option
Cuestiones
ayuda
daypo
buscar.php

HCIA DATACOM

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
HCIA DATACOM

Descripción:
Test de examen

Fecha de Creación: 2023/10/19

Categoría: Informática

Número Preguntas: 242

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

When the host accesses the web server of the server, the network layer protocol field takes the value 6. True. False.

A network engineer prompts the following information when entering the command line: Error: unrecognized command found at ‘^’ position. Which of following statement about the prompt information is correct?. The input command is not clear. Wrong parameter type. No keyword found. Input command is incomplete.

Under the command line interface of Huawei AR router, the save command is used to save the current system time. True. False.

As shown in the figure, there are three data packets captured by the administrator on the network. Which of the following statements is incorrect?. None of these three data packets contain application layer data. These three data packets represent the three-way handshake process of TCP. The telnet client uses port 50190 to establish a connection with the server. The IP address of the telnet server is 10.0.12.1, and the IP address of the telnet client is 10.0.12.2.

Regarding the transport layer protocol, which of the following statements are correct? (Multiple Choice). The establishment of a TCP connection is a three-way handshake process, and the termination of a TCP connection requires a four-way handshake. UDP uses the SYN and ACK flags to request and confirm the establishment of a connection. The range of well-known port numbers is 1-1023. UDP is suitable for transmitting delay-sensitive traffic and can be reorganized according to the sequence number field in the message header.

The tracert diagnostic tool in Huawei routers is used to track the forwarding path of data. True. False.

The tracert diagnostic tool in Huawei routers is used to track the forwarding path of data. True. False.

In which of the following network types does the ospf protocol need to elect DR and BDR? (Multiple Choice). Broadcast type. Point-to-point type. Point-to-multipoint. NBMA.

Regarding the static routing, which of the following is incorrect?. Manual configuration by the network administrator. Routing information needs to be exchanged between routers. Cannot automatically adapt to changes in network topology. Low system performance requirements.

At what frequency does the IEEE 802.11n standard support to work? (Multiple Choice). 6GHz. 2.5GHz. 2.4GHz. 5GHz.

In the network as shown in the figure below, what commands can be entered on the router to make host A ping host B successfully? (Multiple Choice). RTA:ip route-static 0.0.0.0 0.0.0.0 11.0.12.2 RTB:ip route-static 0.0.0.0 0.0.0.0 11.0.12.1. RTA:ip route-static 10.0.12.5 255.255.255.252 11.0.12.2 RTB:route-static 10.0.12.1 255.255.255.252 11.0.12.1. RTA:ip route-static 0.0.0.0 0.0.0.0 11.0.12.1 RTB:ip route-static 0.0.0.0 0.0.0.0 11.0.12.2. RTA:ip route-static 10.0.12.5 255.255.255.252 11.0.12.1 RTB:ip route-static 10.0.12.1 255.255.255.252 11.0.12.2.

Which one of the following commands can only view static routes on VRP operating platform?. display IP routing-table. display IP routing-table statistics. display IP routing-table verbose. display IP routing-table protocol static.

The router running the ospf protocol can reach the FULL state after completing the LSDB synchronization. True. False.

All interfaces of the router belong to the same broadcast domain. True. False.

Which of the following protocol types does the ospf protocol support? (Multiple Choice). Point-to-multipoint. Point-to-point type. Broadcast type. NBMA.

When using the ping command on the VRP platform, if you need to specify an IP address as the source address of the echo request message, which of the following parameters should be used?. -d. -a. -s. -n.

Which of the following ospf protocol packets can ensure the reliability of LSA updates?. DD. LSR. LSU. LSACK.

What kinds of stable states does the neighbor relationship of OSPF protocol have? (Multiple Choice). 2-way. Full. Down. attempt.

All interfaces of routers running ospf protocol must belong to the same area. True. False.

Dynamic routing protocols can automatically adapt to changes in network topology. True. False.

As shown in the figure below, host A and host B cannot communicate. True. False.

As shown in the figure, when the switch needs to forward the frame with the destination mac address of 5489-98ec-f011, which of the following descriptions is correct?. The switch will send a message that the destination is unreachable to the source device. The switch does not find a matching entry in the mac address table, so the frame will be discarded. The switch needs to send a request to discover the device with the mac address of 5489-98ec-f011. The switch will flood the frame on all ports except the port that received the frame.

According to the command output as shown in the figure, which of the following descriptions is correct? (Multiple Choice). GigabitEthernet0/0/1 allows VLAN1 to pass. GigabitEthernet0/0/1 does not allow VLAN1 to pass. If you want to change GigabitEthernet0/0/1 to an Access port, you first need to use the command "undo port trunk allow-pass vlan all". If you want to change GigabitEthernet0/0/1 to an Access port, you first need to use the command "undo port trunk allow-pass vlan 2 to 4094".

According to the command shown in the figure, which of the following descriptions is correct? (Multiple Choice). The PVID of GigabitEthernet0/0/1 port is 1. The PVID of GigabitEthernet0/0/2 port is 1. The PVID of the GigabitEthernet0/0/2 port is 10. The PVID of GigabitEthernet0/0/1 port is 10.

If an Ethernet data frame is Length/type=0x8100, which of the following statements is correct?. There must be a UDP header in the upper layer of this data frame. There must be a TCP header in the upper layer of this data frame. This data frame must carry vlan TAG. There must be an IP header in the upper layer of this data frame.

The bridge ID of the STP protocol in the switching network is as follows. Which of the following bridge ID switches will become the root bridge?. 4096 00-01-02-03-04-DD. 32768 00-01-02-03-04-AA. 32768 00-01-02-03-04-BB. 32768 00-01-02-03-04-CC.

Regarding the election of active ports in link aggregation LACP mode, which of the following is correct?. Compare the priority of the interface first, if it is impossible to determine the better one, continue to compare the interface number, the smaller the better. Only compare interface priority. Compare device priority. Only compare interface numbers.

