HCIA Datacom Exam 50 Q & Answers + Explaination
HCIA Datacom Exam 50 Q & Answers + Explaination
HCIA Datacom Exam 50 Q & Answers + Explaination
Answer: True
2. A network engineer prompts the following information when entering the command line:
Error: Unrecognized command found at '^' position. Which statement is correct about this prompt
message?
A. The input command is incomplete
B. The parameter type is wrong
C. The input command is ambiguous
D. Keyword not found
Answer: D
3. As shown in the figure, there are three data packets captured by the administrator in the network.
Which of the following statements is wrong?
A. None of the three packets contain application layer data
B. These three data packets represent the three-way handshake process of TCP
C. The telnet client uses port 50190 to establish a connection with the server
D. The IP address of the telnet server is 10.0.12.1, and the IP address of the telnet client is 10.0.12.2
Answer: A
4. On the command line interface of the Huawei AR router, the save command is used to save the
current system time.
True
False
Answer: False, "clock save" command is typically used to save the current system time configuration
to the router's non-volatile memory (NVRAM)
5. Which statement about the transport layer protocol is correct? (Multiple choice)
A. The establishment of a TCP connection is a three-way handshake process, while the termination of
a TCP connection requires a four-way handshake
B. UDP uses the SYN and ACK flags to request and confirm connection establishment
C. Well-known port numbers range from 1-1023
D. UDP is suitable for transmitting delay-sensitive traffic and can be reassembled according to the
sequence number field in the packet header
Answer: A, C
B. UDP uses the SYN and ACK flags to request and confirm connection establishment.
• This statement is false. UDP (User Datagram Protocol) does not use flags like SYN and
ACK for connection establishment. UDP is connectionless and does not establish a
session before sending data.
• This statement is true. Well-known port numbers are reserved for system services and
range from 1 to 1023.
• This statement is false. UDP is indeed suitable for transmitting delay-sensitive traffic
due to its low overhead, but unlike TCP, UDP does not support sequencing or
reassembly of packets. It is a connectionless protocol that does not provide reliability
or flow control mechanisms.
6. The tracert diagnostic tool in Huawei routers is used to trace the forwarding path of data.
True
False
Answer: True
7. In which of the following network types does OSPF need to elect DR and BDR? (Multiple choice)
A. Broadcast type
B. Point-to-point type
C. Point-to-multipoint
D. NBMA
Answer: A, D
In these network types, multiple OSPF routers are connected to a common network segment,
and the DR and BDR election process helps optimize OSPF communication by reducing the
amount of OSPF routing information exchanged between routers on the segment.
For point-to-point type networks, such as serial links, there is no need for a DR/BDR election
because there are only two routers directly connected, and all OSPF routers on such links form
full adjacencies with each other.
Answer: A, C, D
9. Which frequencies does the IEEE 802.11n standard support? (Multiple choice)
A. 6GHz
B. 2.5GHz
C. 2.4GHz
D. 5GHz
Answer: C, D
10. In the network shown in the figure below, what commands can be entered on the router to
enable host A to ping host B? (Multiple choice)
A. RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2 RTB: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1
B. RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.2 RTB: route-static 10.0.12.1
255.255.255.252 11.0.12.1
C. RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1 RTB: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2
D. RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.1 RTB: ip route-static 10.0.12.1
255.255.255.252 11.0.12.2
Answer: A, B
11. On the VRP operating platform, which of the following commands can only view static routes?
A. display IP routing-table
B. display IP routing-table statistics
C. display IP routing-table verbose
D. display IP routing-table protocol static
Answer: D
12. A router running the OSPF protocol can only reach the FULL state after completing LSDB
synchronization.
True
False
Answer: True
In the OSPF (Open Shortest Path First) routing protocol, routers must synchronize their Link
State Database (LSDB) before they can reach the FULL state. The LSDB contains information
about the network's topology, which OSPF routers use to calculate routes. LSDB
synchronization ensures that all routers within an OSPF area have consistent information
about the network topology, which is essential for accurate route calculation.
Therefore, routers running OSPF must complete LSDB synchronization before they can achieve
True
False
Answer: False
In a typical network setup, router interfaces do not belong to the same broadcast domain. Each
interface of a router represents a separate network segment or subnet, and by default, routers do not
forward broadcast traffic between interfaces. Instead, routers separate broadcast domains, helping to
control broadcast traffic and segmenting network traffic into smaller, more manageable parts.
