Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

H12-211-Enu V8.02

Download as pdf or txt
Download as pdf or txt
You are on page 1of 159

T estpassportQ&A

*KIJGT  3 WCNKV [ $ GV V GT  5 GT X KE G

=KULLKXLXKK[VJGZKYKX\OIKLUXUTK_KGX
*VVRYYYVGUVRCUURQTVEQO
The safer , easier way to help you pass any IT exams. 

Exam : H12-211-ENU

Title : HCNA-HNTD (Huawei


Network Technology and
Device)

Version : V8.02

1 / 158
The safer , easier way to help you pass any IT exams. 

1. Which parts of a complete data communication system consists of ? ( Please select 4 answers )
A. Sender
B. recipient
C. Media
D. card
E. Agreement
Answer: A B C E

2. Message from a sender to a receiver elapsed between the physical channel is called ( )
A. Agreements
B. Signal
C. Media
D. Equipment
Answer: C

3. Two devices can transmit or receive data , but not both simultaneously.which working style is this?
A. simplex
B. half-duplex
C. full-duplex
D. auto-negotiation
Answer: B

4. Divided according to the network topology structure, the network can be divided into (please select 4
answers)
A. Bus
B. Star
C. Tree
D. Ring
E. Grid
Answer: A B C D

5. The following topology structure, which is of the highest reliability?


A. Bus
B. Star
C. Ring
D. Grid
Answer: D

6. According to geographic scope , the network can be divided into ( please choose 2 answers )
A. Campus Network
B. LAN
C. WAN
D. Enterprise Network
Answer: B C

2 / 158
The safer , easier way to help you pass any IT exams. 

7.RFC(Request For Comments) is generated by which of the following standardization organization?


A.IEEE
B.ITU-T
C.IETF
D.ISO
Answer: C

8. Which of the following standardization organizations to make the most LAN related protocols, such as
the 802 series protocol ?
A.IEEE
B.ITU-T
C.IETF
D.ETSI
Answer: A

9. In what kind of network topology structure, a link failure will cause all communication interrupt?
A. Mesh
B. Bus
C. Star
D. Tree
Answer: B

10. In which of the following network topology structure with redundant links between every two nodes ?
( Please choose 2 answers )
A.mesh
B.star
C.tree
D.bus
E.ring
Answer: A D

11. Judge: The data format in the data communication needs information founder and recipient to reach a
consensus in advance.
A.True
B.False
Answer: A

12. LAN 's main features are: network owned by a unit and the geographic scope and the number of sites
are limited. Common LAN transmission media are ( please select 3 answers )
A. Fiber
B. Coaxial
C.Twisted pair
D. Serial Line

3 / 158
The safer , easier way to help you pass any IT exams. 

Answer: A B C

13. In Half-duplex mode of data communication,each device can send and receive , but not both
simultaneously. When a device sends, the other can only receive. or vice versa. The following working in
half-duplex mode has
A. Keyboard
B. Display
C. Interphone
D. Telephone Network
Answer: C

14. Classified information from both sides interactive communication , there can be several ways of
communication ? ( Choose 3 answers )
A. simplex
B. Half-duplex
C. duplex
D. auto-negotiation
Answer: A B C

15. Network connection geographical scope is bigger,to provide data communications services in a wide
range of area, ,which is mainly used for the interconnection of LAN network
A. Large LAN
B. WAN
C. MAN
D. backbone
Answer: B

16. Judge: the Bus of the local area network (LAN) is commonly used, the star topology structure refers to
the actual physical equipment configuration, rather than the logical structure of the network.
A.True
B.False
Answer: B

17. When a node on the network medium to transmit data , the data will be sent to all nodes. This network
topology structure is
A. Star
B. Bus
C. Tree
D. Ring
Answer: B

18. Topology structure have a central control point, easy to design and installation, network media directly
from a central hub or switch to connect to the workstation location.The disadvantage is that, once the
center points of control equipment problems prone to a single point of failure.The topological structure of

4 / 158
The safer , easier way to help you pass any IT exams. 

the commonly used LAN is


A.Star
B.Bus
C.Tree
D.Ring
Answer: A

19. As the signal conversion equipment between terminal system and communication system,Modem is
one of the indispensable equipment in the wide area network.Modem connected to the router serial port,
divided into two kinds of ( ).(please select 2 answers)
A. Synchronization
B. Asynchronous
C. Switched
D. Routed
Answer: A B

20. IEEE standard LAN mainly defines the 802 X protocol suite, which of the standard of WLAN is
A.802.3
B.802.4
C.802.5
D.802.11
Answer: D

21. OSI reference model is to build a computer network easy to understand , clear hierarchical model .OSI
reference model is proposed by ( ) standards organizations .
A.ISO
B.IEEE
C.ITU
D.IETF
Answer: A

22. What is OSI represented in OSI reference model ?


A.Organization Standard Institute
B.Organization Standard Interconnection
C.Open System Internet
D.Open System Interconnection
Answer: D

23. OSI reference model divides the network into ( ) layers.


A.3
B.5
C.6
D.7
Answer: D

5 / 158
The safer , easier way to help you pass any IT exams. 

24. When the packet is passed from the top to the lower, head will be
A. Add
B. Stripping
C. Reorder
D. Modify
Answer: A

25. In the OSI model, the transport layer is ( ) layer.


A.3
B.4
C.6
D.7
Answer: C

26. In the OSI reference model, the bottom is


A. The data link layer
B. Application Layer
C. Physical Layer
D. Network Layer
Answer: C

27. In the OSI reference model , which defines the data needed to realize the transmission of mechanical,
electrical, features and process method?
A. Transport Layer
B. Data link layer
C. Network Layer
D. Physical Layer
Answer: D

28. The physical layer transmission is


A. Frame
B. Package
C. Segment
D. Binary bit stream
Answer: D

29. The data link layer protocol used for protocol data unit
A. Binary bit stream
B. Frame
C. Package
D. Segment
Answer: B

6 / 158
The safer , easier way to help you pass any IT exams. 

30. Which of the following protocol is a data link layer protocol ? ( Choose 3 answers )
A.PPP
B.HDLC
C.IPX
D.IEEE 802.3
Answer: A B D

31. The data link layer consists of two sub-layers , respectively ( please choose 2 answers )
A.PVC sub-layer
B.MAC sub-layer
C.LLC sub-layer
D.VC sub-layer
Answer: B C

32. Which of the following devices are working in the data link layer ? ( Choose 2 answers )
A. Hub
B. Bridge
C. Switch
D. Router
E. firewall
Answer: B C

33. Broadcast MAC address is


A.FF-FF-FF-FF
B.FF-FF-FF-FF-FF-FF
C.00-00-00-00-00-00
D.00-00-00-FF-FF-FF
Answer: B

34. In the IEEE 802 system protocol,which is described the function, characteristics and protocol of LLC
sub-layer ?
A.IEEE 802.2
B.IEEE 802.3
C.IEEE 802.4
D.IEEE 802.5
Answer: A

35. Which of the following is related to the WAN data link layer protocol? (please select 2 answers)
A.Ethernet
B.PPP
C.HDLC
D.UDP
E.SMTP
Answer: B C

7 / 158
The safer , easier way to help you pass any IT exams. 

36. Routers work in the OSI reference model


A. Physical Layer
B. Data link layer
C. Network Layer
D. Application Layer
Answer: D

37. Which of the following news can provide error message to the source point and IP packet processing
problem?
A.TCP
B.UDP
C.ICMP
D.IGMP
Answer: C

38. When data at the network layer, we call it


A. Segment
B. Package
C. Bit
D. Frame
Answer: B

39. In the OSI model, which description is correct about the network layer functions?
A. ensure data transmission is correct
B. determine how the packets are forwarded and routing
C. on the channel transmit bit stream
D. error correction and flow control
Answer: B

40. The role of ARP protocol is


A. the port number is mapped to IP addresses
B. access layer 2 address the corresponding IP address
C. broadcast IP address
D. obtain an IP address corresponding to the second floor of address
Answer: D

41. The role of the RARP is


A. converts own IP address to MAC address
B. convert other's IP address to MAC address
C. convert other's MAC address to IP address
D. know own MAC address, get own IP address through RARP protocol
Answer: D

8 / 158
The safer , easier way to help you pass any IT exams. 

42. The characteristics of the IP protocol is


A. reliable connectionless oriented
B. unreliable ,connectionless oriented
C. reliable, connection-oriented
D. unreliable ,connection-oriented
Answer: B

43. Which parts are generally consisted of network address ? ( Choose 2 answers )


A. Logical address
B. Link Address
C. Network Address
D. Host Address
Answer: C D

44. Which of the following protocols provide connection-oriented transport service ?


A.IP
B.IPX
C.TCP
D.UDP
Answer: C

45. Which of the following protocol belongs to the transport layer?(please select 2 answers)
A.IP
B.TCP
C.UDP
D.SNMP
Answer: B C

46. Multiplexing is the multiple applications to share the same transport layer connection established for
data transmission ,what is is to distinguish the different applications at the transport layer?
A.DSAP
B.SSAP
C. Protocol No.
D. port number
Answer: D

47. DNS port number is


A.21
B.23
C.53
D.80
Answer: B

48. What is correctly described the process of data encapsulation?

9 / 158
The safer , easier way to help you pass any IT exams. 

A. Data segment - > packet - > Data Frame - > Data Flow - > Data
B. Data Flow - > Data segment - > packet - > Data Frame - > Data
C. Data - > Packet - > Data segment - > Data Frame - > Data Flow
D. Data - > Data segment - > packet - > Data Frame - > Data Flow
Answer: D

49. What is the function of the session layer?


A. provide encryption/decryption
B. provide data conversion and formatting
C. establish a connection between different host
D. establish, maintain, and terminate the session
Answer: D

50. The level of the TCP/IP protocol is not divided according to the OSI reference model, corresponding to
the seven layers of the OSI network model, which is not defined
A. Link layer and the network layer
B. Network layer and transport layer
C. Session layer and the presentation layer
D. Transport layer and the session layer
Answer: C

51. RPC, NFS, SQL these protocol work in the ( ) of OSI reference model
A. Network Layer
B. Transport Layer
C. Session Layer
D. Presentation Layer
Answer: C

52. In the OSI reference model , which of the following items is a function of the presentation layer ?
( Choose 3 answers )
A. Data Encryption
B. Data Compression
C. Session Control
D. Data Format Conversion
Answer: A B D

53. OSI reference model for the first layer to the ( ) layer is called the Lower layer, responsible for data
transmission in the network.
A.second
B.third
C.forth
D.fifth
Answer: B

10 / 158
The safer , easier way to help you pass any IT exams. 

54. Internetworking devices are often located under the ( ) layer of the OSI reference model, in a way that
is combination of hardware and software implementation.
A.second
B.third
C.forth
D.fifth
Answer: B

55. OSI reference model from the ( ) layer to the seventh layer is called Upper layer, also called the host
layer .
A.second
B.third
C.forth
D.fifth
Answer: D

56. Upper layer is used to guarantee the correct data transmission, to implement in ( ) way.
A. hardware
B. software
C. combination of hardware and software
D. software or hardware
Answer: B

57. In the OSI reference model ( ) function is to build a host of end-to-end connection, providing data
transfer and error detection before the retransmission .
A. The data link layer
B. Physical Layer
C. Network Layer
D. Transport Layer
Answer: D

58. In the OSI reference model ( ) function is to provide all kinds of application layer data coding and
conversion functions, process the data format, data encryption, etc.
A. Presentation Layer
B. Session layer
C. Network Layer
D. Application Layer
Answer: B

59. In the OSI reference model( ) function is to put the bits into bytes, then bytes into frames, provide
media access, etc.
A. The data link layer
B. Session layer
C. Network Layer

11 / 158
The safer , easier way to help you pass any IT exams. 

D. Application Layer
Answer: A

60. In the OSI reference model ( ) function is the bitstream transmitted between devices.
A. The data link layer
B. Physical Layer
C. Network Layer
D. Application Layer
Answer: B

61. In the OSI reference model ( ) communication consists of application in different devices between the
service request and response.
A. The data link layer
B. Session layer
C. Network Layer
D. Application Layer
Answer: B

62. OSI reference model provides network services through the application , which provides
communication between the application?
A. The data link layer
B. Session layer
C. Network Layer
D. Application Layer
Answer: D

63. Similar to the OSI model , TCP / IP model uses the same hierarchical structure . TCP / IP model is
divided into ( ) levels.
A.forth
B.fifth
C.sixth
D.seventh
Answer: B

64. Different point of TCP / IP model and the OSI reference model is TCP / IP classified the ( ) of the OSI
model to the application layer.
A. transport layer, presentation layer
B. session layer, presentation layer
C. transport layer, session layer
D. presentation layer, application layer
Answer: B

65. Use PDU ( protocol data unit ) to exchange information between each layer TCP / IP model , PDU with
the transport layer of the TCP header is called

12 / 158
The safer , easier way to help you pass any IT exams. 

A. Frame
B. Package
C. Segment
D. Binary bit stream
Answer: C

66. TCP/IP model () specification data transmission rate, the maximum transmission distance, etc.
A. Physical Layer
B. Data link layer
C. Transport Layer
D. Application Layer
Answer: A

67. WAN related G.703 standard belongs to ( ) standard.


A. Physical Layer
B. Data link layer
C. Transport Layer
D. Application Layer
Answer: A

68. Repeaters work in which layer of the TCP/IP model?


A. Physical Layer
B. Data link layer
C. Transport Layer
D. Application Layer
Answer: A

69. Made of fiberglass and shielding layer,is not affected by the interference of electromagnetic signal,
high transmission rate, transmission distance is long.But the price is expensive.This kind of physical
media is
A. coaxial-cable
B. twisted pair
C. optical fiber
D. waveguide fiber
Answer: D

70. ( ) of the data link layer is responsible for the identification protocol type and to encapsulate data, and
has the PDU sequence control, error control, flow control, and other functions.
A.PVC sub-layer
B.MAC sub-layer
C.LLC sub-layer
D.VC sub-layer
Answer: C

13 / 158
The safer , easier way to help you pass any IT exams. 

71. Which of the following protocols belong to WAN of commonly used data link layer protocol (please
select 2 answers )
A.802.2
B.802.4
C.HDLC
D.PPP
Answer: C D

72. Which of the following protocol is an abbreviation of ICMP protocol ?


A.Internal Control Mail Protocol
B.Intranet Control Message Protocol
C.Internet Connection Message Protocol
D.Internet Control Message Protocol
Answer: D

73. The ICMP protocol agreement number is


A.1
B.6
C.17
D.22
Answer: A

74. Which of the following operations can be sure that the installation or the running of the TCP/IP
protocol have problems?
A.ping 10.1.1.1
B.ping 127.0.0.1
C.ping 169.254.1.1
D.ping 192.168.1.1
Answer: B

75. Which of the following program can detect the packet data path between source node and destination
node ?
A.route
B.netstat
C.tracert
D.send
Answer: C

76. Tracert program is a program of application layer , it uses the transport protocol of


A.ICMP
B.ARP
C.TCP
D.UDP
Answer: D

14 / 158
The safer , easier way to help you pass any IT exams. 

77. When tested using the tracert program to reach the target node path, by default to measure for each
Traceroute TTL value ( ) times
A.3
B.4
C.6
D.8
Answer: A

78. Judge: ICMP protocol (RFC792) is not the application layer protocol, it is network layer protocol.
A.True
B.False
Answer: A

79. The types of ICMP packet ( Please select 2 answers )


A.ICMP transmission message
B.ICMP error report message
C.ICMP inquiry message
D.ICMP application message
Answer: B C

80. ICMP ( ) bytes before is the unified format, with a total of three fields: the types, code, and the
checksum.
A.3
B.4
C.5
D.8
Answer: A

81. The following description about the ICMP protocol, which is correct


A.ICMP protocol to find the corresponding IP addresses based on MAC address
B.ICMP protocol convert public IP address to the IP address of the private network
C.ICMP protocol used to monitor the datagram transmission errors
D.ICMP protocol centralized management in the network IP address assignment
Answer: C

82. ICMP messages are usually reported in the ( ) of IP packet handling process


A. Delay
B. Error
C. Jitter
D. Source IP
Answer: B

83. To test the entire ICMP message through

15 / 158
The safer , easier way to help you pass any IT exams. 

A.ICMP message inspection and field


B.IP datagram header inspection and field
C.ICMP message code field
D.ICMP message type field
Answer: A

84. IP protocol is an unreliable protocol ,unable to error control.But the IP protocol can use ( ) to achieve
this function.
A.ARP
B.ICMP
C.TCP
D.UDP
Answer: B

85. Which of the following pictures is twisted pair ?


A.

Answer: A

86. Which of the following pictures is Optical fiber ?


A.

Answer:A

87. Which of the following module is an RJ45 interface module connector ?


A.

Answer:A

88. Which of the following cable is used to connect the device to the console port and PC com port
configuration line ?
A.

16 / 158
The safer , easier way to help you pass any IT exams. 

Answer:A

89. Known as shown in figure given in the cable and interface, can you tell me the cable type is most likely

A. standard twisted-pair
B. coaxial electric axis
C.V.24
D.V.35
Answer: D

90. ( ) root insulated copper wires together side by side with each other, then twisted together with the
method of the rules constitute the twisted-pair cable.
A.2
B.3
C.8
D.16
Answer: A

91. There can be many different angles of incidence of light in one optical fiber transmission, the optical
fiber is called
A. Four-core optical fiber
B. single mode optical fiber
C. multimode optical fiber
D. active optical fiber
Answer: C

92. The default mask of class B addresses is

17 / 158
The safer , easier way to help you pass any IT exams. 

A.255.0.0.0
B.255.255.0.0
C.255.255.255.0
D.255.225.255.255
Answer:A

93. A class B IP address can have about ( ) hosts.


A.254
B.16K
C.63K
D.2M
Answer: C

94. What is the network address to use the IP address 125.3.54.56 of the natural mask?
A.125.0.0.0
B.125.3.0.0
C.125.3.54.0
D.125.3.54.32
Answer: A

95. The first octet in binary IP address of the beginning of 1110 is ( ) address.


A.A class
B.B class
C.C class
D.D class
Answer: D

96. Reserved for loopback testing network IP address is


A.127.0.0.0
B.130.0.0.0
C.164.0.0.0
D.200.0.0.0
Answer: A

97. In TCP/IP protocol, what is the scope of the first byte of class A address ?
A.0---126
B.0---127
C.1---126
D.1---127
Answer: C

98. For a tradition without subnetting Class C network address , the host can accommodate the maximum
number of
A.1024

18 / 158
The safer , easier way to help you pass any IT exams. 

B.65025
C.254
D.48
Answer: C

99. The role of the IP address in the network number


A. specified network host belongs
B. marks the hosts in the network
C. Specify the network devices to communicate
D. Specify the subnet addressed a node
Answer: A

100. Which of the following multicast addresses represent all routers and hosts in the subnet ?
A.224.0.0.1
B.224.0.0.2
C.224.0.0.3
D.224.0.0.9
Answer: A

101. Which of the following addresses means that all routers in the subnet ?
A.224.0.0.1
B.224.0.0.2
C.224.0.0.3
D.224.0.0.9
Answer: B

102. In IP address, network and host part of the address expressed as a whole 0 means
A. Network Address
B. Specific network segment broadcast address
C. All Network
D. This network segment broadcast address to all nodes
Answer: C

103. IP address 190.233.27.13 is ( ) class address.


A.A
B.B
C.C
D.D
Answer: B

104. What is the network address of IP address 190.233.27.13/16 segment ?


A.190.0.0.0
B.190.233.0.0
C.190.233.27.0

19 / 158
The safer , easier way to help you pass any IT exams. 

D.190.233.27.1
Answer: C

105. Which of the following types are used to support multicast ?


A.A class
B.B class
C.D class
D.E class
Answer: C

106. How many bits of the default subnet mask of IP address 219.25.23.56?


A.8
B.16
C.24
D.32
Answer: C

107. Divide the subnet is in the ( ) part of the IP address.


A. network segment address
B. host Address
C. subnet segment
D. the default subnet mask
Answer: B

108. A class B IP address is most available( )bit to divide the subnet.


A.8
B.14
C.16
D.22
Answer: B

109. A class A IP address subnet mask 255.255.240.0 has ( ) bits are used to divide the subnet.
A.4
B.5
C.9
D.12
Answer: D

110. Class C subnet address the largest possible number of bits is ( ) bit .


A.6
B.8
C.12
D.14
Answer: A

20 / 158
The safer , easier way to help you pass any IT exams. 

111. Network address for 154.27.0.0 network , if not for subnet division ,can support ( ) hosts.
A.254
B.1024
C.65,534
D.16,777,206
Answer: C

112. VLSM is the meaning of


A.Variable Length Subnet Masking
B.Variable Length Shortest Masking
C.Very Long/Shortest Masking
D.Variable Long Subnet Masking
Answer: A

113. For such a network segment 192.168.2.16/28,pls tell me how many ( ) hosts can accommodate at
most.
A.16
B.8
C.15
D.14
E.7
Answer: D

114. The subnet mask 255.255.192.0 binary representation of


A.11111111 11110000 00000000 00000000
B.11111111 11111111 00001111 00000000
C.11111111 11111111 11000000 00000000
D.11111111 11111111 11111111 00000000
Answer: C

115. Dicimal value of binary 11001011 is


A.171
B.193
C.203
D.207
Answer: C

116. Which of the following subnet mask is the most suitable for point to point links?
A.255.255.255.224
B.255.255.255.240
C.255.255.255.248
D.255.255.255.252
Answer: C

21 / 158
The safer , easier way to help you pass any IT exams. 

117. Routing entries 10.0.0.24/29 may be provided by the following ( ) comes from the convergence of
several slivers network . (please select 2 answers)
A.10.0.0.25/30
B.10.0.0.23/30
C.10.0.0.26/30
D.10.0.0.22/30
Answer: A C

118. Which of the following description about NAT is correct? (please select 3 answers)
A.NAT is the abbreviation of English "address translation", also known as the address translation
B.NAT used to implement conversion between the private address and public network address
C.When the hosts of the internal network to access external networks , must not require NAT
D.Address Translation is proposed to solve the problem of shortage of IP addresses provides an effective
way
Answer: A B D

119. What is the necessary technical to let an IP address 10.0.0.1 host access to the Internet?
A. Static Routing
B. Dynamic Routing
C. route introduce
D.NAT
Answer: D

120. NAT can solve the problem of


A. Save Internet public address
B. improve router forwarding performance
C. enhance the security of data transmission
D. protect your computer from virus attacks
Answer: A

121. NAT can transform the network address of


A.IP
B.IPX
C.AppleTalk
D.DECNET
Answer: A

122. Judge : IP address using hierarchical design ,each three-tier network devices do not have to save
each host's IP address , but the store network address of each segment ,greatly reducing the routing table
entries , increase the flexibility of the routing.
A.True
B.False
Answer: A

22 / 158
The safer , easier way to help you pass any IT exams. 

123. IPv4 address consists of 32 bit , which usually dotted decimal form, such as 11.110.96.132. In
addition , IP address 11.110.96.132 can also be expressed as the following form (please select 2
answers)
A.00001011.01101110.01100000.10000100
B.0b.6e.60.84
C.0.b.6.e.6.0.8.4
D.0.1011.0110.1110.0110.0.1000.0100
Answer: A B

124. IP address 191.10.96.132 using natural mask ,what is the network address of 191.10.96.132 ?
A.191.0.0.0
B.191.10.0.0
C.191.10.48.0
D.191.10.96.0
Answer: B

125. Network part of IP address fixed ,host part to all 1 address means


A. Network Address
B. Specific network broadcast address
C. All Network
D. This broadcast address of all the nodes
Answer: B

126. When the IP address of the host part of the digits of n,the number of usable host address in the
network is
A.2^n-1
B.2^n-2
C.2^n-1
D.2^n
Answer: B

127. The network address of the class C IP address for the first three eight array, the first byte start
from( ).
A.101
B.100
C.110
D.10
Answer: C

128. Subnet mask of IP address 192.168.1.7/28 is


A.255.255.255.240
B.255.255.255.248
C.255.255.255.224

23 / 158
The safer , easier way to help you pass any IT exams. 

D.255.255.255.252
Answer: B

129. What is the newwork address of IP address 192.168.1.7/28 ?


A.192.168.1.0
B.192.168.1.4
C.192.168.1.6
D.192.168.1.7
Answer: A

130. IP address 192.168.1.7 uses natural mask , its network address is


A.192.168.1.0
B.192.168.1.4
C.192.0.0.0
D.192.168.0.0
Answer: A

131. ARP protocol is a kind of ( ) protocol.


A. Unicast
B. Multicast
C. The multicast
D. Broadcast
Answer: D

132. Proxy ARP feature enabled router receives an ARP request packet , find the destination address of
the packet is not their own , which of the following kind of operation will make ? (please select 2 answers)
A. discarded packets
B. to find any route to the destination address
C. there is a route to the destination address , then send your MAC address to the ARP Request
D. broadcasts an ARP request message
Answer: B C

133. Corresponds to the RARP requests sent in broadcast way, RARP response generally to send in ()
way, to save network resources.
A. Unicast
B. Multicast
C. The multicast
D. Broadcast
Answer: A

134. Which of the following English words is the abbreviation of DHCP?


A.Dynamic Host Configuration Protocol
B.Dynamic Host Connection Protocol
C.Dynamic Hot Connection Protocol

24 / 158
The safer , easier way to help you pass any IT exams. 

D.Denial Host Configuration Protocol


Answer: A

135. Which level of the protocol belongs to the OSI reference model in the DHCP protocol?
A. Physical Layer
B. Data link layer
C. Network Layer
D. Application Layer
Answer: D

136. Which of the following English words is an abbreviation of SSH ?


A.Secure shell
B.Secure session host
C.Secure session home
D.Session shell
Answer: A

137. The primary role of DNS is


A. DNS
B. Remote Access
C. File Transfer
D. Mail Transfer
Answer: A

138.HTTP Represents the ( )
A.Hypertext Transfer Protocol
B.Hypertext Translate Protocol
C.Hypertest Transmit Protocol
D.Hypertext Transmit Protocol
Answer: A

139. HTTP protocol using TCP communication, the default port is ( )


A.80
B.8080
C.110
D.25
Answer: D

140. Which of the following protocol provide reliable data transmission protocol of FTP protocol based on?
A.RTP
B.SIP
C.UDP
D.TCP
Answer: D

25 / 158
The safer , easier way to help you pass any IT exams. 