The mac address of the existing switch is shown in the figure. Which of the following statements is correct?. When the switch restarts, the mac address learned by port Eth0/0/2 does not need to be relearned. The data frame with the source mac address of 5489-9885-18a8 and the destination mac address of 5489-989d-1d30 learned from the port is forwarded from the Eth0/0/1 port. The data frame with the source mac address of 5489-9811-0b49 and the destination mac address of 5489-989d-1d30 learned from the port is forwarded from the Eth0/0/2 port. When the switch restarts, the mac address learned by port Eth0/0/3 needs to be re-learned.

As shown in the figure below, all hosts can communicate normally. Which of the following statements is correct? (Multiple Choice). G0/0/3 of SWB learned 2 mac addresses. G0/0/3 of SWA learned 1 mac address. G0/0/3 of SWA learned 2 mac addresses. G0/0/3 of SWA learned 3 mac addresses.

Which of the following statements about the Hybrid port are correct?. Hybrid port can strip off the tags of some vlan frames in the outgoing port direction. When the Hybrid port sends data frames, it must carry the vlan tag. Hybrid port only receives data frames with VLAN tag. Hybrid port does not require PVID.

The function of telnet.read_very_eager in Telnetlib is to read data of non-blocking, usually need to be used with the time module. True. False.

Which of the following are not open interfaces for Huawei network equipment?. RE TCONF. JSON. XML. NETCONF.

For switches running STP protocol, the port can be directly converted to the Disabled state in any state. True. False.

The IPv6 address 2001:ABEF:224E:FFE2:BCCO:CDOO:DDBE:8D58 cannot be abbreviated. True. False.

Using the commands "vlan batch 10 20" and "valn batch 10 to 20", how many VLANs can be created respectively?. 11 and 11. 2 and 2. 11 and 2. 2 and 11.

The second layer switch belongs to the data link layer device, which can identify the mac address information in the data frame, forward data according to the mac address, and record these mac addresses and corresponding port information in its own mac address table. True. False.

In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?. 8192 00-01-02-03-04-CC. 2048 00-01-02-03-04-CC. 4096 00-01-02-03-04-CC. 0 00-01-02-03-04-CC.

If the configured ACL rule has an inclusion relationship, it should be noted that the rule number of the strict condition needs to be sorted first, and the rule number of the loose condition needs to be sorted later, to prevent the packet from hitting the loose condition rule and stop continuing to match, thus make it impossible to hit the strict conditions of the rules. True. False.

. The network administrator configures as shown in the figure on the Huawei router RTA, if a user needs to be authenticated in the authentication domain "huawei", which of the following descriptions is correct? [RTA] aaa [RTA-aaa] domain huawei [RTA-aaa-domain huawei] authentication-scheme au1 [RTA-aaa domain-huawei] authentication-scheme au2. "authentication-scheme au1" authentication will be used. "authentication-scheme au1" authentication will be used, if "au1" is deleted, "au2" authentication will be used. "authentication-scheme au2" authentication will be used, if "au2" is deleted, "au1" authentication will be used. "authentication-scheme au2" authentication will be used.

What is the number range of Layer 2 ACL?. 4000-4999. 2000-2999. 6000-6031. 3000-3999.

If the result of the packet matching ACL is "reject", the packet is eventually discarded. True. False.

Which of the following message types does DHCP contain?. DHCP OFFER. DHCP REQUEST. DHCP ROLLOVER. DHCP DISCOVER.

What is the main role of the DNS protocol?. File transfer. Remote access. Domain name resolution. Mail transmission.

Which of the following protocols is not a file transfer protocol?. FTP. SFTP. HTTP. TFTP.

Only the security policy of WPA2-PSK supports to use TKIP for data encryption. True. False.

Which of the following does not include the advantages of Wi-Fi 6 compared to Wi-Fi 5?. Higher consumption. Higher number of access terminals per AP. Lower transmission delay. Higher bandwidth.

The port number used for CAPWAP control tunnel and data tunnel transmission is the same. True. False.

What is the first operation performed by the FIT AP after obtaining the AC's IP address?. Establish a CAPWAP tunnel. Request a configuration file. Download the configuration file. Upgrade the software version.

Before STA associates with AP, it needs to exchange some messages to obtain SSID, what are thesemessages? (Multiple Choice). Probe Response. Probe Request. Beacon. Discovery.

Based on what concept that the segment routing (SR) is a protocol designed to forward data packets on the network?. Policy routing. Source routing. Routing strategy. Destination routing.

In PPP, when the two ends of the communication detect that the physical link is activated, it will transition from the link unavailability stage to the link establishment stage. At this stage, the link parameter negotiation is mainly carried out through the () protocol. IP. LCP. NCP. DHCP.

SNMP V1 defines 5 protocol operations. True. False.

The management information base (MIB) is a virtual database that only exists on the NMS. True. False.

There is a TTL field in the IP packet header. Which of the following statement about the field is correct?. This field is used for packet loop prevention. This field is used for packet fragmentation. This field is used to indicate the priority of the data packet. The field length is 7 bits.

How many Bytes does the length of the IPv6 basic header is?. 40. 48. 32. 64.

Which field in the IPV6 header is like the TTL field in the IPV4 header?. hop limit. Next header. Traffic class. Version.

The role of telnet.read.all in telnetlib is to read all data until EOF. If the echo does not return EOF, it will block consistently. True. False.

In the SNMP protocol by default, which port number does the agent process use to send alarm messages to the NMS?. 161. 163. 164. 162.

If the MAC address of an interface is 00E0-FCEF-0FEC, then what is the corresponding EUI-64 address?. 00E0-FCEF-FFFE-0FEC. 02E0-FCFF-FEEF-0FEC. 00E0-FCFF-FEEF-0FEC. 02E0-FCEF-FFFE-0FEC.

To query the configuration information of the device ospf protocol, which of the following commands can be used?. Enter the command "display this" in the ospf protocol view. Display current-configuration. Display ospf peer. Dis ip routing-table.

The ARP protocol can resolve the mac address of the target device according to the destination IP address, to realize the mapping between the mac address and the IP address. True. False.

In the VRP interface, use the command startup saved-configuration backup.cfg to configure the backup.cfg file to be used for the next startup. True. False.

