.
Wrong
76.) Generally it takes 50 seconds to restore a root bridge fault and 30 seconds to restore a
direct link fault
Right
32768
78.) Which of the following interface configuration parameters does not require the same
configuration of the member interface in a an aggregation group?
79.) Which of the following statement about active link election in LACP mode is fales?
The Actor enables the active interface and disables in the inactive interface. The actor informs
the peer of the election result through the physical interface status.
80.) Which link aggregation mode can implement link backup on Huawei Swtiches?
Multicast
82.) Which of the following fields is used to select the ACtor in the LACPDU?
Device priority
Device MAC address
83.) Which of the following physical parameters must be consistent at both ends of an Ethernet
trunk link
84.) To ensure the minimum bandwidth you can set the minimum number of active interface in a
link aggregation group
Right
85.) Two devies form a cluster and are virtualized into a single logical device. The simplified
networking does not require protocols such as MSTP and VRRP, simplifying network
configurations. In addition, inter-dvice link aggregation implements fast convergence and
improves reliability
Right
Right
172.17.1.254
88.) What is the number of available IP addresses in the 172.16.0.0/30 network segment?
2
89.) If the network address of a company is 192.168.1.0.24, which of the following network
mask is applicable to six subnets with a maximum of 20 host in each subnet?
27
90.) If the IP address of a port is 202.16.7.145/26, which of the following broadcast addresses is
the network where the IP address reside?
202.16.7.191
Class D
92.) Which of the following packets is used by ICMP to detect the connectivity between the
sources and destination Ip addresses?
ICMP Echo
93.) Which of the following IP addresses can be manually configured and used by host
interfaces?
10.2.3.4
192.168.100.254
94.) When the TTL field of an IP packet is 0, the router discards the packet
Right
96.) ICMP Defines various error messages for diagnosing network connectivity problems. Base
on the error messages, the sources device may determine th cause of the data transmission
failure.
Right
97.) Run the display ip routing table command to check the Ip routing table. Which of the
following is not included in the command output?
advRouter
98.) What is the default priority of a static route?
60
99.) When a device learns two routes to the same destination, which of the following parameters
is used to distinguish the routes?
Priority
100.) According to the longest match principle, which of the following routes does not packet
with the destination Ip address 172.16.10.1 match?
172.16.10.0/24
101.) Which of the following routing protocols is a link state routing protocol?
OSPF
ISIS
Direct route
Static routing protocol
Dynamic routing protocol
RIP
ISIS
OSPF
Wrong
105.) When forwarding a packet, the router dicards the pacers if no specific route is found and
no default route is available
Right
106.) When forwarding a packet a router can forward the packet based on the source address
Wrong
107.) Which packets are used by OSPF to discover and maintain neighbor relationship.
Hello
108.) By default what is the OSPF cost of a 1.544 MBit/s serial interface, FE interface, or GE
interface
64,1,1
109.) Which of the followings entries is used by OSPF to store link status information?
OSPF LSDB
110.) Which of the following statements about the router ID is OSPF are correct?
The prerequisites fo the normal running OSPF is that the router has the router ID
111.) OSPF supports multiple processes. If no process ID is specified, which process Id is used
by default
NBMA
Broadcast
114.) ON a broadcast network, the final status of DRs between others is 2-ways and does not
enter the full state.
Right
RIght
116.) OSPF devices can establish neighbour relationship across multi-hop deives
Wroing