IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.
An enterprise administrator wants to configure single-hop BFD to implement fast detection of direct links. Which of the following configurations are mandatory?
BGP is generally applied to complex networks where routes change frequently. Frequent route flapping consumes a large number of bandwidth and CPU resources, and even affects the normal operation of the network. This is an unavoidable problem that cannot be solved in BGP.
On an IS-IS network, all routers generate LSPs. Which of the following types of information isnotcontained in the LSPs generated by pseudonodes?
In the OSPF protocol, intra-area route calculation involves only Router LSA, Network LSA, and Summary LSA.
On an IS-IS network, areas are divided by router, and a router can belong to only one area. Therefore, an IS-IS router only needs to maintain the LSDB of its area.
On an office network of an enterprise, OSPF is enabled on two directly connected routers. During adjacency establishment, the state machine stays in the 2-way state. Which of the following statements are not possible causes?
On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?
During routine maintenance, an enterprise administrator runs a command to check VRRP group information. Which of the following statements is false about the command output?
yaml
CopyEdit
Vlanif100 | Virtual Router 1 State: Master
Virtual IP: 10.1.1.100
Master IP: 10.1.1.2
PriorityRun: 120 PriorityConfig: 120
DR: None BDR: None MTU: 0
Preempt: YES Delay Time: 20s
Remain: --
Track: YES Priority Reduced: 20
Auth Type: MD5
BFD-session State: UP
Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. Which of the following statements is true?
Multiple BGP processes cannot be configured on the same router.
Which of the following statements regarding OSPF multi-instance is false?
Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.
IGMP has three versions. Different versions support different features. Which of the following features is supported by all versions?
An enterprise administrator views the following details about a BGP route during routine O&M:
yaml
CopyEdit
BGP local router ID: 10.1.1.1
Local AS number: 100
Paths: 2 available, 0 best, 0 select
BGP routing table entry information of 192.168.1.1/32:
From: 10.1.1.2 (10.1.1.2)
Route Duration: 00h01m31s
Relay IP Nexthop: 0.0.0.0
Relay IP Out-Interface: --
Original nexthop: 172.16.1.2
AS-path: 200, origin incomplete, MED 0, localpref 100, pref-val 0, internal, pre 255, invalid for IP unreachable
Not advertised to any peer yet
Which of the following statements are true about the BGP route?
In VRRP networking, if VRRP is not configured to track an uplink interface and the uplink interface or link of the master device in a VRRP group fails, no switchover will be triggered. As a result, a traffic blackhole occurs.
In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.
The following figure shows the OSPF network of an enterprise and the OSPF configurations of R1. Which of the following statements is false about the network?
On a P2P IS-IS network, after a neighbor relationship is established between R1 and R2, R2 finds that its LSDB is not synchronized. Then, R2 requests corresponding LSPs from R1 for LSDB synchronization. The following figure shows the synchronization process. Drag the following packet types to the steps in which they are used.(Token is reusable)
Which of the following statements about the forwarding plane of a switch is false?
Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?
What parameters can a DHCP6 server assign to a DHCPv6 client?
A router uses an advanced ACL to filter data. The ACL configuration is shown below. Which of the following statements is false about the configuration?
csharp
CopyEdit
[Huawei] acl 3001
[Huawei-acl-adv-3001] rule permit icmp source 192.168.1.3 0 destination 192.168.2.0 0.0.0.255
This configuration is part of RTA configuration. Which of the following statements regarding the configuration are true?
[RTA] ospf 100
[RTA-ospf-100]silent-interface GigabitEthernet 1/0/0
Match the following IPv4 multicast protocols with the corresponding functions.
As shown in the figure, R1 imports the direct route10.1.1.0/24to OSPF. An engineer enablesbidirectional route re-advertisementon R2 and R3.
After the network becomes stable, which of the following is thePre (preference) valueof the route10.1.1.0/24in therouting table of R3?
On an enterprise WLAN where Portal authentication is deployed, an AC functions as an access device and communicates with a Portal server using the Portal protocol. Which of the following statements are true about the Portal protocol?
ASPF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications.
On an OSPF network, LSDBs are used to store LSAs. Common LSAs include router LSAs and network LSAs. Which of the following items is not included in the 3-tuple that is used to uniquely identify an LSA?
The Interface \P address and VRRP virtual IP address can be the same.
BFD provides fast fault detection independent of media and routing protocols. To use this mechanism to detect link connectivity, devices at both ends must support this feature.
The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.
A BGP device receives a route carrying an unknown attribute from a peer but does not know whether other devices need the attribute. In this case, the BGP device retains this attribute when advertising the route to other peers. Which of the following attributes is of this type?
Which of the following is the default interval at which the DIS on a broadcast IS_IS network sends CSNPs.
Which of the following statements regarding the firewall zone security level is false?
A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?
Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.
An enterprise administrator configures route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.
See the command output of a router below. Which of the following statements is true?
OSPF Process 1 with Router ID 10.0.2.2
Interface: 10.0.12.2 (GigabitEthernet 0/0/0)
Cost: 1 State: BDR Type: Broadcast MTU: 1500
Priority: 1
Designated Router: 10.0.12.1
Backup Designated Router: 10.0.12.2
Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1
After the administrator of an enterprise deploys a DHCP server, employees complain that their clients cannot obtain IP addresses from the DHCP server. Which of the following may cause this problem?
On an IPv6 network, intermediate forwarding devices do not fragment IPv6 packets for the purpose of reducing their packet processing pressure. Packets are fragmented only on the source node.
The filter-policy 2000 export command is run in an ISIS process. Which of the following statements about the functions of a filter policy is false?
The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?
Which of the following routing protocols support the default route through command configuration?
The typical characteristics of the AI era are that it focuses on data, explores data value, and improves AI efficiency. Therefore, the core requirement of AI for data center networks is speed, meaning low latency.
On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.
STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.
On an OSPF network, OSPF routers exchange LSAs to synchronize their LSDBs. If an OSPF router receives an LSA that does not exist in its LSDB, it updates its LSDB and floods the LSA.
Which of the following statements about stack split is false?
A session is an entry used to record the connection status of a protocol and is fundamental for the firewall to forward packets. Which of the following protocol packets will the firewall create sessions for?
On an OSPF network, if a router functions as an ABR, the router must also be a BR.
IPv6 defines multiple types of addresses. Which of the following statements is false about these addresses?
Hackers often obtain the login permissions of system administrators through various attacks.
Which of the following measures can be taken to enhance the security of administrator accounts?(Select all that apply)
In the VRP, by default, the routes imported by BGP will be automatically summarized.
When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.
In VRRP networking, devices assume the Master and Backup roles after election. Match the two roles with their working mechanisms.(Token is reusable)
If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.
A large number of routes typically exist in a BGP routing table, and transmitting such extensive routing information brings a heavy burden to a device. In order to address this problem, it is necessary to filter those routes to be advertised. You can configure a device to advertise only necessary routes or those that its peers require.
Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.
Which of the following statements regarding the summary automatic command and BGP route summarization is false?
A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.
To enable PC1 to access PC2 using the IP address of the firewall's GE0/0/2, you need to configure NAPT for source address translation. In the following figure, fill in the blank to complete the command.
Which of the following LSAs are advertised only within a single area?
Which of the following TLVs is used by ISIS to describe the IP address of an interface?
After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.
OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.
See the network shown in the following figure.
R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?
In BGP, Notification messages are used to request peers to resend routing information after routing policies are changed.
L2TP does not provide security encryption. Therefore, other security measures, such as IPsec, are required to ensure the security of the entire tunnel for data transmission.
Which command is used to configure the VRRP preemption delay?
On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.
Which of the following protocols are multi-channel protocols?
Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.)
To inject IGP routes into BGP routes, you can only use the network command.
ICMPv6 messages are classified as error or informational messages.
When a packet passes through a firewall, the firewall creates a session connection for the packet to guide subsequent forwarding of the packet. However, the firewall does not create session entries for all packets. For which of the following packets does the firewall not create session entries when the packet reaches the firewall?
If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.
There are various types of VPNs, which can be applied to different layers. Which of the following network layers does SSL VPN belong to?
BFD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?
Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.
GRE is a Layer 2 VPN encapsulation technology that encapsulates packets of certain data link layer protocols so that the encapsulated packets can be transmitted over an IP network.
A switch running a later IGMP version can identify Report messages of an earlier IGMP version, but the switch running an earlier IGMP version cannot identify Report messages of a later IGMP version. To ensure that IGMP runs properly, you are advised to set the IGMP version on the switch to be the same as or later than the IGMP version of member hosts.
During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.
The BFD Echo function checks the connectivity of the forwarding link by looping back packets. Which of the following statements are true about this function?
When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements isfalseabout BFD optimization?
On the network shown in the following figure, the management VLAN is VLAN 10, and the AP isconfigured to obtain an IP address on the network segment 10.1.1.0/24 through DHCP. The AP, AC, and AR function as the DHCP client, DHCP relay agent, and DHCP server, respectively. Which of the following configurations for the DHCP relay agent and DHCP server are correct?