Which way does VRP not support router configuration?. Configure the router through the mini USB port. Configure the router via FTP. Configure the router through the console port. Configure the router via telnet.

When routers are running in the same ospf area, which of the following about the description of their LSDB and routing table is correct? (Multiple Choice). The link state database obtained by all routers is the same. All routers get the same routing table. The link state database obtained by each router is different. The routing table of each router is different.

Which of the following statements is correct?. The router works at the network layer. The switch works at the physical layer. The switch works at the network layer. The router works at the physical layer.

After the network administrator uses the Tracert Route function on the router device, what is the value of the protocol field in the IPV4 header of the data packet sent by the router?. 1. 2. 6. 17.

Which of the following protocols are dynamic routing protocols? (Multiple Choice). Direct. static. BGP. OSPF.

The output information of the router is shown in the figure. Which of the following statements is wrong?. The broadcast address corresponding to the Ethernet0/0/0 interface is 10.0.12.255. The physical link of the Ethernet0/0/0 interface is normal. The MTU value of the Ethernet0/0/0 interface is 1480. The IP address of the Ethernet0/0/0 interface is 10.0.12.1/24.

When configuring ospf on a router, what must be configured manually?. Specify the network type of each ospf-enabled interface. Create an ospf zone. Create an ospf process. Configure Router ID.

The following figure shows the routing table of a router. When the router receives a data packet with a destination IP address of 9.1.1.1, the router will forward it according to the route of 9.1.0.0/16 because the mask length of the route is longer. True. False.

If the network address of a network is 10.1.1.0/30, then what is its broadcast address?. 10.1.1.3. 10.1.1.1. 10.1.1.4. 10.1.1.2.

The administrator has configured as shown in the figure on R1, but R1 cannot learn the routes of other routers, so what is the possible reason? (Multiple Choice) [R1] ospf [R1-ospf-1] area 1 [R1-ospf-1-area-0.0.0.1] network 10.0.12.0 0.0.0.255. This router did not announce the network connected to neighbors when configuring ospf. This router is not configured with authentication function, but the neighbor router is configured with authentication function. When this router is configured, the ospf process ID is not configured. The area ID configured by this router is different from the area ID of its neighbor router.

Which type of message is used by network devices running SNMPv1 protocol to actively send alarm information?. Trap. Response. Get-Next Request. Get-Request.

The router running the ospf protocol reaches the FULL state first, and then performs LSDB synchronization. True. False.

Regarding the information as shown in the figure, which of the following is incorrect? [R1] display interface g0/0/0 GigabitEthernet0/0/0 current state: Administratively DOWN Line protocol current state: DOWN. The wrong cable is connected to the GigbitEthernet0/0/0 interface. The GigbitEthernet0/0/0 interface is not configured with an IP address. The GigbitEthernet0/0/0 interface was manually closed by the administrator. GigbitEthernet0/0/0 interface does not enable dynamic routing protocol.

What is the hello message function of ospf? (Multiple Choice). Neighbor discovery. Synchronize the LSDB of the router. Update LSA information. Maintain neighbor relations.

The output information of a router's routing table is shown in the figure. Which of the following statements is correct? (Multiple Choice). The outbound interface of this router to 10.0.0.1 is Ethernet0/0/1. The outbound interface of this router to 10.0.0.1 is Ethernet0/0/0. The outbound interface of this router to 10.0.2.2 is Ethernet0/0/0. The outbound interface of this router to 10.0.2.2 is Ethernet0/0/1.

Regarding the main functions of the router, which of the following statement is incorrect? (MultipleChoice). Guide data forwarding according to the routing table. Establish routing tables through multiple protocols. Realize mutual communication between devices on the same network segment. Forwarding according to the source IP address of the received data packet.

f the Ethernet data frame Length/type=0x0806, which of the following statement is correct? (Multiple Choice). The destination mac address of this data frame may be FFFF-FFFF-FFFFF. This data frame is Ethernet II frame. The source mac address of this data frame must not be FFFF-FFFF-FFFFF. This data frame is an IEEE802.3 frame.

In the network shown in the figure, which of the following descriptions is correct? (Multiple Choice). The network between RTA and SWC is the same conflict domain. The network between SWA and SWB is the same broadcast domain. The network between SWA and SWC is the same conflict domain. The network between SWA and SWC is the same broadcast domain.

All switches in the figure below have the STP protocol enabled. Assuming that the path cost value of all ports is 200, what is the root path cost value contained in the configuration BPDU message received by the G0/0/4 port of SWD?. 600. 200. 0. 400.

As shown in the figure, the switch runs STP with default parameters, which of the following ports will be elected as the designated port?. G0/0/1 port of switch A. HUB's G0/0/1 port. HUB's G0/0/2 port. G0/0/2 port of switch A.

The network administrator has captured a data frame on the network, and its destination MAC address is 01-00-5E-A0-B1-C3. Which of the statement about the mac address is correct?. It is a multicast MAC address. It is a unicast MAC address. It is an illegal MAC address. It is a broadcast MAC address.

As shown in the figure below, all hosts can communicate normally, so what is the correct correspondence between the MAC address and the port in the MAC address table of the SWB?. MAC-A G0/0/1 MAC-B G0/0/2 MAC-C G0/0/3. MAC-A G0/0/2 MAC-B G0/0/2 MAC-C G0/0/3. MAC-A G0/0/3 MAC-B G0/0/3 MAC-C G0/0/1. MAC-A G0/0/1 MAC-B G0/0/1 MAC-C G0/0/3.

The priority of the LACP protocol is shown in the figure. Switch A and Switch B adopt LACP mode link aggregation, and all interfaces are added to the link aggregation group. At the same time, set the maximum number of active ports to 3, then which port of Switch A is not Active port?. G0/0/0. G0/0/1. G0/0/2. G0/0/3.

Which of the following stages is not included in the process of PPPoE session establishment and termination?. Discovery stage. Data forwarding stage. Session stage. Session termination stage.

Which of the following parameters need to be considered when electing the root port in STP? (Multiple Choice). The mac address of the port. Port priority. Port slot number, such as G0/0/1. Duplex mode of the port. The cost of the port reaching the root switch.