14. Which of the following protocol types does the OSPF protocol support? (Multiple choice)
A. Point-to-multipoint
B. Point-to-point type
C. Broadcast type
D. NBMA
Answer: A, B, C, D
15. When using the ping command on the VRP platform, if it is necessary to specify an IP address
as the source address of the echo request message, which of the following parameters should be
used?
-d
-a
-s
-n
Answer: -a
<RTA>ping ?
-a Select source IP address, the default is the IP address of the output interface
-c Specify the number of echo requests to be sent, the default is 5
-n Numeric output only. No attempt will be made to lookup host addresses for symbolic
names
-t Timeout in milliseconds to wait for each reply, the default is 2000ms
STRING<1-255> IP address or hostname of a remote system
16. Which of the following OSPF protocol packets can ensure the reliability of LSA update?
A. DD
B. LSR
C. LSU
D. LSACK
Answer: D
A. DD (Database Description)
• The Database Description (DD) packets are used during the OSPF neighbor
establishment process to exchange summary information about the contents of the
router's Link State Database (LSDB). While DD packets are crucial for establishing OSPF
neighbor relationships, they do not directly ensure the reliability of LSA updates.
• Link State Request (LSR) packets are used by OSPF routers to request specific LSAs
from their neighbors when they detect missing or outdated information in their LSDB.
LSR packets help routers acquire missing LSAs, but they do not directly ensure the
reliability of LSA updates.
C. LSU (Link State Update)
• Link State Update (LSU) packets are used to advertise new or updated LSAs to OSPF
neighbors. These packets carry the actual LSA information and are crucial for
disseminating routing information within an OSPF network. While LSU packets are
essential for distributing LSAs, they do not directly ensure their reliability.
• Link State Acknowledgment (LSACK) packets are used to acknowledge received LSAs.
When an OSPF router receives an LSU packet, it sends an LSACK packet back to the
sender to acknowledge successful reception. LSACK packets ensure the reliability of
LSA updates by confirming successful transmission between OSPF routers.
In summary, while all OSPF protocol packets (DD, LSR, LSU, and LSACK) play important roles in
OSPF operation, only LSACK packets directly ensure the reliability of LSA updates by
acknowledging successful reception of LSAs. Therefore, the correct answer is D. LSACK.
17. What are the stable states of the OSPF protocol neighbor relationship? (Multiple choice)
A. 2-way
B. Full
C. Down
D. attempt
Answer: A, B, C
The stable states of the OSPF (Open Shortest Path First) protocol neighbor relationship are:
B. Full
• The Full state indicates that OSPF routers have successfully exchanged their entire Link
State Database (LSDB) and are fully adjacent. In this state, routers can exchange routing
information and forward traffic.
C. Down
• The Down state indicates that OSPF routers are not able to communicate with each
other. This state may occur due to a failure in the underlying network or configuration
issues.
18. Must all interfaces of routers running OSPF belong to the same area.
True
False
Answer: False
19. Can dynamic routing protocols automatically adapt to changes in network topology.
True
False
Answer: True
20. As shown in the figure below, host A and host B cannot communicate.
True
False
Answer: True
21. As shown in the figure, when the switch needs to forward the frame whose destination mac
address is 5489-98ec-f011, which of the following descriptions is correct?
A. The switch will send a destination unreachable message to the source device
B. The switch does not find a matching entry in the mac address table, so it will drop the frame
C. The switch needs to send a request to discover the device with the mac address 5489-
98ec-f011
D. The switch will flood the frame on all ports except the port that received the frame
Answer: D
A. The switch will send a destination unreachable message to the source device.
• This option is incorrect. Destination unreachable messages are typically used in ICMP
(Internet Control Message Protocol) to inform the source device that the destination is
unreachable, often due to issues like network congestion, unreachable host, or port
unreachable. However, in this scenario, the destination MAC address is known to the
switch, so there is no need to send a destination unreachable message.
B. The switch does not find a matching entry in the MAC address table, so it will drop the
frame.
• This option is incorrect. In the provided MAC address table, there is indeed a matching
entry for the destination MAC address 5489-98ec-f011. Therefore, the switch does not
need to drop the frame.
C. The switch needs to send a request to discover the device with the MAC address 5489-
98ec-f011.
