Hcda All
Hcda All
Hcda All
When both ends running PPP protocol detect that the physical link is active, the link state will transit from dead to establish. Which of the following
A. Distance Vector algorithm can calculate the shortest path to the destination according to the given topology. B. Split horizon can prevent the routing loop between two neighboring routers only. C. Although Holddown mechanism results in slow convergence. completely prevent the routing loop. D. Maximum hop count mechanism can solve the problem caused by routing loop. It can
3. According to OSI reference model, which of the following statements about the function of network layer is correct?
A. Ensure the correctness of data transmission B. Control the forwarding and routing of data packet C. Control transmission of bit flow D. Error correction and flow control
4. A VLAN in the Ethernet is used to separate ( ). A. Layer 2 unicast domain B. Layer 2 broadcast domain C. Layer 2 multicast domain D. Layer 2 MAC address
5. Which port on a UNI-side host or terminal is used to connect to frame relay network? A. DTE B. DCE C. NNI D. None of the above
6. Which of the following are the interface states of STP? (Select 4 Answers) A. Disabled B. Blocking C. Shut down D. Learning E. Forwarding
7. Which of the following is the function of session layer? A. Provide encryption and decryption B. Provide data transformation and data format C. Establish connection between hosts D. Establish maintain and terminate session
8. Which of the following communication types are defined based on information interaction between the transmitter and the receiver? (Select 3 Answers) A. Simplex B. Half-duplex C. Duplex D. Auto-negotiation
9. Which of the following parameter settings for the hyper terminal are correct when we configure a Huawei router through the Console port? A. 4800bps, 8 data bits, 1 stop bits, add parity check, and no flow control B. 9600bps, 8 data bits, 1 stop bits, no parity check, and no flow control C. 9600bps, 8 data bits, 1 stop bits, even parity check, and hardware flow control D. 19200bps, 8 data bits, 1 stop bits, no parity check, and no flow control
10. If the optimal path to the destination IP address is unavailable after a change occurs in a network topology, the dynamic routing protocol can make adaptation to this change and dtermine another optimal path to the destination IP address. A. Ture B. False
11. A static route can be either configured manually by a network administrator or generated automatically. A. True B. False
12. A router receives a packet and the destination of the packet does not match any entries of the routing table in the router. What will the router do? A. Discard the packet directly B. Fragment the packet C. Forward the packet D. Forward the packet according to the default route if the default route exists in the routing table, or else discard the packet
13. Which of the following statements regarding adjacencies of OSPF routers are correct? (Select 4 Answers) A. After two routers have been received the Hello packets from each other, they will form the adjacency automatically. B. If two routers are fully adjacent, the network type between them may be Point-to-Point network. C. If two routers are fully adjacent, the network type between them may be Point-to-Multipoint network. D. If two routers are fully adjacent and the network type between them is broadcast network, then one of routers must be either DR or BDR. E. Only two adjacent routers can exchange LSAs.
14. Which of the following descriptions about PAP and CHAP is correct? A. PAP authentication requires three-way handshake B. CHAP authentication requires two-way handshake C. PAP authentication uses plain text to send authentication message D. CHAP authentication uses plain text to send authentication message
15. What problems can lead a STP loop in a Layer 2 network result in? (Select 2 Answers) A. Increased link bandwidth B. Broadcast storm C. Unstable MAC address table D. Aggregation of ports failed
16. Two OSPF routers become neighbors only after they successfully exchange ( ) packets and LSAs. A. Hello B. DD C. LSR D. LSU
17. Serial interface of a Huawei router need to be encapsulated with PPP protocol. Which of the following commands is required to be configured. A. Link-protocol PPP B. Encapsulation PPP C. Enable PPP D. Address PPP
18. To make sure all hosts belonging to the same VLAN can receive the broadcast packets sent to this VLAN, which of the following operation are needed on the switch? (Select 2 Answers) A. Send the packets out of al ports of the switch. B. Send the packets out of other ports that belong to the same VLAN. C. Send the packets to all trunk links that allow this VLAN to pass. D. Send the packets to all trunks links.
19. The link state database (LSDB) on an OSPF router is formed based on ( ). (Select 2 Answers) A. local LSA B. LSA advertised by a neighboring router C. RSVP packet advertised to a neighboring router D. RSVP packet advertised by a neighboring router
20. In data communications, the data format must be determined and agreed by the information creator and the information on receiver before the data is transmitted. T. True F. False
21. In Ethernet standard, which of the following mechanisms is used to avoid collision when different nodes transmit packets simultaneously? A. CSMA/CA B. CSMA/DA C. CSMA/CD D. CSMA/AC
22. What is the default value of switch priority when STP is enabled on Huawei Switch? A. 4096 B. 8192 C. 16384 D. 32768
23. Which of the following multicast address represents all routers of the subnet? A. 224.0.0.1 B. 224.0.0.2 C. 224.0.0.3 D. 224.0.0.9
24. RTA connects with RTB through interface Serial0. The configuration on RTA is as follow: [RTA]aaa [RTA-aaa]local-user huawei password cipher hello [RTA-aaa]local-user huawei service-type ppp [RTA] interface Serial 0 [RTA-Serial0]link-protocol PPP [RTA-Serial0]ppp authentication-mode chap [RTA-Serial0]ip address 10.1.1.1.30 The configuration on RTB is as follow: [RTB]interface Serial 0 [RTB-Serial0]link-protocol ppp [RTB-Serial0]ppp chap user huawei [RTB-Serial0]ppp chap password cipher hello [RTB-serialo]ip address 10.1.1.2.30 With the configuration on the above. communication with each other. T. True F. False RTA and RTB are able to
26. Which of the following commands is used to enter the system-view from the user view on a Huawei router? A. System-view B. Enable C. Configure terminal D. Interface system
27. VRRP is enabled on the network, which of the following description about default gateway configuration on PC is true? A. Only one default gateway is configured on PC, the IP address is the masters IP address. B. Only one default gateway is configured on PC, the IP address is the IP address of virtual router. C. Two default gateways are configured on PC, the IP addresses are masters IP address and slaves IP address. D. Three default gateways are configured on PC, the IP addresses are masters IP address, slaves IP address and virtual routers IP address.