As shown in the figure below, the router uses a sub-interface as the host gateway and the gateway IP address is 10.0.12.2. Which of the following commands can achieve this requirement? (Multiple Choice). interface GigabitEthernet0/0/0.20 dot1q termination vid 10 Ip address 10.0.12.2 255.255.255.0 arp broadcast enable. interface GigabitEthernet0/0/0.10 dot1q termination vid 10 Ip address 10.0.12.2 255.255.255.0 arp broadcast enable. interface GigabitEthernet0/0/0.20 dot1q termination vid 20 Ip address 10.0.12.2 255.255.255.0 arp broadcast enable. interface GigabitEthernet0/0/0.10 dot1q termination vid 20 Ip address 10.0.12.2 255.255.255.0 arp broadcast enable.

Which of the following statements about the election of the active end in link aggregation LACP mode is correct? (Multiple Choice). Compare interface numbers. The smaller the priority value has priority, if the same, compare the device MAC, the smaller the better. The device with a small system priority value is used as the active end. The device with a small MAC address acts as the active end.

If the value of the type/Length field of an Ethernet data frame is 0x0800, the length of the upper layer message header carried by this data frame is in the range of 20-60B. True. False.

The IP address of the VLANIF interface of the same switch cannot be the same. True. False.

Which of the following commands configures the authentication mode as HWTACAS authentication?. authentication-mode hwtacacs. authentication-mode none. Authorization-mode hwtacacs. Authorization-mode local.

The host uses the IP address 192.168.1.2 to access the Internet through NAT. True. False.

Layer 2 ACL can match information such as source MAC, destination MAC, source ip, destination IP. True. False.

Which of the following statements about the S field in the MPLS packet header are correct? (Multiple Choice). The S bit exists in every MPLS packet header. It is used to mark whether there are other labels behind this label, 0 means yes, 1 means no. The S bit has only 1 bit in the frame mode and 2 bits in the cell mode. It is used to mark whether there are other labels behind this label, 1 means yes, 0 means no.

Which of the configurations in the following options belong to the second-layer acl? (Multiple Choice). rule 25 permit source 192.168.1.1 0.0.0.0. rule 10 permit 12-protocol arp. rule 25 permit source-mac 0203-0405-0607. rule 25 permit vlan-id 100.

The administrator has configured as shown in the figure on the router, then what kind of IP address can a host connected to the G1/0/0 interface of the router obtain through DHCP?. The IP address obtained by the host belongs to the 10.10.10.0/24 network. The IP address obtained by the host belongs to the 10.20.20.0/24 network. The IP address obtained by the host may belong to the 10.10.10.0/24 network, or it may belong to the 10.20.20.0/24 network. The host cannot obtain an address.

A DHCP server is deployed in the network, but the administrator found that some hosts did not correctly obtain the address specified by the DHCP server. What are the possible reasons? (Multiple Choice). Some hosts cannot communicate with the DHCP server normally, and the client systems of these hosts automatically generate addresses in the range of 172.254.0.0. There is another DHCP server that works more efficiently in the network. Some hosts cannot communicate with the DHCP server normally, and the client systems of these hosts automatically generate addresses in the range of 169.254.0.0. The address pool of the DHCP server has all been allocated.

What is the IEEE802.11 standard corresponding to Wi-Fi6?. IEEE802.11au. IEEE802.11ac. IEEE802.11ax. IEEE802.11at.

WiFi6 actually refers to the IEEE802.11ax standard. True. False.

Which WLAN security policies support the link authentication method of open mode? (Multiple Choice). WPA2-802.1X. WPA. WPA2-PSK. WEP.

There is no channel overlap in the 14 available frequency bands in the 2.4 GHz frequency band. True. False.

When AP and AC are in different three-layer networks, what method is recommended for AP to discover AC?. DNS. Manually specified on AP. DHCP. Broadcasting method.

The data link layer uses ppp encapsulation, and the IP addresses at both ends of the link may not be in the same network segment. True. False.

FIT AP can work independently without relying on AC. True. False.

SNMP messages are carried over UDP. True. False.

The network management system can only view the operating status of the device through the SNMP protocol, but cannot issue the configuration. True. False.

Which of the following types does the IPV6 address contain? (Multiple Choice). Anycast address. Multicast address. Unicast address. Broadcast address.

What is the total length of the IPV6 address in bits?. 64. 96. 128. 32.

When using the SNMPv1 protocol to manage network equipment, which of the following commands is used by the network management system to complete the configuration of the network equipment?. Get-Request. Response. Set Request. Get-Next Request.

Virtualization is the basis for realizing NFV. Which of the following statements about the characteristics of virtualization is correct? (Multiple Choice). Isolation: Virtual machines on the same physical server are isolated from each other. Partitioning: Multiple virtual machines can run on a single physical server at the same time. Encapsulation: All virtual machines share the operating system, and the encapsulation is realized through the command space. Hardware independence: Virtual machine and hardware decoupling, support virtual machine migration between servers.

Regarding the concept of NFV architecture, which of the following is correct? (Multiple Choice). VNFM, virtual network function management, responsible for the life cycle management of VNF. NFVO (NFV Orchestrator) is responsible for business orchestration. MANO is composed of NFVO, VNFM and VIM. VIM (Virtualized Infrastructure Manager) virtual resource management, responsible for the virtualization of infrastructure.

Which of the following commands can modify the device name to huawei?. sysname huawei. rename huawei. do name huawei. hostname huawei.

On the VRP platform, which of the following methods can be used to access the previous history command? (Multiple Choice). Ctrl+P. Up cursor. Ctrl+U. Left curso.

Since the TCP protocol uses a three-way handshake system when establishing a connection and closing a connection, so TCP supports reliable transmission. True. False.

Which of the following types of ACL can match the transport layer port number?. Advanced ACL. Basic ACL. Layer 2 ACL. Intermediate ACL.