141. Which of the following protocols can transfer files ? (please select 3 answers)
A.FTP
B.TFTP
C.Xmodem
D.icmp
Answer: A B C

142. TFTP protocol is simple file transfer protocol, it uses ( ) for file transfer.
A.SIP
B.UDP
C.TCP
D.RTP
Answer: B

143. Which of the following protocol is used to transfer Email on the Internet ?


A.SMTP
B.MSTP
C.FTP
D.TFTP
Answer: A

144. The SMTP protocol based on TCP transport, port number is


A.21
B.23
C.25
D.53
Answer: C

145. POP is the full name of the Post Office Protocol, used to receive e-mail , it uses the TCP ( ) port.
A.110
B.53
C.21
D.23
Answer: A

146. FTP is designed for ( ) file transfer .


A. Low Rate
B. High Throughput
C. Simple
D. Read Only Memory(ROM)
Answer: B

147. Judge: TFTP can provide control of the TFTP user login name and password.

26 / 158
The safer , easier way to help you pass any IT exams. 

A.True
B.False
Answer: B

148. Commonly used in the remote service, ( ) provides the user with a login through the networked
terminal to the remote server.
A.FTP
B.TFTP
C.TELNET
D.TRACERT
Answer: C

149. What is the transmission protocol port number which Telnet uses ?


A.23
B.24
C.8080
D.48
Answer: A

150. ( ) is the most common method used to check the IP network connectivity and reachability of a
host .such as routers, between the host and the router connectivity problem can use it to judge.
A.DNS
B.FTP
C.PING
D.TFTP
Answer: A

151. Ping uses a series of ( ) to determine the communication latency and packet loss.
A.FTP
B.Tracert
C.ICMP
D.Telnet
Answer: C

152. On huawei router equipment, VRP Ping command in the operating system of the -i parameter is set
to
A. Send the Echo Request message interface
B. Send the Echo Request source IP
C. Receive the Echo Reply message interface
D. Receive the Echo Reply message purpose IP
Answer: A

153.( )For viewing the IP datagram from one host to another host by routing
A.FTP

27 / 158
The safer , easier way to help you pass any IT exams. 

B.Tracert
C.ICMP
D.Telnet
Answer: B

154. Tracert to record every ICMP TTL timeout messages (), to provide users with the IP address of the
packet to arrive by
A. Destination Port
B. Source Port
C. Destination Address
D. Source Address
Answer: D

155. The transport layer protocol used by Telnet


A.TCP
B.UDP
C.ECMP
D.UCMP
Answer: A

156. The keyboard can be used to input, the keyboard works


A. Simplex
B. Half-duplex
C. Full Duplex
D. Auto-negotiation
Answer: A

157. Correct description of the type of network is (please select 3 answers)


A. All connection type of network in the network, need n (n - 1) / 2 physical links to connect to the n
devices
B. All connection type of network in the network, if a link fails, will not affect the whole system
C. All connection networks have good robustness
D. All connection network costs lowly and is easy to implement
Answer: A B C

158. In all the haracteristics of the local area network (LAN), which is not correct?
A. High transmission efficiency, good reliability
B. Simple structure, convenient construction
C. Flexible layout, convenient extension
D. Cover scope broad
Answer: D

159. Ordinary users usually connect to the Internet by ISP (Internet Service Provider)'s service. The ISP
can be divided into (please select 3 answers)

28 / 158
The safer , easier way to help you pass any IT exams. 

A. International service providers


B. National service providers
C. Regional Internet service provider
D.Park Internet service provider
Answer: A B C

160. Within the network protocol, the regulation of the communication data and control information's
structure and format is
A. Grammar Section
B. Semantic Section
C. Sequential Section
D.Rules Section
Answer: A

161. Typical IP telecom network structure can be divided into (please select 3 answers)
A. Backbone Network
B. Tandem Network
C. MAN (metropolitan area network)
D. AN (access network)
Answer: A C D

162. As the following Network Structure, which has poor security and privacy?
A.mesh
B.tree
C.bus
D.star
Answer: B

163. Network is usually divided into three types: LAN, MAN and WAN. A Network, which belongs to which
type concretely, depands on (Please select 3 answers)
A. The scale of the network
B. The protocol is used in transmitting packets on the Network
C. The scope of cover
D. Physical architecture
Answer: A C D

164. A complete IP network is divided into (Please select 3 answers)


A. Backbone Network
B. MAN (metropolitan area network)
C. AN (access network)
D. Mobile Network
Answer: A B C

165. Funded by the United States Department of Defense, a called ARPANET (i.e., as the ARPANET), is

29 / 158
The safer , easier way to help you pass any IT exams. 

based on the ( ) of the network, the ARPANET is the Internet of today, as the prototype.
A. Low speed serial connection
B. CS (circuit switching)
C. Packet Switching
D. IP forwarding
Answer: C

166. The router is a kind of computer equipment for network interconnection; it works in which layer of the
OSI reference model?
A. Session layer
B. DLL (data link layer)
C. Network layer
D. Application layer
Answer: C

167. All ports of single bus shared equipment share a date bus, at the same time there can be only one
user to transmit data. The following which belongs to single bus Shared equipment is
A.hub
B. Switch
C.Router
D.ATM Switch
Answer: A

168. Which belongs to WAN of the following (please select 3 answers)


A. CHINAPAC
B. CHINADDN
C. Intranet
D.CNGI(China Next Generation Internet)
Answer: A B D

169. The IETF Standard Organization produces two types of files, RFC and( ).
A.Internet Draft
B. IEEE Standard
C. Electrical Characteristics
D. The physical layer standard
Answer: A

170. In the OSI model, which belongs to the top, also known as the host layer, is responsible for
transfering the data between hosts and providing the interface to the users, etc.? (Please choose 3
answers)
A. DLL (data link layer)
B.Network layer
C.Transport layer
D.Session layer

30 / 158
The safer , easier way to help you pass any IT exams. 

E. Presentation layer
F.Application layer
Answer: D E F

171. In the OSI reference model, from the bottom to the top, the correct order is
A. Physical layer, DLL (data link layer), Network layer, Transport layer, Session layer, Presentation layer,
Application layer
B. Physical layer, DLL (data link layer), Network layer, Transport layer, Presentation layer, Session layer,
Application layer
C. Physical layer, Transport layer, DLL (data link layer), Network layer, Presentation layer, Session layer,
Application layer
D. Physical layer, DLL (data link layer), Transport layer, Presentation layer, Network layer, Session layer,
Application layer
Answer: A

172. In the following equipments, which works in the physical layer?


A.Switch
B.Hub
C.Router
D.Firewall
Answer: B

173. In the following protocols, which is the protocol of the physical layer? (Please choose 3 answers)
A.RS-232
B.RJ45
C.802.3
D.V.35
Answer: A B D

174. Which is the transmission media of the physical layer as following? (Please choose 3 answers)
A. Optical fiber
B. Twisted pair
C. Airwave
D. Ethernet
Answer: A B D

175. Which is related to the LAN of the physical cable standard? (Please choose 3 answers)
A.100Base-T
B.Ethernet
C.100Base-FX
D.1000Base-SX/LX
Answer: A C D

176. Which is the common WAN interface? (Please choose 3 answers)

31 / 158
The safer , easier way to help you pass any IT exams. 

A. V. 35 interface
B.ATM interface
C.Ethernet interface
D.FR interface
Answer: A B D

177. The common DCE device contains (Please choose 3 answers)


A. Terminal host
B.WAN Switches
C.Router
D.Modem
E.CSU/DSU(Channel Service Unit/Data Service Unit)
Answer: B D E

178. As following, ( ) interface is the physical inferface. (Please choose 4 answers)


A.Dialer interface
B.Voice interface
C.Serial interface
D. Subinterface
E.CE1/PRI interface
F. Virtual-Template(VT)
G.ISDN BRI interface
Answer: B C E G

179. As following, which layer is responsible for coordinating to send and receive the data transfer rate of
both parties that is for flow control, to prevent buffer overflow and line block?
A.Application layer
B.DLL (date link layer)
C.Network layer
D.Physical layer
Answer: B

180. Which layer is responsible for transfroming the unreliable transmission channel into the reliable
transmission channel, transmiting date frames with a check, using the function error control and the frame
sequence control?
A.Physical layer
B.DLL (date link layer)
C.Network layer
D.Transport layer
Answer: B

181.Nowadays,the most widely used LAN standards are based on the ( ) Ethernet standard.
A.IEEE 802.5
B.IEEE 802.2

32 / 158
The safer , easier way to help you pass any IT exams. 

C.IEEE 802.3
D.IEEE 802.1
Answer: C

182. Which is the function of the DLL? (Please choose 4 answers)


A. Physical address definition
B. Network topology
C.Route
D. Physical media access
E. Error inspection
Answer: A B D E

183. In the VRP platform, Direct routing, Static routing, RIP, OSPF, according to the default routing priority
from high to low, the correct order is
A. Direct routing, Static routing, RIP, OSPF
B. Direct routing, OSPF, Static routing, RIP
C. Direct routing, OSPF, RIP, Static routing
D. Direct routing, RIP, Static routing, OSPF
Answer: B

184. Which belongs to the routing protocol? (Please choose 2 answes)


A.IP
B.OSPF
C.RIP
D.IPv6
Answer: A D

185. UDP is connectionless, must to use ( ) to provide reliability.


A. Internet Protocol
B. Application layer protocol
C.Network layer protocol
D. Transmission control
Answer: C

186. In the OSI reference model, which is able to complete the end-to-end error inspection and flow
control?
A.Physical layer
B.DLL (data link layer)
C.Network layer
D.Transport layer
Answer: D

187. What are functions of the transport layer? (Please choose 4 answers)


A. Block upper data

33 / 158
The safer , easier way to help you pass any IT exams. 

B. To establish an end-to-end connection


C. To transfer data from one the host to another one
D. To ensure the date tranferring is sequential, reliable and correct
E. Addressing
Answer: A B C D

188. In the seven layer model of the OSI, when the date receiver can't handle more date, which layer
stops sending massage to the receiver?
A.Physical layer
B.Transport layer
C.Session layer
D. Presentation layer
Answer: B

189. MAC address consists of 48 bits, and is shown by hexadecimal digit. Whereby, the first ( )
hexadecimal digit is distributed to the equipment manufacturers by IEEE uniformly.
A.4
B.5
C.6
D.7
Answer: C

190. The Network Layer, which is the management protocol and provides massage service for IP, the
protocol massage is carried on the IP massage, is
A.ARP
B.IP
C.ICMP
D.802.2
Answer: C

191. The Hardware Address is solidified in ( ), for example, the MAC address, to be use in communicate
with each other in the same link device.
A.PIC
B.NIC
C.POWER
D.FAN
Answer: B

192. All the application programs, such as SNMP, Radius and so on, which pay more attention to the
transfer efficiency, choose ( ) as the transport protocol.
A.TCP
B.UDP
C.ICMP
D.HDLC

34 / 158
The safer , easier way to help you pass any IT exams. 

Answer: B

193. For the application layer protocol itself has the reliability mechanism, ( ) is suited to be the transport
protocol.
A.TCP
B.UDP
C.ICMP
D.HDLC
Answer: B

194. The standard of data define and the functions of finalise date's encryption, decryption, compression,
decompression are compelted in the ( ) of the Model TCP/IP.
A.DLL (data link layer)
B.Network layer
C.Transport layer
D.Application layer
Answer: D

195. Based on the TCP as the transport layer protocol, ( ) protocol providers domain names to IP address,
allows to proceed decentralized management to the domain resource.
A.TCP
B.UDP
C.DNS
D.HTTP
Answer: B

196. ( ) protocol is use in transfor the documents, which constitute a page on the world wide web.
A.TCP
B.UDP
C.DNS
D.HTTP
Answer: D

197. In TCP/IP model, which protocol is most often used to send and receive mails? (Please choose 2
answers)
A.SMTP
B.POP3
C.DNS
D.HTTP
Answer: A B

198. ( ) dial-up access remote authentication protocol complete access to the user's authentication,
authorization, billing function.
A.SMTP

35 / 158
The safer , easier way to help you pass any IT exams. 

B.RADIUS
C.DNS
D.HTTP
Answer: B

199. As following, which programs will be used in the ICMP protocol? (Please choose 3 answers)
A.ping
B.tracert
C.igmp
D.arp
Answer: A B D

200. In the VRP platfrom, if want the Ping program to be the source address with the specified IP as the
echo request message, which parameter can be used as following?
A.-a
B.-s
C.-d
D.-n
Answer: A

201. ICMP massage provides ( ) to the Network Layer. (Please choose 3 answers)


A. Error recovery
B. Congestion control
C. Path control
D. Inquiry service
Answer: B C D

202. The ICMP massage's type field is 8, the code filed is 0, which type of this ICMP massage belongs to?
A.Echo request message
B.Echo response message
C.Timeout message
D. Destination unreachable message
Answer: A

203. When the first of the received datagram is not correct, then discard the datagram, and send the
ICMP ( ) massage to the source port.
A. A destination unreachable
B. Source Quench
C. Parameter Problem
D. Re-Direct
Answer: C

204. When the router or the mainframe discard the datagram due to the congestion, it will send the ICMP
( ) massage to the source port.

36 / 158
The safer , easier way to help you pass any IT exams. 

A. A destination unreachable
B. Source Quench
C. Parameter Problem
D. Re-Direct
Answer: B

205.VTo create a directory on VRP is to use ( ) command under the user view
A.mkdir
B.Dirview
C.rmdir
D.rmkdir
Answer: A

206. In the synchronous working model, the maximum transmission rate of the V.35 is
A.64Kbps
B.9200bps
C.56kbps
D.2048kbps
Answer: D

207. To add a shielding layer outside the twisted-pair cable can be called ( ), it can improve the resistance
to electromagnetic interference ability of twisted pair.
A.STP
B.UTP
C.BTP
D.RPR
Answer: B

208. About the IP subnet address space size, the correct statements are (Please choose 2 answers)
A. Subnet space must meet the actual needs, at the same time to have a certain redundancy to ensure
extensibility
B. Becuase it is able to use the technological means, such as the IP address to borrow, so in order to save
the IP address, subnet size should be less than the actual needs in general.
C. Subnet size usually should add up to a power of 2 times the size as far as possible, to facilitate the
implementation of the strategies
D. There is something above all, but can not be used in engineering practice
Answer: A C

209. The stand or fall of IP address planning can affect (Please choose 3 answers)
A. The size of the routers in the network routing table
B. The efficiency of routing protocol algorithm in the network
C. Routing protocols used in the network
D. The spread of the network
Answer: A B D

37 / 158
The safer , easier way to help you pass any IT exams. 

210. In the following, ( ) is a legitimate IP host address.


A.127.2.3.5
B.1.255.255.2/24
C.225.23.200.9
D.192.240.150.255/24
Answer: B

211. In the following, the network segment which belong to private address is (Please choose 3 answers)
A.10.0.0.0/8
B.172.16.0.0/12
C.192.168.0.0/16
D.224.0.0.0/8
Answer: A B C

212.192.168.1.127/25 represents( )address.


A. Mainframe
B.Network
C. Multicast
D.Broadcast
Answer: D

213. In the OSI model, which of two parts are contained in the network layer address?
A. Network Address and Host Address
B. Host Address and Network Mask
C. Network Address and Network Mask
D. Host Address and Host Number
Answer: A

214. About the IP host address, which of the following statements is TRUE?


A. All 1 host section
B. Network segment part can be all 1, also can be all 0
C. Network segment part can not be all 1, also can not be all 0
D. Host portion can be all 0
Answer: C

215. Which of the following IP address which belongs to the host is ture?


A.224.0.0.5/24
B.127.32.5.62/8
C.202.112.5.0/24
D.162.111.111.111/16
Answer: D

216. In the following circumstances, the data message source IP and destination IP address is the

38 / 158
The safer , easier way to help you pass any IT exams. 

address of the certain host?


A. Broadcast
B. Multicast
C. Unicast
D. Dircast
Answer: C

217. The subnet mask of a network segment 150.25.0.0 is 255.255.224.0, ( ) is the valid host address.
(Please choose 2 answers)
A.150.25.0.0
B.150.25.1.255
C.150.25.2.24
D.150.15.3.30
Answer: B C

218. In a subnet mask for 255.255.240.0 network, ( ) is the legal web address. (Please choose 2 answers)
A.150.150.0.0
B.150.150.0.8
C.150.150.8.0
D.150.150.16.0
Answer: A D

219. A network, the sub segments address is 5.32.0.0, the mask is 255.224.0.0, and the largest host
address allowed is
A.5.32.254.254
B.5.32.255.254
C.5.63.255.254
D.5.63.255.255
Answer: D

220. The subnet mask if the network segment 175.25.8.0/19 is


A.255.255.0.0
B.255.255.224.0
C.255.255.24.0
D. Depends on the address type
Answer: B

221. The default subnet mask of the Class D IP address has ( ) place.


A.8
B.16
C.24
D. There is no subnet mask
Answer: D

39 / 158
The safer , easier way to help you pass any IT exams. 

222.172.16.10.32/24 represents
A.Network Address
B.Host Address
C. Multicast Address
D. Broadcast Address
Answer: B

223. If the Class C subnet's mask is 255.255.255.224, the correct of the Subnet Places, Subnet Numbers,
the number of hosts per subnet is
A.2,4,62
B.3,8,30
C.4,16,14
D.5,32,6
Answer: B

224. The Broadcast address of 10.1.0.1/17 is


A.10.1.128.255
B.10.1.63.255
C.10.1.127.255
D.10.1.126.255
Answer: C

225. One network's mask is 255.255.248.0, so which of the following statement belongs to one network
segment?
A.10.110.16.1 and 10.110.25.1
B.10.76.129.21 and 10.76.137.1
C.10.52.57.34 and 10.52.62.2
D.10.33.23.2 and 10.33.31.1
Answer: C

226. To divide into 32 subnet in one Class C address segment, wwhich of the following subnet masks is
the best?
A.255.255.255.224
B.255.255.255.240
C.255.255.255.255
D.255.255.255.248
Answer: D

227. The broadcast address of the host address 101.11.100.100/22 is


A.101.11.100.255
B.101.11.101.255
C.101.11.103.255
D.101.255.255.255
Answer: C

40 / 158
The safer , easier way to help you pass any IT exams. 

228. The broadcast address of the segment 201.1.0.0/21 is


A.201.1.7.255
B.201.1.0.255
C.201.1.1.255
D.201.0.0.255
Answer: A

229. Which of the following addresses can be a legal address of a PC? (Please choose 2 answers)
A.221.0.0.1/24
B.224.0.0.5/28
C.30.10.1.15/28
D.12.2.2.2/30
Answer: A D

230. For such a few network segment: 172.128.12.0,172.128.17.0,172.128.18.0,172.128.19.0, it is best


to use the ( ) segment to realize the routing summarization.
A.172.128.0.0/21
B.172.128.0.0/19
C.172.128.12.0/22
D.172.128.20.0/20
Answer: B

231. To use the CIDR technology, which of the following can complete the routing convergence correctly?
A.192.168.1.0-192.168.15.0 converging 192.168.0.0/19
B.192.168.1.0-192.168.15.0 converging 192.168.0.0/20
C.192.168.1.0-192.168.15.0 converging 192.168.0.0/21
D.192.168.1.0-192.168.15.0 converging 192.168.0.0/22
Answer: B

232. For such a few network segment: 172.168.16.0,172.168.17.0,172.168.18.0,172.168.19.0, it is best


to use ( ) segment to realize the routing summarization.
A.172.168.16.0/21
B.172.168.17.0/21
C.172.168.16.0/22
D.172.168.20.0/20
Answer: B

233. About Route Aggregation, which of the following statements is ture? (Please choose 3 answers)
A. The routing aggregation technology only can be used on the hierarchical structure of address system,
but to the planar address structure, it can not be used.
B. The routing aggregation technology can make all the IP address of the route from one body gather for a
route to reduce the routing number of the routing table.
C. Routing aggregation technology can be foreign to hide the internal network.

41 / 158
The safer , easier way to help you pass any IT exams. 

D. Routing Aggregation can be made by the implementation of the dynamic routing protocol, but different
kinds of dynamic routing protocols right by the summary of the support degree is not the same.
Answer: A B D

234. Which elements could be transformed by NAPT?


A.MAC Address+Port Number
B.IP Address+Port Number
C.Only MAC Address
D.Only IP Address
Answer: B

235. Which of the following IP host address belongs to legal?


A.129.0.0.130/25
B.210.12.46.7/16
C.230.19.100.32
D.225.38.9.18
Answer: A

236.220.32.59.31/27 belongs to( )address. (Please choose 2 answers)


A.Class C Address
B. A particular segment of the broadcast address
C. Illegal address
D. Private address
Answer: A B

237. The subnet mask of segment 220.32.59.0/27 is 255.255.255.224, as following, ( ) is the valid host
address.
A.220.32.59.160
B.220.32.59.17
C.220.32.59.64
D.220.32.59.128
Answer: B

238. In a Netwoek, which subnet mask is 255.240.0.0, as following, ( ) is the valid Class A host address.
A.12.32.59.160
B.129.32.59.17
C.158.32.59.64
D.220.32.59.128
Answer: A

239. In a Netwoek, which subnet mask is 255.255.192.0, as following, ( ) is the valid host address.
(Please choose 3 answers)
A.12.32.63.160
B.129.32.62.255

42 / 158
The safer , easier way to help you pass any IT exams. 

C.199.32.64.0
D.220.32.59.128
Answer: A B D

240. The mask of the Class C Subnet is 255.255.255.192, the Subnet Number and the host number of
each subnet included respectively are
A.4,62
B.8,62
C.16,14
D.32,14
Answer: A

241. What protocol can be used to send massage by the DHCP protocol?


A.TCP
B.UDP
C.RTP
D.SIP
Answer: B

242. The port number of Telnet protocol used is


A.23
B.25
C.27
D.29
Answer: A

243. What transport protocol is been based on by Telnet protocol for data transmission?
A.RTP
B.SIP
C.UDP
D.TCP
Answer: D

244. FTP Server can use Port ( ) to listen to the FTP client connection by defalt.
A.21
B.23
C.25
D.53
Answer: B

245. When using FTP protocol router software upgrades, which transfer mode should be chosen?
A. Binary Mode
B. Flow byte mode
C. Byte Mode

43 / 158
The safer , easier way to help you pass any IT exams. 

D. Text Mode
Answer: A

246. When using FTP protocols for data transmission, by default, which is the port using data channel
connection by the server?
A.20
B.21
C.23
D.25
Answer: A

247. FTP session contains two channels, respectively are (Please choose 2 answers)
A. Output Channel
B. Input Channel
C. Control Channel
D. Data Channel
Answer: C D

248. When the TFTP client connect to the TFTP server, the destination port is
A.20
B.21
C.53
D.69
Answer: D

249. Based on TCP protocol, the application program of following is (Please choose 2 answers)
A.PING
B.BGP
C.TELNET
D.OSPF
Answer: B C

250. In the process of TRACERT, which protocol is not used certainly? (Please choose 2 answers)
A.TCP
B.UDP
C.ICMP
D.ARP
Answer: A D

251. About the PING and TRACERT, which of the following statements is true? (Please choose 3
answers)
A. Both can be used to test the connectivity of the network
B. Ping can specify a packet source IP, etc
C. Ping is more used to obtain the packet forwarding path

44 / 158
The safer , easier way to help you pass any IT exams. 

D. Tracert can judge point of failure preliminary


Answer: A B D

252. About FTP, which of the following statements is ture? (Please choose 2 answers)
A. FTP is a protocol which is based on UDP
B. FTP is designed for low speed file transfer
C. FTP can provide control of the FTP user login name and password
D. The router can support FTP Client and FTP Server two work modes
Answer: C D

253. About the TFTP, which of the following statements is true? (Please choose 3 answers)
A. TFTP is a protocol which is based on UDP
B. TFTP is a simple file transfer protocol, suitable for read-only memory
C. TFTP can provide control of the TFTP user login name and password
D. TFTP only supports the Client mode
Answer: A B D

254. Generally, the backbone structure can be divided into (Please choose 2 answers)
A. Network connection structure
B. Planar layered structure
C.Plane+Space hierarchy
D. Dual ownership structure
Answer: B C

255. MAN is in the middle of Backbone Network and AN, usually, it can be devided into (Please choose 3
answers)
A. Bearer layer
B. Core Layer
C. Tandem layer
D. Access Layer
Answer: B C D

256. Due to the Backbone Network is the core of the whole network, so the requirements to the backbone
network are (Please choose 4 answers)
A. High reliability
B. Flexibility and extensibility
C. Centralization
D. QOS reasonable planning
E. Can operation, can manage
Answer: A B D E

257. The layer-2 network under the SACP in a complete IP network belongs to


A.Backbone Network
B.WAN

45 / 158
The safer , easier way to help you pass any IT exams. 