28. For a traditional class C network without sub-netting, how many hosts are available at most? A. 1024 B. 65025 C. 254 D. 48
29. On Frame Relay, which of the following protocols is used to map the address to DLCI dynamically? A. ARP protocol B. RARP protocol C. InARP protocol D. Map protocol
30. Which of the following is the most appropriate aggregation for network segments 172.128.12.0, 172.128.18.0 and 172.128.19.0? A. 172.128.0.0/21 B. 172.128.0.0/19 C. 172.128.12.0/22 D. 172.128.20.0/20
31. According to OSI reference model, which layer defines mechanical, electrical, functional and procedural functions to realize data tansmission? A. Transport layer B. Data link layer C. Network layer D. Physical layer
32. Which of the following protocols requires three-way handshake and allows only username to be transmitted through network while keeping the password secret? A. PAP B. CHAP C. MD5 D. TCP
33. Which of the following are the sources of the routes in the routing table? (Select 3 Answers) A. Some routes are generated during the startup of the router B. Some routers are generated according to the data link layer protocol C. Some routes are configured manually by the administrator D. Some routes are generated by dynamic routing protocols
35. Which of the following standards is defined by IEEE to regulate the implementation of VLAN between switches? A. 802.1x B. 802.1d C. 802.1q D. 802.3
36. In TCP/IP protocol, what is the decimal range of the first octet of class A address? A. 0 126 B. 0 127 C. 1 126 D. 1 127
37. Which of the following is used to check the route that an IP packet traverses from one host to another host? A. FTP B. Tracert C. ICMP D. Telnet
38. RTA connects with RTB through interface Serial0. The configuration on RTA is as follow : [RTA]aaa [RTA-aaa]local-user huawei password simple quidway [RTA-aaa]local-user huawei service-type ppp [RTA]interface Serial 0 [RTA-Serial0]link-protocol ppp [RTA-Serialo]ppp authentication-mode pap [RTA-Serial0]ip address 10.1.1.1.30 The configuration on RTB is as follow : [RTB]interface Serial 0 [RTB-Serial0]link-protocol ppp [RTB-serial0]ppp pap local-user huawei password simple hello [RTB-Serial0]ip address 10.1.1.2.30 With the configuration above, RTA and RTB are able to communicate with each other T. True F. False
39. Which
of
the
following
statements
regarding
the
IP
address
192.168.16.255/20 are correct? (Select 2 Answers) A. Its a broadcast address B. Its a network address C. Its a private address D. It belongs to the network segment 192.168.19.0 E. It belongs to the network segment 192.168.16.0 F. Its a public adddress
It provides various
functions and features in addition to application-based scalability and customization. T. True F. False
41. When a Class C subnet mask is 255.255.255.192, how many subnets does this network consist of and how many hosts does each subnet. A. 4, 62 B. 8, 62 C. 16, 14 D. 32, 14
42. Packet filtering firewall filters packet based on quintuplet. following are the components of quintuplet? (Select 3 Answers) A. IP address B. Protocol number C. Port number D. Application program E. MAC address
Which of the
43. On huawei router, Before you configure the IP address of an Ethernet subport, you need to configure ( A. MAC address B. VLAN encapsulation C. Global GVRP D. Port GVRP )
44. The PDU (Protocol Data Unit) that resides at data link layer is called ( A. Binary bit flow B. Frame C. Packet D. Segment
).
45. Which of the following protocols are routing protocols? (Select 2 Answers) A. RIP B. OSPF C. PPP D. IPX
46. Whats the broadcast address for network segment 201.1.0.0/21? A. 201.1.7.255 B. 201.1.0.255 C. 201.1.1.255 D. 201.0.0.255
47. To implement network layer capability on the VLAN interface, we need to configure ( ) on VLAN interface. (Select 2 Answers)
48. Which of the following descriptions about function of VRRP is true? A. VRRP improves the reliability of the default gateway in the network B. VRR makes the routing protocols converge faster C. VRRP is mainly used for load balancing D. VRRP provides the same default gateway for different network segments, thus simplifies gateway configuration of PCs in the network
49. Which of the following is used by routers to forward the packets on the network? A. DNS lookups B. ARP tables C. Routing tables D. MAC address tables
50. What functions does a Hello packet of OSPF implement? (Select 2 Answers) A. Discover a neighbor. B. Delete unreachable neighbors as specified time. C. Maintain neighborhood. D. Negotiate parameters among adjacent ports.
