0% found this document useful (0 votes)
47 views38 pages

Hcia Sets Exam 1 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views38 pages

Hcia Sets Exam 1 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

MOCK EXAM

True or Fales
Frames transmitted on the trunk link between switches are all tagged.
Fales

Static routes and OSPF routes can form equal-cost routes.


False

Segment routing (SR) can be deployed with or without controllers.


True

In the WLAN network architecture, ACs can be connected in in-path or off-path mode.
True

A hybrid port on a switch can connect to either a user host or a port on another switch.
True

Before sending an IPv6 packet, an interface performs the following operations in this order:
address configuration, address resolution, and duplicate address detection (DAD).
False

Network design and planning is the first phase of campus network construction.
True

Specific routes can be summarized into a summary route only when they have the same next-hop
address.
True

In an OSPF AS, a router can function as both an ABR and an ASBR.


True

During IP packet forwarding, the last-hop router forwards packets using the direct route.
True

WLAN technology enables transmission of information by radio waves over the air. Currently,
the 2.6 GHz and 5 GHz frequency bands are used.
False

Segment routing (SR) provides an innovative traffic steering method. It divides a network path
into segments and allocates segment IDs (SIDs) to these segments. The segments and nodes are
sequentially arranged into a segment list to form a forwarding path.
True
Python can run in both interactive mode and non-interactive (script) mode.
True

When two static routes work as the primary and backup routes, the preference of the backup
route can be changed to the same as that of the primary route so that the two routes become
equal-cost routes.
True

As every two nodes in a full-mesh network are connected using cables, each node requires a
large number of physical ports and connection cables, resulting in relatively high costs.
True

Software-defined networking (SDN) is a new type of network architecture originally proposed by the
Clean State research team at Stanford University. SDN has three characteristics:
forwarding-control separation, centralized control, and open programmable interfaces.
True

FTP is a file transfer protocol and works in active or passive mode.


True

The PVID of a trunk port on a switch may not be the ID of a VLAN that is allowed for the port.
True

AAA is a short for authentication, authorization, and application.


False

TFTP uses TCP to transfer files, and the default server port number is 21
False

52. In STP, a non-root-bridge switch can have two root ports.


Answer: False

53. The precision of telemetry-based traffic statistics collection can be measured in milliseconds.
Answer: False

55. After receiving a tagged frame from the peer device, an access port of a switch checks the VLAN
ID of the frame. If the VLAN ID is the same as PVID of this port, the port accepts the frame and
removes the tag from the frame.
• False

59. A blackhole route (or null route) can prevent routing loops.
• True
Multiple choice single answer
What is the valid VLAN ID range?
Answer: 1 to 4094

As shown in the following networking, the interfaces connecting R1, R2, R3, and R4 are running
OSPF, and are all area 0. On R1, a static route to the network segment 10.1.34.0/24 is
configured using the ip route-static 10.1.34.0.24 10.1.13.32 command. Which of the following
statement is true?
Answer:
The routing table of R1 contains only the OSPF route to the network segment
10.1.34.0/24, and the next hop of the route is 10.1.13.32.

Which of the following port numbers is used by the Telnet protocol?


Answer:
23.

The establishment of an OSPF adjacency between devices involves four steps. Which of the
following statements about these steps is true?
Answer:
The devices establish bidirectional neighbor relationships, negotiate the master/slave
relationship, exchange LSAs, update LSAs, and synchronize their LSDBs.

How many bytes does an MPLS label contain?


Answer: 4 bytes

In which of the following modes are DHCP Discover messages sent?


Answer: Broadcast

OSPF has multiple types of protocol packets. These packets play different roles in the interaction
between OSPF routers. Which of the following packets describes summary information about
the local LSDB and is used to synchronized the LSDBs of two routers?
Answer: DD packet

OSPF authentication enables a device to encrypt OSPF packets by adding an authentication field to
the packets, ensuring network security. Which of the following statements about OSPF
authentication is false?
Answer: The authentication modes of two OSPF neighbors must be the same, that is, both of
them either use interface authentication or use area authentication.

Which of the following is not a method for an AP to discover an AC address?


Answer: OSPF
Which of the following statements is false about Control and Provisioning of Wireless Access
Points (CAPWAP)?
Answer: CAPWAP is an application layer protocol based on TCP

In the same Ethernet network segment, five routers are running OSPF for interconnection.
When the protocol status of all routers is stable, which of the following statements is true?
Answer: The neighbor status of a router on the network can only be Full or 2-way.

In STP, which of the following values cannot be set as the bridge priority?
Answer:22528.

IPv6 addresses can be classified into three types based on IPv6 address prefixes. Which of the
following is not an IPv6 address type?
Answer: Broadcast address.

NTP is a network protocol used to synchronize computer clocks with an NTP server. Which of
the following statements about NTP is False?
Answer: NTP is a network layer protocol in the TCP/IP protocol suite.

Refer to the following configuration on a switch:


[huawei]vlan batch 2 to 9 10
Which of the following statements is true about this command?
Answer:
VLANs 2 to 10 will be created on the switch.

16.Which of the following lists the correct protocol layers of the TCP/IP reference model from
bottom to top?
Answer:
Physical layer, data link layer, network layer, transport layer, and application layer.

Dynamic routing protocols can be classified into Interior Gateway Protocol (IGP) and Exterior
Gateway Protocol (EGP) according to their working area. Which of the following protocols is an
EGP?
Answer:
BGP

The MAC address table of a switch is as follows:


00-01-02-03-04-AA G0/0/1
00-01-02-03-04-CC G0/0/3
A data frame with the destination MAC address 00-01-02-03-04-BB is received on on G0/0/3.
How does the switch process the two data frames?
Answer:
Floods the first frame and discards the second frame.
In the TCP/IP reference model, network layer protocols are responsible for sending packets from
the source host to the destination host. which of the following protocol is not network layer
protocol
answer
PPP

Network Address Translation (NAT) translates the IP address in an IP packet header into another
IP address. Which of the following is not an advantage of NAT?
Answer: Implementing accurate identification and control of packet flows on networks to
control network access behavior, prevent network attacks, and improve network bandwidth
efficiency.

Which of the following statements about STP and RSTP is false?


Answer: There are three RSTP port states: Forwarding, Learning, and Blocking.

The Network Configuration Protocol (NETCONF) provides a mechanism for managing network
devices. Which of the following statements about NETCONF is false?
Answer: NETCONF messages are formatted using either JSON or XML.

An AC manages and controls APs in a centralized manner through CAPWAP tunnels. An AP sends a
Discovery Request packet to find an available AC. Which of the following method cannot be used by
AP to discover AC?
Answer: Multicast

Refer to the following AAA configuration on a device. Which of the following statements is true?
[R1-aaa] display this
[V200R003C00]
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default domain default
domain default_admin
local-user Huawei password cipher %$%$m]GrHmJ1mL[7&zCh^XQBUII]%$%$
Local-user Huawei privilege level O
Local-user Huawei service-type telnet
#
Answer: The authentication mode is local authentication.