C.AN
D.Core Network
Answer: B

258. When the backbone network uses the plane + space layered structure, which if the following
statements is ture (Please choose 2 answers)
A. When one plane failure, another plane can not back-up
B. Different plane carrying different business in general
C. Under normal circumstances business between two surfaces will not influence each other
D. The planar layered structure is higher reliability then the plane + space layered structure relatively
Answer: B C

259. What are the advantages of the OSI reference model? (Please choose 4 answers)
A. Will be divided the intricate network into simple component parts
B. Let the engineers to focus on the module function design and development
C. Define standard interfaces and realize the interactive multiple vendors
D. The complex network problem is decomposed into small simple, easy to learn and operate
E. Easy to give the host addressing
Answer: A B C D

260. What equipemnts could relize the function of the all levels of the OSI reference model? (Please
choose 2 answers)
A.Router
B.Email Server
C. Three -layer Switch
D. The network management server
Answer: B D

261. LLC includes three parts, they are (Please choose 3 answers)


A.SSAP
B.DSAP
C.Address
D.Control
Answer: A B D

262. As following, which belongs to the function of the data link layer MAC sub-layer? (Please choose 3
answers)
A.Define MAC Address
B. Support the upper protocol communication interface
C. Fault correct
D. Fluid control
Answer: A B D

263. When the Router forward date (under the condition of no address translation), which of the following

46 / 158
The safer , easier way to help you pass any IT exams. 

choices is not been changed in the forwarding? (Please choose 4 answers)


A.Source IP Address
B. Purpose of network address
C.Source MAC address
D. Destination MAC address
E. The source port number
F. Destination Port Number
Answer: A B E F

264. About the TTL field of the IP massage, which of the following statements is ture? (Please choose 2
answers)
A. The largest possible value of TTL is 65535
B. Under normal circumstances, the router should not receive the TTL=0 massage from the interface
C. TTL is primarily to prevent forwarding IP packet in the network cycle, waste of network bandwidth
D. Each network device that IP massage pass, including Hub, LAN SWITCH and Router, the TTL value
would be cut a certain value
Answer: B C

265. TCP is a connection-oriented, reliable transport layer protocol, which of the following mechanisms
are used to guarantee the reliability of the transmission? (Please choose 2 answers)
A. Acknowledgement mechanism
B. Buffering
C. Source quench messages
D. Retransmit
Answer: A D

266. As following, what are the ways of the flow control? (Please choose 3 answers)
A. Acknowledgement Technology
B. Buffering Technology
C. Source quench messages
D. Windowing
Answer: B C D

267. Which of following protocols belong to the OSI reference mode presentation protocol? (Please
choose 3 answers)
A. ASCII,EBCDIC
B. IP,ARP
C. MAC, LLC
D. MPEG, MIDI
E.RPC, NFS,SQL
F. PICT, MPEG
Answer: A D F

268. In the TCP/TP reference mode, what application protocol will be used on the top of the TCP? (Please

47 / 158
The safer , easier way to help you pass any IT exams. 

choose 3 answers)
A.HTTP
B.TFTP
C.FTP
D.SMTP
E.SNMP
Answer: A C D

269. The TCP massage header contains 60 bytes at most, if have no Option field, the length of the TCP
massage header is ( ) bytes.
A.8
B.20
C.30
D.40
Answer: A

270. About the error control and flow control of TCP, which of the following statements is true? (Please
choose 3 answers)
A. Adjusted the transmit flow of the sending end by receiving end
B. The receiving end realize the flow control by the window notification mechanism
C. The receiving notice the small windows to reduce the flow
D. The receiving notice the small windows to increase the flow
Answer: A B C

271. TCP will allocate a source port for the application. The source port of the TCP massage header will
take ( ) bytes.
A.1
B.2
C.4
D.8
Answer: B

272. The range of value for the transmission of the Ethernet's Maximum Transmission Unit (MTU) is
A.64—1518
B.60—1518
C.64—1480
D.60—1480
Answer: A

273. IP Header contians 8 bits type of service (TOS,Type of Service) fileds, which of the following is
included in the TOS field? (Please choose 3 answers)
A.3bit COS Field
B.1bit minimum overhead
C.1bit maximum throughput

48 / 158
The safer , easier way to help you pass any IT exams. 

D.2bit highest reliability


Answer: A B D

274. The TTL field in the IP Header set the router number of the data packet passed. Once go through a
router, the value of TTL would be reduce 1. When the filed value is ( ), the data packet will be discarded.
A.0
B.1
C.-1
D.2
Answer: A

275. Fragmentation can occur in the original sender host, can also occur in the middle on a router. After
bursted an IP datagram, it will be rebuilded at ( ).
A. When the message loop back
B.The next router
C. IntermediateRouter
D. A message destination
Answer: D

276. The bursted date program can be bursted again. The IP Header contains ( ) to provide enough
information for the fragmentation and reerection.
A. Type of Service
B.Logo
C. Fragmentation Offset
D. Header Checksum
Answer: D

277. About the TCP connection establishment, which of the following statements is true? (Please choose
3 answers)
A. TCP connection establishment needs three times handshake
B. Three times handshake can solve the problems of delayed grouping
C. Three times handshake mechanism can help to guarantee the reliability of the data exchange
D. Three times handshake mechanism can guarantee the security of data exchange
Answer: A B C

278. The decapsulation of a message in TCP/IP protocol stack is to remove header information of each
layer in ture ( ).
A.Top down
B.Bottom up
C. From the transport layer to the next
D. First from the network layer
Answer: B

279. Public address in the IP address is the world's only, ( ) can be used in LAN repeatedly.

49 / 158
The safer , easier way to help you pass any IT exams. 

A.Hose Address
B.Private Address
C.Network Address
D.Subnet Address
Answer: B

280. Which of the following massages belong to the ICMP massage? (Please choose 3 answers)
A. Name Request Massage
B. Timestamp reply message
C. Router Ask Massage
D. Router Notification Massage
Answer: B C D

281. Router sends the ICMP ( ) massage to the hose, let the host know the next time a datagram should
be sent to another router.
A. Re-Direct
B. Timestamp Reply
C. Router Inquiry
D. A destination unreachable
Answer: A

282. What of the following circumstance do not send the ICMP error report massage? (Please choose 3
answers)
A. ICMP error report message itself
B. On the first datagram fragmentation of all subsequent datagram
C. With a datagram multicast address
D. The special address 10.0.0.0 datagram
Answer: A B C

283. Application layer use the ping protocol to test the connectivity between two hosts commonly. Ping
uses ICMP ( ) massage. (Please choose 2 answers)
A.Echo Request Massage
B.Echo Ask Massage
C.Time-out Massage
D. Target unreachable message
Answer: A B

284. Both analog transmission and digital transmission can use twisted-pair cable, what effect of the
communication distance will have if the wire thicker?
A.Farther
B.Closer
C. Has nothing to do with wire thickness
D. The communication distance of more than 50 km, the farther
Answer: A

50 / 158
The safer , easier way to help you pass any IT exams. 

285. One Class B Network, there are 5 masks joining to the default mask to subnetting, every subnet has
( ) host at most.
A.510
B.512
C.1022
D.2046
Answer: C

286. Planning a Class C Network need to be divided the network into nine subnet, every subnet has 16
hosts at most. Which of the following subnet mask is suitable?
A.255.255.224.0
B.255.255.255.224
C.255.255.255.240
D.No suitable subnet mask
Answer: D

287. To Network 172.168.16.0 MASK 255.255.252.0, the adjacent subnets with its is
A.172.168.20.0
B.172.168.24.0
C.172.168.32.0
D.172.168.48.0
Answer: A

288. If your next IP address is 192.168.12.43, the subnet mask is 255.255.255.128, so the network
address is _______, the broadcast address is ______.
A.192.168.12.32 192.168.12.127
B.192.168.0.0 255.255.255.255
C.192.168.12.43 255.255.255.128
D.192.169.12.128 255.255.255.128
E.192.168.12.0 192.168.12.127
Answer: E

289. Assigned you a Class B IP Network 155.16.0.0, after subnetting, the subnet mask is
255.255.255.192, the network number you can use is _____, the most hose number in every segment is
____________.
A.512, 126
B.1022, 64
C.1024, 62
D.256, 254
E.92, 254
Answer: C

290. The Network Address and Broadcast Address of all the segment which IP address 190.5.4.2 /22 in

51 / 158
The safer , easier way to help you pass any IT exams. 

are
A.190.5.4.0, 190.5.7.255
B.190.5.4.0, 255.255.255.255
C.190.5.0.0, 190.5.4.255
D.190.5.4.0, 190.5.4.255
Answer: A

291. As the following addressed, ( ) can be used as host IP address.


A.192.168.2.15/28
B.10.0.2.128/26
C.122.245.264.13/26
D.12.3.4.6/24
E.224.0.4.5
Answer: D

292. If the IP address is 190.5.6.1, the subnet mask is 255.255.252.0, so the IP address of network
segment and subnet broadcast address respectively are
A.190.5.4.0 190.5.7.255
B.190.5.4.0 190.5.4.255
C.190.5.4.0 190.5.4.254
D.190.5.1.0 190.5.1.255
Answer: A

293. If the lengths of mask in the IP address 10.110.53.233 are the same as the mask below, so which is
in the same segment with 10.110.53.233? (Please chooe 2 answers)
A.10.110.48.10 mask 255.255.248.0
B.10.110.43.10 mask 255.255.0.0
C.10.110.43.10 mask 255.255.248.0
D.10.110.48.10 mask 255.255.252.0
Answer: A B

294. One company applied a Class C IP address field; it is assigned to 5 subsidiaries. The biggest
subsidiary has 14 computers, every subsidiary in one segment, so the subnet mask should be
A.255.255.255.0
B.255.255.255.128
C.255.255.255.192
D.255.255.255.224
Answer: D

295. The host IP address which belongs to one segment with 10.110.12.29/27 is
A.10.110.12.0
B.10.110.12.30
C.10.110.12.31
D.10.110.12.32

52 / 158
The safer , easier way to help you pass any IT exams. 

Answer: B

296.To 192.168.19.255/20, which of the following statements is true? (Please choose 2 answers)
A. It is a broadcast address
B. It is a network address
C. It is a private address
D. The address on the 192.168.19.0 segment
E. The address on the 192.168.16.0 segment
F. This is a public address
Answer: C E

297. One company applied a Class C IP address field; but need to connect six subsidiaries; the biggest
subsidiary has 26 computers, every subsidiary in one segment, so the subnet mask should be
A.255.255.255.0
B.255.255.255.128
C.255.255.255.192
D.255.255.255.224
Answer: C

298. Class C network, increase 3 masks to join the default mask is used to partition the subnet mask, the
number of hosts per subnet support for
A.62
B.30
C.14
D.6
Answer: B

299. The IP address is 199.32.59.64, the subnet mask is 255.255.255.224, and the segment address is
A.199.32.59.64
B.199.32.59.65
C.199.32.59.192
D.199.32.59.224
Answer: A

300. IP address is 12.28.75.160, after subnetting, the subnet mask is 255.255.252.0, so the broadcast
address of the IP address subnet is
A.12.28.255.255
B.12.28.69.255
C.12.28.75.255
D.12.255.255.255
Answer: C

301. IP address 129.32.59.17, after being divided into subnets, subnet mask is 255.255.254.0, then
what's the number of usable subnet?

53 / 158
The safer , easier way to help you pass any IT exams. 

A.256
B.128
C.64
D.32
Answer: B

302. What's the network address of the IP address 220.32.59.128/25?


A.220.32.59.192
B.220.32.59.128
C.220.32.59.254
D.220.32.59.0
Answer: B

303. Which statement is true about the free ARP?(please select 2 answers)


A. by sending free ARP you can confirm whether the IP address is conflict
B. the format of free ARP packet belongs to the ARP request message
C. free ARP can help update the old IP address o information
D. the format of free ARP packet belongs to the ARP reply message
Answer: A B

304. Under the Windows XP system, if you want to release the current obtained through a DHCP IP,
what's command used?
A.ipconfig /all
B.ipconfig /renew
C.ipconfig /release
D.ipconfig
Answer: C

305. Relative to the Telnet, which following advantages does the SSH have?(please select 3 answers)
A. can put all the data is encrypted transmission, so as to avoid "middlemen" attacks
B. to prevent DNS and IP spoofing
C. transmission of data is compressed, so can speed up the transmission speed
D. based on UDP connections, suitable for large-scale use
Answer: A B C

306. Based on the defined ISO3166 country code, some domain known as the national domain, or
geographical domain, which following domain name belongs to the geographic domain? (please select 3
answers)
A.cn
B.uk
C.us
D.com
Answer: A B C

54 / 158
The safer , easier way to help you pass any IT exams. 

307. In the DNS query, which message is often used?


A.SIP
B.RTP
C.UDP
D.TCP
Answer: C

308. which following agreement and application is based on the realization of TCP (please select 3
answers)
A.FTP
B.DNS
C.SNMP
D.Telnet
Answer: A B D

309. which following protocols and applications are based on the realization of UDP(please select 2
answers)
A.FTP
B.DNS
C.SNMP
D.Telnet
Answer: B D

310. What message does the application program PING send out?


A.TCP request message
B.TCP response message
C.ICMP request message
D.ICMP response message
Answer: C

311. Which command is used to check whether the application layer protocol work normally?
A.PING
B.TRACE
C.Extended ping
D.TELNET
Answer: D

312. Tracert is often used on Data networkis debugging, in its working mechanism, how many ICMP
message are used?
A.2
B.3
C.4
D.6
Answer: A

55 / 158
The safer , easier way to help you pass any IT exams. 

313. In the standard Ethernet, what is the mechanism called to avoid multiple devices grabbing lines at
the same time
A.CSMA/CA
B.CSMA/DA
C.CSMA/CD
D.CSMA/AC
Answer: C

314. How many bits does a MAC address has?


A.6
B.12
C.24
D.48
Answer: D

315. Each MAC address consists of two parts, respectively is the supplier code and serial number. The
top 2 4 bit binary is on behalf of the supplier code, which of the following code is the company Huawei
code?
A.00e0fc
B.0010fe
C.000001
D.0003cf
Answer: A

316. About the HUB, which is true


A.HUB is the physical equipment
B.HUB is a data link layer device
C.HUB is network layer devices
D.HUB is application layer equipment
Answer: A

317. Which of the following is the standard of standard Ethernet?


A.IEEE802.3
B.IEEE802.3u
C.IEEE802.3z/ab
D.IEEE802.3ae
Answer: A

318. Which of the following is the standard of Fast Ethernet?


A.IEEE802.3
B.IEEE802.3u
C.IEEE802.3z/ab
D.IEEE802.3ae

56 / 158
The safer , easier way to help you pass any IT exams. 

Answer: B

319. Which of the following is the standard of Gigabit Ethernet standard?


A.IEEE802.3
B.IEEE802.3u
C.IEEE802.3z/ab
D.IEEE802.3ae
Answer: C

320. Which of the following is the standard of 10-gigabit Ethernet standard?


A.IEEE802.3
B.IEEE802.3u
C.IEEE802.3z/ab
D.IEEE802.3ae
Answer: D

321. What does 10base 2 use for data transmission?


A. Coaxial Cable
B. twisted-pair
C. optical fiber
D. radio waves
Answer: B

322. What is the distance of Fine coaxial cable transmission?


A.100M
B.200M
C.50M
D.500M
Answer: B

323. What is maximum transmission distance that five kinds of UTP twisted pair transmit?
A.100M
B.200M
C.50M
D.185M
Answer: A

324. If you want to connect two computers directly by twisted-pair, which order is the correct line?
A. The two computers can't be connected directly by twisted-pair
B.1--1,2--2,3--3,4--4,5--5,6--6,7--7,8--8
C.1--3,2--6,3--1,4--4,5--5,6--2,7--7,8--8
D.1--2,2--1,3--6,4--4,5--5,6--3,7--7,8-8
Answer: C

57 / 158
The safer , easier way to help you pass any IT exams. 

325. The PC through the network card to connect to the router's Ethernet front-end ports, which cable
should be used between the two ports?
A. crossover cable
B. the standard network cable
C. the configuration cable
D. backup cable
Answer: A

326. Switches are the devices that work in the OSI reference model ().
A. the physical
B. the data link layer
C. the transport layer
D. the application layer
Answer: B

327. Switches, after receipt of the complete data frame, execute CRC check, after the check through you
can forward the frame. And this forward model is called forward ()
A.Cut-Through
B.Store-and-Forward
C.Fragment-free
D.Store-free
Answer: B

328. Switches, after receipt of the complete data frame, execute CRC check, after the check through you
can forward the frame. And this forward model is called forward ()
A.Cut-Through
B.Store-and-Forward
C.Fragment-free
D.Store-free
Answer: A

329. Layer 2 switches has which of the following advantages relative to the HUB?(please select 3
answers)
A. reduce conflict
B. higher throughput
C. price is cheaper
D. narrow scope of collision domain
Answer: A B D

330. To use the technical consultation to coordinate the port rate, duplex mode, etc. When the both
negotiations sides support a variety of ways of working, which has the highest priority?
A. 100 base - T4
B. 100 base - TX full duplex
C. 100 base - TX

58 / 158
The safer , easier way to help you pass any IT exams. 

D. 10 base-t full duplex


Answer: B

331. Which of the following IEEE standard does provide flow control standard?
A.802.1Q
B.802.3u
C.802.3z
D.802.3x
Answer: D

332. () is to get multiple ports together to form a group, in order to realize the share in/into the load port in
members, and also provides higher reliability of the connection.
A. the port aggregation
B. port binding
C. port of load balancing
D. port group
Answer: B

333. Judge: in thick coaxial cable 10base5, 5 represents the maximum transmission distance of the cable
is 500 meters。
A.True
B.False
Answer: A

334. Twisted wire can be classified as ().(please select 2 answers)


A. directly connected network cable
B. cross cable
C. interwoven network cable
D. shielded cable
Answer: A B

335. Network device interface is divided into the following two (please select 2 answers)
A.MDI
B.MDI_S
C.MDI_X
D.MDI_R
Answer: A C

336. Generally the Ethernet Interface of the router, host NIC (Network Interface Card) Interface type is ()
A.MDI
B.MDI_S
C.MDI_X
D.MDI_R
Answer: A

59 / 158
The safer , easier way to help you pass any IT exams. 

337. The Hub interface type is ()


A.MDI
B.MDI_S
C.MDI_X
D.MDI_R
Answer: C

338. Switch interface type can be (which) two kinds.(please select 2 answers)


A.MDI
B.MDI_S
C.MDI_X
D.MDI_R
Answer: A C

339. What cable is it which used to connect to the network devices of different types of interface
A. directly connected network cable
B. cross cable
C. interwoven network cable
D. shielded cable
Answer: A

340. What cable is it that used to connect cables that are of the same kind of interface between network
equipment?
A. directly connected network cable
B. cross cable
C. interwoven network cable
D. shielded cable
Answer: B

341. IEEE set fast Ethernet standards with 100 Mbps data transfer rate, transmission medium mainly
includes optical fiber and twisted pair.Single-mode fiber (SMF) cable transmission distance is ()
A. equal to 1km
B. greater than 2km
C. less than 550m
D. equal to 2km
Answer: B

342. What’s the transmission distance of Fast Ethernet cable 100BaseTX and100BaseT4?
A.100m
B.550m
C.1000m
D.2000m
Answer: A

60 / 158
The safer , easier way to help you pass any IT exams. 

343. What’s the transimission distance of Gigabit Ethernet cable1000BaseT?


A.100m
B.550m
C.1000m
D.2000m
Answer: A

344. How many kinds of rates do Ethernet have? (please select 3 answers)
A.10M
B.655M
C.1000M
D.10G
Answer: A B D

345. Judgment: the Hub working principle is: data frame received from any interface indiscriminately
forwarded to any other port..
A.True
B.False
Answer: A

346. What’s the working way of Hub?


A. simplex
B. half duplex
C. full-duplex
D. the negotiation
Answer: B

347. What's the essence of the Ethernet that established through Hub


A. star Ethernet
B. Shared Ethernet
C. switched Ethernet
D. token ring Ethernet
Answer: B

348. Whose abbreviation is STP?


A. rapid spanning tree protocol
B. the shortest path tree protocol
C. spanning tree protocol
D. Shared tree
Answer: C

349. What's the standard that IEEE defines the STP?


A.802.1P

61 / 158
The safer , easier way to help you pass any IT exams. 

B.802.1W
C.802.1D
D.802.1Q
Answer: C

350. When there is redundant path in the layer 2 switching network, with what method can prevent the
loop, improve the reliability of the network?
A. spanning tree protocol
B. level segmentation
C. toxicity reverse
D. the shortest path tree
Answer: A

351. According to the OSI model, where a layer of layer 2 Ethernet switch work?
A. the physical layer
B. the data link layer
C. IP layer
D. the application layer
Answer: B

352. Which following description about Ethernet switch is correct?


A. Ethernet switches can tell whether there is a loop according to the content of a message
B. the Ethernet switches can modify the message content according to the need when data forwarding
C. Ethernet switch is transparent to users; it does not modify anything to the forwarded message content
D. the Ethernet switches can work normally under the loop presence situation
Answer: C

353. Which following description about spanning tree specified port is correct


A. each network bridge has only one specified port
B. specified port is charge of forwarding the message to the network segment that connected with it
C. specified port is a path to the root switches
D. the specified port forwarding data message ever reach the root switch
Answer: B

354. The basic idea of spanning tree protocol is passing the special message through the network bridge
to construct a acyclic tree and this special news is called ()
A. configure a message
B. notification message
C. Hello message
D. Update message
Answer: A

355. When the switches run the STP, By default, the priority level of the switch is ( )
A.4096

62 / 158
The safer , easier way to help you pass any IT exams. 

B.8192
C.16384
D.32768
Answer: A

356. Bringing the STP switch, one of its port from the learning state to the forwarding state need undergo
a forwarding delay, default the forwarding delay is ( ) seconds.
A.10
B.15
C.20
D.30
Answer: B

357. About spanning tree protocol which description of Learning state is wrong


A.the port of Learning status can send and receive BPDU Message
B.the port of Learning status can learn the Message's source MAC address
C.the port of Learning status only learn the source MAC address, not forwarding data Message
D.the port of Learning status can forward part of the data Message
Answer: D

358. About spanning tree protocol which description of Blocking status is wrong


A.the port of Blocking status can receive BPDU Message
B.the port of Blocking status doesn't learn the Message's source MAC address
C.the port of Blocking status doesn't forward data Message
D.the port of Blocking status doesn't receive any Message
Answer: D

359. In spanning tree protocol which description of Forwarding status is wrong


A.the port of Forwarding status can receive BPDU Message
B.the port of Forwarding status doesn't learn the Message's source MAC address
C.the port of Forwarding status can forward data Message
D.the port of Forwarding status can send BPDU Message
Answer: B

360. In STP agreement, suppose that all the priorities that the switches configure are the same, the MAC
address for Switch 1 is: 00-e0-fc-00-00-40, the MAC address for Switch 2 is: 00-e0-fc-00-10, the MAC
address for Switch 3 is: 00-e0-fc-00-00-20, the MAC address for Switch 4 is: 00-e0-fc-00-00-80, then the
root switch should be ( )
A. Switch 1
B. Switch 2
C. Switch 3
D. Switch 4
Answer: B

63 / 158
The safer , easier way to help you pass any IT exams. 

361. When spanning tree protocol deal with the link failure, in order to prevent the temporary loop coming
out, what kind of timer do we use ( )
A.Hello Time
B.Forward Delay
C.Max Age
D.Message Age
Answer: B

362. What kinds of problems can be easily caused by the path loop in the layer 2 (please select 2
answers)
A. link bandwidth increase
B. the broadcast storm
C. MAC address table is not stable
D. port can't aggregation
Answer: B C

363. In order to calculate spanning tree, need to exchange information between devices and parameters,
where these information and parameters are encapsulated, passing between the devices.
A.TCP BPDU
B.Configure BPDU
C.Configure STP
D.Configure RSTP
Answer: B

364. When STP protocol message calculating spanning tree, How many root bridge will it choose in all the
bridges?。
A.1
B.2
C.3
D.4
Answer: A

365. After the STP agreement convergence, what end port is that the root port directly connected
A. Designated port
B. Backup port
C. Alternate port
D. edge port
Answer: A

366. STP protocol message calculations spanning tree, the election of the root bridge based on the
comparison ( )
A.Bridge ID
B.Path Cost
C.Port Cost

64 / 158
The safer , easier way to help you pass any IT exams. 

D.Port ID
Answer: B

367. Judgement: root bridge has a root port and designated port。


A.True
B.False
Answer: B

368. In STP calculation, Port Cost is related to the bandwidth of the Port, the higher the bandwidth is, how
will the cost change?
A. small
B. big
C. consistent
D. Not sure
Answer: A

369. Judgment: from a non-root Bridge to the root bridge there may be multiple paths, each path has a
general overhead value, this overhead value is the total cost of all the Egress Ports and ports in that path.
A.True
B.False
Answer: A

370. In STP, to calculate the path total cost from a non-root bridge equipment to root bridge equipment,
what's the path of the non-root bridge equipment that the least total cost path undergo?
A. Designated port
B. the root port
C. the ordinary port
D. queue port
Answer: B

371. In STP calculation, the port logo is made up of two parts: 1 byte length' () and 1 byte length' port
number.
A. the port priority
B. link priority
C. the bridge MAC
D. port MAC
Answer: A

372. According to the definition of IEEE802.1Q, identify different VLAN tag is in what position?
A. not fixed
B. before the source MAC address and the destination MAC address
C. after the source MAC address and the destination MAC address
D. in the middle of the source MAC address and the destination MAC address
Answer: C

65 / 158
The safer , easier way to help you pass any IT exams. 

373. A VLAN can be regarded as one ( )


A. collision domain
B. broadcast domain
C. management domain
D. block domain
Answer: B

374. What standard does IEEE make, regulate the method that across the switches realize VLAN.
A.802.1x
B.802.1d
C.802.1q
D.802.3
Answer: C

375. from which of the following technology that can reduce the range of the broadcast domain?
A.VLAN
B.Trunk
C.RARP
D.STP
Answer: A

376. Based on the division of VLAN, what common methods are (please select 3 answers)
A. divide VLAN based on port
B. divide VLAN based on MAC address
C. divide VLAN based on agreement
D. divide VLAN based on TCP port
Answer: A B C

377. What is Link called that connect switches and ordinary PC?


A. Access link
B. Trunk link
C. Hybrid link
D. ISL link
Answer: A

378. About the access port, which of the following statement is correct (please select 2 answers)
A.access port belongs to only one VLAN
B.access port can belong to multiple VLAN
C.access port is commonly used to connect user's computer's port
D.access port is commonly used for the connection between the switch port
Answer: A F

379. About the Trunk port, which of the following statements is correct (please select 2 answers)

66 / 158
The safer , easier way to help you pass any IT exams. 