In the network shown in the figure below, the router receives a data packet with a destination IP address of 11.0.12.1 from host A. After this data packet is forwarded by the router, what are the destination mac and destination IP respectively?. MAC-D 10.0.12.2. MAC-D 11.0.12.1. MAC-C 11.0.12.1. MAC-B 11.0.12.1.

Which equipment is generally involved in the WLAN deployment plan in the enterprise scenario? (Multiple Choice). AC (Access Controller). AP. PoE switch. CPE.

The routing table is shown in the figure, which of the following statements is correct? (Multiple Choice). The router forwards data packets with a destination IP of 10.0.2.2 from Ethernet0/0/0. The NextHop of the destination network 10.0.3.3/32 is not directly connected, so the router will not forward packets with the destination IP address 10.0.3.3. The router forwards data packets with a destination IP of 10.0.3.3 from Ethernet0/0/0. The router forwards data packets with a destination IP of 10.0.12.1 from Ethernet0/0/0.

In order to detect the connectivity status of the CAPWAP tunnel, after the CAPWAP tunnel is established, which of the following CAPWAP messages is used by the AC for detection? (Multiple Choice). Keepalive. Echo. DPD. Hello.

In the network shown in the figure below, all routers run the OSPF protocol, and the link cost value is as shown in the figure, what is the cost value of the route entry to the network 10.0.0.0/8 in the RTA routing table?. 100. 70. 20. 60.

As shown in the figure below, which of the following statements is correct?. Host A can ping host B successfully. Only when the masks of host A and host B are set to be the same, host A and host B can communicate. The IP address mask b of host A and host B are different, so host A and host B cannot communicate. The broadcast address of host A and host B are the same.

When two 0SPF routers form a 2-WAY neighbor relationship, the LSDB has completed synchronization. True. False.

Which of the following commands to configure the default route is correct?. [huawei] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0. [huawei] ip route-static 0.0.0.0 255.255.255.255 192.168.1.1. [huawei-Serial0] ip route-static 0.0.0.0 0.0.0.0 0.0.0.0. ip route-static 0.0.0.0 0.0.0.0 192.168.1.1.

What kind of state does the OSPF protocol use to indicate that the neighbor relationship has been established?. Completed. Down. 2-way. Attempt.

The network administrator hopes to be able to effectively use the IP address of the 192.168.176.0/25 network segment. Now the company's marketing department has 20 hosts, which of the following address segments is best allocated to the marketing department?. 192.168.176.160/27. 192.168.176.0/25. 192.168.176.96/27. 192.168.176.48/29.

If the network address of a network is 192.168.1.0, then its broadcast address must be 192.168.1.255. True. False.

Access type ports will () when sending messages. Type the PVID information of this port, and then send it out. Send messages with Tag. Strip the VLAN information of the message, and then send it out. Add the VLAN information of the message, and then send it out.

As shown in the figure below, which port of the following switches will be blocked?. G0/0/2 of SWC. G0/0/3 of SWA. G0/0/1 of SWC. G0/0/3 of SWB.

Which of the following port states does not include the RSTP protocol?. Forwarding. Learning. Discarding. Blocking.

The configuration information of a certain port of the switch is shown in the figure, then the PVID of this port is: # interface GigabitEthernet0/0/1 port hybrid tagged vlan 2 to 3 100 port hybrid untagged vlan 4 6 #. 100. 2. 4. 1.

If an Ethernet data frame Length/Type=0×8100, which of the following ports may the data frame be sent from? (Multiple Choice). Trunk port of the switch. Hybrid port of the switch. Access type port of the switch. Serial interface of the router.

The load sharing mode at both ends of the Eth-Trunk may be inconsistent. True. False.

The port in the Discarding state in RSTP will discard the received data frame, but it can maintain the MAC address table according to the data frame received by the port. True. False.

When LACP horizontal mode is used for link aggregation, what is the default system priority of Huawei switches?. 36864. 24576. 4096. 32768.

Regarding the Layer 2 Ethernet switch, which of the following statement is incorrect?. Layer 2 Ethernet switches work at the data link layer. Able to learn MAC address. Need to make certain modifications to the layer 3 header of the forwarded message, and then forward it. Forward according to the Layer 2 header information of the Ethernet frame.

As shown in the figure, the network administrator creates VLAN2 on SWA and SWB, and configures the ports connecting the hosts on the two switches to Access port, which is assigned to VLAN2. G0/0/1 of SWA and G0/0/2 of SWB are configured as Trunk ports, allowing all VLANs to pass. To achieve normal communication between two hosts, also need: Configure G0/0/1 on the SWC as a trunk port and allow VLAN 2 to pass through, set G0/0/2 port as an access port, and set the PVID to 2. Create VLAN2 on SWC, configure G0/0/1 and G0/0/2 as trunk ports, and allow VLAN 2 to pass. Just create BLAN2 on SWC. Configure G0/0/1 on SWC as a trunk port and allow VLAN 2 to pass through.

In the RSTP standard, in order to improve the convergence speed, the port that the switch is directly connected to the terminal can be defined as: Fast port. Root port. Backup port. Edge port.

In a two-layer network with redundant links, which of the following protocols can be used to avoid loops?. VRRP. STP. ARP. UDP.

Which of the following statements about the ACL matching mechanism are correct? (Multiple Choice). If the ACL does not exist, the ACL matching result will be returned as: no match. If the last rule is found and the packet still does not match, the ACL matching result will be returned as: no match. By default, the search starts from the rule with the smallest number in the ACL. Once the rule is matched, the search for subsequent rules is stopped. Regardless of whether the result of a packet matching ACL is "unmatched", "allowed" or "denied", whether the packet is finally allowed to pass or denied is determined by each business module that applies the ACL.

As shown in the figure, a static NAT command is deployed on router R1. When the PC accesses the Internet, the destination address in the data packet will not change. True. False.

What is the main function of the DHCP DISCOVER message?. The server's confirmation response to the REQUEST message. The client is used to find the DHCP server. The client requests configuration confirmation, or renews the lease. The DHCP server is used to respond to the DHCP DISCOVER message, which carries various configuration information.