Python can be used to implement automatic network deployment, operation, and maintenance,
reducing the dependence on human resources. This resolves the problems with traditional network
O&M. Which of the following statements about Python is false?
Answer: Two forward slashes (//) can be used to mark a single-line comment.
The following shows partial OSPF neighbor information for a specific router:
OSPF Process 1 with Router ID 10.1.1.3
Neighbors
Area 0.0.0.0 interface 10.1.1.3 (GigabitEthernet0/0/0/O)'s neighbors
Router ID: 10.1.1.1
Address: 10.1.1.1
State: Full Mode:Nbr is
Slave Priority:1
DR: 10.1.1.5
BDR: 10.1.1.1
MTU: 0
Dead timer due in 35 sec
Retrans timer interval: 5
Neighbor is up for 00:02:01
Authentication Sequence: [0]
Which of the following statement is false?
Answer: The router is the slave in the master-slave relationship.

Which of the following states that the neighbor relationship is stable between OSPF-enabled DR-
other routers on a broadcast network?
Answer: Two-way

Which of the following statements is true about APs in WLAN networking?


Answer: Typically, APs use PoE power to facilitate deployment.

A WLAN is constructed using wireless technologies. Which of the following statements about the
WLAN networking is false?
Answer: A virtual access point (VAP) is a service entity virtualized on an AP. All VAPs virtualized
on the same AP has the same BSSID.

Which of the following statements about BPDUs in STP is false?


Answer: When the network topology becomes stable, all switches proactively send
configuration BPDUs.

Which of the following is not a valid port role in RSTP?


Answer: Forwarding port

Which of the following commands can be used to check OSPF LSDB information on a Huawei
device?
Answer: display ospf Isdb
Refer to the following ACL configuration on a device.Which of the following statements is true?
Time-range satime 08:00 to 17:30 working-day
#
acl number 3002
rule 5 permit ip source 10.164.2.0 0.0.0.255
destination 10.164.9.9 0.0.0.255 time-range satime
Answer: The ACL rule takes effect only on working days.

Which of the following packet types is used by OSPF to maintain neighbor relationships?
Answer: Hello

The Versatile Routing Platform (VRP) uses the file system to manage files directories on a
device.Which of the following commands can be used to check the current directory of a device?
Answer: pwd

SNMP is used to manage network devices. Refer to the following SNMP configuration on a Huawei
device. Which of the following statements is false?
[~HUAWEI] display current-configuration | include snmp
snmp-agent
snmp-agent local-engineid 800007DB03001974593301
snmp-agent sys-info version v3
snmp-agent mib-view included iso-view iso
snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view
Iso-view
snmp-agent usm-user v3 v3user
snmp-agent usm-user v3 v3user group v3group
snmp-agent usm-user v3 v3user authentication-mode sha cipher
%^%#&Ygn:NzQw;d>f=2+aJ;=B\IM^"P1Hf/{L$F9UW@%^%#
Smp-agent usm-user v3 v3user privacy-mode aes256 cipher
%^%#Gc!*FAB;vL5_[a#9q9i7:*lj;q#<P8MOf8@PJMJ0%^%#
Answer: The encryption mode of the v3user user is SHA

Which is the most widely used VLAN assignment method?


Answer: Interface-based VLAN assignment

The Point-to-Point Protocol (PPP) is a common data link layer protocol for wide area networks
(WANs). Which of the following statements about PPP is false?
Answer: The establishment of a PPP link goes through three phases: link layer negotiation,
network layer negotiation, and authentication.

The Domain Name System (DNS) protocol is used to resolve domain names to IP addresses.
Which of the following statements about DNS is false?
Answer: DNS supports traversal query
Refers to the following configuration on a Huawei router.
‹huawei>system-view
[huawei]user-interface maximum-vty 7
Which of the following statements is true?
Answer: The router allows a maximum of seven users to log in concurrently through Telnet

If the PVID of a trunk port on a switch is 10 and the port trunk allow-pass vlan 7 9 command is
configured on the port, which of the following statements is true?
Answer: Data frames of VLANs 1,7, and 9 can be transmitted on a trunk link.

An IPv6 address is 128 bits long. Typically, an IPv6 address is represented by eight groups of
16-bit hexadecimal values separated by colons (:). Which of the following statements about IPv6
addresses is false?
Answer: Each IPv6 interface must have a unique local address (ULA).

The process for an AP to go online is as follows: The AP sends a Join Request packet to an AC, which
then authenticates the AP after receiving the packet. The AP gets managed after being successfully
authenticated. Which of the following AP authentication method is not supported by an AC?
Answer: Password authentication

OSPF is configured on RTA, RTB, and RTC. GigabitEthernet 0/0/0 interfaces of these routers belong
to area 0 and the network types of these interfaces are broadcast. The router ID of RTA is 1.1.1.1,
and the DR priority of GigabitEthernet 0/0/0 on RTA is set to 0. The router ID of RTB is
2.2.2.2, and the DR priority of GigabitEthernet 0/0/0 on RTB is set to 225. The router ID of RTC is
3.3.3.3, and the DR priority of GigabitEthernet 0/0/0 on RTC is the default value.
Which of the following statements is true about the DR and BDR on the network?
Answer: RTB functions as the DR, and RTC as the BDR.

The ping and tracert commands are used to check the network status. Which of the following
statements about the ping and tracert commands is false?
Answer: The ping-s source-ip-address destination-ip-address command is used to specify the
source and destination IP addresses of ICMP Echo Request packets

What is the network ID for the IP address 192.168.1.1/29


Answer: 192.168.1.4

A router has the following four specific routes:


ip route-static 10.1.20.0 24 12.1.1.2
ip route-static 10.1.21.0 24 12.1.1.2
ip route-static 10.1.22.0 24 12.1.1.2
ip route-static 10.1.23.0 24 12.1.1.2
To summarize these specific routes, which of the following commands should be run?
Answer: ip route-static 10.1.22.0 24 12.1.1.2
Destination/Mask Proto Pre Cost Flags NextHop Interface
172.16.1.0/24 OSPF 10 200 D 192.168.1.2 GigabitEthern et0/0/0
172.16.0.0/16 Static 5 0 RD 192.168.1.2 GigabitEthernet0/0/0
172.16.1.0/22 Static 80 0 RD 192.168.1.2 GigabitEthernet0/0/0
When data needs to be sent to the destination 172.16.1.1 through this router, which of the
The following shows the routing table of a specific router: following routes is used?
Answer: OSPF route 172.16.1.0/24 with a preference of 10 and cost of 200

Multiple Choice multiple answer


Which of the following statements about IP addresses and MAC addresses are true?
Answer:
-IP addresses are assigned based on the network topology.
-MAC addresses are unchangeable.
-MAC addresses are assigned based on vendors

Which of the following statements about Layer 2 hybrid ports are true?
Answer:
1. After receiving a tagged frame on a link, a Layer 2 hybrid port checks whether the VID in the tag of
the frame is in the tagged or untagged VLAN ID list. If not, the port discards the frame.
2. When a tagged frame needs to be sent from a Layer 2 hybrid port of a switch and the VID in the
tag of the frame is in the untagged VLAN ID list, the port removes the tag from the frame and then
sends the untagged frame out on the link.
3. When a tagged frame needs to be sent from a Layer 2 hybrid port of a switch and the VID in the
tag of the frame is in the tagged VLAN ID list, the port sends the frame out on the link without
removing the tag from the frame.