A.trunk port belongs to only one VLAN


B.trunk port can belong to multiple VLAN
C.trunk ports are commonly used to connect user's computer port
D.trunk ports are commonly used for the connection between the switch ports
Answer: B D

380. Which of the following Protocols can dynamically register VLAN information?


A.GVRP
B.GMRP
C.VRRP
D.STP
Answer: A

381. One switch can support 802.1Q protocol, How many VLAN does it support at most?
A.512
B.1024
C.2048
D.4096
E. In theory it supports countless
Answer: D

382.Whose abbreviation is VLA?


A.virtual local area network
B.virtual long area network
C.virtual local area networking
D.virtual long area networking
Answer: A

383. Vlan tag is realized in which layer of the OSI reference model?


A. the physical layer
B. the data link layer
C. the network layer
D. the application layer
Answer: B

384. In an Ethernet switch network environment, which two formats are there in the Ethernet
frame ?(please select 2 answers)
A. ungtagged frame
B. FR frame
C. tagged frame
D. HDLC frame
Answer: A C

385.In the switch, which Vlan can be deleted by using Undo command (please select 3 answers)

67 / 158
The safer , easier way to help you pass any IT exams. 

A.vlan 1
B.vlan 2
C.vlan 1024
D.vlan 4094
Answer: B C D

386. In order to achieve the function of the network layer on the VLAN interface, which need to be
configured on VLAN interface (please select 2 answers)
A.IP address
B.MAC address
C.subnet mask
D.IP prefix
Answer: A C

387. On VRP platform, what's the role of the command "interface vlan - interface vlan id -"?
A. create A VLAN
B. generate or enter VLAN interface view
C. configure VLAN for a port
D. no this command
Answer: B

388.VLAN tag has a long( )bytes。


A.2
B.3
C.4
D.5
Answer: C

389. In Ethernet frame header 2 bytes TPID, when values to 0x8100, suggests that this is a frame to carry
( ) tag.
A.802.1P
B.802.1Q
C.802.1D
D.802.1S
Answer: A

390. After Ethernet brings VLAN function, the switch's ports are divided into which types?(please select 3
answers)
A.Acess port
B.Trunk port
C.Hybrid port
D.None port
Answer: A B C

68 / 158
The safer , easier way to help you pass any IT exams. 

391. Judgment: Trunk port sent to the end equipment must be tagged frame
A.True
B.False
Answer: B

392. After Ethernet brings into VLAN function, what does VLAN insulate?
A. layer 2 unicast domain
B. layer 2 broadcast domain
C. layer 2 multicast domains
D. layer 2 the MAC address
Answer: B

393. The flow cannot direct communication between different vlans, you need to use
A. the port isolation
B. MAC visits
C. VLAN routing
D. VLAN switching
Answer: C

394. When forwarding frame, by examining the Ethernet packets carrying VLAN tag, whether for the port
(), to determine whether the Ethernet frames can be from port forwarding.
A. allow the approved label
B. the default PVID
C. MAC address corresponding to
D. STP disable state
Answer: A

395. After using the VLAN tag, in the switching network environment, Ethernet frame has the following
two formats: ( ) and ( ).(please select 2 answers)
A.untagged frame
B.tagged frame
C.row frame
D.column frame
Answer: A B

396. In VLAN Tag, frame Control Information TCI (Tag Control Information) fields include?(please select 3
answers)
A.Priority
B.CFI
C.VLAN Identifier
D.TPID
Answer: A B C

397. CFI field is 1 bit, the characterization is ( )

69 / 158
The safer , easier way to help you pass any IT exams. 

A. the priority of the Ethernet frame


B. the bit sequence information
C. the network bridge priority
D. port priority
Answer: B

398. All Ethernet frames in the switches are ( ) in the form of a liquid.


A.BPDU
B.PVID
C.untagged frame
D.tagged frame
Answer: D

399. Switches based on port in the VLAN ID value, if switch receive untagged frames, the value depends
on the VLAN ID
A. BPDU
P. PVID
C. MAC mapping table
D. IP address
Answer: B

400. Just join switch's access port ethernet0/1 into VLAN 4, what kind of method can be used to configure.
(please select 2 answers)
A.[Switch]vlan 4
[Switch-vlan4]port ethernet 0/1
B.[Switch]vlan 4
[Switch-Ethernet0/1]port access vlan 4
C.[Switch] vlan 4
[Switch- vlan4]port access ethernet 0/1
D.[Switch]vlan 4
[Switch-Ethernet0/1]port access vlan pvid 4
Answer: A C

401. Below what kind of configuration method can realize the switch of trunk port ethernet0/1 to join into
VLAN 4? (Please select 3 answers)
A.[Switch]vlan 4
[Switch-vlan4]port ethernet 0/1
B.[Switch]vlan 4
[Switch-Ethernet0/1]port trunk pvid vlan 4
C.[Switch] vlan 4
[Switch- vlan4]port trunk ethernet 0/1
D.[Switch]vlan 4
[Switch-Ethernet0/1]port trunk permit vlan 4
Answer: A B D

70 / 158
The safer , easier way to help you pass any IT exams. 

402. Before Ethernet network subinterface configure IP address, which should be first configured?
A. MAC address
B. VLAN encapsulation
C. global GVRP
D. port GVRP
Answer: B

403. Define the Ethernet network subinterface 0/1.1 to be VLAN100 members, what configuration
command should you use?
A.[Router-Ethernet0/1.1]vlan trunk vid 100
B.[Router-Ethernet0/1.1]port dot1q vid 100
C.[Router-Ethernet0/1.1]vlan dot1q vid 100
D.[Router-Ethernet0/1.1]vlan default vid 100
Answer: C

404. By using Layer 3 switches to realize VLAN communication; after VLAN eastablished what's the
configuration command to enter VLAN interface view?
A.interface vlan-interface PVID
B.Interface vlan-interface VLAN-ID
C.interface vlan-interface permit VLAN-ID
D.interface vlan-interface trunk VLAN-ID
Answer: B

405.What’s the full name of VRRP


A.Virtual Routing Redundancy Protocol
B.Virtual Router Redundancy Protocol
C.Virtual Redundancy Router Protocol
D.Virtual Redundancy Routing Protocol
Answer: B

406. Which following statement is true about the VRRP?


A. only the data that Master deal with and send to the virtual router
B. only the data that Slave deal with and send to the virtual router
C. Master and Slave can handle and send the data to the same virtual router, and can share the flow
D. the default only Master handle and send the data to the virtual router, can handle and send the data
function to the same virtual router via configuring to open Slave
Answer: A

407. After open the VRRP on the network, which of the following is true about on PC in the network to
configure the default gateway?
A. only configure one default gateway on PC; the default gateway address is the Master's IP address
B. only configure one default gateway on PC; the default gateway address is the virtual router's IP
address

71 / 158
The safer , easier way to help you pass any IT exams. 

C. configure two default gateways on PC, respectively are Master's IP address and Salve's IP address
D. configure three default gateways on PC; respectively are Master's IP address and Salve's IP address
and virtual router's IP address
Answer: B

408. Which of the following is true about VRRP's virtual IP address?


A. A virtual router can only be associated with one virtual IP address
B. a virtual router can be associated at most three virtual IP address
C. a virtual router can be associated multiple virtual IP address, but the same time there is only one
available
D. a virtual router can be associated multiple virtual IP address, at the same time these virtual IP
addresses all available
Answer: D

409. Which of the following is true about the VRRP's role


A. VRRP increase the reliability of the default gateway in the network
B. VRRP accelerates the convergence rate of router agreement in the network
C. VRRP is mainly used to share the network flow
D. VRRP to provide the same default gateway for different network segment, simplifies the PC's
configuration of the gateway in the network
Answer: A

410. What mainly physical media do Ethernet use (please choose three answers)
A. The coaxial cable
B. twisted-pair
C. cable
D. V.24 cable
Answer: A B C

411. Multiple computers via cable are connected to a HUB, what kind of structure is logically?
A. the star topology
B. the tree topology
C. mesh topology
D. ring topology
E. bus topology
Answer: E

412. Below what kind of situation will make multiple workstations in the same collision domain?
A. multiple workstations via cable connected to A HUB
B. multiple workstations via cable to connect to an Ethernet switch
C. multiple workstations via cable connected to a router
D. multiple workstations via cable connected to a bridge
Answer:B

72 / 158
The safer , easier way to help you pass any IT exams. 

413. About the function that HUB provides, which is NOT correct?


A. work in the physical layer
B. is a Shared network equipment, that is every moment only one device can send the data
C. work in data link layer
D. have to plastic amplification of binary bit stream, increase the transmission distance
Answer: C

414. In the late 80s, unshielded twisted pair UTP come out and has been widely used. What's the UTP
advantage (please select 3 answers)
A. the price is low
B. to make simple
C. transceiver using different cables
D. physical topology and the logical topology is the bus
Answer: A B C

415. In Ethernet, a reasonable way to eliminate the conflict is ( )


A. increase the length of the cable
B. to reduce data packet sent
C. reduce the number of users on each network segment
D. use switches or Bridges to replace the HUB and repeater
Answer: D

416. About the conflict which of the following statements is not correct


A. each port of the switches is A separate collision domain
B. the conflict of the network that is connected to one port of the switch will affect another port connected
network
C. a network with a bridge to replace the HUB can increase the number of collision domains in the
network
D. reduce the number of hosts on a network can reduce the probability of the happening of the conflict
Answer: B

417. Switch is a data forwarding equipment based on ( )


A. the source MAC address
B. the destination MAC address
C. the source IP address
D. the destination IP address
Answer: B

418. Layer 2 Ethernet switches according to the port to receive message's ( ) to generate address
published.
A. the source MAC address
B. the destination MAC address
C. the source IP address
D. the destination IP address

73 / 158
The safer , easier way to help you pass any IT exams. 

Answer: A

419. The working principle of layer 2 Ethernet switches including (please select 3 answers)
A. the receiving port is connected all the data frames on the network segment
B. the use of receiving orders, the MAC address of a data frame to build the MAC address table
C. in the MAC address table to find the destination MAC address of a data frame, if found will be the data
frame is sent to the corresponding port (not including source port);If you cannot find, just send all in
addition to the source port of the port
D. use address aging mechanism table maintenance
Answer: A C D

420. The IEEE 802.3 frame contains ( ) bit DSAP fields, used to indicate the high-level protocol.
A.8
B.4
C.16
D.24
Answer: A

421. The last field in Ethernet data frames is frame check sequence (FCS), the field take up () bytes.
A.2
B.4
C.8
D.32
Answer: B

422. The following narrative about Ethernet switch exchange way, which is correct?(please select 2
answers)
A. Store and Forward way don't test frame error
B. Cut-through way, switch receives a frame 64 bytes and then forwards the frame
C. Fragment-free way to detect frame errors in the first 64 bytes
D. Store and Forward way discard the total length less than 64 bytes of the frame
Answer: C D

423. Which description of collision domains and broadcast domains is correct (please select 3 answers)
A. A Hub connecting equipment belongs to A collision domain
B. A Hub connecting equipment belongs to a broadcast domain
C. a bridge connecting equipment belongs to a collision domain
D. a bridge connecting equipment belongs to a broadcast domain
E. a router connecting device belongs to a broadcast domain
Answer: A B D

424. Port mirror refers to make a copy of a particular business data, transmitted to the monitoring device,
and image data analysis, commonly used in flow measurement and fault location. Port mirror can be
divided into two kinds. What are they? (please select 2 answers)

74 / 158
The safer , easier way to help you pass any IT exams. 

A. based on the image of the port


B. based on application of image
C. the image based on flow
D. based on the image upper protocol
Answer: A C

425. MAC address has 48, is usually expressed as dotted hexadecimal number 12. If all 48 is 1, then
indicate the address is ( )
A. multicast address
B. the broadcast address
C. unicast address
D. the virtual address
Answer: D

426. In the destination MAC address, what's the postion number of the address can decide the frame will
be sent to a single site or a group?
A.7
B.8
C.9
D.10
Answer: B

427. Common L2 switch MAC address table is made up of MAC address and switches ( ) to establish the
mapping relationship.
A. RARP table
B. transmission medium
C. port
D. ARP table
Answer: C

428. L2 switch in the case of multicast, agree with unicast, the establishment of the MAC address table
entries also learn by MAC.
A.True
B.False
Answer: B

429. L2 switch when forwarding check MAC forwarding table, for the address that is not in the table will be
forward via ( ) way
A. multicast
B. the radio
C. unicast
D. to find the routing
Answer: B

75 / 158
The safer , easier way to help you pass any IT exams. 

430.IIP network within the same network segment communication, through ( ) function to complete the
interflow
A. the physical
B. the second floor
C. the third layer
D. the application layer
Answer: B

431. L3 switch based on Ethernet frame's () address of the domain is to judge the forwarding is layer 2
forward or layer 3 forward.
A. destination MAC
B. the source MAC
C. destination IP
D. the source IP
Answer: A

432. The main characteristics of L3 switch, which of the following is true (please select 3 answers)
A. when it has the function of layer 2 and at the same time realize three layer forward
B. a lot of layer 3 switches with layer three search to realize layer 3 forwarding
C. most layer 3 switches only provide Ethernet interface
D. the high-end layer 3 switches in order to improve the efficiency of uplink, some also provide high-speed
FrameRelay interface
Answer: A B C

433. If layer 2 switching network has the loop, then it leads to ( ).(please select 2 answers)
A. the broadcast storm
B. route self-loop
C. purpose network inaccessible
D. MAC address table turbulent
Answer: A D

434. Which of the following description about layer 2 Ethernet switches, is Not correct?
A. can take the initiative to learn the MAC address
B. need to do some modifications to the first three layers of the forwarding Message, then forward again
C. according to the Ethernet frame layer 2 header information to forward
D. layer 2 Ethernet switch is working in the data link layer
Answer: B

435. Which of the following about the spanning tree is true (please select 3 answers)
A. through physical path redundancy to improve the reliability of the bridge network
B. through logical path redundancy to improve the reliability of the bridge network
C. by blocking link to eliminate possible path loopback bridge network
D. the current active path fails to activate the redundant backup link to restore network connectivity
Answer: A C D

76 / 158
The safer , easier way to help you pass any IT exams. 

436. About STP, which of the following statements is not correct (please select 3 answers)
A. there can be only one specified switch in a switched network
B. all the ports of the root switches are root port
C. all ports in the root switch are specified port
D. the least switch priority value of exchange network switch becomes the root switch
Answer: A B D

437. In the agreement of the STP bridge ID consists of two parts, respectively are ( ) (please select 2
answers)
A. the priority of the bridge
B. the bridge port ID
C. the bridge's MAC address
D. the IP address of the bridge
Answer: A D

438. In the agreement of the STP Bridges ID contains ( ) bits


A.8
B.32
C.48
D.64
Answer: D

439. Which of the following description is true about the spanning tree protocol? (please select 3 answers)
A. from all switches in the network, choose A switch (Root) as the Root
B. calculate the shortest path this switch to the root switches
C. for each LAN, select the closest to the root switches as the specified switch, in charge of the forward
the data on the LAN
D. non-root exchange chance to choose several root port, the root port is given the path of the collection
is the best path of the switch to the root switches
Answer: A B C

440. In the STP agreement, which of the following factors will affect the election of the root switch?(please
select 2 answers)
A. switch priority
B. switch port ID
C. switch interface bandwidth
D. switch MAC address
E. the IP address of the switch
Answer: A D

441. Which of the following description is not true about the strengths and weaknesses of the spanning
tree protocol?
A. spanning tree protocol can manage redundancy link

77 / 158
The safer , easier way to help you pass any IT exams. 

B. the spanning tree protocol can block the redundant link, prevent the formation of the loop
C. the spanning tree protocol to prevent network temporarily from losing connectivity
D. spanning tree protocol allows Ethernet switch can work normally in the presence of a physical loop in
the network environment
Answer: C

442. Which of the following description is wrong about port state transition in spanning tree protocol?
A. Forwarding status can directly transfer to the Blocking state
B. Learning status can directly transfer to the Blocking state
C. Learning status can directly transfer to the Forwarding state
Db locking status can directly transfer to the Forwarding state
Answer: D

443. For each segment in the calculation of the STP election specified port and specified bridge, first to
compare the network segment is connected port belongs to device (), the smaller is preferred.
A. link priority
B. the root path cost
C. port log
D. port MAC
Answer: B

444. For the physical layer and data link layer can work normally, and open the STP deviceport, STP,
defines the three port, respectively are ( ) (please select 3 answers)
A.Root Port
B.Designated Port
C.Alternate Port
D.Disable Port
Answer: A B C

445. Connecting to the specified port of the end device, don't forward any message but can receive BPDU
to monitor the network change. What is it? ( )
A.Root Port
B.Designated Port
C.Alternate Port
D.Disable Port
Answer: C

446. In STP caculation, when the port in (what kind of) condition, don't forward data frames, don't learn
the MAC address table, only to participate in the spanning tree caculation, receive and send STP protocol
message.
A.Listening
B.Blocking
C.Learning
D.Forwarding

78 / 158
The safer , easier way to help you pass any IT exams. 

Answer: A

447. In STP caculation, when the port in (what kind of) condition, don't forward data frames, don't learn
the MAC address table, And in this condition port receive and handle STP protocol Message but don't
send the STP protocol Message out.
A.Listening
B.Blocking
C.Learning
D.Forwarding
Answer: B

448. With a VLAN tag data frame has extra more ( ) bytes than the standard Ethernet frames.
A.4
B.32
C.12
D.8
Answer: A

449. How many bits does VLAN tag have to identify the VLAN of the data frame?
A.4
B.32
C.12
D.8
Answer: B

450. In the VRP, VLAN tag TPID field is in a fixed value ( )


A.0x8100
B.0x0800
C.0x0806
D.0x9100
Answer: A

451. Compared with the traditional LAN technology, VLAN has the following advantages (please select 3
answers)
A. Reduce the cost of movement and change
B. Separate broadcast domain, restrain radio message
C. Lower prices of using switches
D. Enhance the robustness of the network
Answer: A, B, D 

452. The original belongs to a switch port VLAN 5, now use undo VLAN 5 command to delete a VLAN 5,
the port belongs to which a VLAN?
A.0
B.1

79 / 158
The safer , easier way to help you pass any IT exams. 

C.1023
D.1024
Answer: B

453. GVRP protocol can be ( ) on port operation.


A. Trunk
B. Access
C. Hybrid
D. Normal
Answer: A

454. The following method can realize communication between the vlans? (please select 2 answers)
A.STP
B.OSPF
C.L2 Switch+Router
D.L3 Switch
Answer: C D

455. The site A and B, respectively, and switches connected to two ports, the site A for the first time to site
B send A data packet, which of the following statement is correct?
A. switches learn A address
B. switches learn B address
C. switches learn no address
D. switches A and B at the same time learn the address
Answer: A,

456. The following on the correct option in VLAN virtual interface description for (please select 2
answers)
A. If you give an IP address VLAN configuration, you need to create a virtual interface that end VLAN
B. two of the same switch VLAN interface can be configured the same IP address
C. configuration commands in the empty slogan must be the same as the VLAN ID
D. to not create vlans also can configure virtual interface
Answer: A C

457. The Access type of port is commonly used to connect to the computer, the ports on a switch of the
following is true? (please select 3 answers)
A. received with the tag message, directly discarded
B.A ccess port of the default VLAN is the VLAN, it is in do not need to manually configure the default
VLAN on the Access port
C. Access port only belong to two vlans
D. received untag message, hit the port PVID information
Answer: A B D

458. The Access type of port when sending a message for what?

80 / 158
The safer , easier way to help you pass any IT exams. 

A. send message with the tag


B. stripping message VLAN information, send out directly
C. message exchange VLAN information, and then send out
D. print on the port PVID information
Answer: B

459. The Trunk type of port is received untag what message when processing?
A. directly discarded
B. add the port trunk VLAN ID information then send out
C. don't add the tag information, send out directly
D. print on this port PVID information then send out
Answer: D

460. Trunk type of port when receives the message with the tag, the following is true (please select 2
answers)
A. whether the port the VLAN tag data will be allowed to pass
B. don't do any deal with direct passthrough
C. if the port is not allowed to the VLAN tag data then directly discarded
D. print this port PVID information, send out again
Answer: A, C

461. Trunk type of port when sending a message, the following is true (please select 2 answers)
A. will send A message of VLAN ID and port PVID is different, is sent directly
B. VLAN ID is going to send it a message, and port PVID, same stripping VLAN information, send it again
C. will send a message of VLAN ID and port PVID, same is sent directly
D. will send a message of VLAN ID and port PVID, stripping VLAN information, send it again
Answer: A B

462. About the Hybrid type of port, the following is true (please select 3 answers)
A. Hybrid port can be used to switch the connection between the can also be used for the connection
between the switches and user's PC
B. Hybrid ports and the Trunk when receiving data, the processing method is the same
C. Hybrid ports and Trunk mainly, the difference between a Hybrid port allows multiple VLAN message not
dozen label, and allow only the default VLAN Trunk port message does not play tag
D. Hybrid untag configuration on the port to send a message, to receive a message when also play a role
Answer: A B D

463. To implement the communication between VLAN, the following is true (please select 2 answers)
A. on L3 switch, only through the router configuration single-arm routing to realize the communication
between the vlans
B. for L2 switch, only through the router configuration single-arm routing to realize the communication
between the vlans
C. on L3 switches, VLAN interface can be configured for three layer to realize communication between
the vlans

81 / 158
The safer , easier way to help you pass any IT exams. 

D. on L2 switches, VLAN interface can be configured for three layer to realize communication between
the vlans Answer: B C
Answer: B C

464. Advantage of the following is true about VLAN is (please select 2 answers)
A.VLAN by reducing the number of physical ports required on switches to reduce network overhead
B.VLAN user access to sensitive data and applications by identifying entitled to enhance network security
C.VLAN by regulating flow control and window size to improve network performance
D.VLAN the network into smaller logical networks, which reduces the sensitivity of the network broadcast
storm
Answer: B D

465. Frame tagging will add () to each frame, so that the frames can switch between the trunk port.
A. the destination MAC address
B. switch the source MAC address
C. LAN ID
D. switches bridge ID
Answer: C

466. Switch configuration of the default VLAN configuration has the following characteristics? ( )
(please select 2 answers)
A. the default VLAN cannot be removed manually
B. By default, all switch ports are members of the default VLAN
C. must first create the default VLAN to assign port for it
D. the IP address of the configured on the switches can only be applied to the members of the default
VLAN ports
Answer: A B

467. In the configuration VRRP, the Priority value range of VRRP configurable ( )
A.0-127
B.0-255
C.1-127
D.1-254
Answer: D

468. The following is true about the VRRP Priority: (please select 2 answers)
A. no matter how much configuration Priority is the owner of the virtual IP address always use 255 as a
Priority
B. no matter how much configuration Priority is the owner of the virtual IP address always use 0 as a
Priority
C. can give a set of VRRP router configuration Prority to 0 to make the VRRP router does not participate
in the Master's election, so that the router always is Slave
D. stop running when the Master of VRRP router VRRP, send in the network will be a Priority of 0 VRRP
notification message

82 / 158
The safer , easier way to help you pass any IT exams. 

Answer: A D

469. RTA use Ethernet0/0 interface connected to a LAN, port IP address is 10.1.1.251, network mask as
255.255.255.0. Requirements on the RTA creating a virtual router, ID is 1, the virtual IP address is
10.1.1.254, the following command is correct ( )
A.[RTA-Ethernet0/0]vrrpvrid 1 virtual-ip 10.1.1.254
B.[RTA]vrrpvrid 1 virtual-ip 10.1.1.254
C.[RTA-Ethernet0/0]vrrpvrid 1 virtual-ip 10.1.1.254 mask 255.255.255.0
D.[RTA]vrrpvrid 1 virtual-ip 10.1.1.254 mask 255.255.255.0
Answer: A

470. RTA Ethernet0/0 and RTB Ethernet0/0 receives the same local area network (LAN) and open the
VRRP, create a virtual router at the same time, the ID is 1, the virtual IP address is 10.1.1.254. RTA
Priority for 200, RTB Priority for the default values. On the RTA has the following configuration:
RTA - Ethernet0/0 VRRP vrid 1 track Ethernet reduced 150 1/0
Described below is correct? (please select 2 answers)
A. when RTA detected Ethernet1/0 fails, the priority of the RTA will become 150
B. when RTA Ethernet1/0 failure is detected, the RTA will become a priority
C. when RTA detected Ethernet1/0 fails, the priority of the RTB becomes 150
D. when RTA detected Ethernet1/0 fails, RTB will become a Master
Answer: B D

471. The RTA Ethernet0/0 and RTB Ethernet0/0 receives the same local area network (LAN) and open
the VRRP, create a virtual router at the same time, the ID is 1, the virtual IP address is 10.1.1.254. RTA
Priority for 200, RTB Priority for the default values. The command display on the RTB VRRP interface
Ethernet 0/0, see:
...
Preempt: YES Delay: 5
...
The following description of the above information is correct
A. when RTB found after their priority is higher than RTA will immediately grab RTA is called the Master
B. when RTB found his priority is higher than RTA will not take the RTA is called the Master
C. when RTB found their priority is higher than RTA will grab RTA in 5 seconds after referred to as the
Master
D. when RTB found their priority is lower than RTA will grab RTA in 5 seconds after referred to as the
Master
Answer: C

472. Cable types including 100BaseT4 Ethernet technology( ) (please select 3 answers)
A. 3 types UTP
B. 4 types of UTP
C. 5 types of UTP
D. 6 types UTP
Answer: A, B, C

83 / 158
The safer , easier way to help you pass any IT exams. 