• This option is incorrect. The switch already has an entry for the destination MAC
address in its MAC address table, indicating that it has previously learned the MAC
address from traffic received on port GE0/18. Therefore, there is no need for the switch
to send a request to discover the device.
D. The switch will flood the frame on all ports except the port that received the frame.
• This option is correct. Since the switch has a matching entry for the destination MAC
address in its MAC address table, it knows the outgoing port associated with that MAC
address. Therefore, it will forward the frame only to the port where the device with that
MAC address is connected, instead of flooding it to all ports.
22. According to the command output shown in the figure, which of the following descriptions is
correct? (Multiple choice)
#
Interface GigabitEthernet0/0/1 Port link-type trunk
#
A. GigabitEthernet0/0/1 allows VLAN1 to pass through
B. GigabitEthernet0/0/1 does not allow VLAN1 to pass through
C. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the
command "undo port trunk allow-pass vlan all"
D. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the
command "undo port trunk allow-pass vlan 2 to 4094"
Answer: B
• Incorrect. The command output specifies that VLANs 2 to 4094 are allowed to pass
through, not VLAN 1.
• Correct. The command output does not specify VLAN 1 in the allowed VLAN range, so
VLAN 1 is not allowed to pass through this port.
C. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the
command "undo port trunk allow-pass vlan all".
• Incorrect. This command would remove all VLANs from the allowed VLAN list, but it
wouldn't specifically change the port to an Access port.
D. If you want to change GigabitEthernet0/0/1 into an Access port, you first need to use the
command "undo port trunk allow-pass vlan 2 to 4094".
• Incorrect. This command would remove VLANs 2 to 4094 from the allowed VLAN list,
but it wouldn't specifically change the port to an Access port.
23. According to the command shown in the figure, which of the following descriptions is correct?
(Multiple choice)
Answer: C, D
• Incorrect. The PVID (Port VLAN ID) of GigabitEthernet0/0/1 is specified as VLAN 10, not
VLAN 1.
• Correct. The command output explicitly states that the default VLAN (PVID) of
GigabitEthernet0/0/1 is VLAN 10.
24. If the Length/type=0x8100 of an Ethernet data frame, which of the following statements is
correct?
A. The upper layer of this data frame must have a UDP header
B. There must be a TCP header in the upper layer of this data frame
C. This data frame must carry VLAN TAG
D. The upper layer of this data frame must have an IP header
Answer: C
A. The upper layer of this data frame must have a UDP header.
• This statement cannot be concluded solely based on the Ethernet frame's Length/Type
field being set to 0x8100, which indicates the presence of a VLAN tag. The presence of
a VLAN tag does not determine the upper-layer protocol encapsulated within the
frame.
B. There must be a TCP header in the upper layer of this data frame.
• Similar to option A, the presence of a VLAN tag does not imply the presence of a TCP
header in the upper layer. Therefore, this statement cannot be concluded based on the
Length/Type field value of the Ethernet frame.
• This statement is correct. When the Length/Type field of an Ethernet frame is set to
0x8100, it indicates the presence of an IEEE 802.1Q VLAN tag. The VLAN tag contains
information such as the VLAN ID, Priority Code Point (PCP), and Drop Eligibility
Indicator (DEI).
• This statement cannot be deduced solely based on the Length/Type field value of the
Ethernet frame. The presence of a VLAN tag does not determine the upper-layer
protocol encapsulated within the frame.
• The Ethernet II frame references a hexadecimal type value which identifies the upper
layer protocol. One common example of this is the Internet Protocol (IP) which is
represented by a hexadecimal value of 0x0800. Since this value for IP represents a value
greater than 0x0600, it is determined that the Ethernet II frame type should be applied
during encapsulation. Another common protocol that relies on the Ethernet II frame
type at the data link layer is ARP, and is represented by the hexadecimal value of
0x0806.
25. The bridge ID of the STP protocol in the switching network is as follows. Which of the following
bridge ID switches will become the root bridge?
A. 4096 00-01-02-03-04-DD
B. 32768 00-01-02-03-04-AA
C. 32768 00-01-02-03-04-BB
D. 32768 00-01-02-03-04-CC
Answer: A
To determine the root bridge, we need to compare the Bridge Priority first. If Bridge Priority is
the same, we then compare the MAC addresses.
26. Which of the following statements about the election of active ports in link aggregation LACP
mode is correct?