51. Which of the following routing protocols are IGPs (Interior Gateway Protocols)? (Select 2 Answers) A. RIP B. OSPF C. IP D. BGP
52. Which of the following descriptions about blocking state in STP is incorrect? A. The port in blocking state can received BPDU B. The port in blocking state does not learn source MAC address of data packet C. The port in blocking state does not forward data packets D. The port in blocking state does not receive any data packets
53. Which of the following fibers allows for multiangular incidence of multiple beams of light for transmission? A. 4-core fiber B. Single-mode fiber C. Multimode fiber D. Active fiber
54. The ( ) is the physical path along which a message passes. A. Protocol B. Signal C. Medium D. Device
55. Which of the following technologies can reduce the scope of broadcast domain? A. VLAN B. Trunk C. RARP D. STP
56. Which of the following statements about the process of creating VLAN are true? (Select 2 Answers) A. The member port of this VLAN enters the active state immediately. B. The routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created. C. A network administrator can create a VLAN either in the global view or in the VLAN view. D. A VLAN can be created only after its member port is allocated to another VLAN.
57. PPP is more secure then HDLC because PPP support authentication protocols such as ( A. PAP B. MD5 C. CHAP D. SSH ). (Select 2 Answers)
58. This device is used between the zones with different security level, control the information exchanged between two networks, enforce the implementation of unified security policy, and prevent the intruder from copying and accessing the important information illegally, in short words, it protects the security of the system. above? A. Firewall B. Gateway C. Router D. IDS Which of the following devices provides the function mentioned
59. The data forwarding of the switch is based on ( A. Source MAC address B. Destination MAC address C. Source IP address D. Destination IP address
).
60. Which of the following statements about the key features of a Layer 3 switch are true? (Select 3 Answers) A. A Layer 3 switch provides Layer 3 functions while providing Layer 2 functions. B. Many Layer 3 switches provide exact search and perform Layer 3 forwarding based on Layer 3 functions. C. All Layer 3 switches provide only ATM port. D. Some high-end Layer 3 switches provide high-speed POS ports to improve the upstream link efficiency.
61. The PPP protocol provides a standard method of transmitting datagrams of different protocols on a point-to-point link. It is a point-to-point communication protocol widely used at the present time. T. True F. False
62. Which of the following network topologies consist of redundant links between any two nodes? (Select 2 Answers) A. Mesh B. Star C. Tree D. Bus E. Ring
63. Which transport-level protocol does Telnet use? A. TCP B. UDP C. ECMP D. UCMP
64. In the PPP protocol, which of the following encryption algorithms is used by CHAP? A. DES B. MD5 C. AES D. None
65. The network address of the IP 190.233.27.13/16 is ( ) A. 190.0.0.0 B. 190.233.0.0 C. 190.233.27.0 D. 190.233.27.1
66. A switch is configured with VLAN 3, VLAN 4 and VLAN 5, GVRP is not enabled for the trunk port. The trunk port then receives a frame with VLAN ID 6. This frame will be ( ).
A. Flooded to all VLANs B. Flooded to VLAN 1 only C. Flooded to all trunk ports D. Discarded
67. After a PPP connection is established, the VRP platform sends Echo-Request packets at the interval of ( A. 1 B. 5. C. 10 D. 60 ) seconds by default.
68. Which of the following protocol is used by RIP to encapsulate the messages? A. UDP B. TCP C. ICMP D. Raw IP
69. What type of port does a hub use? A. MDI B. MDI_S C. MDI_X D. MDI_R
70. Which of the following is the default control policy on Eudemon firewall? A. Loose control policy B. Strict control policy C. Compromise control policy D. No default control policy
71. Which of the following devices operate at data link layer? (Select 2 Answers) A. Hub B. Bridge C. Switch D. Router E. Firewall
72. In Ethernet standard, which of the following mechanisms is used to avoid collision when different nodes transmit packets simultaneously? A. CSMA/CA B. CSMA/DA C. CSMA/CD D. CSMA/AC
A B.
C.
D.
74. Routing Information on Protocol (RIP) is available in the RIPv1, RIPv2, and RIPv3 versions. T. True F. False
75. Which of the following parameter settings for the hyper terminal are correct when we configure a Huawei router through the Console port? A. 4800bps, 8 data bits, 1 stop bits, odd parity check, and no flow control B. 9600bps, 8 data bits, 1 stop bits, no parity check, and no flow control C. 9600bps, 8 data bits, 1 stop bits, even parity check, and hardware flow control. D. 1920bps, 8 data bits, 1 stop bits, no parity check, and no flow control
it provides various
functions and features in addition to application-based scalability and customization. T. True F. False 77. OSPF allows for multiple processes. By default, OSPF selects a process whose No. is ( ). A. 0 B. 1 C. 10 D. 100
78. After an Ethernet frame uses VLAN tag, the Ethernet frame can be expressed in two formats, namely, ( Answers) A. Untagged frame B. Tagged frame C. Row frame D. Column frame ) and ( ) in a switched network. (Select 2
79. Each router only knows how to forward the packet to the next hop IP address. It doesnt know the end to end forwarding path. This type of forwarding is called ( ).