473. The length of the standard Ethernet frame data fields for ( ) bytes
A.40-1500
B.46-1500
C.64-1500
D.64-1518
Answer: A

474. Through caught tools caught an Ethernet frame, found that the frame Type/Length field has a value
of 0 x0800, in the face of the frame under the description is correct ( ) (please select 2 answers)
A. The frame of the frame structure is Ethernet_II
B. The frame of the frame structure is 802.3
C. The frame is an IP message
D. The frame is an IPX message
Answer: A C

475. Inhuawei switches, by ( ) command can set port duplex mode for the consultation. (please
select 2 answers)
A.duplex full
B.duplex half
C.duplex auto
D.undo duplex
Answer: C D

476. Which of the following command is used to set the Ethernet port, to ensure that the buffer is not
overflow when the congestion in the link?
A.flow on
B.flow-control
C.flow control
D.enable flow-control
Answer: B

477. In full duplex environment, when the port's blocking, switch sends a "PAUSE" frame to the source
told the source PAUSE for a period of time to send information. This through the "PAUSE" frame to realize
the flow control method which is suitable for the environment? (please select 3 answers)
A. A terminal
B. a switch and a terminal
C. a stable state of network congestion
D. switches and switch between the links
E. the end-to-end flow control
Answer: A B D

478. By aggregating two huawei mid-range switch port for communication, the following factors in both
ends must be consistent with ( ) (please select 3 answers)
A. the number of link aggregation

84 / 158
The safer , easier way to help you pass any IT exams. 

B. aggregated port number


C. aggregated link duplex mode
D.S TP, QoS, VLAN configuration
Answer: A C D

479. Ethernet interface can work in three kinds of duplex, Ethernet interface can only work in the light
A. full-duplex
B. half duplex
C. negotiation
D. simplex
Answer: A

480. Port aggregation is the multiple ports together to form a group together, in order to realize the share
in/into the load port in members. Port aggregation on the ( ) implementation.
A. the physical
B. the data link layer
C. the network layer
D. the transport layer
Answer: B

481. Port aggregation to bundle multiple connection ports become a logical connection, after bundling is
the bandwidth
A. the sum of any two members the bandwidth of the port
B. the sum of all members of the bandwidth of the port
C. the sum of all the members of the port half the total bandwidth
D. the bandwidth of the highest member of the bandwidth of the port
Answer: B

482. Is mirror port in and out of the data message completely copy a mirror to the port, this way of mirror
image is based on the ( ).
A. link
B. equivalent
C. flow
D. port
Answer: D

483. What is port mirror configuration, the following ( ) must be configured the steps?
A.redirect
B.acl
C.classify
D.behavior
Answer: B

484. Auto-negotiation Ethernet technology implemented by ( )., so do not use a dedicated data

85 / 158
The safer , easier way to help you pass any IT exams. 

message
A. the application layer
B. the network layer
C. the data link layer
D. the physical chip
Answer: D

485. When site A and site B, respectively, and two ports of a switch are connected, assuming that Site B
does not send any messages, then site A to site B sends the first packet, the following statement is correct
( )
A. switches in the MAC address table can not find the purpose of the site B port, so will be discarded the
newspaper article
B. switches learn site address, and will be sent a message in the site connection port B
A. switches learn site address, and will be A message to broadcast from all ports
D. switches learn the address of the site A, and the message from all other ports in addition to the
receiving port of broadcast out
Answer: D

486. About the right in STP of the following statements is (please select 3 answers)
A. there can be only one root in A switched network switches
B. root switches of all port is port
C. all ports in the root switch are specified port
D. priority numerical minimum switch exchange network become the root switch
Answer: A B D

487. In the STP protocol, the role of the switch port can be ( ) (please select 3 answers)
A. the root port
B. the backup root port
C. the optional ports
D. to prepare port
E. specified port
Answer: A D E

488. In what aspects of STP RSTP is improved? (please select 3 answers)


A. A non-root switches elected a new root port, if the root of the port is not in Forwarding state before, and
the upstream specified port already forwarded the data, the new root port into the Forwarding state
immediately
B. when configuring a switch Port became edge Port, once the Port is enabled, the Port immediately
become a specified Port (Designated Port), and enter the forwarding state
C. if specified port connection point to multipoint link, the device can shake hands with the downstream
equipment, into the forwarding state immediately after get the response
D. if specified port connection point to a point-to-point link, the device can shake hands with the
downstream equipment, into the forwarding state immediately after get the response
Answer: A B D

86 / 158
The safer , easier way to help you pass any IT exams. 

489. The disadvantages of single spanning tree with ( ) (please select 3 answers)
A. single spanning tree may cause in different switches on the same VLAN host cannot be exchanged
B. under the condition of single spanning tree, can not share the flow on the different link
C. running a spanning tree, the entire network convergence speed is slow
D. under the condition of single spanning tree, there may be a suboptimal path on the second floor
Answer: A B
490. In RSTP standard, directly connected to the terminal not linked to other bridge port is defined as (),
the port can be directly to the forwarding state, without any delay.
A. Rapid port
B. the backup port
C. the root port
D. edge port
Answer: D

491. STP/RSTP is based on the port, and MSTP is based on the ().
A. the root bridge
B. the specified bridge
C. the root port
D. instance
Answer: D

492. RSTP protocol when a specified port failure cases, () will be quickly converted to a new no delay
access to specified port forwarding state.
A.Forwarding Port
B.Alternate Port
C.Backup Port
D.Edge Port
Answer: C

493. RSTP When the root port failure cases in the protocol, ( ) will be quickly converted into a new root
port, there is no time delay access to the forwarding state.
A.Forwarding Port
B.Alternate Port
C.Backup Port
D.Edge Port
Answer: B

494. In enabling MSTP deal with the following conditions of the bridge belongs to the same MSTP domain
( ). (please select 2 answers)
A. at the same time open the root protection function
B. the same domain name
C. the number of ports in a forwarding state
D.V LAN and the mapping relationship instance

87 / 158
The safer , easier way to help you pass any IT exams. 

Answer: B D

495. Under the system view, we need to differentiate a port to a VLAN, to perform operations include ( )
(please select 2 answers)
A. create (or enter) VLAN view
B. Specify the broadcast storm for VLAN rejection ratio
C. as characters in the specified VLAN or VLAN interface description
D. to make Ethernet ports in a VLAN
Answer: A D

496. A switch display some information as follows, this port PVID would be ( )
[Quidway]display interface Ethernet 1/0/1
... ...
Mdi type: auto
Port link-type: access
Tagged VLAN ID : none
Untagged VLAN ID : 5
A.0
B.1
C.5
D. Information is insufficient, is not known
Answer: C

497. What type of port to allow the following passthrough VLAN? (please select 2 answers)
A.Trunk
B.Access
C.Hybrid
D.Normal
Answer: A C

498. A Trunk port allows VLAN 3/4/5 through, but only VLAN3 / 4 message is with the tag, vlan5 message
without tag, this probably because
A. the port PVID for 5
B. the port PVID for 3 and 4
C. in the Trunk port set up "the port Trunk permit vlan 3 4", but does not include VLAN5
D. can make the GVRP on the port
Answer: B

499. About the Access - Link, described below is correct ( ) (please select 2 answers)
A. when the Access port received frame, if the frame does not contain 802.1 Q tag header, will play on
port PVID
B. when received frame Access port, if the frame contains 802.1 Q tag VLAN ID in the header and port
PVID, change the VLAN ID of the tag as PVID
C. when Access port sends frames, shed 802.1 Q tag header, a frame for the common Ethernet frame

88 / 158
The safer , easier way to help you pass any IT exams. 

D. when Access port sends frames, keep 802.1 Q tag header, a frame for the Ethernet frames with the tag
Answer: A C

500. On Trunk ports, described below is correct: (please select 3 answers)


A. when the Trunk port received frame, if the frame does not contain 802.1 Q tag header, will play on port
PVID
B. when the Trunk port received frame, if the frame contains 802.1 Q tag header, does not change
C. when the Trunk port send frame, when the frame of the VLAN ID with port PVID is not at the same time,
direct passthrough
D. when the Trunk port send frame, when the frame of the VLAN ID and port PVID photograph at the
same time, the wrong tag operation
Answer: A B C

501. In order to ensure that all the host of the belong to the same VLAN can receive departure to the
VLAN radio message, switches must carry out the following forwarding operation? (please select 2
answers)
A. all the message from the switch port to send out
B. the message is sent to the same VLAN switch to other ports
C. the message is sent to the switch allows all through this VLAN trunk link
D. the message sent from the switch to all trunk links
Answer: B C

502. Layer 3 switches connected three hosts users, namely A, B, C, A and B, which requires users to
communicate floor, AB and C floor isolation, AB and C can communicate at Layer 3 Will switch must do
the following What configuration? (please select 3 answers)
A.A and B draw users to the same VLAN
B.C users plan to another with a different VLAN AB
C.A, B User host address can be in different segments
D. Two configuration switches VLAN interface and configure the IP address of the default gateway
address as user
Answer: A B D

503. About the VLAN of the following statements is correct (please select 2 answers)
A. switch configuration of the default VLAN configuration VLAN 1 cannot be deleted or renamed
B. switch can support up to 255 vlans
C. by multiple VLAN allows a single access port
D. allows multiple VLAN trunk at the same time
Answer: A D

504. Switch A and Switch - B are equipped with respectively in the research and development department,
sales department, products division, finance department and personnel department VLAN ports. Each
VLAN contains 20 users. At least need how many subnets can be realized in between all VLAN routing
connected?
A.5

89 / 158
The safer , easier way to help you pass any IT exams. 

B.20
C.50
D.100
Answer: A

505. Network administrators deleted from the switch several VLAN. When the administrator enters undo
vlan 1 command, receive an error message. The reasons of the error message is ( )
A. VLAN can only be created by its users to delete
B. only assign VLAN 1 role after other VLAN can delete VLAN 1
C. the command not correct input, produced a syntax error
D.V LAN 1 is the default VLAN management, unable to delete them
Answer: D

506.VLANmrshalling method is called on () based on the IP address of VLAN marshalling


A. port
B. routing
C. MAC addess
D. strategy
Answer: B

507. Access switch ports belong to which VLAN?


A The only defined VLAN.
B. The maximum number of VLAN
C. All VLAN
D. The minimum number of VLAN
Answer: A

508. Network administrators want to building a separate to the host to A VLAN 3 and VLAN 5, about the
VLAN configuration of the following statements is correct ( )
A. VLAN information will be automatically saved in the startup configuration
B. after manually create a VLAN 3 and VLAN 5, the default VLAN is automatically cancelled
C. the network administrator can create vlans in a global view, or VLAN view
D. two VLAN can be named BUILDING_A with other VLAN to distinguish at different geographical
location
Answer: C

509. When delete VLAN, the following is true ( ) (please select 2 answers)
A. the members of the VLAN port into the active state
B. when there is a VLAN routing type interface (Vlanif interface), you must first delete the corresponding
Vlanif interface to delete the VLAN
C. the network administrator can be in a global view, or VLAN view delete VLAN
D. the VLAN must be assigned to other members of the port VLAN, to delete the original VLAN
Answer: B C

90 / 158
The safer , easier way to help you pass any IT exams. 

510. Switches certain port is configured as a trunk port, now intended to connect a host to the port access
to the network. The following operation is essential ( )
A. delete the port under global view on several VLANS
B. under the interface view to remove the port on multiple VLANS
C. shut down the interface, and then restart, make its restore the default configuration
D. configure the interface for the access port
Answer: A

511. Command the port trunk permit vlan all have what effect?
A. the port on all the VLAN will be allowed to pass
B. the to end port must be connected with the port and configure the port trunk permit vlan all
C. can to end devices connected to dynamically determine which VLAN ID will be allowed to pass
D. if it is connected to the remote device configuration for the port default vlan 3 orders, the vlan 3 cannot
be exchanged between the two devices
Answer: A

512. When creating a VLAN, the following is true (please select 2 answers)
A. the members of the VLAN port immediately into the active state
B. when creating a VLAN routing type interface (Vlanif interface), you must first create a VLAN to create
the corresponding Vlanif interface
C. the network administrator can create vlans in a global view, or VLAN view
D. the VLAN must be assigned to other members of the port VLAN, to create the original VLAN
Answer: B C

513. The following is true about the Master VRRP election ( ) (please select 2 answers)
A. configure the Priority of the largest become Master
B. configure the Priority of the smallest become Slave
C. configure the Priority of the largest doesn't necessarily become Master
D. configure the Priority of minimum doesn't become Slave
Answer: C D

514. RTA Ethernet0/0 and RTB Ethernet0/0 receives the same local area network (LAN) and open the
VRRP, create a virtual router at the same time, the ID is 1, the virtual IP address is 10.1.1.254. Under the
condition of without modifying the RTA Priority, could you tell me the following commands can make RTB
Master is: ( )
A.[RTB-Ethernet0/0]vrrpvrid 1 priority 200
B.[RTB-Ethernet0/0]vrrpvrid 1 virtual-ip 10.1.1.254 priority 200
C.[RTB-Ethernet0/0]vrrpvrid 1 force-master
D.[RTB]vrrpvrid 1 force-master
Answer: A
515. The following is true about virtual router ( )
A. multiple routers virtual router ID configuration is the same in the router connection to the same virtual
router;
B. multiple routers in the virtual IP address configuration indicates that these same router associated to

91 / 158
The safer , easier way to help you pass any IT exams. 

the same virtual router;


C. if multiple routers to relate to the same virtual router, the virtual router ID and virtual IP address
configuration must be exactly the same;
D. if multiple routers to relate to the same virtual router, the virtual router ID and at least one virtual IP
address configuration is the same.
Answer: C

516.In HDLC is an ISO standard link layer protocol, is used to encapsulate the data on the asynchronous
serial links.
A.True
B.False
Answer: B

517. In HDLC frame is divided into three types: (please select 3 answers)
A. control frame (C frame)
B. monitoring frame frame (S frame)
C. information frame (I frame)
D. no number frame frame (U frame)
Answer: B C D

518. In HDLC has what characteristic ( )(please select 3 answers)


A. half duplex communication, without having to wait for confirmation can send data continuously, have
higher data link transmission efficiency
B. all frame adopts CRC check, to order the information frame number, can prevent LouShou or heavy,
high transmission reliability
C. transmission control function and treatment function separation, has great flexibility and more perfect
control function
D. protocol does not rely on any one character code set, the data packet transmission can be transparent
Answer: B C D

519. VRP platform, on the Serial port Settings is the command data link layer encapsulation type in HDLC
is ( )
A.encapsulationhdlc
B.link-protocol hdlc
C.hdlc enable
D.link-protocol ppp
Answer: B

520. True or false: in HDLC is a bitstream data link layer protocol, oriented to different character sets of
data are can realize transparent transmission.
A.True
B.False
Answer: B

92 / 158
The safer , easier way to help you pass any IT exams. 

521. What kind of frame type in HDLC have? (please select 3 answers)
A. information frame
B. monitoring frame
C. no number frame
D. the retransmission frame
Answer: A B C

522. Monitoring in HDLC frames in which fields does not contain?


A. address field (A)
B. control field (C)
C. information field (I)
D. frame check sequence field (FCS)
Answer: C

523. True or false: standard in HDLC protocol in the family is running on synchronous serial lines.
A.True
B.False
Answer: A

524. True or false: Run in HDLC serial interface can be achieved by IP address unnumbered interface
LoopBack 0 command to configure Shared with LoopBack 0 IP address.
A.True
B.False
Answer: A

525. PPP supports ( ) authentication protocol, and thus more security than in HDLC. (please select 2
answers)
A.PAP
B.MD5
C.CHAP
D.SSH
Answer: A C

526. The PPP protocol work in which layer of the OSI seven layer model?
A. the physical layer
B. the data link layer
C. the network layer
D. the transport layer
Answer: B

527. About the PPP, described below is correct ( )


A. supports both synchronous link and support asynchronous link
B. only supports synchronous link
C. only supports asynchronous link

93 / 158
The safer , easier way to help you pass any IT exams. 

D. above is correct
Answer: A

528. The PPP frame protocol domain is used to indicate the information domain of the protocol used type,
which of the following values are used to represent information domain is an IP packet?
A.0x0021
B.0x8021
C.0x8821
D.0x8863
Answer: A

529. PPP frame Protocol domain is used to indicate the information domain using the protocol type, which
of the following values are used to represent information domain is an LCP data message?
A.0x0021
B.0x8021
C.0xc021
D.0x8863
Answer: C

530. In the PPP, when both ends of the communicating parties detected physical line active, unavailability
of phase transition from link to link establishment phase, at this stage mainly through ( ) Potocol
configure link parameters.
A.IP
B.DHCP
C.LCP
D.NCP
Answer: C

531. The state transition diagram includes which of the following phase of PPP? (please select 3
answers)
A.Idle
B.Establish
C.Listening
D.Network
Answer: A B D

532. In the PPP, when the physical can't detect carrier or management personnel to close operation of the
link, this link will be broken, when it is in what stage?
A. link is unavailable stage
B. the link establishment stage
C. authentication stage
D. the network layer protocol stage
Answer: B

94 / 158
The safer , easier way to help you pass any IT exams. 

533. What kind of situation will lead to the PPP terminated link below? (please select 3 answers)
A. too much information
B. carrier wave lost
C. administrator for close links
D. link quality test failure
Answer: B C D

534. In the PPP protocol, PAP authentication process need to build ( ) time to shake hands.
A.2
B.3
C.4
D.1
Answer: A

535. In the PPP protocol, need three times handshake authentication protocol, it only in the transmission
network user name password authentication protocol is ( )
A.PAP
B.CHAP
C.MD5
D.TCP
Answer: B

536. In huawei router serial interface to encapsulate the PPP protocol, need input command is under the
interface view ( )
A.link-protocol ppp
B.encapsulationppp
C.enableppp
D.addressppp
Answer: A

537. In the PPP protocol, the PAP and CHAP authentication described is correct ( )
A. PAP authentication need three times handshake
B. CHAP authentication requires two hands
C. PAP authentication using plain text authentication information
D. CHAP cleartext authentication information
Answer: C

538. Which command is the PPP verification mode is set to the PAP?
A.ppp pap
B.ppp chap
C.ppp authentication-mode pap
D.ppp authentication-mode chap
Answer: C

95 / 158
The safer , easier way to help you pass any IT exams. 

539. Ruter A configuration is as follows:


[RTA]aaa
[RTA-aaa]local-user huawei password cipher hello
[RTA-aaa]local-user huawei service-type ppp
[RTA]interface Serial 0
[RTA-Serial0]link-protocol ppp
[RTA-Serial0]ppp authentication-mode pap
[RTA-Serial0]ip address 10.1.1.1 30
The router B configuration is as follows:
[RTB]interface Serial 0
[RTB-Serial0]link-protocol ppp
[RTB-Serial0]ppp chap user huawei
[RTB-Serial0]ppp chap password cipher hello
[RTB-Serial0]ip address 10.1.1.2 30
When connected to the router Serial 0, two routers can be connected to the end.
A.True
B.False
Answer: B

540. Ruter A configuration is as follows:


[RTA]aaa
[RTA-aaa]local-user huawei service-type ppp
[RTA]interface Serial 0
[RTA-Serial0]link-protocol ppp
[RTA-Serial0]ppp authentication-mode pap
[RTA-Serial0]ip address 10.1.1.1 30
The router B configuration is as follows:
[RTB]interface Serial 0
[RTB-Serial0]link-protocol ppp
[RTB-Serial0]ppp chap user huawei
[RTB-Serial0]ppp chap password cipher hello
[RTB-Serial0]ip address 10.1.1.2 30
When connected to the router Serial 0, two routers can be connected to the end.
A.True
B.False
Answer: B

541. The PPP protocol in TCP/IP protocol stack which layer?


A. the physical layer
B. the data link layer
C. the network layer
D. the transport layer
Answer: B

96 / 158
The safer , easier way to help you pass any IT exams. 

542. True or false:the PPP protocol, the CHAP authentication process needs three message interaction,
respectively Challenge,Response,Success/Failure.
A.True
B.False
Answer: A

543. The PPP protocol, which belongs to the NCP? (please select 2 answers)
A.IPv6CP
B.ICMP
C.IPCP
D.TCP
Answer: A D

544. After the PPP connection is established, which protocol component can use the Echo-Request
message and the Echo Reply message to detect link-state?
A.Data encapsulation
B.LCP
C.NCP
D.IPCP
Answer: B

545. True or false: PPP provides a transmission more protocol packets on the point-to-point link in the
standard method, is widely used in the data link layer the point-to-point communication protocol.
A.True
B.False
Answer: A

546. The PPP data frames can not directly on the link transmission, transfer the PPP data on the different
link frame need extra encapsulation and different control mechanism. Transfer the PPP data on the serial
links frame follow in HDLC standard.
A.True
B.False
Answer: A

547. After the PPP connection is established, VRP platform by default every how many seconds to send
an Echo Request message?
A.1
B.5
C.10
D.60
Answer: C

548. The parameters of the LCP negotiation usually have? (please select 3 answers)
A. MRU

97 / 158
The safer , easier way to help you pass any IT exams. 

B. Authentication protocol
C.Magic-number
D. IP Address
Answer: A B C

549. True or false: magic -number of LCP field can be used to test loop.
A.True
B.False
Answer: A

550. In the configuration, the configuration of PAP protocol keyword cipher is refers to the user's
password
[RTB]interface Serial 0
[RTB-Serial0]link-protocol ppp
[RTB-Serial0]ppp pap local-user huawei password cipher hello
[RTB-Serial0]ip address 10.1.1.2 30
A. In the configuration file password using ciphertext
B. When certify, issued by the packets in the password using ciphertext
C. Both of the above are correct
D. Both of the above are incorrect
Answer: A

551. Network control protocol (NCP) can provide the PPP connection with what function?
A. Error Checking
B. Authentication
C. Carry multiple Layer 3 protocol
D. Congestion Control
Answer: C

552. Standard PPP protocol frame format which contains several fields? (please select 3 answers)
A. Protocol field
B. Information Field
C. Length field
D. padding field
Answer: A C D

553. True or false: the PPP protocol, the CHAP authentication process needs to be three times the
interaction of a message. In order to match the request message and respond to a message, the
message contains the Identifier field, a authentication process used by all use the same message
Identifier information.
A.True
B.False
Answer: A

98 / 158
The safer , easier way to help you pass any IT exams. 

554. Frame relay work in data link layer, provides the following functions (please select 3 answers)
A. statistical multiplexing
B. frame transparent transmission
C. error detection
D. retransmission operation
Answer: A B C

555. Which normally occupied Frame Relay LMI DLCI? (please select 2 answers)
A.0
B.16
C.1007
D.1023
Answer: A D

556. On frame relay technology described below is correct (please select 4 answers)
A. in the fast-packet frame relay data link layer by a simplified method for transmitting data units and
exchange switching technology.
B. Frame Relay only complete OSI physical layer functions
C. Frame Relay flow control, error correction, such as leaving the intelligent terminal is completed, greatly
simplifying the agreement between the node machine.
D. Frame Relay virtual circuit using technology to make full use of network resources
E. Frame Relay with high throughput, low latency, and other characteristics suitable for bursty traffic
Answer: A C D E

557. Which of the following methods using frame relay address dynamically mapped to DLCI?
A.ARP protocol
B.RARP protocol
C.inARP protocol
D.map protocol
Answer:B

558. To achieve full interconnection topology contains 12 router frame relay network, how much of PVC?
A.6
B.132
C.66
D.12
Answer: C

559. Frame Relay congestion avoidance can be achieved is determined by which of the packet header
fields to achieve? (please select 3 answers)
A.BECN
B.FECN
C.DLCI
D.DE

99 / 158
The safer , easier way to help you pass any IT exams. 

E.CIR
Answer: A B D

560. When you configure Frame Relay subinterfaces VRP, the optional sub-interface types are there?
(please select 2 answers)
A.P2P
B.NBMA
C.P2MP
D.Broadcast
Answer: A C

561. Reverse Address Resolution Protocol (Inverse ARP) main function is (please select 2 answers)
A. Find the hardware address of the device via the network address of the network device
B. Find DLCI number connected
C. Find the peer device connections in the VC frame relay network protocol address
D. generate peer protocol address mapping DLCI in Frame Relay networks
Answer: C D

562. If the Frame Relay network congestion experienced on a strip PVC, Frame Relay notice the source
information through which a field?
A.CLP
B.BECN
C.FECN
D.TCP
Answer: B

563. Frame relay only complete function ( ) of the core layer, flow control, and error correction is
completed leaving the intelligent terminal, greatly simplifying the protocol between a Node.
A. Link layer and the network layer
B. Network layer and transport layer
C. transport layer and the session layer
D. physical layer and link layer
Answer: D

564. True or false: Run frame relay on the port of the MAP table is corresponding to the logical interface,
different logical interface has a different MAP table.
A.True
B.False
Answer: A

565. Host or terminal connected to the user side of the frame relay network interface
A.DTE
B.DCE
C.NNI

100 / 158
The safer , easier way to help you pass any IT exams. 

D. None of the above


Answer: A

566. True or false: when sealed relay binding agreement, by default, the frame of the packaging format for
the IETF.
A. True
B.False
Answer: A   
 
567. On the interface encapsulates the frame relay protocol can make dynamic reverse address
resolution protocol command is ( )
A.frame-realy reverse-arp
B.frame-relay inarp
C.inverse-arp
D.reverse-arp
Answer: B

568. True or False: Frame Relay X.25 protocol is a third layer functions have been simplified, while
providing operational errors discovered after the retransmission.
A.True
B.False
Answer:A

569. In HDLC frame marks the beginning and end of the field for a fixed value, it is
A.11111111
B.01111110
C.00000000
D.11111110
Answer: B

570. True or false: Asynchronous Response way ARM (Asynchronous Response Mode) is a kind of to
allow any node to start the transmission Mode of operation.
A.True
B.False
Answer: B

571. With what method of bitstream in HDLC transparent transmission?


A. filling technology
B. special characters
C. data length field
D. above are incorrect
Answer: A

572. Huawei VRP system router serial interface as the default package

101 / 158
The safer , easier way to help you pass any IT exams. 

A.HDLC
B.PPP
C.Frame relay
D.above are incorrect
Answer: B

573. Which of the following components PPP protocol defines? (please select 3 answers)
A. Data package
B. Data Encryption
C. Link Control Protocol (LCP)
D. Network Control Protocol (NCP)
Answer: A C D

574. The PPP for different network layer protocols have different network control protocol, such as ( )
(please select 3 answers)
A.IPCP
B.IPXCP
C.MPLSCP
D.SLIPCP
Answer: A B C

575. PPP protocol is mainly composed of three types of agreements, namely (please selcet 3 answers)
A.PPPOE
B.LCP(Link Control Protocol)
C.NCP(Network Control Protocol)
D. The expansion of the PPP protocol
Answer: B C D

576. The PPP protocol address field is usually fill content for
A.0x7E
B.0xFF
C.0xFE
D.0x03
Answer: B

577. MRU indicates the maximum value of the data field of the PPP data frame received from the
termination, the default value for this parameter option Normally, it is the ( ) byte.
A.1492
B.1500
C.4700
D.9600
Answer: B

578. Exchange message is in the PPP link establishment phase

102 / 158
The safer , easier way to help you pass any IT exams. 

A.IP message
B.LCP message
C.NCP message
D.DHCP message
Answer: B

579. PAP authentication protocol which several data message types are there? (please select 3
answers)
A.Authenticate-Request
B.Authenticate-Ack
C.Authenticate-Fail
D.Authenticate-Nak
Answer: A B D

580. After the PPP authentication fails, what will Authenticating phase to phase?
A.Idle
B.Establishing
C.Networking
D.Terminating
Answer: C

581. Ruter A configuration is as follows


[RTA]aaa
[RTA-aaa]local-user huawei password simple hello
[RTA-aaa]local-user huawei service-type ppp
[RTA]interface Serial 0
[RTA-Serial0]link-protocol ppp
[RTA-Serial0]ppp authentication-mode pap
[RTA-Serial0]ip address 10.1.1.1 30
The router B configuration is as follows:
[RTB]interface Serial 0
[RTB-Serial0]link-protocol ppp
[RTB-Serial0]ppp pap local-user huawei password simple hello
[RTB-Serial0]ip address 10.1.1.2 30
When connected to the router Serial 0, two routers can be connected to the end.
A.True
B.False
Answer: A

582. Ruter A configuration is as follows:


[RTA]aaa
[RTA-aaa]local-user huawei password simple quidway
[RTA-aaa]local-user huawei service-type ppp
[RTA]interface Serial 0

103 / 158
The safer , easier way to help you pass any IT exams. 

[RTA-Serial0]link-protocol ppp
[RTA-Serial0]ppp authentication-mode pap
[RTA-Serial0]ip address 10.1.1.1 30
The router B configuration is as follows:
[RTB]interface Serial 0
[RTB-Serial0]link-protocol ppp
[RTB-Serial0]ppp pap local-user huawei password simple hello
[RTB-Serial0]ip address 10.1.1.2 30
When connected to the router Serial 0, two routers can be connected to the end.
A.True
B.False
Answer: B

583. PPP supports dynamic address negotiation, open a command port IP address in the dynamic port
negotiation ( )
A.[Quidway-Serial0]ip address negotiation
B.[Quidway-Serial0]ip address ppp-negotiation
C.[Quidway-Serial0]ppp negotiation
D.[Quidway-Serial0]pppip-negotiation
Answer: B

584. True or false: the PPP protocol, IPCP USES the same consultation mechanism and LCP, message
type, but not call IPCP LCP, just working process, such as message is the same as the LCP.
A.True
B.False
Answer: A

585. True or False: PPP protocol is an important feature to provide authentication, both ends of the link
can negotiate which authentication protocol and implementation of the certification process, only the
authentication is successful will establish a connection.
A.True
B.False
Answer: A

586. Which of the following is correct? (please select 2 answers)


A. LCP negotiate authentication information
B. CHAP interact through two message authentication
C. IPCP can be used to negotiate IP, compression and other information
D. PAP is used for user authentication
Answer: C D

587. PPP protocol, CHAP what encryption algorithm is used?


A.DES
B.MD5

104 / 158
The safer , easier way to help you pass any IT exams. 

C.AES
D.Do not use
Answer: B

588. True or false: in a PPP link, cannot transmit IPv4 and IPv6 message at the same time.
A.True
B.False
Answer: B

589. Below for LCP, which is correct? (please select 3 answers)


A. Responsible for negotiating the establishment of a link
B. Negotiation Layer 3 protocol type
C. Will be cut off after the link idle timer timeout link
D. test link to determine whether the link quality can build links
Answer: A C D

590. About the data link connection identifier DLCI, the following description is correct (please select 3
answers)
A. Frame Relay can provide multiple virtual circuits on a single physical transmission lines, different virtual
circuits to distinguish by DLCI
B. DLCI only on the local interface and the remote interface directly connected with effective, does not
have the overall effectiveness
C. In the Frame Relay network, on different physical interfaces with the same DLCI representation is a
virtual connection
D. Frame Relay network user support 1024 virtual circuits on the interface most users available DLCI
range is 16~1007
Answer: A B D

591. In Frame Relay networks, Local Management Interface LMI (Local Management Interface) protocol
status request messages and status messages to maintain the link status and Frame Relay PVC status,
including (select 4 answers)
A. Increase PVC Records
B. Delete records broken PVC
C. Monitoring PVC status changes
D. link integrity verification
E. increase recorded correspondence between PVC and IP
Answer: A B C E

592. In the VRP system, Frame Relay LMI protocol support package for the (please select 3
answers)
A.Q933a
B.Ansi
C.Cisco
D.Nonstandard

105 / 158
The safer , easier way to help you pass any IT exams. 

Answer: A B D

593. Which of the following is the Frame Relay parameters? ((please select 3 answers)
A.CIR Committed Information Rate
B.TTL survival time
C.BE allowed to exceed the burst size
D.BC committed burst size
Answer: A C D

594. The following features are not part of the FR


A. fixed length cells
B. is an international standard
C. simplify the third layer functions of X.25
D. statistical multiplexing at the link layer is completed, the frame transparent transmission and error
detection
Answer: A

595. In the Frame Relay network, to carry out the policy of each VC bandwidth control, describing correct
(please select 3 answers)
A. In the Tc, when a user data transfer amount no greater than the Bc, to continue to receive transmission
frame
B. When the user data transfer amount is greater than the Bc but not greater than the sum of the Bc and
Be, will Be more than the Bc scope transmitting frame DE position "1"
C. When Tc is greater than the user data transmission and the time of Bc and Be, the frame over a range
DE "1"
D. When Tc in user data transfer when quantity is greater than the sum of the Bc and Be will exceed the
scope of the frame is discarded
Answer: A B D

596. The following narrative about the DLCI is correct (please select three answers)
A. DLCI has global significance
B. DLCI is assigned by the DCE side
C. DLCI range is available to the user 16-1007
D. different physical interfaces can be configured with the same DLCI
Answer: B C D

597. To view the serial s0 Quidway routers / a DTE or DCE in the way, which of the following commands
should be used?
A.display controller serial
B.display saved-config
C.display interface s0/1
D.display current-config
Answer: C

106 / 158
The safer , easier way to help you pass any IT exams. 

598. When configuring a Frame Relay network on Huawei routers, using Inverse ARP protocol, you can
not manually configure a static address mapping, because Inverse ARP protocol address mapping can be
generated dynamically
A.True
B.False
Answer: A

599. On the interface encapsulates the frame relay protocol can make dynamic reverse address
resolution protocol command is ( )
A.frame-relay inarp
B.frame-realy reverse-arp
C.inverse-arp
D.reverse-arp
Answer: A

600. In the configuration commands fr map ip 10.1.1.2 200, numbers 200 meaning ( )
A. peer logical channel number
B. The local DLCI number
C. peer interface number
D. peer node number
Answer: B

601. If the router can make frame relay PVC the function of exchange, the type of frame relay interface
should be (please select 2 answers)
A.DTE
B.DCE
C.NNI
D.UNI
Answer: B C

602. Judge: frame relay point-to-multipoint interface can be connected multiple remote node via a PVC.
A.True
B.False
Answer: B

603. Which of the following statements about the frame relay is correct? (please select 2 answers)
A. DLCI is only effective in local interfaces and directly connected with the end interface
B. PVC can only establish the virtual connection between DCE
C. frame relay address mapping table store the mapping relation between the end IP address and the
DLCI of next hop
D. reverse address resolution protocol can get corresponding DLCI via the end IP
Answer: A B

604. What meaning does 30 represent in the configuration commands of the following Frame relay?

107 / 158
The safer , easier way to help you pass any IT exams. 

[RTB-Serial0]fr map ip 10.1.1.2 30


A. Subnet mask
B.DLCI
C.Cost
D.Weight
Answer: B

605. IP address of Loopback0 on a router is 10.1.1.1/32, on serial0/0/1, the command that configuration
borrow IP address of loopback0 is
A.[Quidway] ip address serial0/0/1 equal loopback0
B.[Quidway-serial0/0/1] ip address serial0/0/1 equal loopback0
C.[Quidway] ip address unnumbered interface serial0/0/1 loopback0
D.[Quidway-serial0/0/1] ip address unnumbered interface loopback0
Answer: D

606. Which of the following statements about HDLC are correct? (please select 3 answers)
A. in terms of system structure, HDLC is only applicable to the structure of point to point
B. in terms of working, HDLC applies to half duplex or full duplex
C. in terms of transport, HDLC is only used for synchronous transmission
D. in consideration of transmission rate, HDLC is often used in the high-speed transmission
Answer: B C D

607. By which field HDLC identify the upper-layer protocol?


A. mark fields
B. address field
C. control fields
D. cannot identify
Answer: D

608. In the PPP link establishment phase, receiver received code of LCP data message, which should not
be identified, what message of a LCP will be sent to?
A.Code-Reject message
B.Protocol-Reject message
C.Field-Reject message
D.Code-NAK message
Answer: A

609. Which several data message types does CHAP authentication protocol have? (please select 4
answers)
A.Challenge message
B.Request message
C.Response message
D.Success message
E.Failure message

108 / 158
The safer , easier way to help you pass any IT exams. 

Answer: A C D E

610. Judge: two Quidway router connected directly with Serial port, the link layer protocol encapsulated in
the PPP, the IP address on both ends of link is not in the same network segment, which can also
exchange.
A.True
B.False
Answer: A

611. The configuration of router A is as follows:


[RTA]aaa
[RTA-aaa]local-user huawei password cipher hello
[RTA-aaa]local-user huawei service-type ppp
[RTA]interface Serial 0
[RTA-Serial0]link-protocol ppp
[RTA-Serial0]ppp authentication-mode chap
[RTA-Serial0]ip address 10.1.1.1 30
The configuration of router B is as follows: [RTB]interface Serial 0
[RTB-Serial0]link-protocol ppp
[RTB-Serial0]ppp chap user huawei
[RTB-Serial0]ppp chap password cipher hello
[RTB-Serial0]ip address 10.1.1.2 30
When Serial 0 of two routers are connected, two routers can be connected to the end.
A.True
B.False
Answer: A

612. When configure PPP authentication way as the PAP, which of the following operation is a must?
(please select 3 answers)
A. Join user name and password of the prover to the local user list
B. configure encapsulation type of interface which is connected with the end equipment for PPP
C. set the validation of the PPP mode to PAP
D. In being the prover, configure user name and password which are sent the prover
Answer: B C D

613. What function is the following command?


ip address ppp-negotiate
A. open the function of requesting IP address from the end
B. open the function of accepting the remote request IP address
C. open the function of distributing IP address to static state
D. none of the above is correct
Answer: B

614. Judge: in the PPP protocol, the static and dynamic consultation of IPCP process are the same, only

109 / 158
The safer , easier way to help you pass any IT exams. 

need one Config - Request dialogue to complete IP address assignment.


A.True
B.False
Answer: B

615. How many bytes is the default of PPP (Maximum Receive Unit, MRU)?
A.1024
B.1500
C.1518
D.8096
Answer: B

616. In the PPP link establishment phase, the parameter values of the Configure - Request which the end
send can not be recognized in the local, which the message should the client respond to?
A.Configure-Nak
B.Configure-Reject
C.Configure-Ack
D.None of the above is correct
Answer: B

617. Judge: in the following configuration, configure PPP connection, and adopt dynamic to distribute IP
address. After the success of the link establishment, routing table can appear direct routing of 10.1.1.0/30.
[RTB]interface Serial 0
[RTB-Serial0]link-protocol ppp
[RTB-Serial0]ip address 10.1.1.2 30
[RTB-Serial0]remote address 10.1.1.1
A.True
B.False
Answer: B

618. In PPP link, configure TCP/IP header compression, which protocol is used to negotiate?
A.LCP
B.PAP
C.IPCP
D.CHAP
Answer: C

619. In the frame relay packaging, when configure static map, which of the parameters are a must?
(please select 2 answers)
A. the local DLCI
B. the DLCI of Opposite terminal
C. the local protocol address
D. protocol address of opposite terminal
Answer: A D

110 / 158
The safer , easier way to help you pass any IT exams. 

620. Which of the following fields are not contained in the frame of frame relay? (please select 2 answers)
A.BECN
B.FECN
C.CIR
D.DLCI
E.PVC
Answer: C E

621. In VRP, frame relay encapsulation support ( ) format. (please select 2 answers)
A.IETF
B.ANSI
C.Q.933a
D.Nonstandard
Answer: A D

622. On the Quidway router, which command can be used to display the mapping relation between the
network address and DLCI?
A.display fr interface
B.display fr
C.display fr map-info
D.display fr brief
Answer: C

623. Configure a frame relay PVC on the Quidway router, found no effect, what is the possible reasons?
(please select 3 answers)
A. configure the same dlci number on the same router
B. LMI type configuration errors
C. frame relay encapsulation type configuration errors
D. DLCI configuration errors
Answer: B C D

624. Judge: in the following frame relay, IP address 10.1.1.2 in the result of the display command refers to
the IP address of the local.
[RTA]dis fr map-info
Map Statistics for interface Serial0 (DTE)
DLCI = 100, IP INARP 10.1.1.2, Serial0
create time = 2007/06/04 17:34:59, status = ACTIVE
encapsulation = ietf, vlink = 20, broadcast
A.True
B.False
Answer: A

625. Because the distance vector routing protocol adopted horizontal splitting mechanism, it can lead to

111 / 158
The safer , easier way to help you pass any IT exams. 

connect to multiple of end the frame relay nodes of opposite terminal, can't spread routes to all opposite
terminal, which of the following ways can solve this problem? (please select 3 answers)
A. use multiple physical interface to connect multiple adjacent nodes
B. use multiple logical interface of a physical interface
C. close function of level segmentation and consider the risk of routing loops
D. any conditions will not produce routing loops, do not need to consider risk of routing loops
Answer: A B C

626. What is the scope of IGP affects?


A. area
B. in the local area network (LAN)
C. autonomous systems
D. natural subnet range
Answer: C

627. Which of the following correctly describes the routing protocol?


A. A protocol which allows packets to transmit between hosts
B. A way which define the format and usage of domain in packets
C. A protocol which complete the route selection by executing an algorithm
D. A protocol which specify binding mode and time of MAC address and IP address
Answer: C

628. which of the following description of the function of the router is correct? (please select 3 answers)
A. interconnect the network of addressing type
B. the message section for the forwarding of a message
C. to forward the message from one network to another network
D. addressing
Answer: B C D

629. Which of the following description about Routing table is correct? (please select 2 answers)
A. the next hop in routing tables are redundant, can guide the message forwarding with interface
B. to routing of different sources, the priority is not the same
C. the cost values are icomparable between the different routing protocols
D. the cost values are not comparable between different routing protocols
Answer: B D

630. On the Quidway router, it should use the command ( ) to observe the routing table.
A.display ip path
B.display ip routing-table
C.display interface
D.display current-configuration
Answer: B

631. What are the sources do routing of routing table have? (please select 3 answers)

112 / 158
The safer , easier way to help you pass any IT exams. 

A. the physical layer protocol


B. the link layer protocol
C. the administrator add by hand
D. dynamic routing protocol
Answer: B C D

632. Which of the following content is not contained in the routing table?


A. the source address
B. the next-hop
C. the target network
D. the routing metric
Answer: A

633. In the router, if there are multiple routes to the same destination, what factors determine the best
router?(please select 2 answers)
A. the routing priority
B. the publisher of the routing
C. the routing cost value
D. survival time of the routing
Answer: A C

634. Which of the following belongs to the routing protocol? (please select 2 answers)
A.RIP
B.Frame Relay
C.OSPF
D.PPP
E.IPv6
F.IP
Answer: A C

635. Which of the following statements about routing priority is correct? (please select 3 answers)
A. is only used between RIP and OSPF
B. is used between different routing protocols
C. is the important basis of routing selection
D. The default priority of direct routing is 0
Answer: A C D

636. In IGP protocol, there are many different paths to a destination, these paths have the same path
overhead; in the routing table, these routes can be called
A. equivalent routing
B. suboptimal routing
C. multipath routing
D. the default routing
Answer: A

113 / 158
The safer , easier way to help you pass any IT exams. 

637. Common link-state routing protocols have (please select 2 answers)


A.RIP
B.BGP
C.IS-IS
D.OSPF
Answer: C D

638. According to the computational algorithm of routing to divide, routing protocols can be divided into
(please select 2 answers)
A.IGP
B.EGP
C. Distance vector
D. link-state
Answer: C D

639. Which of the following information is contained in the IP routing table? (please select 3 answers)
A. Destination network address
B. the source address
C. the interface
D. the next-hop address
Answer: A C D

640. Common IGP routing protocols contain (please select 2 answers)


A.RIP
B.OSPF
C.IP
D.BGP
Answer: A B

641. Judge: each router is responsible for their own site packets through optimal path to forward, through
multiple routers a relay to forward the packet to the destination from station to station.
A.True
B.False
Answer: A

642. The formation of the routing table has a variety of ways, which of the following is correct?(please
select 2 answers)
A. the static routing protocol
B. dynamic routing protocol
C. the application layer protocol
D. a transport layer protocol
Answer: A B

114 / 158
The safer , easier way to help you pass any IT exams. 

643. The main function of the router, which of the following is correct? (please select 3 answers)
A. check source address of packet
B. determine the source of information
C. found possible route
D. identify and maintain the routing information
Answer: B C D

644. The proto field values of a route is direct in the routing table, which shows that the route is (please
select 3 answers)
A. the routing is found by the link layer protocol
B. interface routing
C. direct routing
D. the default routing
Answer: A B C

645. The routing which is found by the link layer protocol, which of the following is correct (please select 2
answers)
A. don't need maintenance
B. can only find the routing of the loopback address
C. can only find the routing of the interface networking straight segment
D. can only find the routing of across a network segment
Answer: A C

646. Routers do not need to know the complete forward path, only know how the nearest next-hop walk to
the destination, we call this process of message relaying forward as
A.hop by hop forwarding
B.host by host forwarding
C.router by router forwarding
D.network by network forwarding
Answer: A

647. In the network, the router use () to guide the forwarding of a message.
A.DNS look up
B.ARP table
C. the routing table
D. MAC address table
Answer: B

648. About the routing convergence, which of the following statements is the most exact?
A. the convergence is changing process due to network changes
B. convergence refers to process of router sends hello message to form neighbors
C. convergence is process of two routers merge their routing table into one
D. convergence is process of all the routing tables synchronize in the network, or simply can be defined
as process of a router adopt corresponding measures to reach a steady state to the network changes

115 / 158
The safer , easier way to help you pass any IT exams. 

Answer: D

649. When the router receives the message of the destination IP address which has no matching table
item in the routing table, the strategy-taken is
A. lose the message
B. make the message fragmentation
C. forward the message
D. if the default routing exists, as the default routing forwarding, or discarded
Answer: D

650. Judge: when the network topology changes, if the best path to the destination IP is not available,
dynamic routing protocol can adapt to network changes, and determine another the best path to
destination IP.
A.True
B.False
Answer: A

651. Protocol configuration is simple, slow convergence speed. The routing protocol which is often used
in small and medium-sized network refers to
A.BGP
B.OSPF
C.ISIS
D.RIP
Answer: D

652. which of the following command used to configure a default route is correct?


A.[Quidway]ip route-static 0.0.0.0 0.0.0.0 172.16.2.1
B.[Quidway]ip route-static 0.0.0.0 255.255.255.255 172.16.2.1
C.[Quidway- Serial0]ip route-static 0.0.0.0 0.0.0.0 172.16.2.1
D.<Quidway>ip route-static 0.0.0.0 0.0.0.0 172.16.2.1
Answer: A

653. Which of the following description of the default route is correct? (please select 2 answers)
A. the default route is a routing which is used preferentially
B. the default route is a routing which is finally used
C. the default routing can be configured manually
D. the default route is a special kind of dynamic routing
Answer: B C

654. If the foreign export of an internal network only has one, then the best configuration
A. the default routing
B. the host routing
C. dynamic routing
D. direct routing

116 / 158
The safer , easier way to help you pass any IT exams. 

Answer: A

655. Configure gateway in the computer running Windows, which is similar to configure in the router
A. direct routing
B. the default route
C. dynamic routing
D. the host routing
Answer: B

656. On VRP platform, the default priority of static routing is


A.0
B.20
C.60
D.100
Answer: C

657. Judge: static routing can be manually configured by the administrator, can also be automatically
generated.
A.True
B.False
Answer: B

658. The configuration commands of static routing for huawei router is


A.ip route-static
B.ip route static
C.route-static ip
D.route static ip
Answer: B

659. The destination IP address and mask in configuration command parameters of static routing, form of
expression of mask can be (please select 2 answers)
A. dotted decimal
B. the length of the mask (the digit of ' 1 ' in the mask)
C. dotted binary
D. dotted hexadecimal
Answer: A B

660. The preference_value parameters in configuration commands of static routing, which of the following
is correct? (please select 2 answers)
A. preference_value value can be input for many times in the same command, and take effect many times
B. preference_value value can be input for many times in the same command, only the first one is
effective
C.preference_value values can be input for many times in the same command , only the last one is
effective

117 / 158
The safer , easier way to help you pass any IT exams. 

D. for multiple routing to reach the same destination IP, can configure the different preference_value to
achieve routing backup
Answer: C D

661. The parameter reject in the configuration commands of Static routing shows clearly
A. inaccessible routing
B. black hole routing
C. routing loops
D. the routing iteration
Answer: A

662. The parameter blackhole in the configuration commands of Static routing shows clearly
A. inaccessible routing
B. black hole routing
C. routing loops
D. the routing iteration
Answer: B

663. Hit inaccessible routing will perform the following operations (please select 2 answers)
A. any IP message to the destination will be discarded
B. send ICMP message to inform the source host destination IP inaccessible
C. don't send ICMP unreachable message to the source host
D. send message of TTL - 1 to inform the source host
Answer: A B

664. Configure router A RIP protocol and interface S0 (IP address is 10.0.0.1/24) in network segment can
use RIP routing protocol, which of the following command is required? (please select 2 answers)
A.rip
B.rip 10.0.0.0
C.network 10.0.0.0 255.255.255.0
D.network 10.0.0.0
Answer: A D

665. In RIP protocol, calculating the parameters of the cost value is


A. MTU
B. delay
C. the bandwidth
D. the routing hop count
Answer: D

666. About the RIP protocol, which of the following statement is correct? (please select 2 answers)
A.RIP protocol is a kind of IGP
B.RIP protocol is a kind of EGP
C.RIP protocol is a distance vector routing protocol

118 / 158
The safer , easier way to help you pass any IT exams. 

D.RIP protocol is a link-state routing protocol


Answer: A C

667. RIP protocol is based on


A.UDP
B.TCP
C.ICMP
D.Raw IP
Answer: A

668. How long hasn't RIP routing item been updated which will become inaccessible?
A.90s
B.120s
C.180s
D.240s
Answer: C

669. In RIP, cost value is equal to ( ) as inaccessible.


A.8
B.10
C.15
D.16
Answer: D

670. The founction of RIP leading up routing inhibition mechanism is


A. to save network bandwidth
B. to prevent from forming the routing loops in the network
C. spread routing inaccessible information in the entire network
D. inform the neighbor routers that which routing learn from the router
Answer: D

671. For RIP protocol, the maximum number of hop which can reach the target network (the number of
router which passes through) is
A.12
B.15
C.16
D.no limit
Answer: B

672. The updated message sending cycle of RIP routing table is ( ) seconds.


A.5
B.30
C.60
D.180

119 / 158
The safer , easier way to help you pass any IT exams. 

Answer: B

673. RIP (Routing Information Protocol) Protocol use () for interaction of Routing Information, and send an
updated message to outside every certain time interval.
A.TCP
B.UDP
C.RSVP
D.LDP
Answer: B

674. Judge: RIP (Routing Information Protocol) Protocol version has RIPv1, RIPv2 and RIPv3.
A.True
B.False
Answer: B

675. After a RIP routing become inaccessible, the router spends ( ) on not receiving the updated message
after of the RIP routing information, then delete the RIP routing from the routing table.
A.120s
B.180s
C.240s
D.300s
Answer: A

676. In RIP, the number of hop of routers to the directly connected network is
A.0
B.1
C. infinity
D.none of the above is correct
Answer: A

677. After receiving the Response message which is sent from the neighbors, RIP protocol caculate the
metric of route item in message, the size of metric is equal to
A. the metric carried in message
B. metric value + 1 carried in message
C. metric carried in message + the cost of measure of network of receiving message
D. the cost of measure of network of receiving message
Answer: C

678. Which method does RIPv2 default adopt to send a message?


A. unicast
B. multicast
C. the broadcast
D. multicast and broadcast
Answer: B

120 / 158
The safer , easier way to help you pass any IT exams. 

679. which of the following features do RIPv2 version support? (please select 3 answers)
A. variable-length subnet mask
B. link-state calculation
C. plaintext authentication
D. MD5 ciphertext validation
Answer: A C D

680. The message of RIPv1 have the largest limit of routing item. The router send more than ( )updated
message of route once, then which must generate multiple RIP v1 message.
A.15
B.16
C.25
D.90
Answer: C

681. Version field value in RIPv1 message is


A.0
B.1
C.2
D.3
Answer: C

682. When the Command field values in RIP message is 1, which shows the message is
A. request message
B. the response message
C. the unsolicited response message
D. periodic broadcast message
Answer: A

683. Which of the following description about OSPF is correct?Classless Inter-Domain Routing (please
select 3 answers)
A. support classless Inter-Domain Routing CIDR
B. use the distance vector algorithm
C. use triggered update, if the network topology changes, send updated message immediately, and make
the change synchronization in the autonomous system
D. support multicast address to send protocol message
Answer: A C D

684. Which of the following statement about OSPF protocol is correct?(please select 3 answers)
A. is the external gateway routing protocol
B. because the OSPF calculate routing by the shortest path tree algorithm through collected link-state
routing, from algorithm itself, to ensure the area inside can not generate self-loop
C. support authentication function for protocol message, increase the safety

121 / 158
The safer , easier way to help you pass any IT exams. 