A. Compare the interface priority first, if you cannot determine the superior one, continue to compare the
interface number, the smaller the better
B. Only compare interface priorities
C. Compare device priorities
D. Only compare interface numbers
Answer: A
In LACP, the election of active ports considers both the interface priority and the interface number. If
two ports have the same priority, the port with the smaller interface number is selected as the active
port. If the priorities are also the same, then the device priorities may be compared as a tiebreaker.
However, comparing device priorities is not as common as comparing interface priorities and numbers.
27. The MAC address of the existing switch is shown in the figure, which of the following
statements is correct?
A. When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be
relearned
B. The data frame with source MAC address 5489-9885-18a8 and destination MAC address
5489-989d-1d30 learned from the port is forwarded from Eth0/0/1 port
C. The data frame with source MAC address 5489-9811-0b49 and destination MAC address
5489-989d-1d30 learned from the port is forwarded from Eth0/0/2 port
D. When the switch restarts, the MAC address learned by port Eth0/0/3 needs to be relearned.
Answer: B
28. As shown in the figure below, all hosts can communicate normally. Which of the following
statements is correct? (Multiple choice)
Answer: A, B
Answer: A
A Hybrid port is a type of port on a network switch that can handle both tagged and
untagged frames. It is often used to connect to devices that might send traffic belonging to
multiple VLANs. Here's an explanation for each option:
A. The Hybrid port can strip the tags of certain VLAN frames in the direction of the outgoing
port.
• This statement is correct. Hybrid ports can be configured to strip VLAN tags from
certain frames before sending them out of the port. This capability allows the switch to
forward traffic to devices that do not understand VLAN tagging.
B. When the Hybrid port sends a data frame, it must carry the VLAN tag.
• This statement is incorrect. Hybrid ports can be configured to send both tagged and
untagged frames depending on the network configuration and requirements. They are
versatile in handling traffic with or without VLAN tags.
• This statement is incorrect. Hybrid ports can receive both tagged and untagged frames,
depending on the configuration and the type of devices connected to them.
• This statement is incorrect. Hybrid ports typically do require a Port VLAN ID (PVID) to
determine the VLAN to which untagged frames belong. The PVID is used to assign a
VLAN to incoming untagged frames on the port.
30. The function of telnet.read_very_eager in Telnetlib is to read data non-blockingly. Usually needs
to be used together with the time module.
True
False
Answer: True
31. For a switch running the STP protocol, the port can be directly converted to the Disabled state
in any state.
True
False
Answer: True
Disabled
⑤ ① ⑤
Forwardin
③ Blocking
②
⑤ ③ ③
④ ⑤
Learnin ④ Listenin
Answer: True
33. Using the commands "vlan batch 10 20 " and "valn batch 10 to 20 ", what is the number of
VLANs that can be created?
A. 11 and 11
B. 2 and 2
C. 11 and 2
D. 2 and 11
Answer: D
34. The Layer 2 switch belongs to the data link layer device, which can identify the mac address
information in the data frame, forward the data according to the mac address, and record these mac
addresses and corresponding port information in its own mac address table.
True
False
Answer: True
35. In the configuration BPDU sent by the switch, which bridge ID cannot appear?
A. 8192 00-01-02-03-04-CC
B. 2048 00-01-02-03-04-CC
C. 4096 00-01-02-03-04-CC
D. 0 00-01-02-03-04-CC
Answer: B
36. If there is an inclusion relationship in the configured ACL rules, it should be noted that the rule
numbers of the strict conditions need to be sorted first, and the rule numbers of the loose
conditions need to be sorted last, so as to prevent the packet from stopping to continue matching
due to hitting the rules of the loose conditions, thereby Rules that make it impossible to hit strict
conditions.
True
False
Answer: True
37. The network administrator configures the Huawei router RTA as shown in the figure. If a user
needs to be authenticated in the authentication domain "huawei", which of the following
descriptions is correct?