ACLs are used to match and distinguish packets. Which of the following information can be used to
define ACL rules?
Answer: ABCD

Network Address Translation (NAT) translates the IP address in an IP packet header into another
IP address. Which of the following methods can implement NAT?
Answer: ABCD

Which of the following parameters can be specified when an administrator configures an advanced
ACL?
Answer:
-Source and destination IP addresses
-Source and destination MAC address
-ICMP protocol type
Which of the following statements about collision domains and broadcast domains are true?
Answer: ABCD

Which of the following statements about OSPF areas are true?


Answer: ABCD

Which of the following are IPv6 address types?


Answer:
Anycast address
Unicast address
Multicast address

Which of the following statements about Layer 2 and Layer 3 loops are true?
Answer:
1. The Layer 2 frame header does not contain any information that can prevent data frames
from being forwarded endlessly.
2. If redundant links are deployed on the network, Layer 2 loops may occur.
3. A Layer 2 loop may occur if cables are incorrectly connected.

Which of the following are the advantages of a VLAN?


answer: ABCD

Which of the following statements are false about the forwarding behavior of access ports on a
switch?
Answer:
1. When an access port of the switch sends an untagged data frame, the port adds its default
VLAN ID to the frame.
2. When an access port of the switch receives a data frame carrying the same tag as the
default VLAN ID of the port, the port discards the frame.

Which of the following statements about static and dynamic routes are true?
Answer:
1. Dynamic routing protocols can automatically discover and generate routes and are more
suitable for large-scale networks
Static routes have low requirements on the system and are applicable to simple, stable, and
small-sized networks.
2. Dynamic routing protocols can be classified into distance-vector routing protocols and link-
state routing protocols based on their working mechanism and routing algorithms.
3. The Domain Name System (DNS) protocol is used to resolve domain names to IP addresses.
Which of the following elements constitute a complete domain name?
Answer: ABCD

Which of the following IP addresses are private IP addresses?


Answer:
10.0.1.1/30
172.16.1.1/30
192.168.1.1/30

An IPv6 address is 128 bits long. For convenience, IPv6 addresses can be abbreviated. For the IPv6
address 2001:0B8:0000:0000:1234:FB00:0000:5000:45FF, which of the following comply with the
IPv6 address abbreviation rules?
Answer:
2001:0DB8:0:1234:FB00:0:5000:45FF
2001:DB8::1234:FB00:0:5000:45FF
2001:DB8:0:1234:FB00::5000:45FF

As shown in the following networking, the interfaces connecting R1, R2, R3, R4, and R5 are running
OSPF, and are all in area 0. The routing table of R1 has two equal-cost routes to the destination
10.1.35.0/24. In order for the forwarding path R1 -> R4 -> R3 to be preferentially selected, which of
the following configuration should be performed?
Answer:
Run the ospf cost 10 command on GE0/0/1 of R1.
Run the ospf cost 10 command on GE0/0/3 of R2.

The route preference is an indicator used by a router to compare routes of different routing
protocols. Which of the following statements are true about the default preference of common
routes?
Answer:
The default preference of an OSPF internal route is 10.
The default preference of a static route is 60.
The default preference of a direct route is O.

A WLAN is a network that uses wireless signals such as radio waves, lasers, and infrared rays to
replace the traditional media used for transmission on a wired LAN. Which of the following devices
are commonly used on a WLAN?
Answer: ABCD

Which of the following are valid MAC Address types?


Answer:
Multicast MAC address
Broadcast MAC address
Unicast MAC address
A router can advertise default routes in an OSPF area. Which of the following statements about
OSPF default route advertisement are false?
Answer:
1. After learning the default route advertised by the router, other routers in the same OSPF
area as the router will add this route to their routing tables.
2. The preference of the advertised default route in the routing table is 10.

Which of the following are advantages of switch stacking and clustering?


Answer:
Improves network reliability
Simplifies network management
Simplifies network structure

The concept of Network Function Virtualization (NFV) was proposed by a group of network service
providers to solve problem such as too much telecom network hardware, complex deployment and
O&M, and difficult service innovation. Which of the following components are included in the
standard NFV architecture?
Answer:
MANO
NFVI
VNF

In OSPF, which of the following network types require the election of a DR and BDR?
Answer:
BMA
NBMA

A host at 192.168.1.1/24 on an intranet wants to access a server at 160.131.20.1 on a public


network. Refer to the following configuration on a gateway router:
[RTAlinterface GigabitEthernet 0/0/0
[RTA-GigabitEthernet0/0/0]nat outbound 2000
Which of the following statements are true?
Answer:
1. The administrator configures Easy IP
2. The address 192.168.1.1 will be translated into a public IP address in a public address pool

For the IPv6 address 2000:002A:0000:0000:0000:000A:020C:023D, which of the following comply


with the IPv6 address abbreviation rules?
Answer:
2000:2A::A:20C:23D
2000:2A:0:0:0:A:20C:23D
Refer to the following configuration:
[huawei]interface eth-trunk 1
[Huawei-Eth-Trunk1]undo portswitch
Which of the following statements about the undo portswitch command are true?
Answer:
1. This command enables a router to support Layer 3 link aggregation.
2. This command enables a Layer 3 switch to support Layer 3 link aggregation

Which of the following statements about OSPF router IDs are true?
Answer:
1. To ensure protocol stability, it is recommended that the network administrator manually
configure a router ID for an OSPF process.
2. A router ID can be manually configured or automatically selected by a device
3. The router ID of every device in an OSPF area must be unique

When troubleshooting a spanning tree network fault, an administrator obtains the spanning tree
status information of interface GE0/0/1 on a switch, shown as follows:
--[Port1(GigabitEthernet0/0/1)][FORWARDING]----
Port Protocol
:Enabled
Port Role
:Designated Port
Port Priority
:128
Port Cost(Dot1T)
:Config=100 / Active = 100
Designated Bridge/Port :32768.4c1f-cc4f-26df / 128.1
Port Edged
:Config=default / Active=disabled
Point-to-point :Config=auto / Active=true
Transit Limit
:147 packets/hello-time
Protection Type
:None
Port STP Mode :None
Which of the following statements are true?
Answer:
1. The switch uses the default priority
2. The administrator has changed the path cost of the port by running the stp path cost
command.
Refer to the following ACL configuration on a device. Which of the following statements are true?
Acl number 2000
rule 5 deny source 10.1.1.1 0
rule 10 deny source 10.1.1.2 0
rule 15 permit source 10.1.1.0 0.0.0.255
Answer:
1. Packets with the source IP address 10.1.1.3 will be permitted by the device
2. Packets with the source IP address 10.1.1.2 will be filtered out by the device

A WLAN is constructed using wireless technologies. Which of the following are wireless network
types based on the application scope?
Answer: ABCD

IPv6 have many advantages over IPv4. Which of the following statements about these advantages
are true?
Answer:
1. Supports the configuration of stateless address autoconfiguration (SLAAC) addresses.
2. Provides a larger address space due to being 128 bits in length.
3. Simplifies the packet header and supports new applications using extension headers.