The administrator has configured the router as shown in the figure. At the same time, the administrator wants to assign a shorter lease period to the DHCP address. Which of the following commands should be used? ip pool pool1 network 10.10.10.0 mask 255.255.255.0 gateway-list 10.10.10.1. Lease 0. Dhcp select relay. Lease day 0 hour 10. Lease 24.

Which of the following IEEE 802.11 standards support working in the 5GHz frequency band? (Multiple choice). 802.11n. 802.11ax. 802.11a. 802.11g.

The configuration of the country code will affect the frequency used for actual transmission and the maximum transmission power. True. False.

Which of the following types of ACLs cannot match the network layer information?. Basic ACL. Layer 2 ACL. User ACL. Advanced ACL.

What kind of message does the OSPF protocol use to describe its LSDB?. DD. LSR. LSU. HELLO.

Which of the following IPv4 addresses the host uses cannot directly access the Internet?. 50.1.1.1. 10.1.1.1. 100.1.1.1. 200.1.1.1.

As shown in the figure below, which of the following statement is correct? (Multiple choice). The broadcast address of host A and host B are the same. Host A can ping host B. Host A and Host B cannot obtain each other's MAC address. The following entry 10.0.12.5 MAC-B exists in the ARP cache of host A.

A gateway must be configured for a host to communicate with other hosts. True. False.

Which of the following statements about MPLS Label is wrong?. The label is carried by the header of the message and does not contain topology information. The label is encapsulated between the network layer and the transport layer. The label is used to uniquely identify the forwarding equivalence class FEC to which a packet belongs. The label is a short identifier with a fixed length and only local meaning.

The basic header length of an IPv6 message is a fixed value. True. False.

In the network shown in the figure below, all links are Ethernet links, and all interfaces of all routers run OSPF protocol, how many DRs are elected in the entire network?. 1. 2. 4. 3.

A gateway must be configured for a host to communicate with other hosts. True. False.

The host uses the stateless address automatic configuration scheme to obtain the IPv6 address, and cannot obtain the DNS server address information. True. False.

::1/128 is the IPv6 loopback address. True. False.

In order to distinguish different users and provide different network services on the AP, which of the following can be configured?. VAP. WAP. VAC. VT.

The DHCP OFFER message can carry DNS address, but it can only carry one DNS address. True. False.

Regarding the corresponding relationship between the number and type of the access control list, which of the following descriptions is correct? (Multiple choice). The number range of advanced access control list is 3000-3999. The access control list number range of the second layer is 4000-4999. The number range of the interface-based access control list is 1000-2000. Based on the access control list number range is 1000-2999.

Which two stages can the PPPoE session establishment process be divided into? (Multiple choice). Discovery stage. PPPoE Session stage. PPP connecting stage. DHCP stage.

How many bytes is the total length of the VLAN frame format defined by IEEE802.1Q. 4. 3. 2. 1.

The RSTP protocol uses the P/A mechanism to speed up the speed at which the upstream port turns to the Forwarding state, but there is no temporary loop appeared, what is the reason?. Ensure that there will be no temporary loops through the synchronization mechanism. Shorten the time of Forward Delay. Speed up port role election. Introduced edge ports.

There is no need to write a hop when writing static routes at both ends of the PPP link. The Ethernet link needs. True. False.

Users cannot configure VLAN ID. to 0. (). True. False.

Refer to the single-arm routing configuration in the figure below, it can be judged that even if the ARP proxy is not enabled on the sub-interface of R1, the administrative department and the financial department can communicate with each other. True. False.

Which of the following working modes are supported by Huawei enterprise APs? ()*. Cloud. FAT. FIT. Local.

Which of the following descriptions about the switch is wrong?. Switches generally work at the data link layer. The switch can provide network access services for terminal devices (PC/server). The switch is generally used as the export equipment of the network. The switch can complete the exchange of data frames.

There is no channel overlap in the 14 available frequency bands in the 2.4GHz frequency band. True. False.

By default, the lease period for the DHCP server to assign an IP address is?. 24. 12. 1. 18.

When adopting LACP mode for link aggregation, what is the default system interference level of Huawei switches?. 24576. 36864. 4096. 32768.

The following rules exist in an ACL of a router. Rule deny top source192.168.1.0 0.0.0.255 destination 172.16.10.1 0.0.0.0 destination-port eq 21 is the correct statement?. Rule sourceIP is 192.168.1.1, the destination IP is 72.16.10.3, and all TCP packets with the destination port number of 21 match this rule. The type of ACL is basic ACL. sourceIP is 192.168.1.1, destination P is 172.16.10.1, and all TCP packets with destination port number 21 match this rule. The source IP is 192.168.1.1, the destination IP is 172.16.10.2, and all 1CP packets whose destination port number is 21 match this rule.

The switch receives a unicast data frame. If the destination MAC of the data frame can be found in the MAC surface, the data frame will be forwarded from the corresponding port of the MAC. True. False.

How many port states does the RSTP protocol have?. 1. 3. 4. 2.

The ACL on AR G3 series routers supports two matching sequences. Configuration order and automatic sorting. True. False.

The following statement about the main functions of the router is wrong. Realize the mutual communication between the same network disconnection equipment. Establish routing table through multiple protocols. According to the source of the received packetIP address for forwarding. Guide data forwarding according to the routing table.

How many types of data flows with different service levels can be marked based on MPLS labels?. 8. 16. 2. 4.

If the administrator wants to completely delete the old device configuration file, the following command is correct. reset config.zip. clear config.zip. delete /force config.zip. delete /unreserveD.config.zip.

In the PPPoE discovery stage, the PPPoE server assigns a session-id to the PPPoE client in which packet?. PADI. PADO. PADR. PADS.

NAPT allows for multiple internal addresses to be mapped to a single public address. How does NAT distinguish between the different private addresses when mapping to the same public address?. The source MAC address is used. The destination MAC address is used. The source port number is used. The destination port number is used.

The MPLS label header is encapsulated between the data link layer header and the network layer header of the message. True. False.

Which of the following commands can be used to view the router's CPU usage?. display cpu-usage. display memory. display cpu-state. display interface.