[RTA] aaa
[RTA-aaa] domain huawei
Answer: C
Answer: A
40. If the packet matches the ACL and the result is "deny", the packet will be discarded eventually.
A. True
B. False
Answer: A
41. Which of the following message types does DHCP contain? (Multiple choice)
A. DHCP OFFER
B. DHCP REQUEST
C. DHCP ROLLOVER
D. DHCP DISCOVER
A. File transfer
B. Remote access
C. Domain name resolution
D. Mail transmission
Answer: C
A. FTP
B. SFTP
C. HTTP
D. TFTP
Answer: C
44. Only the security policy of WPA2-PSK supports the use of TKIP for data encryption.
A. True
B. False
Answer: B
Explanation: WPA2-PSK (Wi-Fi Protected Access 2 - Pre-Shared Key) supports both TKIP (Temporal Key
Integrity Protocol) and AES (Advanced Encryption Standard) for data encryption. While TKIP is primarily
associated with WPA (Wi-Fi Protected Access) security, it can also be used with WPA2-PSK. However,
AES is the preferred and more secure encryption method for WPA2-PSK networks. Therefore, WPA2-
PSK supports both TKIP and AES for data encryption, not just TKIP.
45. Which of the following does not include the advantages of Wi-Fi6 over Wi-Fi5?
A. Higher consumption
B. Higher number of access terminals per AP
C. Lower transmission delay
D. Higher bandwidth
Answer: A
A. Higher consumption
Explanation: Wi-Fi 6 (802.11ax) offers several advantages over Wi-Fi 5 (802.11ac), including
higher efficiency, increased capacity, and improved performance in crowded environments.
The options listed as advantages of Wi-Fi 6 over Wi-Fi 5 are:
B. Higher number of access terminals per AP: Wi-Fi 6 supports more simultaneous
connections, thanks to technologies like OFDMA and MU-MIMO, allowing for better
performance in dense environments.
C. Lower transmission delay: Wi-Fi 6 introduces features like Target Wake Time (TWT) and
improved scheduling algorithms, reducing latency and improving responsiveness in wireless
networks.
D. Higher bandwidth: Wi-Fi 6 offers higher maximum data rates and better overall throughput
compared to Wi-Fi 5, making it suitable for demanding applications and high-speed
connections.
Option A, "Higher consumption," is not an advantage of Wi-Fi 6 over Wi-Fi 5. In fact, Wi-Fi 6 is
designed to be more power-efficient, leading to improved battery life for connected devices.
Therefore, it does not include an advantage of Wi-Fi 6 over Wi-Fi 5.
46. The port numbers used in the control tunnel and data tunnel transmission of CAPWAP are the
same.
A. True
B. False
Answer: B
CAPWAP data and control packets are transmitted on different UDP ports:
▪UDP port 5246 for transmitting control packets
47. What is the first operation to be performed after the FIT AP obtains the IP address of the
AC?
Answer: A
Explanation: After obtaining the AC's (Access Controller) IP address, the first operation
performed by the FIT AP (Fat/Fit Access Point) is to establish a CAPWAP (Control and
Provisioning of Wireless Access Points) tunnel with the AC. This tunnel allows the AP to
communicate with the AC for configuration, management, and control purposes. Once the
CAPWAP tunnel is established, further operations such as requesting a configuration file,
downloading the configuration file, or upgrading the software version may occur as part of the
initialization process, but establishing the CAPWAP tunnel is the initial step.
48. Before the STA associates with the AP, it needs to exchange some messages to obtain
the SSID. Which of the following are these messages? (Multiple choice)
A. Probe Response
B. Probe Request
C. Beacon
D. Discovery
Answer: BC
The messages exchanged by a Station (STA) to obtain the SSID (Service Set Identifier)
before associating with an Access Point (AP) include:
Explanation:
• Probe Request: A Probe Request is sent by the STA to discover nearby APs. It
includes information about the SSID that the STA is looking for.
• Beacon: A Beacon frame is transmitted periodically by APs to advertise their
presence and capabilities, including the SSID they are broadcasting.
Options A (Probe Response) and D (Discovery) are not part of the initial exchange for
obtaining the SSID:
• Probe Response: This is sent by the AP in response to a Probe Request from the
STA, providing information about the network, but it is not part of the initial step
for obtaining the SSID.
• Discovery: This term is not typically used in the context of Wi-Fi communication.
The process of discovering nearby APs is usually referred to as scanning, which
involves sending Probe Requests.
49. Based on what concept is segment routing SR (segment routing) a protocol designed to
forward data packets on the network?
A. Policy routing
B. Source routing
C. Routing strategy
D. Destination routing
Answer: B
Explanation: Segment Routing (SR) is a routing paradigm that leverages the concept of source
routing. With SR, the source node of a packet explicitly defines the path that the packet should
take through the network by specifying a list of segments (routing instructions) in the packet
header. These segments represent the intermediate nodes or hops that the packet should
traverse to reach its destination. Therefore, SR allows for flexible and efficient routing of data
packets based on predefined paths or policies, making it a suitable protocol for various network
scenarios.
50. In PPP, when the two ends of the communication detect the activation of the physical link,
they will transition from the link unavailable stage to the link establishment stage. In this
stage, the link parameters are mainly negotiated through the () protocol
A. IP
B. LCP
C. NCP
D. DHCP
Answer: B
Explanation: In the Point-to-Point Protocol (PPP), the link establishment stage involves the
negotiation of link parameters between the two communicating devices. This negotiation is
primarily conducted using the Link Control Protocol (LCP). LCP is responsible for establishing,
configuring, and testing the data link connection between the devices. It ensures that both ends
of the PPP link are ready for data transmission by negotiating parameters such as
authentication, compression, and the maximum transmission unit (MTU) size. Once the LCP
negotiation is successful, the PPP link transitions to the network layer protocol configuration
stage, where the Network Control Protocol (NCP) is used to negotiate network layer protocols
such as IP. Therefore, the correct answer is option B, LCP.
New HCIP-Transmission V2.5 Exam Dumps - Get Huawei H31-341_V2.5-ENU Exam
Dumps to Make Preparation
Huawei H12-311_V3.0-ENU Exam Dumps Updated (V9.02) - Completely Pass
HCIA-WLAN V3.0 Exam with Ease
Related Posts
Dumps
From our dumpsbase platform you could search what exams you need then test or practice online
by yourself. Download the PDF file if you need directly. Any other questions you can
mail support@dumpsbase.com
1. When the host accesses the web server of the server, the value of the network layer
protocol field is 6.
• Truecorrect
• False
2. A network engineer prompts the following information when entering the command line:
Error: Unrecognized command found at '^' position. Which statement is correct about this
prompt message?
• The input command is incompletewrong
• The parameter type is wrong
• The input command is ambiguous
• Keyword not foundcorrect
3. As shown in the figure, there are three data packets captured by the administrator in the
network. Which of the following statements is wrong?
• Truewrong
• Falsecorrect
21. As shown in the figure, when the switch needs to forward the frame whose destination
mac address is 5489-98ec-f011, which of the following descriptions is correct?
• The switch will send a destination unreachable message to the source device
• The switch does not find a matching entry in the mac address table, so it will drop the frame
• The switch needs to send a request to discover the device with the mac address 5489-98ec-
f011
• The switch will flood the frame on all ports except the port that received the
framecorrect
22. According to the command output shown in the figure, which of the following
descriptions is correct? (Multiple choice)
• When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be
relearned
• The data frame with source MAC address 5489-9885-18a8 and destination MAC
address 5489-989d-1d30 learned from the port is forwarded from Eth0/0/1 portcorrect
• The data frame with source MAC address 5489-9811-0b49 and destination MAC address
5489-989d-1d30 learned from the port is forwarded from Eth0/0/2 port
• When the switch restarts, the MAC address learned by port Eth0/0/3 needs to be relearned
28. As shown in the figure below, all hosts can communicate normally. Which of the following
statements is correct? (Multiple choice)
• G0/0/3 of SWB learned 2 mac addressescorrect
• G0/0/3 of SWA learns a mac addresscorrect
• G0/0/3 of SWA learns 2 mac addresses
• G0/0/3 of SWA learns 3 mac addresses
29. Which of the following statements about Hybrid ports is correct?
• The Hybrid port can strip the tags of certain vlan frames in the direction of the
outgoing portcorrect
• When the Hybrid port sends a data frame, it must carry the vlan tag
• Hybrid ports only receive data frames with vlan tag
• Hybrid port does not require PVID
30. The function of telnet.read_very_eager in Telnetlib is to read data non-blockingly. Usually
needs to be used together with the time module.
• Truecorrect
• False
31. For a switch running the STP protocol, the port can be directly converted to the Disabled
state in any state.
• Truecorrect
• False
32. The IPv6 address 2001:ABEF:224E:FFE2:BCCO:CDOO:DDBE:8D58 cannot be abbreviated.
• Truecorrect
• False
33. Using the commands "vlan batch 10 20 " and "valn batch 10 to 20 ", what is the number of
VLANs that can be created?
• 11 and 11
• 2 and 2
• 11 and 2
• 2 and 11correct
34. The Layer 2 switch belongs to the data link layer device, which can identify the mac
address information in the data frame, forward the data according to the mac address, and
record these mac addresses and corresponding port information in its own mac address
table.
• Truecorrect
• False
35. In the configuration BPDU sent by the switch, which bridge ID cannot appear?
• 8192 00-01-02-03-04-CC
• 2048 00-01-02-03-04-CCcorrect
• 4096 00-01-02-03-04-CC
• 0 00-01-02-03-04-CC
36. If there is an inclusion relationship in the configured ACL rules, it should be noted that
the rule numbers of the strict conditions need to be sorted first, and the rule numbers of the
loose conditions need to be sorted last, so as to prevent the packet from stopping to
continue matching due to hitting the rules of the loose conditions, thereby Rules that make it
impossible to hit strict conditions.
• Truecorrect
• False
37. The network administrator configures the Huawei router RTA as shown in the figure. If a
user needs to be authenticated in the authentication domain "huawei", which of the following
descriptions is correct?
[RTA] aaa
1. When the Trunk port send the data frame, how to deal with?
• When the VLAN ID is the same as the PVID of the port and is a VLAN ID allowed by the
port, remove the Tag and send the messagecorrect
• When the VLAN ID is different from the PVID of the port, the data frame is dropped
• When the VLAN ID is different from the PVID of the port, replace it with PVID forwarding
• When the VLAN ID is different from the PVID of the port, strip off the TAG and forward
2. How many bits are there in the VLAN ID in the VLAN format defined by IEEE802.1Q?
• 12correct
• 6
• 10
• 8
3. In the network shown in the figure below, the output information of switch A is shown in
the figure. Then in the MAC address table of switch A, which interface does the MAC address
of host B correspond to?
• GigabitEthernet 0/0/3
• GigabitEthernet0/0/2
• Eth-Trunk 1correct
• GigabitEthernet0/0/1wrong
4. All ports on the root-bridge switch are designated ports.
• Truecorrect
• Falsewrong
5. In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?
• 8192 00-01-02-03-04-CC
• 4096 00-01-02-03-04-CC
• 0 00-01-02-03-04-CC
• 2048 00-01-02-03-04-CCcorrect
6. The number of VLANs that can be created using the commands "vlan batch 10 20" and
"vlan batch 10 to 20" respectively is
• 11 and 11
• 11 and 2
• 2 and 2
• 2 and 11correct
7. By default, the root path cost of the root bridge in the STP protocol must be 0.
• Truecorrect
• False
8. The administrator wants all hosts to be unable to access the Internet between 8:00-17:00
every day, so which ACL rule needs to be bound to the traffic-filter outbound in the GO/0/1
interface allocation?
• time-range am9topm5 08:00 to working-day
Acl number 2003
rule 5 deny time-range am9topjni5
• time-range am9topm5 08:00 to 17:00 off-day
#
acl number 2004
rule 5 permit time-range
• time-range am9topm5 08:00 to 17:00 daily
acl number 2001
rule 5 deny time-range am9topm5correct
• time-range am9topm5 07:00 to 18:00 daily
Acl number 2002
9. As shown in the figure below, the wrong statement is:
[Huawei]user-interface vty o 14
• MAC-C, 11.0.12.1
• MAC-D, 10.0.12.2wrong
• MAC-D, 11.0.12.1correct
• MAC-B, 11.0.12.1
29. In the network shown in the figure below, assuming that all routers enable the OSPF
protocol at the same time, which router is the BDR in this network?
• Router Dwrong
• Router B
• Router C
• Router Acorrect
30. There are multiple route entries to the same destination network in the routing table.
These routes are called:
• Sub-optimal routing
• Multi-path routing
• Default route
• Equal cost routing
2. A network engineer prompts the following information when entering the command line:
3. As shown in the figure, there are three data packets captured by the administrator on the
network.
Which of the following statements is incorrect?
20. As shown in the figure below, host A and host B cannot communicate.
• Truewrong
• False
38. The network administrator configures as shown in the figure on the Huawei router
RTA, if a user needs to be authenticated in the authentication domain "huawei", which of
the following descriptions is correct?
[RTA] aaa
NO.132 #### The information shown in the figure is the port status information displayed on
a switch.