PPP over Ethernet (PPPoE) is a link layer protocol that encapsulates PPP frames into Ethernet
frames. Which of the following statements about PPPoE are true?
Answer: ABCD

31. In contrast with SNMPv1, which of the following operations are newly added to SNMPV2c?
answer:
B. InformRequest
D. GetBulkRequest

32. Refer to the following configuration on the VTY user interface 0. When a user logs in to the
system through VTY 0, which of the following statements are true?
‹HUAWE!> system-view
(-HUAWEl) user-interface vty 0
[-HUAWEI-ui-vty 0] user privilege level 2
Answer:
A. The user can use some display commands.
B. The user can use the ping and tracert commands.
D. The user can use service configuration commands, including routing configuration
commands.

44. Which of the following statements are false about the forwarding behavior of access ports on a
switch?
answer:
B. When an access port of the switch receives a data frame carrying the same tag as the
default VLAN ID of the port, the port discards the frame.
D. When an access port of the switch sends an untagged data frame, the port adds its default
VLAN ID to the frame.

48. Which of the following are possible causes for an AP's failure to go online?Answer:
A. PoE parameters are incorrectly configured on the PoE switch to which the AP is connected.
B. The link between the AC and AP is not established.
C. Network cables are not properly connected.
D. The AC version does not match the AP version.

49. Interfaces GE1/0/1 and GE 1/0/0 on both switches CE1 and CE2 shown in the figure have the
following configurations: interface GE1/0/1 undo shutdown port link-type access # interface GE
1/0/0 undo shutdown port link-type trunk port trunk pid vlan 2# Which of the following statements
are true?ANSWER:
A. The Ethernet uses CSMA/CD to avoid collisions in collision domains.
B. All devices connected to the same hub belong to the same collision domain.
• C. Each port of a router connects to a broadcast domain.
• D. Each port of a switch connects to a collision domain.

SINLGE ANSWER

1. Which of the following is not a valid port role in RSTP? ANSWER. Forwarding port

2. The establishment of an OSPF adjacency between devices involves four steps. Which of the
following statements about these steps is true?

ANSWER. The devices establish bidirectional neighbor relationships, negotiate the


master/slave relationship, exchange LSAs, update LSAs, and synchronize their LSDBs.

3. Refer to the following configuration on a switch:


[huawei]vlan batch 2 to 9 10
Which of the following statements is true about this command?
ANSWER. VLANs 2 to 10 will be created on the switch.

4. Which of the following statements about Fit AP+AC networking is true?

ANSWER data tunnel and a control tunnel will be established between the AC and Fit AP.

5. When a ping command is run on a network device to check the network connectivity, which type
of packet will be sent by the network device? ANSWER. ICMP

6. The ping and tracert commands are used to check the network status. Which of the following
statements about the ping and tracert commands is false?

ANSWER. The ping -s source-ip-address destination-ip-address command is used to specify


the source and destination IP addresses of ICMP Echo Request packets.
7. Which of the following statements is true about APs in WLAN networking?

ANSWER Typically, APs use PoE power to facilitate deployment.

8. Which of the following packet types is used by OSPF to maintain neighbor relationships?
ANSWER. Hello

9. The Point-to-Point Protocol (PPP) is a common data link layer protocol for wide area networks
(WANs). Which of the following statements about PPP is false?

ANSWER. The establishment of a PPP link goes through three phases: link layer negotiation,
network layer negotiation, and authentication.

10. The Versatile Routing Platform (VRP) uses the file system to manage files and directories on a
device. Which of the following commands can be used to check the current directory of a device?
ANSWER: pwd

11. OSPF is configured on RTA, RTB, and RTC. GigabitEthernet 0/0/0 interfaces of these routers
belong to area 0 and the network types of these interfaces are broadcast. The router ID of RTA is
1.1.1.1, and the DR priority of GigabitEthernet 0/0/0 on RTA is set to 0. The router ID of RTB is
2.2.2.2, and the DR priority of GigabitEthernet 0/0/0 on RTB is set to 255. The router ID of RTC is
3.3.3.3, and the DR priority of GigabitEthernet 0/0/0 on RTC is the default value. Which of the
following statements is true about the DR and BDR on the network?

ANSWER: RTB functions as the DR, and RTC as the BDR.

12. SNMP is used to manage network devices. Refer to the following SNMP configuration on a
Huawei device. Which of the following statements is false?

[~HUAWEI] display current-configuration | include snmp


snmp-agent
snmp-agent local-engineid 800007DB03001974593301
snmp-agent sys-info version v3
snmp-agent mib-view included iso-view iso
snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view iso-view
snmp-agent usm-user v3 v3user
snmp-agent usm-user v3 v3user group v3group
snmp-agent usm-user v3 v3user authentication-mode sha cipher %^%#&Ygn:NzQw;d>f=2+aJ ;;=
BVM^"P1Hf/L$F9UW@%^%#
snmp-agent usm-user v3 v3user privacy-mode aes256 cipher %^%#Gc !* FAB;vL5_[a#9q9i7 :*
lj;q#<P8MOf8@PJMJ0%^%#
ANSWER: The encryption mode of the v3user user is SHA.

20. The Domain Name System (DNS) protocol is used to resolve domain names to IP addresses.
Which of the following statements about DNS is false?Answer: DNS supports traversal query.
22. An AC manages and controls APs in a centralized manner through CAPWAP tunnels. An AP
sends a Discovery Request packet to find an available AC. Which of the following methods cannot
be used by an AP to discover an AC? Answer: B. Multicast

23. OSPF has multiple types of protocol packets. These packets play different roles in the
interaction between OSPF routers. Which of the following packets describes summary information
about the local LSDB and is used to synchronize the LSDBs of two routers? DD packet

24. If the PVID of a trunk port on a switch is 10 and the port trunk allow-pass vlan 7 9 command is
configured on the port, which of the following statements is true?

Answer: C. Data frames of VLANs 1, 7, and 9 can be transmitted on a trunk link.

26. Which of the following lists the correct protocol layers of the TCP/IP reference model from
bottom to top?

Answer: D. Physical layer, data link layer, network layer, transport layer, and application layer

27. What is the length range of an Ethernet frame?

Answer: B. 64 to 1518 bytes

MULTIPLE ANSWERS
33. The route preference is an indicator used by a router to compare routes of different routing
protocols. Which of the following statements are true about the default preference of common
routes?

Answer:

A. The default preference of a static route is 60.


B. The default preference of an OSPF internal route is 10.
C. The default preference of a direct route is 0.

34. Which of the following statements about IP addresses and MAC addresses are true?Answer:

A. MAC addresses are assigned based on vendors.


B. IP addresses are assigned based on the network topology.
D. MAC addresses are unchangeable.

41. An administrator wants to allocate IP addresses in the network segment 172.16.4.32/29 to


hosts. Which of the following IP addresses can be allocated to hosts?

Answer:
B. 172.16.4.35 255.255.255.248
D. 172.16.4.33 255.255.255.248
45. Refer to the following configuration:
[huawei]interface eth-trunk 1

[huawei-Eth-Trunk1]undo portswitch

Which of the following statements about the undo portswitch command are true?

Answer:
A. This command enables a router to support Layer 3 link aggregation.
C. This command enables a Layer 3 switch to support Layer 3 link aggregation.