SNMP consists of which of the following parts? (Multiple choice). Managed objects. Network Management System. Management Information Base. Agent process.

In the VRP interface, use the command delete vrpcfg.zip to delete a file. The file must be emptied in the recycle bin to completely delete the file. True. False.

A network administrator of a company wants to uniformly divide users who often access the company network from different switches to VLAN 10 due to frequent changes of office locations. Which of the following methods should be used to divide VLANs?. Divide VLAN based on protocol. Divide VLAN based on MAC address. Divide VLAN based on port. Divide VLAN based on subnet.

In port aggregation, “multiple” ports are aggregated to form a port aggregation group so that all the member ports in the group share the outgoing/incoming load. At which layer is port aggregation implemented?. Physical Layer. Data Link Layer. Network Layer. Transport Layer.

What is the mode for AP to obtain the version from AC to upgrade? (Multiple choice). FTP mode. SFTP mode. TFTP mode. AC mode.

Which of the following commands can be used to check the session status of the PPPoE client?. display pppoe-client session packet. display pppoe-client session summary. display ip interface brief. display current-configuration.

In the network as shown in the figure, the administrator hopes that all hosts cannot access the Web service (port number is 80), and other services are normally accessed, so in the interface configuration of G0/0/1, which ACL rule needs to be bound to traffic-filter outbound?. acl number 3000 rule 5 deny tcy destination-port eq www rule 10 permit ip. acl number 3001 rule 5 deny udp destination-port eq www rule 10 permit ip. acl number 3002 rule 5 permit ip rule 10 deny tcp destination eq www. acl number 3003 rule 5 permit ip rule 10 deny udp destination eq www.

What modes are supported by device link aggregation? (Multiple choice). Manual load sharing mode. Manual active/standby mode. Mixed mode. LACP mode.

Which of the following advantages is/are inter-VLAN route interworking in one-arm routing mode?. Reduced the number of links. Reduced the use of IP addresses. Reduced the number of devices. Reduced the number of entries in the routing table.

Network Functions Virtualization (NFV) implements software-based network application deployment. True. False.

Which of the following IPv4 addresses can be used by a host to directly access the Internet?. 10.255.255.254/24. 172.32.1.1/24. 192.168.1.1/24. 172.16.255.254/24.

Refer to the following IP routing table on the router R1. If R1 sends a data packet with the destination IP address 10.0.2.2, which of the following interfaces will R1 use to send the packet?. GigabitEthernet0/0/0. Ethernet0/0/0. Ethernet0/0/1. Ethernet0/0/2.

What is the protocol number of OSPF at the network layer?. 0. 1. 6. 89.

In the OSPF broadcast network, which routers will a D Rother router exchange link state information with? (Multiple choice). BDR. All OSPF neighbors. DR Other. DR.

The broadcast address of the 192.168.1.0/25 network segment is 192.168.1.128. True. False.

Which fields in the IPv4 header are related to fragmentation? (Multiple choice). Flags. TTL. Identification. Fragment Offset.

The last option field of IPv4 is variable-length optional information. What is the maximum length of this field?. 10B. 40B. 60B. 20B.

Which of the following fields is not included in the OSPF Hello packet?. Hello Interval. Neighbor. Network Mask. sysname.

VLAN 4095 is reserved for system use and VLAN 1 cannot be deleted on Huawei switches. True. False.

The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments. True. False.

Assuming that OSPF has been enabled on all routers in the following figure, which router is the BDR on this network?. Router A. Router B. Router C. Router D.

Which of the following statements about the functions and packet encapsulation of the ARP protocol is true?. The ARP cache on a network device can be obtained only through the ARP protocol. The MAC address and UUID of the destination device can be obtained through ARP. ARP can be deployed on PPP and HDLC links. ARP packets are encapsulated over Ethernet.

An authenticator router has been configured with two domains named “Area1” and “Area2”, following which a user is created with the username “huawei” and the password “hello” for authentication. Which domain does this user belong to?. Area1 domain. Area2 domain. default domain. default_admin domain.

IPv6 uses NS and NA packets to perform duplicate address detection (DAD). True. False.

A network requires a solution to allow 50 private IP addresses to be translated, however only a single public address is available for use. Which translation method can be used to support this requirement?. Static NAT. Dynamic NAT. Easy-IP. NAPT.

Which of the following are routed protocols?. IP. OSPF. BGP. IPX.

Which of the following problems are caused by routng loops?. Slow convergence. Packets circulate between routers. Router restarting. Inconsistency of routing information.

Which of the following packet type is used by OSPF to maintain neighbor relationships. LSR. LSU. HELLO. DD.

The Versatile Routung Plataform (VRP) uses the file system to manage and directories on a device. Which of the following commands can be used to check the current directory of a device. pwd. Is. dir. display dir.

Which os the following is not a method for an AC address?. Broadcast. DNS. Static configuration. DHCP. OSPF.

Which of the following statements about STP and RSTP is false?. RSTP is backward compatible with STP. There are three RSTP port state: Forwarding, Learning, and Blocking. Three are five STP port states: Forwarding, Learning, Listening, Blocking, and Disabled. RSTP converges faster than STP.

Which of the following statements about BPDUs in STP is false. BPDUs are classified ionto configuration BPDUs and TCN BPDUs. Configuration BPDU contains parameters such as the bridge ID, path cost and port ID. TCN BPDUs are trigged only when the network topology change. When the network topology becomes stable, all switches proactively send configuration BPDUs.

In contrast with SNMPv1, which of the following operations are newly added to SNMPv2c?. GetBulkRequest. SetRequest. GetNextRequest. InformRequest.

A WLAN is constructed using wireless technologies. Which of the following are wireless network types based on the application scope. WPAN. WMAN. WWAN. WLAN.

The Domain Name System (DNS) protocol is used to resolve domain names to IP addresses. Which of the following elements constitute a complete domain name. Root domain name. Host name. Second-level domain nave. Top-Level domain name.