A. Hop by hop forwarding B. Host by hose forwarding C. Router by router forwarding D. Network by network forwarding
81. Which of the following technologies can allow a host with IP address 10.0.0.1 to access the internet? A. Static route B. Dynamic route C. Route import D. NAT
82. Which address of an Ethernet frame is used by a Layer 3 switch to determine whether to perform Layer 2 forwarding or Layer 3 forwarding? A. Destination MAC address B. Source MAC address C. Destination IP address D. Source IP address
83. Whats the broadcast address for 10.1.0.1/17? A. 10.1.128.255 B. 10.1.63.255 C. 10.1.127.255 D. 10.1.126.255
84. A TCP packet consists of a maximum of 60 bytes. How many bytes does a TCP packet header consist of after the Option field is deducted? A. 8 B. 20 C. 30 D. 40
85. A MAC address consists of 48 bits and is generally expressed in 12-bit dotted decimal notation. What kind of address does a MAC address consisting of all 1s stand for? A. Multicast address B. Broadcast address C. Unicast address D. Virtual address
86. What types of port can a switch use? (Select 2 Answers) A. MDI B. MDI_S C. MD_X D. MDI_R
87. FTP is used to upgrade the routers program. transmission modes should be used? A. Binary mode B. Stream mode C. Byte mode D. Letter mode
88. The PDU (Protocol Data Unit) that resides at data link layer is called ( A. Binary bit flow B. Frame C. Packet D. Segment
).
89. Which of the following is the maximum transmission rate of V.35 working in synchronous mode? A. 64Kbps B. 9200bps C. 56kbps D. 2048kbps
90. After STP protocol convergence, which port on the peer is connected directly to the roof port? A. Designated port B. Backup port C. Alternate port D. Edge port
91. POP (Post Office Protocol) is used for receiving E-mail. Which TCP port numbers does it use by default? A. 110 B. 53 C. 21 D. 23
92. A Frame Relay network consists of 12 routers, how many PVCs are built in a full mesh network? A. 6 B. 132 C. 66 D. 12
93. In the PPP protocol, the dynamic negotiation is the same as the static negotiation in the IPCP flow. That is, in either dynamic or static negotiation, allocation of IP addresses is completed after one Config-Request dialog. T. True F. False
94. On Quidway series switch, which of the following VLANs can be removed by using command undo? (Select 3 Answers) A. Vlan 1 B. Vlan 2 C. Vlan 1024 D. Vlan 4094
95. Which of the following allows a user to log in to a remote server through a terminal connected to the same network? A. FTP B. TFTP C. TELNET D. TRACERT
96. What do we call the routers in the routing table that have the same cost to the same destination? A. Equivalent routes B. Sub-optimal routes C. Multipath routes D. Default routes
97. The netwrok address of 125.3.54.56 with default subnet mask is ( A. 125.0.0.0 B. 125.3.0.0 C. 125.3.54.0 D. 125.3.54.32
98. A PC is connected to routers Ethernet port through its network interface card. What type of cable should be used to connect these two interfaces? A. Cross cable B. Straight cable C. Console cable D. Backup cable
99. IGP is the protocol which is used in ( A. An area B. A LAN C. An Autonomous System
100.
).
101.
called (
102.
A. Port-based VLAN B. MAC Address based VLAN C. Protocol-based VLAN D. TCP port-based VLAN
103. A. 3 B. 5 C. 6 D. 7
104.
105.
A. LAN switch detects loops according to the contents of packet B. LAN switch modify the contents of packet if necessary before forwarding C. LAN switch is transparent for user, it does not modify any contents of packet D. LAN switch is able to work properly even when loop exists
106.
that buffer will not overflow when congestion occurs? A. Flow on B. Flow-control C. Flow control D. Enable flow-control
107.
(Select 2 Answers) A. Without manual configuration, an OSPF area is a backbone area with area ID 0 by default. B. OSPF supports area division. C. Every OSPF area is identified by a 32-bit Area ID number. D. Area ID must be assigned by IANA and we can not simply assign it.
108.
109.
which of the following is similar to the configuration on a router? A. Direct route B. Default route C. Dynamic route D. Host route
110. On a port running frame relay, an MAP table corresponds to a logical port. Different logical ports have different MAP tables. T. True F. False
111. Which of the following description about access port are correct? (Select 2 Answers) A. B. C. D. 112. Access port belongs to only one VLAN Access port belongs to multiple VLAN Access port is used for connection between switch and PC Access port is used for connection between switches
Which of the following description about forwarding state in STP is
incorrect?
A. The port in forwarding state can receive BPDU B. The port in forwarding state does not learn source MAC address of the data packet C. The port in forwarding state can forward data packets D. The port in forwarding state can send BPDU
113.
114.
115.
(Select 2 Answers)
A. Complicated configuration and can result in a lot of problems due to misconfiguration B. As the complexity and length of ACL increase, its performance will degrade greatly C. Simple configuration D. Low overhead, high processing speed
116.
Data link layer has two sub-layers, they are ( ) (Select 2 Answers)
117.
How many hosts are available in the network 154.27.0.0 without sub-
netting?
118.
119.
T. True F. False
120.
A router with the Proxy ARP function enabled receives an ARP request
packet but finds that the destination address in the packet is not itself. In this case, what will the router do? (Select 2 Answers)
A. Discard the packet B. Check for a route that matches the destination address C. Forward its MAC address to the ARP request sender after finding that a route to the destination address is available D. Broadcast the ARP request packet
121.
A. Checksum field in the ICMP packet B. Header checksum field in an IP datagram C. Code field in the ICMP packet D. Type field in the ICM packet
122.
123.
124.
not be directly connected. Which of the following ways can be used to solve this problem?
125.
126.
(Select 3 Answers)
A. DLCI is locally significant B. DLCI is allocated by DTE C. The range of DLCI value that can be used is from 16-1007 D. The same DLCI can be configured on different physical interfaces.
127.
There may be multiple paths between a non -roof bridge and a root
bridge. Each of the paths has its own total cost, which is the sum of the port costs of all egress ports on the path.