46. Which of the following are valid MAC address types Answer:

B. Multicast MAC address


C. Broadcast MAC address
D. Unicast MAC address

48. In OSPF, which of the following network types require the election of a DR and BDR?

Answer:

A. NBMA
D. BMA

TRUE or FALSE

52. In an OSPF AS, a router can function as both an ABR and an ASBR. >>True

54. Network design and planning is the first phase of campus network construction. >> True

55. As every two nodes in a full-mesh network are connected using cables, each node requires a
large number of physical ports and connection cables, resulting in relatively high costs. >> True

56. To prevent out-of-order packets, it is recommended that Eth-Trunk use flow-based load
balancing. >> True

58. Before sending an IPv6 packet, an interface performs the following operations in this order:
address configuration, address resolution, and duplicate address detection (DAD). >> False

60. A blackhole route (or null route) can prevent routing loops. >> True

When the host accesses the web server of the server, the value of the network layer protocol field
is 6. >> TRUE
2. A network engineer prompts the following information when entering the command line:
Error: Unrecognized command found at ' position. Which statement is correct about this prompt
message?
D. Keyword not found

3. As shown in the figure, there are three data packets captured by the administrator in the network.
Which of the following statements is wrong?
Source destination protocol info
10.0.12.1 10.0.12.2 TCP 50190>telnet [SYN] seq=0 win=8192 Len=0 mss=1460
10.0.12.2 10.0.12.1 TCP telnet>50190 [SYN,ACK] seq=0 Ack=1 win=8192 Len=0
mss=1460
10.0.12.1 10.0.12.2 TCP 50190>telnet [ACK] seq=1 Ack=1 win=8192 Len=0

Answer: . None of the three packets contain application layer data

4. On the command line interface of the Huawei AR router, the save command is used to save the
current system time. False
Answer: False, "clock save" command is typically used to save the current system time
configuration to the router's non-volatile memory (NVRAM)

5. Which statement about the transport layer protocol is correct? (Multiple choice)
Answer:

>> The establishment of a TCP connection is a three-way handshake process, while the
termination ofa TCP connection requires a four-way handshake
>> Well-known port numbers range from 1-1023

6. The tracert diagnostic tool in Huawei routers is used to trace the forwarding path of data.
Answer: True

7. In which of the following network types does OSPF need to elect DR and BDR? (Multiple choice)
Answer:

A. Broadcast type
D. NBMA

Explanation
In these network types, multiple OSPF routers are connected to a common network segment,and
the DR and BDR election process helps optimize OSPF communication by reducing theamount of
OSPF routing information exchanged between routers on the segment.
For point-to-point type networks, such as serial links, there is no need for a DR/BDR
electionbecause there are only two routers directly connected, and all OSPF routers on such links
formfull adjacencies with each other.
8. Which of the following statements about static routing is wrong?
A. Manual configuration by network administrator
C. Cannot automatically adapt to changes in network topology
D. Low requirements on system performance

1. When the host accesses the web server of the server, the value of the network layer protocol field
is 6.
• True

2. A network engineer prompts the following information when entering the command line:
Error: Unrecognized command found at '^' position. Which statement is correct about this prompt
message?
• Keyword not found

3. As shown in the figure, there are three data packets captured by the administrator in the network.
Which of the following statements is wrong?
• The IP address of the telnet server is 10.0.12.1, and the IP address of the telnet client is 10.0.12.2

4. On the command line interface of the Huawei AR router, the save command is used to save the
current system time.
• False

5. Which statement about the transport layer protocol is correct? (Multiple choice)
• The establishment of a TCP connection is a three-way handshake process, while the termination
of a TCP connection requires a four-way handshake
• Well-known port numbers range from 1-1023correct

6. The tracert diagnostic tool in Huawei routers is used to trace the forwarding path of data.
• True

7. In which of the following network types does OSPF need to elect DR and BDR? (Multiple choice)
• Broadcast type
• NBMA

8. Which of the following statements about static routing is wrong?


• Routing information needs to be exchanged between routers

9. Which frequencies does the IEEE 802.11n standard support? (Multiple choice)
• 2.4GHz
• 5GHz
10. In the network shown in the figure below, what commands can be entered on the router to
enable host A to ping host B? (Multiple choice)
• RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2
RTB: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1
• RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.2
RTB: route-static 10.0.12.1 255.255.255.252 11.0.12.1

11. On the VRP operating platform, which of the following commands can only view static routes?
• display IP routing-table protocol static correct

12. A router running the OSPF protocol can only reach the FULL state after completing LSDB
synchronization.
• True

13. All router interfaces belong to the same broadcast domain.


• False

14. Which of the following protocol types does the OSPF protocol support? (Multiple choice)
• Point-to-multipoint
• Point-to-point type
• Broadcast type
• NBMA

15. When using the ping command on the VRP platform, if it is necessary to specify an IP address
as the source address of the echo request message, which of the following parameters should be
used?
• -a

16. Which of the following OSPF protocol packets can ensure the reliability of LSA update?
• LSACK

17. What are the stable states of the OSPF protocol neighbor relationship? (Multiple choice)
• 2-way
• Full
• Down

18. Must all interfaces of routers running OSPF belong to the same area.
• False

19. Can dynamic routing protocols automatically adapt to changes in network topology.
• True
20. As shown in the figure below, host A and host B cannot communicate.
• False

21. As shown in the figure, when the switch needs to forward the frame whose destination mac
address is 5489-98ec-f011, which of the following descriptions is correct?
• The switch will flood the frame on all ports except the port that received the frame

22. According to the command output shown in the figure, which of the following descriptions is
correct? (Multiple choice)
• GigabitEthernet0/0/1 allows VLAN1 to pass through
• If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the
command "undo port trunk allow-pass vlan 2 to 4094"

23. According to the command shown in the figure, which of the following descriptions is correct?
(Multiple choice)
• The PVID of port GigabitEthernet0/0/1 is 1
• The PVID of port GigabitEthernet0/0/2 is 1
• The PVID of port GigabitEthernet0/0/1 is 10

24. If the Length/type=0x8100 of an Ethernet data frame, which of the following statements is
correct?
• This data frame must carry VLAN TAG

25. The bridge ID of the STP protocol in the switching network is as follows. Which of the following
bridge ID switches will become the root bridge?
• 4096 00-01-02-03-04-DD

26. Which of the following statements about the election of active ports in link aggregation LACP
mode is correct?
• Compare the interface priority first, if you cannot determine the superior one, continue to
compare the interface number, the smaller the better

27. The MAC address of the existing switch is shown in the figure, which of the following statements
is correct?
• The data frame with source MAC address 5489-9885-18a8 and destination MAC address 5489-
989d-1d30 learned from the port is forwarded from Eth0/0/1 port

28. As shown in the figure below, all hosts can communicate normally. Which of the following
statements is correct? (Multiple choice)
• G0/0/3 of SWB learned 2 mac addresses
• G0/0/3 of SWA learns a mac address
29. Which of the following statements about Hybrid ports is correct?
• The Hybrid port can strip the tags of certain vlan frames in the direction of the outgoing port

30. The function of telnet.read_very_eager in Telnetlib is to read data non-blockingly. Usually needs
to be used together with the time module.
• True