PPP over Ethernet (PPPoE) is a link layer protocol that encapsulates PPP frames into Ethernet frames. Which of the following statements about PPPoE are true?. PPPoE session establishment involves three stages: PPPoE discovery, Session, and Termination. PPPoE is often used by home user and enterprise users to dial up for internet access. PPPoE client can terminate a PPPoE session in unicast mode. PPPoE client broadcast a request for the required service information.

Which of the following are the advantages of a VLAN. Improves Network robustness. Limits boadcast domains. enhances LAN security. Felibly contructs virtual workgroups.

In OSPF, which of the following network type require the election of a DR and BDR. P2P. BMA. NBMA. P2MP.

Which of the following are possible causes for an AP´s Failure to go online. The AC version does not match the AP version. PoE parameteres are incorrectly configured on the Poe switch to which the AP is connected. the link between the AC and AP is not stablished. Network cables are not properly connected.

In the Wlan network architecture, ACs can be connected in in-path or off patch mode. True. False.

SNMP is a standards-based network management protocol widely used on TCP/IP networks. It provides a method for managing NEs through a central computer that runs network management software, that is, a network management station (NMS). An SNMP NMS and SNMP agent communicate with each other through the TCP protocol. True. False.

After receiving a tagged frame from the peer device, an access port of a switch checks the VLAN ID of the frame. If the VLAN ID is the same as PVID of this port, the port accepts the frame and removes the tag from the frame. True. False.

AAA is short for authentication, authorization, and application. True. False.

TFTP uses TCP to transfer files, and the default server port number is 21. True. False.

Specific routes can be summarized into a summary route only when they have the same next-hop address. True. False.

As every two nodes in a full-mesh network are connected using cables, each node requires a large number of physical ports and connection cables, resulting in relatively high costs. True. False.

A hybrid port on a switch can connect to either a user host or a port on another switch. True. False.

Before sending an IPv6 packet, an interface performs the following operations in this order: address configuration, address resolution, and duplicate address detection (DAD). True. False.

When a static route is configured on a router, the specified next-hop address must be an address on the directly connected network. True. False.

Mastering the basic operations of the file system is crucial for network engineers to efficiently manage the configuration files and VRP system files of devices. Which of the following statements is true about these files?. configuration file stores configuration commands. The common file name extension is .cc. System software is mandatory for device startup and running. The common file name extension is .cfg. patch file is a type of software compatible with the system software. The common file name extension is .zip. PAF file effectively controls product features and resources. The common file name extension is .bin.

Which of the following statements about edge ports is false?. In most cases, edge ports are directly connected to user terminals. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state. If an edge port receives a configuration BPDU, it becomes a common STP port. In normal situations, an edge port cannot receive configuration BPDUs.

Which of the following statements about static and dynamic routes are true?. Static routes have low requirements on the system and are applicable to simple, stable, and small-sized networks. When creating a static route, you must specify both the outbound interface and next hop. Dynamic routing protocols can be classified into distance-vector routing protocols and link-state routing protocols based on their working mechanism and routing algorithms. Dynamic routing protocols can automatically discover and generate routes and are more suitable for large-scale networks.

What is the length range of an Ethernet frame?. 64 to 1500 byte. 46 to 1518 byte. 64 to 1518 byte. 46 to 1500 byte.

What command can be typed in the system view to switch to the user view?. quit. user-view. souter. exit.

ACLs are used to match and distinguish packets. Which of the following information can be used to define ACL rules?. VLAN ID. Source and destination IP addresses of IPv4 packets. Source and destination MAC addresses. Protocol type of Ethernet frames.

A router can advertise default routes in an OSPF area. Which of the following statements about OSPF default route advertisement are false?. The preference of the advertised default route in the routing table is 10. If there is no default route on the local device, the default-route-advertise always command can be run to advertise a default route in an OSPF area. After learning the default route advertised by the router, other routers in the same OSPF area as the router must add this route to their routing tables. The default-route-advertise command can be used to advertise a default route in an OSPF area only when the default route exists on the local device.

Which of the following is not included in the MAC address table?. Port number. IP address. Vlan. MAC address.

NTP is a network protocol used to synchronize computer clocks with an NTP server. Which of the following statements about NTP is false?. NTP packets are transmitted through UDP. The master time server directly synchronizes with the standard reference clock through cables or radio signals. The stratum indicates the hierarchy for clock synchronization. The value 1 indicates the highest clock precision. NTP is a network layer protocol in the TCP/IP protocol suite.

SNMP is used to manage network devices. Refer to the following SNMP configuration on a Huawei device. Which of the following statements is false? [~HUAWEI] display current-configuration | include snmp snmp-agent snmp-agent local-engineid 800007DB03001974593301 snmp-agent sys-info version v3 snmp-agent mib-view included iso-view iso snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view iso-view snmp-agent usm-user v3 v3user snmp-agent usm-user v3 v3user group v3group snmp-agent usm-user v3 v3user authentication-mode sha cipher %^%#&Ygn:NzQw;d>f=2+aJ;;=B\lM^"P1Hf/{L$F9UW@%^%# snmp-agent usm-user v3 v3user privacy-mode aes256 cipher %^%#Gc!*FAB;vL5_[a#9q9i7:*Ij;q#<P8MOf8@PJMJ0%^%#. The v3user user can access nodes in the subtree with iso as the root node. SNMPv3 is configured. The encryption mode of the v3user user is SHA. SNMP packets will be encrypted using AES256.

The process for an AP to go online is as follows: The AP sends a Join Request packet to an AC, which then authenticates the AP after receiving the packet. The AP gets managed after being successfully authenticated. Which of the following AP authentication methods is not supported by an AC?. Serial number authentication. Non-authentication. Password authentication. MAC address authentication.

Which of the following statements are false about the forwarding behavior of access ports on a switch?. When an access port of the switch receives a data frame carrying the same tag as the default VLAN ID of the port, the port accepts the frame. When an access port of the switch receives an untagged data frame, the port adds its default VLAN ID to the frame. When an access port of the switch sends an untagged data frame, the port adds its default VLAN ID to the frame. When an access port of the switch receives a data frame carrying the same tag as the default VLAN ID of the port, the port discards the frame.

Denunciar Test