T. True F. False
128.
A. Layer 2 unicast domain B. Layer 2 broadcast domain C. Layer 2 multicast domain D. Layer 2 MAC address
129.
A. 6 B. 12 C. 24 D. 48
130.
Which function does the NCP protocol can provide for a PPP
connection?
A. Error detection B. User identifier authentication C. Carrying of multiple Layer 3 protocols D. Congestion control
131.
During STP calcuation, STP selects a designated port and bridge for ) of
the port connected to the network segment and selects the one with the lowest number.
A. Link Priority B. Root path cost C. Port identifier D. Port MAC address
132.
Which of the following values is the default preference value for static
A. 0 B. 20 C. 60 D. 100
133.
134.
the network interface card (NIC) of a host. Which of the following represents this type?
135.
A. 10 B. 1 C. 100 D. 120
136.
Which of the follwing are the sources of the routes in the routing table?
(Select 3 Answers)
A. Some routes are generated during the startup of the router B. Some routes are generated according to the data link layer protocol C. Some routes are configured manually by the administrator D. Some routes are generated by dynamic routing protocols
137. is ( ).
OSPF runs over the IP protocol and the IP protocol No. used by OSPF
A. 89 B. 80 C. 512 D. 2328
138.
Which of the following commands can switch a view from the system
139.
A. Check the destination address in a datagram. B. Determine the information source. C. Discover possible routes. D. Verify and maintain route information.
140.
mutlicast address and this can reduce the impact on non-OSPF speaking devices.
A. True B. False
141.
T. True F. False
142.
143.
144.
Which of the following DLCI numbers are used by Frame relay LMI?
(Select 2 Answers)
A. 0 B. 16 C. 1007 D. 1023
145.
146.
pre 10 100
Which of the following statements is correct when this router forwards the packet to the destination host 9.1.4.5?
A. The router selects the first entry to match the destination address of the packet because the preference of OSPF is higher than the preference of RIP B. The router selects the second entry to match the destination address of the packet because the cost of RIP is lower than that of OSPF C. The router selects the second entry to match the destination address of the packet because the outgoing interface is Ethernet interface. The
forward speed of Ethernet interface is faster than the forwarding speed of Serial interface. D. The router selects the second entry to match the destination address of the packet because the router will match the most specific address.
147.
messages?
148.
149.
Ethernet frame?
A. 4 B. 32 C. 12 D. 8
150.
151.
Huawei switch?
152.
T. True F. False
153.
Network side interfaces are classified into two types. What are these
154.
155.
data units (PDUs). What is a PDU with a TCP header called at the Transport Layer? A. Frame B. Packet C. Field D. Binary bit stream
156.
Which of the following is the most common method used to check the
connectivity between an IP network and a host, for example, the connectivity between routers and the connectivity between a router and a host?
157.
A. TCP Request packet B. TCP Reply packet C. ICMP Request packet D. ICMP Reply packet
158.
159.
A. The calculation method of the preference and cost in the routing table are same. B. The calculation of cost may be based on single link attribute or several link attributes such as delay, hop count, bandwidth and etc. C. When several dynamic routing protocols have the best routers to the same destination, all these routes will be added to the routing. D. Some of the dynamic routing protocols calculate the best path base on the cost value. However, Different routing protocol calculates the metric in different ways.
160.
incorrect?
A. The port in blocking state can receive BPDU B. The port in blocking state does not learn source MAC address of data packet C. The port in blocking state does not forward data packets D. The port in blocking state does not receive any data packets
161.
162.
163.
164.
The IP protocol is a kind of unreliable protocol and offers no error To provide error detection, which of the following must the IP
detection.
165.
does a Layer 2 network under the service access control point belong to?
a. Backbone network b. Metropolitan area network (MAN) c. Access network d. Core network
166.
167.
168.
Answers)
169.
A. The next hop in the routing table is redundant because the outgoing interface can be used for packet forwarding. B. The outes from generated by different protocols have different preferences. C. The costs of different routing protocols are comparable. D. The costs of different routing protocols are nto comparable.
170.
171.
Which of the following statemetns regarding the OSPF router types are
A. ABR can be ASBR at the same time B. ABR is the oruter connecting any two OSPF areas and it can be used to transmit the routing information between them C. The router inside an OSPF area can not be ASBR D. An OSPF router can belong to two or more areas but can be the ABR for a single area only
172.
correct? A. Convergence is a process that occurs due to network topology changes B. Convergence is a proces of establishing neighbor relationships between any two routers by sending hello packets C. Convergence is a process of combining the routing tables of two routers D. Convergence is a process of synchronizing all routing tables for all the routers in the network. It is the process for a router to reach the stable and
173.
In the PPP protocol, the dynamic negotiation is the same as the static
negotiation in the IPCP flow. That is, in either dynamic or static negotiation, allocation of IP addresses is completed after one Config-Request dialog. T. True F. False
174. To provide the information about the IP addresses that a user packet traverses along the path to the destination, which of the following does Tracert record in each expired ICMP TTL packet? A. Destination port B. Source port C. Destination address D. Source address
175.
Which of the following statemetns about backup routes are true? (Select 3
Ansers) A. A backup route is not added to the global routing table. B. A static route does not take part in data forwarding. C. After the working route fails, a backup route becomes a working route and is added to the global routing table. D. A static route together with the working route takes part in data forwarding.
176. In an OSPF area, routers exchange information about ( information forms an information library. A. Link status B. Distance vector C. Route cost D. Route priority
).
This type of
177. Which of the following are advantages of layer 2 switch compared with hub? (Select 3 Answers) A. Increase the collision B. Higher throughput C. Higher port density D. Isolate collision domains
178. Which transmission rates does an Ethernet allow for? (Select 3 Answers) A. 10M B. 100M C. 1000M D. 155M
179. Which of the following statements about function of hub is incorrect? A. Hub operates at physical layer, transmits binary bit flow among cables B. Hub is a type of sharing device, only one device in the network can send data at any given time C. Hub operates of data link layer, transmits binary bit flow among cables D. Hub can regenerate and reamplify the binary bit flow and this can increase the transmission distance
180. STP is short for? A. Rapid spanning tree protocol B. Shortest path tree protocol C. Spanning tree protocol D. Sharing tree protocol
181. In the OSI reference model, one layer transmits bit streams between devices. Which of the following layers stands for this layer? A. Data Link Layer B. Physical Layer C. Network Layer D. Application Layer
182. The most significant feature of a local area network (LAN) is that the LAN is intended for only one organization and is geographically limited, allowing interconnections of a limited number of stations. Which of the following transmission media are most common to a LAN? (Select 3 Answers) A. Fiber B. Coaxial cable C. Twisted pair cable D. ADSL
183. Each OSPF router floods LSAs to advertise link status information, including ( ). (Select 3 Answers) A. Ports B. Available neighbors C. Information about adjacent network segments D. Local link status information
184. Which of the folllowing are routed protocols? (Select 2 Answers) A. IP B. OSPF C. BGP D. IPX
185. IGP is the protocol which is used in ( ) A. An area B. A LAN C. An Autonomous System D. Within the range of classful address
186. Which of the following storage devices are supported by Huawei Quidway router? (Select 4 Answers) A. SDRAM B. NVRAM C. Flash D. Hard Disk E. CF Card
187. Which attribute is selection of a root bridge based on when the spanning tree is calculated by the STP? A. Bridge ID B. Path Cost C. Port Cost D. Port ID
188. Which VLAN does an access port of a switch belong to? A. The only defined VLAN B. The VLAN with the greatest No. C. All VLANs D. The VLAN with the smallest No.
189. What is the main function of DNS? A. Domain Name Resolution B. Remote Access C. File Transfer D. Mail Transfer
190.
correct? (Select 2 Answers) A. RIP is based on Bellman-Form algorithm. B. Bellman-Ford is essentially a Dijkstra algorithm. C. When Bellman-Ford algorithm is used to calculate the routes, it does not need to know the whole topology of network. D. Bellman-Ford algorithm is a link-state algorithm.
191.
(Select 2
Answers) A. RIP is an IGP. B. RIP is an EGP. C. RIP is a distance vector routing protocol. D. RIP is a link-state routing protocol.
192. The operation deleting the configuration files saved in the storage devices will become effective after rebooting the router. T. True F. False 193. In general, IP address consists of ( ) (Select 2 Answers)
A. Logic address B. Link address C. Network address D. Host address 194. Which of the following are the disadvantages of packet filtering firewall?
(Select 2 Answers) A. Complicated configuration and can reuslt in a lot of problems due to misconfiguration B. As the complexity and length of ACL increase, its performance will degrade greatly C. Simple configuration D. Low overhead, high processing speed 195. Each router calculates the shortest path tree based on the LSDB with itself as
196.
A. Dialer interface B. Voice interface C. Serial interface D. Sub interface E. CE1/PRI interface F. Virtual interface template G. ISDN BRI interface
197.
) and
one-byte port number. A. Port priortiy B. Link priority C. Bridge MAC address D. Port MAC address
198.
with MDI and MDI_X ports? A. Straight through cable B. Crossover cable C. Twisted cable D. Shielded cable
199 .
and VLAN5. Which of the following statements about VLAN configuration is true? A. VLAN information is saved automatically in the starting configuration. B. After VLAN 3 and VLAN 5 are created manually, the default VLAN is removed automatically. C. The network administrator can create a VLAN either in the global view or in the VLAN view. D. The two VLANs can be named BUILDING_A to differentiate them from the VLANs in other geographical areas
200.
Which of the following statements about an OSPF neighboring router are true?
(Select 2 Answers) A. An OSPF interface broadcast Hello packets to discover a neighbor. B. After a router receives a Hello packet from the peer router, it becomes the neighbor of the peer router. C. After an OSPF router receives a Hello packet from the peer OSPF router, it checks the parameters in the packet. If the parameters in the packet from the peer OSPF router are consistent with the parameters of this OSPF rotuer, the two OSPF rotuers become neighbors of each other. D. Neighbor discovery is equivalent to adjacency establishment.
201. What is the underlying protocol used by Telnet to transmit data? A. RTP B. SIP C. UDP D. TCP
202.
A. A route discovered by a protocol at the link layer need not be maintained. B. A protocol at the link layer can discover only a route to a loopback address. C. A protocol at the link layer can discover only a route in a network segment connected directly to a port. D. A protocol at the link layer can discover only a route across different network segments.
203.
204.
A. Layer 2 unicast domain B. Layer 2 broadcast domain C. Layer 2 multicast doman D. Layer 2 MAC address
205.
datagrams? A. Application Layer B. Network Layer C. Data Link Layer D. Chips at Physical Layer
206.
This type of firewall inspects the connection state for TCP/UDP connections.