31. For a switch running the STP protocol, the port can be directly converted to the Disabled state in
any state.
• True

32. The IPv6 address 2001:ABEF:224E:FFE2:BCCO:CDOO:DDBE:8D58 cannot be abbreviated.


• True

33. Using the commands "vlan batch 10 20 " and "valn batch 10 to 20 ", what is the number of
VLANs that can be created?
• 2 and 11

34. The Layer 2 switch belongs to the data link layer device, which can identify the mac address
information in the data frame, forward the data according to the mac address, and record these
mac addresses and corresponding port information in its own mac address table.
• True

35. In the configuration BPDU sent by the switch, which bridge ID cannot appear?
• 2048 00-01-02-03-04-CC

36. If there is an inclusion relationship in the configured ACL rules, it should be noted that the rule
numbers of the strict conditions need to be sorted first, and the rule numbers of the loose
conditions need to be sorted last, so as to prevent the packet from stopping to continue matching
due to hitting the rules of the loose conditions, thereby Rules that make it impossible to hit strict
conditions.
• True

37. The network administrator configures the Huawei router RTA as shown in the figure. If a user
needs to be authenticated in the authentication domain "huawei", which of the following
descriptions is correct?
[RTA] aaa
[RTA-aaa] domain huawei
[RTA-aaa-domain huawei] authentication-scheme au1
[RTA-aaa domain-huawei] authentication-scheme au2
answer
• will use "authentication-scheme au2" authenticationcorrect
38. What is the number range of Layer 2 ACL?
• 4000-4999

39. What is the number range of the advanced ACL?


• 3000-3999

40. If the packet matches the ACL and the result is "deny", the packet will be discarded eventually.i
• False

41. Which of the following message types does DHCP contain? (Multiple choice)
• DHCP OFFER
• DHCP REQUEST
• DHCP DISCOVER

42. What is the main function of the DNS protocol?


• Domain name resolution

43. Which of the following protocols is not a file transfer protocol?


• HTTP

44. Only the security policy of WPA2-PSK supports the use of TKIP for data encryption.
• False

45. Which of the following does not include the advantages of Wi-Fi6 over Wi-Fi5?
• Higher consumption

46. The port numbers used in the control tunnel and data tunnel transmission of CAPWAP are the
same.
• False

47. What is the first operation to be performed after the FIT AP obtains the IP address of the AC?
• Establish a CAPWAP tunnel

48. Before the STA associates with the AP, it needs to exchange some messages to obtain the SSID.
Which of the following are these messages? (Multiple choice)
• Probe Response
• Probe Request

49. Based on what concept is segment routing SR (segment routing) a protocol designed to forward
data packets on the network?
• Source routing
50. In PPP, when the two ends of the communication detect the activation of the physical link, they
will transition from the link unavailable stage to the link establishment stage. In this stage, the link
parameters are mainly negotiated through the () protocol
• LCP

1. When the Trunk port send the data frame, how to deal with?
• When the VLAN ID is the same as the PVID of the port and is a VLAN ID allowed by the port,
remove the Tag and send the message

2. How many bits are there in the VLAN ID in the VLAN format defined by IEEE802.1Q?
• 12

3. In the network shown in the figure below, the output information of switch A is shown in the
figure. Then in the MAC address table of switch A, which interface does the MAC address of host B
correspond to?
• Eth-Trunk 1

4. All ports on the root-bridge switch are designated ports.


• True

5. In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?
• 2048 00-01-02-03-04-CC

7. By default, the root path cost of the root bridge in the STP protocol must be 0.
• True

8. The administrator wants all hosts to be unable to access the Internet between 8:00-17:00 every
day, so which ACL rule needs to be bound to the traffic-filter outbound in the GO/0/1 interface
allocation?
• time-range am9topm5 08:00 to 17:00 daily
acl number 2001
rule 5 deny time-range am9topm5

9. As shown in the figure below, the wrong statement is:


acl number 2000
rule 5 deny source 200.0.12.00.0.0.7 rule 10permit source200.0.12.00.0.0.15 #
interface GigabitEthernetO/0/1 traffic-filteroutbound acl2000
• The host whose source IP address is 200.0.12.8 cannot access the Internet

10. On Huawei equipment, if you use aaa authentication for authorization. When the remote server
does not respond, you can authorize from the network equipment side.
• True
11. What percentage does the DHCP client expect to send the lease renewal message for the first
time?
• 0.5

12. After the administrator successfully logs in to the router through Telnet, and finds that the
router's interface IP address cannot be allocated, the possible reasons are ()
• The Telnet user level is incorrectly configured

13. vty configuration as shown in the figure, the user authority level is set to level 3.
[Huawei]user-interface vty o 14
[Huawei-ul-vtyo-14]acl 200o inbound
[Huavei-ui-vtyo-14]user privilege level 3
[Huavei-ui-vtyo-14]authentication-node password Please configure the login password (maxim
length 16):Huawei
• True

14. When AP and AC are on different Layer 3 networks, what method is recommended for AP to
discover AC? (Multiple Choice)
• Broadcasting method
• DNS
• DHCP

15. What frequency does IEEE 802.11n support? (Multiple Choice)


• 2.5GHz
• 2.4GHz
• 5GHz

16. In IPv4 networks, AP supports static and DHCP methods to obtain IP addresses.
• True

17. What is the maximum negotiation rate supported by the IEEE 802.llg standard?
• 54Kbps

18. Which WLAN security policies support the link authentication method of Open mode? (Multiple
Choice)
• WPA2-802.IX
• WEP
• WPA

19. Which of the following SNMP packets are sent to the NMS by the Agent on the managed device?
• Response
20. Which field is added to the IPv6 packet header than the IPv4 packet header?
• Flow Label

21. Which of the following statements about RA and RS in IPv6 are correct? (Multiple Choice)
• RS is used to reply address prefix information
• RS is used to request address prefix information
• RA is used to reply address prefix information

22. Telnetlib is a module that implements the Telnet protocol that comes with Python.
• True

23. The controller is the core component of SDN. The controller connects to the device through the
southbound interface. Which of the following belong to the controller southbound protocol?
(Multiple Choice)
• SNMP
• OpenFlow

24. In the campus network, network reliability can be improved by using link aggregation and
stacking technology.
• True

25. Using the command mkdir test in the VRP operating platform, the system will create a directory
named test.
• True

26. As shown in the figure, after the two routers are configured with OSPF, the administrator
configures the <silent -interface s0/0/0> command on RTA, then the correct description of the
following is (). (Multiple Choice)
• The neighbor relationship between the two routers will be down
• The neighbor relationship between the two routers will not be affected
• RTA will no longer send OSPF packets
• RTA will continue to receive, analyze and process OSPF packets sent by RTB

27. Which of the following statements about the default route are correct? (Multiple Choice)
• If the destination address of the message cannot match any other routing entries in the routing
table, the router will forward the message according to the default route
• In the routing table, the default route appears as a route to the network 0.0.0.0 (the mask is also
0.0.0.0)
28. In the network shown in the figure below, the router receives a data packet with a destination IP
address of 11.0.12.1 from host A. After this data packet is forwarded by the router, what are the
destination MAC and destination IP?
• MAC-D, 11.0.12.1

29. In the network shown in the figure below, assuming that all routers enable the OSPF protocol at
the same time, which router is the BDR in this network?
• Router A