D. support more than the equivalent routing to the same destination address
Answer: B C D

685. For the process of OSPF protocol caculating routing, which of the following order is correct?
a. every router generate LSA according to their own around topology
b. according to collected all the LSA computing routing, generate minimum spanning tree in the network
c. send LSA to all other routers in the network, and at the same time, collect LSA which all other routers
generated
d. generate LSDB link-state database A.a-b-c-d
B.a-c-b-d
C.a-c-d-b
D.d-a-c-b
Answer: C

686. For the benefits of the divided region, which of the following description is correct? (please select 3
answers)
A. reduce the size of the LSDB
B. reduce the complexity of running the SPF algorithm
C. reduce oscillation of routing
D. in favour of routing protocol processing safety certification
Answer: A B C

687. Which of the following description about the Router ID is not correct? (please select 3 answers)
A. the Router ID must be the same in the same area, and the Router ID can be different in different area
B. Router ID must be the IP address of an interface of the router
C. must be manually configured to specify the Router ID
D. the precondition of OSPF protocol normal running is that the Router has the Router ID
Answer: A B C

688. Which of the following statement about type of router in the OSPF is not correct? (please select 3
answers)
A. ABR can be ASBR at the same time
B. connect the router in any two regions for ABR, can transfer routing information between the two
regions
C. Routers inside area can not be ASBR
D. a router can belong to two or more than two regions, but only be ABR of at most a region
Answer: B C D

689. In the OSPF protocol, most of the message is sent as the multicast address, which reach the role of
the radio, and minimize the disturbance to the other network devices.
A.True
B.False
Answer: A

122 / 158
The safer , easier way to help you pass any IT exams. 

690. On VRP platform, the default priority of OSPF protocol in the routing table is
A.10
B.1
C.110
D.120
Answer: A

691. In the OSPF protocol, which of the following description of DR is correct? (please select 3 answers)
A. DR is jointly elected by all of the routers in the network
B. if priority value of two routers are different, choose priority value of router which is smaller as DR
C. if priority values of two routers are equal, select the Router ID of routers which is bigger as DR
D. establish adjacency relationship between DR and BDR
Answer: A C D

692. Which of the following network type does OSPF support? (please choose 3 answers)
A. the point-to-point
B. point to multipoint
C. the total linear
D. radio type
Answer: A B D

693. In the OSPF routing protocol, which of the following role can a ABR (Area Border Router) be at the
same time? (please select 2 answers)
A.IR(Internal Router)
B.BR(Backbone Router)
C.ASBR
D.Stub Router
Answer: B D

694. In the VRP, how to configure the Router ID of route for 1.1.1.1?
A.<Quidway>router id 1.1.1.1
B.[Quidway]router id 1.1.1.1
C.[Quidway]router-id 1.1.1.1
D.[Quidway]router id 1.1.1.1 255.255.255.255
Answer: B

695. Exchange between routers in the OSPF domain is ( ) information, and all these information gather
into database.
A. link-state
B. the distance vector
C. the routing cost
D. routing priority
Answer: A

123 / 158
The safer , easier way to help you pass any IT exams. 

696. The router which can make OSPF through ( ) algorithm to calculate the shortest route to the
destination.
A.OSPF
B.SPF
C.SRC
D.OPF
Answer: B

697. Judge: OSPF through routing protocol algorithm can generate an acyclic the shortest path tree, and
therefore there is no loop problem of OSPF routing protocol.
A.True
B.False
Answer: A

698. OSPF run directly on the IP protocol, which IP protocol number can be used?
A.89
B.80
C.512
D.2328
Answer: A

699. About the characteristics of the OSPF protocol, which of the following statement is correct? (please
select 3 answers)
A. support flat network design
B. fast routing change convergence speed
C. support multiple equivalent routing
D. support authentication of agreement message
Answer: B C D

700. Each OSPF router notify LSA through flood link-state to release information, which of the following is
included?(please select 3 answers)
A. the available ports
B. accessible neighbors
C. information of the adjacent routers
D. the local link state information
Answer: A B D

701. In the process of OSPF routing calculation, router flood send LSA, which process between routers
do flood refer to?
A. the process of sending link state database
B. the process of synchronizing link state database
C. the process of sending and synchronizing connection state database process
D. the process of removing port link state database
Answer: C

124 / 158
The safer , easier way to help you pass any IT exams. 

702. What basis do the link-state database (LSDB) of OSPF routers form (please select 2 answers)
A. their own local LSA
B. receive LSA which is released by neighbor routers
C. send RSVP messages to the neighbor router
D. receive RSVP messages which are released by neighbor routers
Answer: A B

703. Through the LSDB, each router calculates their own shortest path tree of ( ) nodes.
A. the root
B. the leaves
C. the specified root
D. backup
Answer: A

704. What of other nodes in network from route are given by the shortest path tree which is caculated by
route in OSPF area?
A. all link-state
B. the routing table
C. MAC table
D. ARP table
Answer: B

705. About neighbor routers of OSPF, which of the following is correct? (please select 2 answers)
A.OSPF interface send the Hello message outside which is used to find the neighbors
B. the router receive Hello message which is sent by opposite router, both become neighbor
C. OSPF routers which receive the Hello message will check and define some of the parameters in the
message, if both are consistent, then to form neighbor relationship
D. neighbor discovery is equal to the adjacent relations
Answer: A C

706. Only when OSPF routers exchange ( ) message successfully, and can exchange the LSA, to form
the adjacency relations in the true sense.
A.Hello
B.DD
C.LSR
D.LSU
Answer: C

707. When two routers synchronize LSDB database, which message is used to describe their own LSDB?
A.Hello
B.DD
C.LSR
D.LSU

125 / 158
The safer , easier way to help you pass any IT exams. 

Answer: B

708. Which of the following description about DD taking message is correct? (please select 3 answers)
A. include all data of each LSA
B. only includes Header of each LSA
C. LSA's Header can identify a LSA uniquely
D. LSA Header only takes up a fraction of the entire amount of data in a LSA
Answer: B C D

709. In the () network type, in order to avoid problems with the slow routing convergence, design the DR
and BDR router. (please select 2 answers)
A. the point-to-point
B. the radio type
C. NBMA
D. point to multipoint
Answer: B C

710. Which of the following statement is correct? (please select 2 answers)


A. routing priority is consistent with the calculation method of routing metrics
B. routing metrics calculation may be based on a single characteristics calculation of path, may also be
based on a variety of properties of path
C. if several dynamic routing protocol all find the best route of reaching the same target network , these
routes will be added to the routing table
D. dynamic routing protocol judge the stand or fall of routing according to the routing metrics, and
judgment method of every kind of routing protocol is not the same
Answer: B D

711. A router learns route of reaching the same destination address by RIP, OSPF and static routing. By
default, the VRP will eventually choose () routing as the optimal routing
A.RIP
B.OSPF
C. the static routing
D. All the three are used
Answer: B

712. What will Routing loop problem cause? (please select 3 answers)


A. slow convergence
B. message is forwarded cycle between routers
C. the router restart
D. the routing inconformity
Answer: A B D

713. Which of the following is not correct? (please select 2 answers)


A. priority of each static routing can also be different

126 / 158
The safer , easier way to help you pass any IT exams. 

B. by default, the order of routing priority is OSPF > RIP


C. the greater the routing cost value, the better the routing
D. in VRP, the greater the numerical value of the routing protocol priority, which shows the higher priority
Answer: C D

714. which of the following reasons may Routing self loop be caused? (please select 3 answers)
A. in the process of routing transmission, it appears error
B. the defects of routing algorithm
C. when introduced into routing in different routing domain, routing information which can prevent the loop
lost
D. configuration errors
Answer: B C D

715. Which of the following routing protocol can support variable-length subnet mask? (please select 3
answers)
A.RIP v1
B.RIP v2
C.OSPF
D.BGP
Answer: B C D

716. Which of the following performance index can measure the dynamic routing protocol? (please select
four answers)
A. Accuracy
B. fast convergence
C. low overhead
D. security
E. universality of being used
Answer: A B C D

717. Which of the following routing protocol is multicast routing protocol? (please select 3 answers)
A.RIP
B.PIM-DM
C.PIM-SM
D.DVMRP
Answer: a C D

718. Judge: when the network breaks down, static routing can be automatically corrected, do not need the
administrator to configure.
A.True
B.False
Answer: B

719. According to the method of route discovery and the calculated routing to distinguish, which of the

127 / 158
The safer , easier way to help you pass any IT exams. 

following does distance vector protocols care?


A. the hop count of reaching the destination address
B. manually specify the next-hop address
C. routing nterface is polymerization port or not
D. link bandwidth resource information
Answer: A

720. When there are multiple routing information of the same destination address in the routing table,
Which is chosen by router as the matches?
A. multicast polymerization
B. the shortest path
C. the longest mask
D. a minimum of hop count
Answer: C

721. When the length of the data link layer receiving message from the upper is greater than the largest
MTU of interface of the router sending the message, the strategy-taken is
A. lose the message
B. slice the message
C. send request to the source router, reduce the message size
D. forwarding the packet directly
Answer: B

722. Based on Behrman ford algorithm, usually send entire routing table to neighboring routers at a
certain time interval. Simple configuration, poor scalability, which does the routing protocol defer to?
A. the distance vector routing protocol
B. link-state routing protocol
C. the internal gateway protocol
D. external gateway protocol
Answer: A

723. Which of the following configuration of static routing is correct? (please select 3 answers)
A.ip route-static 129.1.0.0 16 serial 0
B.ip route-static 10.0.0.2 16 129.1.0.0
C.ip route-static 129.1.0.0 16 10.0.0.2
D.ip route-static 129.1.0.0.255.255.0.0 10.0.0.2
Answer: A C D

724. When configure Static routing, what is the difference of keyword reject and blackhole? (please select
2 answers)
A. message which is sent to reject routing is discarded, and do not inform the source host
B. message which is sent to blackhole routing is discarded, and do not inform the source host
C. message which is sent to reject routing is discarded, message which is sent to blackhole routing is not
discarded

128 / 158
The safer , easier way to help you pass any IT exams. 

D. message which is sent to blackhole routing is discarded, message which is sent to reject the routing is
not discarded
E. message which is sent to reject routing is discarded, and inform the source host
F. message which is sent to blackhole routing is discarded, and inform the source host
Answer: B E

725. Compared with the static routing protocol, the advantages of dynamic routing have (please select 2
answers)
A. less occupy of bandwidth
B. simple
C. the router can automatically discover the network topology changes
D. the router can automatically calculate the new routing
Answer: C D

726. The advantages of Static routing include: (please select 2 answers)


A. simple configuration
B. automatically updates routing
C. improve network security
D. save bandwidth
Answer: A D

727. Which of the following disadvantage are using static routers in network?(please select 2 answers)
A. configuration is complex in the large network
B. after the network topology changes, the static routes must be reconfigured
C. the static routing cannot be known by external routers, which can lead to poor network connectivity
D. in VRP, static routing cannot achieve load sharing
Answer: A B

728. Which of the following statement about the static routing priority right is correct? (please select 3
answers)
A. When configure multiple routing of reaching the same network destination, if you specify the same
priority, it can realize the load sharing
B. in VRP, the default value of static routing priority is 10
C. When configure multiple routing of reaching the same network destination, if you specify different
priorities, it can realize routing backup
D. overhead value of Static routing in VRP is zero
Answer: A C D

729. Configure two static routers on a router to network 10.1.1.1/32, one of the static routing is not set
preference_value, but configure preference_value of the other static routing for 100, which of the following
statement is correct? (please select 2 answers)
A. the router which is not set preference_value as the main road
B. preference_value configured to 100 routing as by the main road
C. the static routing support routing backup

129 / 158
The safer , easier way to help you pass any IT exams. 

D. the two routing realize load sharing


Answer: A d

730. Configure two static route on a router to network 10.1.1.1/32, one of the static routing is not set
preference_value, but configure preference_value of the other static routing for 100, display the IP routing
table can see ( ). (please select 3 answers)
A. only one routing which arrive 10.1.1.1/32
B. two routing which arrive 10.1.1.1/32
C. the routing of the preference_value for 100 which can not see in the routing table
D. the routing of preference_value for 60
Answer: A C D

731. Check the information of the static route on a router, what does alternate properties of backup routing
show?
A.Bypass
B.Inactive
C.Backup
D.Slave
Answer: B

732. Which of the following statement about the reserved Route is correct? (please select 3 answers)
A. not to join the global routing table
B. don't guide data forwarding
C. by the failure of the main routing, it will rise to main routing, and join the global routing table
D. guide the data forwarding with the main routing
Answer: A B C

733. In RIP protocol, which of the following methods can solve the problem of routing loops?(please
select 3 answers)
A. level segmentation
B. routing control method
C. the router restart
D. define the maximum number of routing metrics
Answer: A B D

734. About the distance vector algorithm, which of the following statement is not correct? (please select 2
answers)
A. distance vector algorithm does not produce routing loop problem
B. routing protocol which adopt the distance vector algorithm is implemented by transmiting routing
message
C. the representation of distance vector of routing information is (target network, cost)
D. the router which run distance vector protocols only get information from their neighbors
Answer: A C

130 / 158
The safer , easier way to help you pass any IT exams. 

735. Which of the following statement about distance vector routing protocols using the split horizon
technology is correct? (please select 3 answers)
A. avoid generating routing loop between adjacent routers
B. ensure that in the process of routing information transmission, the routing information is no longer sent
to the interface of receiving the routing information
C. work together with routing (holddown) inhibition mechanism, to avoid routing loops at a certain extent
D. replace poison reverse algorithm
Answer: A B C

736. which of the following statement about the Bellman - Ford algorithm is correct? (please select 2
answers)
A. RIP routing protocol based on Bellman - Ford algorithm
B. Bellman - Ford algorithm is essentially Dijkstra algorithm
C. Bellman - Ford algorithm does not need to know the entire network topology
D. Bellman - Ford algorithm is link-state algorithm
Answer: A C

737. Which command is to prohibit automatically routing aggregation function of RIP protocol?


A.undo rip
B.summary
C.undo summary
D.undo network 10.0.0.0
Answer: C

738. After RIP receive the routing information which is released by neighbor routers, for routing
information updates, which of the following statement is correct? (please select 3 answers)
A. for the routing item which is not in the routing table, only when metric value is less than inaccessible, to
add the item
B. for the routing item which is in the routing table, when the next-hop of the routing item is neighbor
routers, only when the metric value reduce, update this item
C. for the routing item which is in the routing table, when the next-hop of the routing item is not neighbor
routers, only when the metric value reduce, update this item
D. for the routing item which is in the routing table,when the next-hop of the routing item is neighbor
routers, as long as the metric value has changes, it will update the metric value of this item
Answer: A C D

739. In VPR, about RIP V1 and RIP V2, which of the following statement is correct? (please select 2
answers)
A.RIP V1 message support VLSM
B.RIP V2 message support VLSM
C.RIP V2 default use routing aggregation function
D.RIP V1 only supports simple password authentication of message, but RIP V2 support MD5
authentication
Answer: B C

131 / 158
The safer , easier way to help you pass any IT exams. 

740. In the RIP routing protocol, which of the following statement about reduce routing self-loop
mechanisms is correct? (please select 3 answers)
A. trigger updates can to avoid routing loops at a certain extent,
B. level segmentation method can eliminate self-loop between the routers
C. set suppression time method may result in slow convergence of routing
D. in order to reduce the repercussions of the routing self-loop, RIP protocol specifies the maximum hop
count
Answer: A C D

741. When the interface operates in RIPv2 broadcast way, which message can it receive? (please select
2 answers)
A.RIPv1 radio message
B.RIPv1 multicast message
C.RIPv2 radio message
D.RIPv2 multicast message
Answer: A C

742. Which of the statements about routing self-loop problem in RIP routing protocol is correct?
A. Taken topology, D - V algorithm can certainly find the shortest path
B. level segmentation method can only have effect on eliminating the self-loop between the two routers
C. although set inhibition time method could lead to the slow convergence, but can thoroughly solve the
problem of routing self-loop
D. set the maximum hop count method can solve all of the problems of routing self-loop
Answer: c

743. Which of the following description about RIP V1 and RIP V2 is correct? (please select two answers)
A.RIP V1 does not support multicast, by default, not release subnet information
B.RIP V2 support multicast, can not release subnet information
C.In RIP in V1, can release subnet information by be eliminated routing aggregation
D.RIP V2 default use broadcast mode, to use multicast to release RIP message, need to use command
RIP version 2 multicast to set
Answer: A B

744. Which of the following statement about RIP networks scale is correct? (please select 3 answers)
A.RIP based on Bellman - Ford algorithm can correctly calculate the shortest path of large-scale network
B.16 hop limit of RIP is to avoid routing loops to result in the infinite transmission of packets in the network
C. even within 16 hop limit, for complex network topology or advice not to choose RIP but the OSPF
routing protocol or others
D. one main reason of only adapting to run in the small network is that RIP must broadcast their full
routing information regularly, but routing information in large networks is more, which causes RIP takes
too much network bandwidth
Answer: B C D

132 / 158
The safer , easier way to help you pass any IT exams. 

745. Which of the following statement about RIP routing is correct? (please select 2 answers)
A. configure RIP route in preference to the static routing
B. When RIP introduce other routing protocols to find routing, if don't specify routing cost, then use the
default routing cost 1
C. configure RIP route in preference to direct routing on a router
D. RIP routing priority can not be configured manually
Answer: A B

746. Which of the following description about segmentation technology is correct? (please select 3
answers)
A. level segmentation technique is used to solve the problem of routing self-loop, its main thought is that
will not send routing information which is received from neighbor from the interface again to the neighbors
B. level segmentation technology can only solve the problem of the self-loop between the two routers, but
the self-loop problem between more than two routers is powerless
C.RIP level segmentation technology has side effect, may make some routers not get the correct routing
sometimes
D. in VRP, horizontal split off by default, if necessary, can be configured to open
Answer: A B C

747. In VRP, which of the following about RIP routing aggregationis correct? (please select 3 answers)
A.RIP V1 support routing aggregation by default, and routing aggregation function can be turned off when
necessary
B.RIP V2 support the function of closing routing aggregation
C.RIP V1 doesn't support CIDR
D.RIP V2 support subnet routing aggregation
Answer: B C D

748. Which of the following about OSPF and RIP is correct? (please select 3 answers)
A. Compared RIP, OSPF is more adapted to large networks
B. Compared OSPF, RIP is more adapted to small network
C. RIP IS adapted to the face form and OSPF is more adapted to network structure of hierarchical model
D. on the same network, bandwidth cost of RIP is higher than OSPF
Answer: A C D

749. Which of the following command can be used to show the current operation state and configuration
information of the RIP?
A.show #rip
B.show rip
C.display rip
D.display this rip
Answer: C

750. To view Age time of RIP routing protocol on the router through the command means
A.RIP message update interval

133 / 158
The safer , easier way to help you pass any IT exams. 

B.RIP routing aging time


C.RIP routing inhibition time
D.RIP routing switching time
Answer: B

751. Displayed routing information command on the router RIP, according to the results of peer
192.169.1.3 on ethernet1/0/1, what of the router interface is 192.168.1.2?
A. RIP neighbor address
B. enable the RIP protocol interface address
C. RIP routing next-hop address
D. RIP transport address
Answer: A

752. Displayed routing information command on the router RIP, according to the results of peer
192.169.1.3 on ethernet1/0/1, what of the router interface is ethernet1/0/1?
A. the interface linked to RIP neighbor 192.169.1.3
B. RIP transport address of the interface
C. can broadcast protocol interfaces
D. to the multicast protocol interfaces
Answer: A

753. Displayed routing information on the router RIP, Cost of 1 represents:


A. the routing cost is zero
B. RIP priority is 1
C. Hop to the destination network segment is 1
D. the routing process number is 1
E. The weights of the routing is 1
Answer: D

754. running OSPF protocol in single area network, for LSDB and routing table, which of the following
description is correct (please select 2 answers)
A. the router get LSDB link-state database is the same
B. the router get LSDB link-state database is different
C. the router get routing table is different
D. the router get routing table is the same
Answer: A C

755. Border router ASBR in the OSPF network for autonomous system, which of the following description
is correct (please select 2 answers)
A. ASBR are those who will find the other routing protocols in the route into the OSPF router
B. ASBR don't have to be located at the boundary of AS, but can at any position in the autonomous
system (except Stub area)
C. ASBR cannot simultaneously for ASBR
D. ASBR must connect two OSPF areas

134 / 158
The safer , easier way to help you pass any IT exams. 

Answer: A B

756. Which of the following description is correct about OSPF routing self-loop?
A. OSPF area has eliminate the routing self-loop
B. OSPF area does not eliminate the routing self-loop
C. OSPF autonomous system area does not eliminate the routing self-loop
D. OSPF autonomous system area does not exist self-loop
Answer: A

757. which of the following concept of areas is not correct about OSPF protocol? (please select two
answers)
A. if there is no manual configuration, the default of AREA as the backbone area, AREA ID is 0
B. OSPF supports multiple division
C. every area all have a 32-bit AREA ID identification
D. regional AREA ID must apply to the relevant international organizations, not specified on its own.
Answer: A D

758. In the VRP, configure OSPF routers must? (please select 3 answers)
A. configure the Router ID
B. open the OSPF process
C. create OSPF area
D. the specified segment contained in each area
Answer: B C D

759. which of the following is true about DR in OSPF network? (please select 2 answers)
A. one OSPF area must have a DR
B. DR must be produced in accordance with relevant provisions of the agreement between the router
consultation
C. only the priority of the largest routers in the network can become DR
D. only NBMA or radio network will choose the DR
Answer: B D

760. According to the regulations of OSPF protocol: in a radio types of networks, because of the
existence of DR. No longer interact link-state information between two DROther routers, also no longer
send a HELLO message each other.
A.True
B.False
Answer: B

761. OSPF as an application layer protocol, its running in?


A. On UD, Port Number 520
B. On TCP, Port Number 179
C. On IP, Protocol Number 89
D. directly run on the data link layer

135 / 158
The safer , easier way to help you pass any IT exams. 

Answer: C

762. In VRP operating system, how to enter OSPF area 0 view (please select 2 answers)
A.[Quidway]ospf area 0
B.[Quidway-ospf-1]area 0
C.[Quidway-ospf-1]area 0.0.0.0
D.[Quidway-ospf-1]area 0 enable
Answer: B C

763. View the OSPF neighbor relations established is correct, which command is used to?
A.display ospf neighbor
B.display ospf brief
C.display ospf peer
D.display ospf interface
Answer: a

764. About the role of the DR and BDR, which of the following is true (please select 3 answers)
A. can reduce the number of adjacency relations
B. can decrease produce loop
C. can decrease the number of interaction for routing information
D. save bandwidth, reduce the pressure on router processing capacity
Answer: A C D

765. A DRother router and which can exchange the link-state information and routing information. (please
select 2 answers)
A. DR
B. BDR
C. DRother
D. all OSPF neighbors
Answer: A B

766. OSPF Area is a set of routers and network. OSPF rules have the same () of the router belong to the
same Area.
A. neighbours relations
B. LSDB
C. LSA
D. adjacency relations
Answer: B

767. About the Router ID, which of the following is true (please select 2 answers)
A. belong to the same LSDB Router has the same Router ID
B. OSPF every Router in the network needs to have a unique Router ID
C. two Routers belong to different OSPF Area can have same Router ID
D. Router ID format is the same as the format of the IP address

136 / 158
The safer , easier way to help you pass any IT exams. 

Answer: B D

768. If not manually specify the Router ID, which OSPF priority use as the Router ID?
A. the biggest IP address of the Loopback interface address
B. the biggest IP address of the physical interface address
C. 127.0.0.1
D. linked to OSPF neighbors the IP address of the interface
Answer: A

769. OSPF supports multiple processes, if you do not specify a process, which process number is default?
A.0
B.1
C.10
D.100
Answer: B

770. Which of the following configuration commands to specify the right segment is contained in the
OSPF area?
A.[Quidway-ospf-1-area-0.0.0.0] network 10.1.1.0 0.0.0.255
B.[Quidway-ospf-1-area-0.0.0.0] network 10.1.1.0 255.255.255.0
C.[Quidway-ospf-1] network 10.1.1.0 0.0.0.255
D.[Quidway-ospf-1] network 10.1.1.0 255.255.255.0
Answer: A

771. OSPF protocol autonomous system was divided into different Area, what Area will relay?
A. area of abstract routing information
B. area of link-state information
C. area of topology information
D. regional information link bandwidth
Answer: A

772. OSPF backbone area is responsible for the release of area border router between nonbackbone
areas summary information, the number of backbone area ID ?
A.area 0
B.area 1
C.area 0.0.0.1
D.area 0.0.0.2
Answer: A

773. A router routing table is as follows:

137 / 158
The safer , easier way to help you pass any IT exams. 

At the moment when the router from the etheric received a packet sent to 11.1.1.1 host, the router how to
deal with?
A. Lost
B. from Serial0 forward
C. from Ethernet0 forward
D. from LoopBack0 forward
Answer: B

774. A router routing table is as follows:

At the moment when the router from the etheric received a packet sent to 10.1.1.1 host, the router how to
deal with?
A. from Serial0 forwarded to 2.2.2.1
B. from Ethernet0 forwarded to 2.2.2.1
C. from Serial0 forwarded to the target host
D. from Ethernet0 forwarded to the target host
Answer: A

775. Known to a router's routing table has the following two tables

If the router forward to the destination address is 9.1.4.5 message, which of the following statements is
correct?
A. choose the first match, because of the high priority of OSPF protocol
B. Select the second match, because the cost of the RIP protocol is small
C. Select the second match, because exports are Ethternet0, faster than Serial0

138 / 158
The safer , easier way to help you pass any IT exams. 