It inspects the application layer protocol information, monitor the protocol state for the connected application layer and dynamically make decision on whether the packets are allowed to pass the firewall. Which of the following is best described the firewall mentioned above. A. Packet filetering firewall B. Proxy firewall C. Stateful firewall D. Application layer gateway firewall
207.
packets can be used to detect the link status? A. Data encapsulation B. LCP C. NCP D. IPCP
208.
configuraiton fiels in a router? A. SDRAM B. NVRAM C. Flash D. BootROM 209. Which of the following statements about the ICMP protocol is true?
A. The ICMP protocol searches for IP addresses based on MAC addresses. B. The ICMP protocl translates the IP address of a public network into the IP address of a private network. C. The ICMP protocol monitors errors generated in datagram transmission. D. The ICMP protocol allocates and manages IP addresses in a network in a uniform manner.
210.
211. Which type of Ethernet uses hubs? A. Star Ethernet B. Shared Ethernet C. Switched Ethernet D. Token ring Ethernet
). (Select 3 Answers)
214.
215. During frame forwarding, a switch checks the VLAN tag carried in an Ethernet frame and then determines whether to forward the Ethernet frame through a port if the LVAN tag is a ( ) of this port.
A. Permitted tag B. Default PVID C. MAC address equivalence D. STP disable state
216.
a server for the client and acts as a client for the server? Which of the following firewalls best describes the firewall mentioned above?
A. Packet filtering firewall B. Proxy firewall C. Stateful firewall D. Application layer gateway firewall
217.
A series of packets are used in a Ping test to determine wehtehr delay and
packet loss occur in communication. Which of the following represents the packet used in a Ping test?
218. Which of the following description about STP designated port is correct?
A. Each bridge can have only one desginated port B. Designated port is responsible for sending STP packets to its connected netework segments C. Designated port is a path leading to the root switch D. Designated port forwards packet destined for the root switch
219.
Which of the following descriptions about trunk port are correct? (Select 2
Answers)
A. Trunk port belongs to only one VLAN B. Trunk port belongs to multiple VLAN C. Trunk port is used for connection between switch and PC D. Trunk port is used for connection between switches
220.
T. True F. False
221.
A. Only master process the data sent to the virtual router B. Only slave processes the data sent to the virtual router C. Both master and slave process the data sent to the virtual router D. By default, only master processes the data sent to the virtual router. However, if slave is enabled, it can also processes the data sent to the virtual router.
222.
223.
Which of the following fields are contained in a TCP packet header? (Select
224.
225.
In OSPF protocol, most of the packets are sent by using reserved multicast
address and this can reduce the impact on non-OSPF speaking devices. T. True F. False
226.
The 192.168.1.7 IP address uses a natural mask. In this case, which of the
227. Which of the following methods can be used to upgrade the VRP software? (Select 3 Answers)
229.
230.
A. 23 B. 25 C. 27 D. 29
231.
A. Root port B. Backup root port C. Optional port D. Alternate port E. Designated port
232.
In one IP address, the network part is constant and the host part consists of
A. Network address B. Broadcast address of a specific network segment C. All the networks D. Broadcast addresses of all the nodes in the specified network
233.
peer 192.169.1.3 on ethernet1/0/1 is displayed in the returned result. What does ethernet1/0/1 stand for?
A. Port connected to the RIP neighbor with the IP address of 192.169.1.3 B. Port corresponding to the RIP transmission address C. Port with the broadcast protocol enabled D. Port with the multicast protocol enabled
234.
A. All link states B. Routing states C. MAC address table D. ARP table
235.
any data frame nor learns MAC address tables. It takes part in only spanning tree calculation in addition to receiving and sending STP protocol packets. Which state does the abovementioned state refer to?
236. Which of the following statements regarding default route are correct? (Select 2 Answers)
A. Default route is more preferred over the specific route B. Default route is used only when the destination route is not in the routing table C. Default route can be configured manually D. Default route is a special type of dynamic route
237.
A. Save the bandwidth B. Loop-avoidance C. Propagate the unreachable routing information throughout the network D. Advertise the local route information to the RIPs neighbor
238.
239.
240.
A. Not fixed B. In front of the source MAC address and destination MAC address C. Behind the source MAC address and destination MAC address D. Between the source MAC address and destination MAC address
241.
Assume all of STP enabled switches have the same bridge priority. The
MAC address of switch A is 00-e0-fc-00-00-40, the MAC address of switch B is 00e0-fc-00-00-10, the MAC address of switch C is 00-e0-fc-00-00-20, and the MAC address of switch D is 00-e0-fc-00-00-80. Which switch will be elected as the root switch?
242.
243.
PSTN switching technology. Which of the following statements about circuit switching are correct? (Select 3 Asnwers)
A. Low delay B. Transparent transmission, which means no modificiation on user data C. Fixed badwidth, utilization rate for the network resoruce is high D. Ensure the Quality of service
244.
A. Enables the function of requesting for an IP address from the peer device B. Enables the function of accepting the request for an IP address from the remote device C. Enables the function of statically allocating IP addresses to the peer D. None of the above
245.
A. SVC(Static Virtual Circuit) B. TVC(temporary Virtual Circuit) C. PVC(Permanent Virtual Circuit) D. SVC(Switching Virtual Circuit)
246.
A. Each ports of switch is an independent collision domain B. The collision that happends in the network connected with one port of a switch will affect another network connected with another port of the switch C. The number of the collision domains will be incureased if the hub in the network is replaced with the bridge D. Reduce the number of hosts in a network can decrease probability of collision
247.