30. There are multiple route entries to the same destination network in the routing table. These
routes are called:
• Equal cost routing

11. Which one of the following commands can only view static routes on VRP operating platform?
• display IP routing-table protocol static

12. The router running the ospf protocol can reach the FULL state after completing the LSDB
synchronization.
• True

13. All interfaces of the router belong to the same broadcast domain.
• True
• Falsecorrect

14. Which of the following protocol types does the ospf protocol support? (Multiple Choice)
• Point-to-multipointcorrect
• Point-to-point typecorrect
• Broadcast typecorrect
• NBMAcorrect

15. When using the ping command on the VRP platform, if you need to specify an IP address as the
source address of the echo request message, which of the following parameters should be used?
• -d
• -acorrect
• -s
• -n
16. Which of the following ospf protocol packets can ensure the reliability of LSA updates?
• DD
• LSR
• LSU
• LSACKcorrect
17. What kinds of stable states does the neighbor relationship of OSPF protocol have? (Multiple
Choice)
• 2-waycorrect
• Fullcorrect
• Downcorrect
• attempt
18. All interfaces of routers running ospf protocol must belong to the same area.
• True
• Falsecorrect
19. Dynamic routing protocols can automatically adapt to changes in network topology.
• Truecorrect
• False
20. As shown in the figure below, host A and host B cannot communicate.

• Truewrong
• Falsecorrect
21. As shown in the figure, when the switch needs to forward the frame with the destination mac
address of 5489-98ec-f011, which of the following descriptions is correct?

• The switch will send a message that the destination is unreachable to the source device
• The switch does not find a matching entry in the mac address table, so the frame will be discarded
• The switch needs to send a request to discover the device with the mac address of 5489-98ec-
f011
• The switch will flood the frame on all ports except the port that received the framecorrect
22. According to the command output as shown in the figure, which of the following descriptions is
correct? (Multiple Choice)

• GigabitEthernet0/0/1 allows VLAN1 to passcorrect


• If you want to change GigabitEthernet0/0/1 to an Access port, you first need to use the command
"undo port trunk allow-pass vlan 2 to 4094"correct

23. According to the command shown in the figure, which of the following descriptions is correct?
(Multiple Choice)

• The PVID of GigabitEthernet0/0/1 port is 1correct


• The PVID of GigabitEthernet0/0/2 port is 1correct
• The PVID of GigabitEthernet0/0/1 port is 10correct

24. If an Ethernet data frame is Length/type=0x8100, which of the following statements is correct?
• There must be a UDP header in the upper layer of this data frame
• There must be a TCP header in the upper layer of this data frame
• This data frame must carry vlan TAGcorrect
• There must be an IP header in the upper layer of this data frame

25. The bridge ID of the STP protocol in the switching network is as follows. Which of the following
bridge ID switches will become the root bridge?
• 4096 00-01-02-03-04-DDcorrect

26. Regarding the election of active ports in link aggregation LACP mode, which of the following is
correct?
• Compare the priority of the interface first, if it is impossible to determine the better one, continue
to compare the interface number, the smaller the bettercorrect
• Only compare interface priority
• Compare device priority
• Only compare interface numbers
27. The mac address of the existing switch is shown in the figure. Which of the following statements
is correct?

• When the switch restarts, the mac address learned by port Eth0/0/2 does not need to be
relearned
• The data frame with the source mac address of 5489-9885-18a8 and the destination mac address
of 5489-989d-1d30 learned from the port is forwarded from the Eth0/0/1 portcorrect

28. As shown in the figure below, all hosts can communicate normally. Which of the following
statements is correct? (Multiple Choice)

• G0/0/3 of SWB learned 2 mac addressescorrect


• G0/0/3 of SWA learned 1 mac addresscorrect
• G0/0/3 of SWA learned 2 mac addresses
• G0/0/3 of SWA learned 3 mac addresses
29. Which of the following statements about the Hybrid port are correct?
• Hybrid port can strip off the tags of some vlan frames in the outgoing port directioncorrect
• When the Hybrid port sends data frames, it must carry the vlan tag
• Hybrid port only receives data frames with VLAN tag
• Hybrid port does not require PVID
30. The function of telnet.read_very_eager in Telnetlib is to read data of non-blocking, usually need
to be used with the time module.
• Truecorrect
• False
31. Which of the following are not open interfaces for Huawei network equipment?
• RE TCONFcorrect

32. For switches running STP protocol, the port can be directly converted to the Disabled state in
any state.
• Truecorrect
• False
33. The IPv6 address 2001:ABEF:224E:FFE2:BCCO:CDOO:DDBE:8D58 cannot be abbreviated.
• Truecorrect
• False
34. Using the commands "vlan batch 10 20" and "valn batch 10 to 20", how many VLANs can be
created respectively?
• 11 and 11
• 2 and 2
• 11 and 2
• 2 and 11correct
35. The second layer switch belongs to the data link layer device, which can identify the mac
address information in the data frame, forward data according to the mac address, and record
these mac addresses and corresponding port information in its own mac address table.
• Truecorrect
• False
36. In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?
• 8192 00-01-02-03-04-CC
• 2048 00-01-02-03-04-CCcorrect
• 4096 00-01-02-03-04-CC
• 0 00-01-02-03-04-CC
37. If the configured ACL rule has an inclusion relationship, it should be noted that the rule number
of the strict condition needs to be sorted first, and the rule number of the loose condition needs to
be sorted later, to prevent the packet from hitting the loose condition rule and stop continuing to
match, thus make it impossible to hit the strict conditions of the rules.
• Truecorrect
• False
38. The network administrator configures as shown in the figure on the Huawei router RTA, if a user
needs to be authenticated in the authentication domain "huawei", which of the following
descriptions is correct?

[RTA] aaa

[RTA-aaa] domain huawei

[RTA-aaa-domain huawei] authentication-scheme au1

[RTA-aaa domain-huawei] authentication-scheme au2


• "authentication-scheme au1" authentication will be used
• "authentication-scheme au1" authentication will be used, if "au1" is deleted, "au2" authentication
will be used
• "authentication-scheme au2" authentication will be used, if "au2" is deleted, "au1" authentication
will be usedcorrect
• "authentication-scheme au2" authentication will be usedwrong
39. What is the number range of Layer 2 ACL?
• 4000-4999correct
• 2000-2999
• 6000-6031
• 3000-3999
40. What is the number range of advanced ACL?
• 2000-2999
• 4000-4999
• 6000-6031
• 3000-3999correct

HCIP-Cloud Service

Which of the following packets are OSPF packets?


• A. HELLO
According to the VTY user interface configuration shown in the following figure, the user level is set
to 3.
[Huawei]user-interface vty 0 14
[Huawei-ui-vty0-14]acl 2000 inbound
[Huawei-ui-vty0-14]user privilege level 3
[Huawei-ui-vty0-14]authentication-node password
Please configure the login password (maximum length 16):huawei
• B. False
Which of the following protocols can be used to prevent loops on a Layer 2 network with redundant
links?
• B. STP
Trunk interfaces can send both tagged and untagged frames.
• A. True

Which of the following statements about switches is false?