D. Choose the second match, because this item for the destination address 9.1.4.5, is more precise
matching
Answer: D

776. A Quidway router's two Ethernet of E0 and E1 respectively connects the two segments: E0 (IP
address is 10.1.1.1, subnet mask 255.255.255.0) connect to network A, E1(IP address is 10.1.2.1 ,
subnet mask 255.255.255.0) connect to network B. Assuming that the gateway host on the network are
set up correctly, which of the following hosts can Ping through A host in the Internet? ( please select 3
answers)
A. A host in the network A, its IP address is 10.1.1.12, subnet mask is 255.255.0.0
B. A host in the network A, its IP address is 10.1.2.16, subnet mask is 255.255.0.0
C. A host in the network B, its IP address is 10.1.2.14, subnet mask 255.255.255.0
D. A host in the network A, its IP address is 10.1.1.8, subnet mask 255.255.255.0
Answer: A C D

777. Default routes can be derived from? (please select 2 answers)


A. manual configuration
B. the router itself
C. dynamic routing protocol
D. the link layer protocol
Answer: A C

778. Huawei router device by default, compare the priority of the OSPF routing with ISIS routing, which of
the following is true (please select 2 answers)
A. OSPF routing is better
B. Priority values of OSPF routing are smaller
C. both priority are exactly the same
D. Priority values of ISIS routing are smaller
Answer: A B

779. Equivalent routing refers to several () routing to the same destinatio.


A. the same cost
B. the same priority
C. the same interface
D. the same next jump
Answer: A

780. Below about routing loop, which is correct (please select 2 answers)
A. routing loop make message can not correctly to the destination, and lead to link congestion
B. routing loop only through a dynamic routing protocol
C. message loop routing between two or several routers, until the TTL reduced to zero and cast it away
D. link-state protocols will not produce routing loops
Answer: A C

139 / 158
The safer , easier way to help you pass any IT exams. 

781. In the process of different routing protocols to exchange routing information is called ?
A. Routing introduce
B. routing aggregation
C. routing loops
D. routing by default
Answer: A

782. which of following index can be used to measure the performance of dynamic routing protocols.
(please select 2 answers)
A. no routing loops
B. the agreement itself less overhead
C. subnet partition number
D. routing priority
Answer: A B

783. which of following about the default routing is correct? (please select 3 answers)
A. the default route is a special kind of routing, can through static route configuration
B. some dynamic routing protocol can also generate a default route, such as OSPF and ISIS
C. the default route is in the routing table entry item no match is found when routing is used. That only
when there is no appropriate routing, the default route to be used
D. in the routing table by default route network and mask is 0.0.0.0 and 255.255.255.255
Answer: A B C

784. which of following is true about the default routing (please select 2 answers)
A. also called the default route
B. only by the administrator manually configured
C. a special kind of static routing
D. make dynamic routing protocol generate the default routing
Answer: A D

785. When a router receives a packet that can not find from destination routing table, which can match
to ?
A. OSPF routing
B. RIP routing
C. BGP routing
D. the default routing
Answer: a

786. which is the default routing routing form for performance?


A. destination IP all 0, mask all 1
B. destination IP all 1, mask all 0
C. destination IP and mask all 0
D. destination IP and mask all 1
Answer: C

140 / 158
The safer , easier way to help you pass any IT exams. 

787. how maximum routing support load sharing by default route of Huawei?
A.0
B.2
C.16
D.32
Answer: D

788. After the network topology changes, which will not automatically change? must have a network
administrator intervention.
A. ISIS routing
B. OSPF routing
C. BGP routing
D. the static routing
Answer: D

789. About RIP routing aggregation, which of the following is true (please select 3 answers)
A. routing aggregation refers to different subnets within the same natural segment of the routing in the
polymerization to other network segments into a natural mask routing to send
B. RIPv1 does not support routing aggregation
C. huawei routers, by default, RIPv2 closed routing aggregation function
D. when will need all the subnet route to broadcast, can close RIPv2 routing aggregation function
Answer: A B D

790. About RIP priority, which of the following is true (please select 3 answers)
A. the priority of the routing protocol will affect the routing strategy using what kind of routing protocol for
routing as the optimal routing
B. RIP routing protocols of numerical value, the greater the priority of its actual higher priority
C. router can manually set the priority of the RIP protocol
D. By default, the priority of huawei router RIP is 100
Answer: A C D

791. At the interface configuration under the view of rip metricin value, rip metricin value command is
used to? (please select 2 answers)
A. Interface send RIP routing increased metric values
B. Interface receive RIP routing increased metric values
C. Interface send RIP routing carried metric values
D. Interface receive RIP routing carried metric values
Answer: A B

792. Under the interface view to configure RIP message, when the interface version is RIPv1, which of
the following is true (please select 2 answers)
A. this interface only receive RIPv1 and RIPv2 broadcast message
B. this interface does not receive RIPv2 group message

141 / 158
The safer , easier way to help you pass any IT exams. 

C. this interface only receive RIPv1 broadcast message


D. this interface does not receive RIPv2 broadcast message
Answer: A B

793. When specified interface run at RIPv2, which of the following is true (please select 3 answers)
A. only receive RIPv2 group broadcast message
B. don't accept RIPv1 broadcast message
C. don't accept RIPv2 broadcast message
D. receive RIPv1 group broadcast message
Answer: A B C

794. The following description about OSPF backbone area, which is correct (please select 3 answers)
A. the backbone Area ID is 0.0.0.0
B. all areas must be connected to the backbone area
C. the backbone area is responsible for the release by ABR summary routing information between
nonbackbone areas
D. each area border router ABR connections area are not backbone area
Answer: A B C

795. In the OSPF protocol, which type of the following default belongs to NBMA networks? (please select 3
answers)
A. PPP
B. frame relay
C. X.25
D. Ethernet
E.ATM
Answer: B C E

796. In OSPF routing protocol, which way that solve nonbackbone areas and backbone area do not have
directly connect?
A. set ABR
B. set ASBR
C. set virtual connection
D. set STUB area
Answer: D

797. A router running OSPF router protocol, interface Serial0 belongs to the backbone area , the IP
address is 10.0.0.1/30, which command can use enable OSPF?
A.[Quidway-ospf -1-area-0.0.0.0]network 10.0.0.0
B.[Quidway-ospf -1-area-0.0.0.0]network 10.0.0.0 0.0.0.3
C.[Quidway-serial0]ospf area 0 enable
D.[Quidway-ospf -1]network 10.0.0.0 255.255.255.252
Answer: B

142 / 158
The safer , easier way to help you pass any IT exams. 

798. ASBR in the OSPF network router is responsible for the whole AS notices AS external routing
information, ASBR can be? (please select 3 answers)
A. IR
B. ABR
C. the router belongs only to the backbone area
D. the router does not belong to the backbone area
Answer: A B D

799. OSPF configuration for multiple area, which of the following is true (please select 2 answers)
A. All nonbackbone areas must be physical or logical connected to the backbone area
B. ABR on the backbone area and nonbackbone areas can generate LSDB respectively
C. ABR on the same network segment must be in the region of backbone area and nonbackbone areas
D. ABR on unified LSDB for all regions
Answer: A B

800. OSPF basic configuration includes which steps? (please select 3 answers)
A. open the OSPF process
B. create OSPF area
C. assigned segment contained in each area
D. configured router is BR or IR
Answer: A B C

801. OSPF hello message to finish which function? (please select 2 answers)
A. the neighbors found
B. delete inaccessible neighbors regularly
C. maintain neighbor relations
D. negotiation between adjacent interface parameters
Answer: A C

802. which is the advantage of OSPF hierarchical routing (please select 3 answers)
A. to reduce the frequency of SPF calculations
B. reduced the routing table
C. reduced the link-state update message
D. reduces the network level
Answer: A B C

803. OSPF routers have four types, which of the following is true about internal router IR (please select 2
answers)
A. IR is all interfaces belong to the same area of the router
B. IR refers to the physical location of the router in regional center
C. IR refers to only one interface and backbone area related to the router
D. if all interfaces of IR belong to AREA0, then this IR is also a backbone routers
Answer: A D

143 / 158
The safer , easier way to help you pass any IT exams. 

804. which of the following type belongs to OSPF area? (please select 3 answers)
A. the standard area
B. peripheral area
C. peripheral area completely
D. border area
Answer: A B C

805. The role of ABR router, which of the following description is correct (please select 3 answers)
A. ABR is regional communication gateway
B. ABR summary linked to its regional topology information to the backbone
C. ABR for the connection of all areas to maintain an LSDB
D. ABR at least one port is connected to the backbone area
Answer: A B D

806. which is OSPF measurement?


A. the hop
B. COST
C. the priority
D. LSA
Answer: B

807. Which of the following equipment is most suited to work in two trust between different networks, and to
control the communication between the two networks, through compulsory unified security policy, to prevent
illegal access and access to the important information resources in order to achieve the purpose to protect the
safety of the system?
A. A firewall
B. the gateway
C. the router
D. the intrusion detection system
Answer: D

808. In the firewall configuration is the basic strategy of "unless explicitly banned, otherwise allowed" this
strategy is?
A. loose control strategy
B. limit control strategy
C. compromise control strategy
D. Eudemon default control strategy
Answer: A

809. Which Eudemon firewall configuration strategy is used by default


A. loose control strategy
B. limit control strategy
C. compromise control strategy
D. the default policy

144 / 158
The safer , easier way to help you pass any IT exams. 

Answer: B

810. With the development of firewall technology, the function of firewall is getting stronger and stronger, from
its technology development history, we can simply classified into three categories, namely? (please select 3
answers)
A. packet filter firewall
B. proxy firewall
C. state inspection firewall
D. circuit layer of a firewall
Answer: A B C

811. Firewall can obtain the packet source IP address, destination IP address, source TCP/UDP port and the
purpose of the TCP/UDP port number and protocol, etc., and according to the definition of specific rules to filter
packets, this firewall we called
A. packet filter firewall
B. proxy firewall
C. state inspection firewall
D. circuit layer of a firewall
Answer: A

812. The shortcomings of packet filter firewall? (please select 2 answers)


A. define complex and prone to bring problems due to the improper configuration
B. configure filtering strategy too much will cause a sharp drop in performance
C. simple configuration
D. performance overhead is small, processing speed quickly
Answer: A B

813. In the packet filter firewall, often use the "quintuple group" to do filtering strategy, the "quintuple
group" here includes? (please select 3 answers)
A. P address
B. agreement NO..
C. the port number
D. the application
E. MAC address
Answer: A B C

814. Firewall as intermediate nodes of a business visit, a firewall is a Server for the Client, a firewall is a
Client to the Server. This firewall is called?
A. packet filter firewall
B. proxy firewall
C. state inspection firewall
D. the application gateway firewall
Answer: B

145 / 158
The safer , easier way to help you pass any IT exams. 

815. About the proxy firewall, which is correct (please select 3 answers)
A. proxy firewall for each application development corresponding agent service, development cost is
higher
B. relative to the packet filter firewall, proxy firewall security is higher
C. proxy firewall usually support the business is not very rich
D. the performance of the proxy firewall usually is higher
Answer: A B C

816. Proxy firewall disadvantages include? (please select 2 answers)


A. proxy firewall for each application development corresponding agent service, development cost is
higher
B. slower, not suitable for high speed network (such as ATM or one billion - bit Ethernet) between
applications
C. enough thorough understanding related services of command, to safe handling
D. support business
Answer: A B

817. What type of firewall by detecting the following based on TCP/UDP connection status and the
application layer protocol information, and monitoring based on the connection state of the application
layer protocol, can dynamically determine file can pass through?
A. packet filter firewall
B. proxy firewall
C. state inspection firewall
D. circuit layer of a firewall
Answer: C

818. Eudemon firewall by which of the following table to identify a complete connection?
A. the routing table
B. ARP table
C. Session table
D. neighbor table
Answer: C

819. Judge: for firewall, when essage into the interface and outgoing interface belongs to the same area,
don't trigger a firewall security rules.
A.True
B.False
Answer: A

820. The Eudemon firewall, each virtual firewall support how many user-defined security domain.
A.3
B.4
C.5
D.6

146 / 158
The safer , easier way to help you pass any IT exams. 

Answer:B

821. Eudemon by default, which of the following domain don't need to be associated with a specific interface
before use?
A.Local domain
B.DMZ domain
C.Trust domain
D.Untrust domain
Answer: A

822. Eudemon, interface and adding area expression means that the interface is connected network belongs
to the area, the interface itself belongs to which area?
A.Local domain
B.DMZ domain
C.Trust domain
D.Untrust domain
Answer: A

823. Which of the following domain Eudemon firewall configuration by default minimum safety priority?
A.Local domain
B.DMZ domain
C.Trust domain
D.Untrust domain
Answer: D

824. Eudemon firewall by default in some areas, the priority of local domain?
A.100
B.85
C.50
D.5
E.0
Answer: A

825. Eudemon firewall by default in some areas, the priority of DMZ domain?
A.100
B.85
C.50
D.5
Answer: C

826. Eudemon firewall by default in some areas, the priority of trust domain?
A.100
B.85
C.50

147 / 158
The safer , easier way to help you pass any IT exams. 

D.5
Answer: B

827. Eudemon firewall by default in some areas , the priority of untrust domain?
A.100
B.85
C.50
D.5
Answer: D

828. Judge: when the data flow between the safe zone flow, will stimulate the Eudemon firewall security policy.
The data flow between the domain in two directions, one into the direction of data by the low-level security
zones to high-level security area transport direction.
A.True
B.False
Answer: A

829. Judge: when the data flow between the safe zone flow, will stimulate the Eudemon firewall security policy.
The Eudemon firewall between security policy implementation are based on the domain. The data flow
between the domain in two direction, which direction is the data from high-level security zone to transfer
the direction of the low-level security area.
A.True
B.False
Answer: A

830. Eudemon firewall, associated with the network and safety area should follow the principles include
(please select 3 answers)
A. internal network should be arranged in the region of the high level of security
B. external network should be arranged in the lowest level of security area
C. some conditional can external service network should be arranged in the medium level of DMZ security
area
D. internal network should be arranged in the middle of the DMZ area
E. external network should be arranged in Trust region
Answer: A B C

831. Users in the Eudemon firewall can default security area, which of the following content that users in
the domain configuration view usually configure for default security area (please select 2 answers)
A. set security priority
B. add interface
C. set the IP address
D. set the ARP proxy
Answer: A B

832. In Eudemon, security policy is used to control two priority data flow interactions between different

148 / 158
The safer , easier way to help you pass any IT exams. 

security area, in which of the following configuration under a view?


A. system view
B. interface view
C. domain configuration view
D. configuration view between domains
Answer: C

833. On the basis of the operation mode of the Eudemon firewall, concrete can be divided into three kinds,
respectively is (please select 3 answers)
A. routing patterns
B. transparent mode
C. mixed mode
D. the proxy pattern
Answer: A B C

834. Eudemon firewall works in which of the following model can give the interface configuration IP address?
(please select 2 answers)
A. routing patterns
B. transparent mode
C. mixed mode
D. the proxy pattern
Answer: A C

835. Eudemon firewall works in which of the following mode can not give interface configuration IP address?
(please select 2 answers)
A. routing patterns
B. transparent mode
C. mixed mode
D. the proxy pattern
Answer: B C

836. Network administrators new bought a Eudemon firewall, want it to work on the current network, but can't
change the current network configuration, then he should let the Eudemon firewall work in what mode?
A. routing patterns
B. transparent mode
C. mixed mode
D. the proxy pattern
Answer: B

837. Two Eudemon firewall when used for network export dual-machine backup, if on the premise of
without changing the current network topology, which mode is generally recommended that allow them to
work in?
A. routing patterns
B. transparent mode

149 / 158
The safer , easier way to help you pass any IT exams. 

C. mixed mode
D. the proxy pattern
Answer: C

838. Known a company network through the Eudemon firewall connected to the Internet, the company in
the Eudemon firewall DMZ area provides a private network IP of FTP server, use port 21 to provide
services to the public, at this time which of the following functions must be use in the Eudemon firewall?
A. FFTP server functionality
B. the port mapping function
C. AAA function
D. the blacklist function
Answer: B

839. VRP support through what kind of way of router configuration (please select 3 answers)
A. through the Console port configuration
B. by Telnet on the router configuration
C. through AUX port on the router configuration
D. via FTP was carried out on the router configuration
Answer: A B C

840. VRP is which of the following abbreviation?


A.Versatile Routine Platform
B.Virtual Routing Platform
C.Virtual Routing Plane
D.Versatile Routing Platform
Answer: D

841. VRP operating system commands are divided into 4 levels: visiting, monitoring, configuration level
and management level. Can run all kinds of business configuration commands but not operate level of the
file system, which level?
A. visiting level
B. monitoring level
C. configure level
D. management level
Answer: C

842. On VRP platform, you can access by which of the following on a historical command? (please select 2
answers)
A.up cursor
B.left cursor
C.Ctrl+P
D.Ctrl+U
Answer: A C

150 / 158
The safer , easier way to help you pass any IT exams. 

843. On the Quidway router, which command can change the name of the router to Router1?
A.[Quidway] name Router1
B.[Quidway] hostname Router1
C.[Quidway] sysname Router1
D.[Quidway] routername Router1
Answer: C

844. On the Quidway router, which command can view the initial configuration information?
A.display current-configuration
B.display saved-configuration
C.view saved-configuration
D.show startup- configuration
Answer: B

845. On the Quidway router, which command to view the current running configuration information?
A.display current-configuration
B.display saved-configuration
C.view saved-configuration
D.show startup- configuration
Answer: B

846. Which storage medium as follows are huawei router common used? (please select four answers)
A.SDRAM
B.NVRAM
C.Flash
D.Hard Disk
E.CF Card
Answer: A B C E

847. The router's initial configuration file is generally kept on what kind of storage media?
A.SDRAM
B.NVRAM
C.Flash
D.Boot ROM
Answer: B

848. Judge: after removal of the router's initial configuration file, if you want to make the operation effect, need
to restart the router.
A.True
B.False
Answer: A

849. On VRP operation platform, which command is to restart the router?


A.[Quidway]restart

151 / 158
The safer , easier way to help you pass any IT exams. 

B.<Quidway>restart
C.<Quidway>reboot
D.<Quidway>reset
Answer: C

850. For huawei router, user from the user view into the system view, which commands is the need to
input?
A.system-view
B.enable
C.configure terminal
D.interface system
Answer: A

851. Judge: do command " compare configuration "display the information as follows, "display current
configuration" and "display saved-configuration" file are not the same
<Quidway>compare configuration
Warning:The current configuration is NOT the same as the saved configuration!
====== Current configuration line 31 ======
ospf 1
... ...
====== Saved configuration line 31 ======
A.True
B.False
Answer: A

852. Which command can display interface Ethernet1/1 status information?


A.display ethernet1/1
B.display interface ethernet1/1
C.show ethernet1/1
D.show interface ethernet1/1
Answer: B

853. which of the following products that VRP platform is software core engine? (please select 3 answers)
A. all series routers
B. the Ethernet switch
C. business gateway product
D. LTE products
Answer: A B C

854. Judgment: VRP adopts modular architecture, in the realization of rich features at the same time, provides
based on the application of cutting and extensible ability.
A.True
B.False
Answer: A

152 / 158
The safer , easier way to help you pass any IT exams. 

855. VRP on the functions, which of the following is true (please select 3 answers)
A. implement unified user interface and management interface
B. the control plane
C. definition forwarding plane interface specification
D. stop forwarding plane and interaction between VRP control plane
Answer: A B C

856. User authentication billing, user belongs to which VRP platform components.
A. business control plane
B. general control plane
C. system management plane
D. above are not correct
Answer: A

857. Judge: currently, huawei router support local or remote support configure via SSH.
A.True
B.False
Answer: B

858. The router on electricity for the first time must build configuration environment by which?
A.SSL
B.SSH
C.Console
D.Telnet
Answer: C

859. Configure the router through the Console port operation steps, which of the following is true (please
select 3 answers)
A. configuration cable RJ45 head connected to the router console port
B. can be connected to the PC serial port RS232 interface can be 9-pin RS232 or 25-pin RS232
C. create super terminal on the PC, new connection can login the router
D. in PC directly Telnet can login the router
Answer: A B C

860. If the router is not the first time with electricity, and the user of router IP address has the right of each
interface configuration, and configure the correct login authentication way and the incoming breath limited
rules, which can be used to login to the router? (please select 2 answers)
A.SSD
B.SSL
C.Console
D.Telnet
Answer: C D

153 / 158
The safer , easier way to help you pass any IT exams. 

861. When a router and PC in the same LAN, from Telnet of PC to a router, can use the following
connection (please select 2 answers)
A. standards Ethernet cable let PC through the Hub or layer 2 switches connected to the router
B. crossover cable let PC directly connected to the router
C. crossover Ethernet cable let PC through the Hub or layer 2 switches connected to the router
D. standard straight line will directly connected the PC to the router
Answer: A B

862. If the router and configuration terminals across the wan, Telnet from the terminal to the router, which
the login conditions to be fulfilled?
A. configure terminal and target routers have reachability router
B. configure terminal and target routers have reachability router and communication well
C. configure terminal and target routers belong to the same VPN
D. configure terminal and target routers IP address in the same network segment
Answer: B

863. Upgrade VRP software by which of the following methods? (please select 3 answers)
A.WEB
B.FTP
C.TFTP
D.X-modem
Answer: B C D

864. With Telnet login the router, you can choose what kind of verification method? (please select 3
answers)
A. password validation
B. AAA local validation
C. MD5 ciphertext validation
D. don't verify
Answer: A B D

865. Operation after users Telnet to the router, can not use configuration commands configuration
interface IP address, the possible reasons?
A. Communication failure between a user and the router operation
B. did not set up correctly Telnet user authentication method
C. did not set up correctly Telnet user level
D. did not set up correctly SNMP parameters
Answer: C

866. By which commands Serial1/0/1 configuration information can view the interface? (please select 2
answers)
A.[Quidway]display current-configuration
B.[Quidway-Serial1/0/1]display this
C.[Quidway]view saved-configuration

154 / 158
The safer , easier way to help you pass any IT exams. 

D.[Quidway]show current-configuration
Answer: A B

867. File management on the router, which the following commands can be confirmed by current directory?
A.display
B.show
C.pwd
D.check
Answer: C

868. On a router has two VRP version software, which command can be used to remove one of the unused
VRP version software?
A.delete
B.rm
C.rename
D.copy
Answer: D

869. Which command is used to save the router's current configuration files?
A.[Quidway]save
B.<Quidway>save
C.[Quidway]write
D.<Quidway>write
Answer: B

870. Which command can delete files in the recycle bin?


A.remove
B.delete
C.reset recycle-bin
D.clear
Answer: C

871. Huawei router can update system files through FTP and TFTP, which described below is correct?
(please select 3 answers)
A. huawei router can be used as an FTP Client
B. huawei router can be used as a FTP Server
C. huawei router can be used as a TFTP Client
D. huawei router can be used as a TFTP Server
Answer: A B C

872. which of the following methods that router to Telnet login user authentication? (please select 3
answers)
A. SSL validation
B. AAA local validation

155 / 158
The safer , easier way to help you pass any IT exams. 

C. AAA remote authentication


D. don't verify
Answer: B C D

873. Way through the command on a router configuration Telnet login user and password, which of the
following command to limit allowed five user login at the same time?
A.[Quidway] User-interface vty 0 4
B.[Quidway] User-interface vty 0 5
C.[Quidway] User-interface vty 0 6
D.[Quidway] User-interface vty 5
Answer: A

874. which the following command is implementation way on the router configuration Telnet login
authentication codes for Huawei?
A.[Quidway-ui-vty0-5] set authentication password Huawei
B.[Quidway-ui-vty0-5] set authentication password simple Huawei
C.[Quidway-ui] set authentication password Huawei
D.[Quidway-ui] set authentication password simple Huawei
Answer: B

875. Command view of VRP, which of the following is true (please select 3 answers)
A. the view from the user can use the System-view command to switch to System view
B. from system view using relevant business commands can enter the other business view
C. from view using the exit command system can switch to the user view
D. can be used under different views have different orders
Answer: A B D

876. Under the system view type which can switch to the user view?
A.System-view command
B.Router command
C.Quit command
D.User-view command
Answer: C

877. Through the Console to configure the router, which the terminal emulator Settings are correct
A. 4800 BPS, 8 data bits, 1 stop bit, odd and no flow control
B. 9600 BPS, 8 data bits, 1 stop bit, no check and no flow control
C. 9600 BPS, 8 data bits, 1 stop bit, parity and hardware flow control
D. 19200 BPS, 8 data bits, 1 stop bit, no check and no flow control
Answer: B

878. On Quidway router, which command removes the initial configuration information?
A.erase saved-configuration
B.erase startup- configuration

156 / 158
The safer , easier way to help you pass any IT exams. 

C.reset current-configuration
D.reset saved-configuration
Answer:C

879. Judge: VRP as TFTP client, you can use the binary mode and ASCII mode transfer files.
A.True
B.False
Answer: B

880. Which of the following command or operation can let users from other views returned to user view?
A.quit
B.home
C.return
D.exit
Answer: C

881. In huawei router, use delete to delete a named test.bin file, now want to restore the file from the
recycle, which command is used?
A.restore test.bin
B.undelete test.bin
C.fix test.bin
D.repair test.bin
Answer: B

882. Create a Telnet user steps, which the following is true (choose three.)
A. first enter the vty user view
B. after entering vty user view configuration modes and authentication need password
C. the last need to set up the user permissions
D. under the system view set user permissions
Answer: A B C

883. Which following protocol version VRP can through to upgrade? (choose three)
A.FTP
B.TFTP
C.TELNET
D.XMODEM
Answer: A B D

884. Which command is use to erase the router in a storage device configuration file?
A.restart saved-configuration
B.reset saved-configuration
C.delete saved-configuration
D.reboot saved-configuration
Answer: B

157 / 158
The safer , easier way to help you pass any IT exams. 

885. Router is powered on, from the default storage path router reads the configuration files of
initialization work, if the default storage path no configuration files, which initialize that the routers use to?
A. the new configuration
B. the initial configuration
C. The default parameter
D. the current configuration
Answer: C

886. The following figure, which module is SFP optical interface connector?
A.

Answer: A

158 / 158

You might also like