Assume that the router has learnt the best route to the same destination by
using RIP, OSPF, BGP and Static Route respectively. By default, Huawei router will select the route learnt from ( ) as the best route.
248.
values, this datagram is discarded and a certain ICMP packet is sent to the source. Which type of ICMP packet is sent to the source?
A. Destinaton Uncreachable packet B. Source Quench packet C. Parameter Problem packet D. Redirect packet
249.
function. With this funciton, the two ends of a link can negotiate with eah other to use which authentication protocol and then performa authentication. A PPP connection is established only when the authentication is successful.
T. True F. False
250.
these types of the coaxial cables is suitable for relatively large LAN because it supports long distance and provides high reliability. Which of the following coaxial cables belongs to this type?
A. Coaxial cable with a large diameter B. Coaxial cable with a small diameter C. 10-core coaxial cable D. 16-core coaxial cable
251.
of packets at different times. To match the Request packet with a Reply packet, each packet contains an Idnetifier field. In each authentication process, all the packets use the same Identifier information.
T. True F. False
252.
How many bytes does the Maximum Receive Unit (MRU) of PPP consist of
by default?
253. signal?
254.
A. Address space of sub-network must meet the practical requirements. At the same time, redundancy is needed to ensure the extensibility. B. Since IP address borrowing method can be used preserve IP address, the size of the sub-network required may be smaller than actual requirement. C. The size of the sub-network should be integral power of two make it easier for the implementation of various policies. D. All of the statements above are correct but none of them can be used in actual network implementation.
255.
(Select 2 Answers)
A. Routing loops cause the packets not able to reach the destination and this will result in network congestion. B. Route loops are generated by dynamic routing protocols only. C. Packets are routed circularly between two or more routers and will be discarded when the TTL becomes 0. D. Link state routing protocols will not cause the routing loops.
256.
(Select 2 Answers)
257.
What are the rip metricout value and trip metricin value commands used to
A. Metric increased by sending RIP route information on the interface. B. Metric increased by receiving RIP route information on the interface. C. Metric contained in the transmitted RIP route information on the interface. D. Metric contained in the received RIP route information on the interface.
258.
A switch reads the destination address before receiving the entire frame and
then forward this frame. The switching mode for this switch is?
259. Which of the following protocols is used to send email on the internet?
260.
Routing metric is a value that measures the cost of the route to the
designated destination and it is used to calculate the best path. Which of the following factors can affect the metric of a route? (Select 3 Answers)
261.
If a WAN exists between a router and a terminal, a user on the terminal can ).
A. A route is available between the terminal and the router. B. A route is available between the terminal and the router and the communication between the terminal and the router is normal. C. The terminal and router are in the same VPN. D. The IP address of the terminal and that of the router belong to the same network segment.
262.
).
263.
264.
In a ( ) network, DRs and BDRs are used to prevent the problem with route
265.
A. ppp pap B. ppp chap C. ppp authentication-mode pap D. ppp authentication-mode chap
266.
The bus and star topologies, which are frequently used in a LAN, refer to the
physical connection types rather than the logical structure of the network.
T. True F. False
267. cost?
268.
).
269.
(Select 3 Answers)
A. For the proxy firewall, a module must be developed for each application. Therefore, the development cost is high. B. Proxy firewall has better security compared with packet filtering firewall. C. Proxy firewall does not support abundant services. D. The performance of proxy firewall is higher.
270.
A. Service control plane B. Versatile control plane C. System management plane D. None of the above
271.
272.
the following binary numbers does the first byte of the three octets start with?
273.
A. Find the hardware address of the device according to its IP address. B. Find the DLCI number of the connection. C. Find the IP address of the remote device based on virtual circuit in Frame Relay network. D. Establish the mapping relationship between IP address of remote device and DLCI.
274.
275.
Which of the following products use the VRP platform as the core engine of
276.
Answers)
277.
For a class C IP address, how many bits at most can be use dfor sub-netting?
A. 6 B. 8 C. 12 D. 14
278.
packet processing?
279.
280.
Which of the following itmes are the contents of the routing table? (Select 2
Answers)
281. Which of the following well-known ports is used by the FTP server to listen for the client connection? A. 21 B. 23 C. 25 D. 53
282.
experiemental and has never been deployed? A. OSPFv1 B. OSPFv2 C. OSPFv3 D. OSPFv4
283.
For an IP address 192.168.12.43, its mask is 255.255.255.128, its network ), and its broadcast address is ( ).
address is (
E. 192.168.12.0 192.168.12.127
284.
How many insulated copper conductors aligned and then twisted together in a
A. 2 B. 3 C. 8 D. 16
285.
The interface Ethernet0/0 of RTA and RTB are connected to the same LAN.
VRRP are enabled on both RTA and RTB. At the same time, virtual routers are created. The virutal routers ID are 1 and virutal IP addresses are 10.1.1.254. RTAs priority is 200 while RTBs priority is the default value. The following command is configured on RTA, [RTA-Ethernet0/0]vrrp vrid 1 track Ethernet 1/0 reduced 150 Which of the following descriptions are correct? (Select 2 Answers) A. If RTAs interface 0/0 goes wrong, RTAs priority becomes 150 B. If RTAs interface 0/0 goes wrong, RTAs priority bocomes 50 C. If RTAs interface 0/0 goes wrong, RTBs priority becomes 150 D. If RTAs interface 0/0 goes wrong, RTB becomes master