• A. A switch is typically deployed as an egress device of a network.
• B. A switch usually works at the data link layer.
• C. A switch can provide network access services for terminals such as PCs and servers.
• D. A switch can exchange data frames.
Network Functions Virtualization (NFV) implements software-based network application
deployment.
• B. False
Which of the following IPv4 addresses can be directly used by a host to access the Internet?
• A. 192.168.1.1/24
• B. 10.255.255.254/24
• C. 172.16.255.254/24
• D. 172.32.1.1/24
Refer to the following IP routing table on the router R1. If R1 sends a data packet with the
destination IP address 10.0.2.2, which of the following interfaces will R1 use to send the packet?

• A. GigabitEthernet0/0/0
• B. Ethernet0/0/0
• C. Ethernet0/0/1
• D. Ethernet0/0/2

What is the protocol number of OSPF at the network layer?


• A. 0
• B. 1
• C. 6
• D. 89

Which of the following fields is not included in the OSPF Hello packet?
• A. Hello Interval
• B. Neighbor
• C. Network Mask
• D. sysname

Which of the following OSPF states can be used to indicate that an adjacency relationship has been
established?
• A. Down
• B. 2-way
• C. Full
• D. Attempt
VLAN 4095 is reserved for system use and VLAN 1 cannot be deleted on Huawei switches.
• A. True
Which of the following statements is true?
• A. Switches work at the network layer.
• B. Routers work at the network layer.
• C. Switches work at the physical layer.
• D. Routers work at the physical layer.
The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in
different network segments.
• A. True
Assuming that OSPF has been enabled on all routers in the following figure, which router is the BDR
on this network?

• A. Router A
• B. Router B
• C. Router C
• D. Router D
the functions and packet encapsulation of the ARP protocol is true?
• A. The ARP cache on a network device can be obtained only through the ARP protocol.
• B. The MAC address and UUID of the destination device can be obtained through ARP.
• C. ARP can be deployed on PPP and HDLC links.
• D. ARP packets are encapsulated over Ethernet.
An authenticator router has been configured with two domains named “Area1” and “Area2”,
following which a user is created with the username “huawei” and the password “hello” for
authentication. Which domain does this user belong to?
• A. Area1 domain
• B. Area2 domain
• C. default domain
• D. default_admin domain
IPv6 uses NS and NA packets to perform duplicate address detection (DAD).
• B. False

A network administrator wishes to implement VLAN 10 to isolate certain users. It is common


however for these users to often change their physical location. Which of the following VLAN
implementations should be used?
• A. Port based VLAN assignment.
• B. Protocol based VLAN assignment.
• C. MAC based VLAN assignment.
• D. IP subnet based VLAN assignment.
Refer to the following display vlan command output on SWA. Which one of the following interfaces
can forward untagged data frames from VLAN 40?

• A. GE0/0/2
• B. GE0/0/3
• C. GE0/0/4
• D. GE0/0/5
The tracert diagnostic tool of Huawei routers is used to trace data forwarding paths.
• A. True
• B. False
Which of the following port states is not included in Rapid Spanning Tree Protocol (RSTP)?
• A. Forwarding
• B. Learning
• C. Discarding
• D. Blocking
Refer to the following configuration of an interface on a switch. For witch VLAN does the interface
transmit tagged data frames?
#
interface GigabitEthernet0/0/1
port hybrid tagged vlan 2 to 3 100
port hybrid untagged vlan 4 6
#
• A. 1, 2, 3, 100
• B. 2, 3, 100
• C. 2, 3, 4, 6, 100
• D. 1, 2, 3, 4, 6, 100

TRUE or False
1. When a switch port receives a frame that does not carry a VLAN tag, it must add a PVID to the
frame.
+ True

2. On a Layer 2 WLAN, STAs use an AC as their gateway.


+ False

3. When Fit APs go online on an AC, they will necessarily download the system software package
from the AC.
+ False

4. A hybrid port can be connected to either a user host or a switch.


+ True

5. On Huawei switches, you can run the vlan batch command to create multiple VLANs in batches.
+ True

6. The source IP address or source interface of the CAPWAP tunnel can be manually specified on an
AC.
+ True

7. You can run the user-interface maximum-vty command to configure the maximum number of
users who can
log in to the device through Telnet simultaneous
+ True

8. When the host accesses web service of the server, the value of the "Protocol” field at the network
layer is 6.
+ True

9. Loops may cause broadcast storms on a Layer 2 network.


+ True

10. None of the 14 available channels on the 2.4 GHz frequency band overlap.
+ False

11. Which of the following statements about Length/Type = 0x8100 in an Ethernet data frame is/are
true?
+A. The data frame must carry a VLAN tag.

12. A network administrator has been assigned the IP address segment 192.168.176.0/25, from
which he/she must
allocate a subnet to support 20 users in the m
department. Which IP subnet best supports this + D. 192.168.176.96/27

13. As shown in the figure, if the administrator wants that all hosts cannot access the web service
(port number:
80) and other services can be accessed normally rule needs to be bound to "traffic-filter outbound"
in the G0/0/1 interface configuration?
+ A.
GE 0/0/1
acl
Internet
Router A
number 3000
rule 5 deny tcp destination-port eq www rule 10 permit ip
#

14. After establishing an OSPF neighbour relationship, two routers remain in 2-way state. Given this,
which of the following statements is true?
+ D. The routers are both DR others on a broadcast network.

15, Which of the following parameters is used to elect the root bridge in STP?
+ A. Bridge ID

16, Which of the following methods is not supported by the Versatile Routing Platform (VRP) to
configure a router?
+ A. Configure the router through FTP.

17. Which of the following statements regarding static routing and dynamic routing is incorrect?
+ A. The static routing can be easily configured and managed on the enterprise network.
18, Which of the following IPv4 addresses is a class A address?
+ D. 100.1.1.1

19. What action does an access port take in the process of sending VLAN frames?
Answer: The Access port strips the VLAN Tag and forwards the frame.

20, Which of the following commands sets the data forwarding mode on an AC to direct
forwarding?
+ B. forward-mode direct-forward

21, In the network shown in the following figure, a switch needs to use a VLANIF interface to
connect to a sub-interface of a router. Which of the following configuration can meet this
requirement?

+ A interface Vlanif10
ip address 10.0.12.1 255.255.255.0
interface GigabitEthernet0/0/2
port link-type trunk
port trunk allow-pass vian 10
#

Whice phase in the campus network construction lifecycle is the beginning of project?
B. Network planning and design

Which of the following is not an advantage of Wi-Fi 6 over Wi-Fi 5?


A. A Higher power consumption

24, By default, in the SNMP protocol, which port number is used by the proxy process to send alarm
messages to the NMS?
B. 162

25, Which of the following parameters is not contained in STP configuration BPDUs?
+ D. VLAN ID

26, Which of the following is not a major wireless standard in the initial mobile office era?
+ C. 802.11ac

A network administrator wishes to implement VLAN 10 to isolate certain users. It is common


however f ese users to often change their physical location. Which of the following VLAN
implementations should I used?
+ C. MAC based VLAN assignment.
28, How many TCP connections will be established when FTP is used to transfer files?
+ B. 2

29, Which of the following protocols can be used to prevent loops on a Layer 2 network with
redundant links?
+ B. STP

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy