Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

HCIA-Datacom V1.0 Certification H12-811-ENU Dumps

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

HCIA-Datacom V1.

0 Certification H12-
811-ENU Dumps
1. As shown in the figure below, all switches enable the STP protocol and keep
other configurations in their default state. When the network is stable, which
of the following statements are correct? (Multiple Choice)

 Both ports of SWB are in Forwarding state


 SWB is the root bridge in this network
 SWA is the root bridge in this network
 Both ports of SWC are in Forwarding state
2. What is the total length of the IPv6 address in bits?
 96
 64
 32
 128correct
3. The IPv4 address assigned by the network administrator to a host in the
network is 192.168.1.1/28. How many hosts can be added to the network
where this host is located?
 12
 15
 13
 14c
4. All ports on the root bridge switch are designated ports.
 True
 False
5. As shown in the figure below, host A and host B cannot communicate.

 True
 False
6. Which of the following statements about IPv6 multicast addresses are
correct? (Multiple Choice)
 Provide redundant functions for services
 Realize load sharing of services
 The packet whose destination address is a multicast address will be sent to the
nearest network interface in the sense of routing
 Multicast addresses and unicast addresses use the same address space
7. What is the number range of advanced ACL?
 3000-3999
 2000-2999
 4000~ ~ 4999
 6000~6031
8. The basic header length of IPv6 packets is a fixed value.
 True
 False
9. In which of the following network types does the OSPF protocol need to
elect DR and BDR? (Multiple choice)
 Point to multipointcorrect
 NBMAcorrect
 Point-to-point type
 Broadcast typecorrect
10. By default, how long is the lease period of the IP address assigned by the
DHCP server?
 12h
 1h
 24h
 18h
11. When deploying ACL on Huawei devices, which of the following description
is correct? (Multiple choice)
 ACL can match the TCP/UDP port number of the message, and can specify the
range of port numbers
 The same ACL can be called under multiple interfaces
 When ACL defines rules, it can only proceed in the order of 10, 20, and 30
 ACL cannot be used to filter OSPF traffic, because OSPF traffic does not use UDP
protocol encapsulation
 When calling ACL under the interface, it can only be applied to the outbound
direction
12. In the network shown in the figure below, when the OSPF neighbor status
is stable, what is the neighbor status of Router B and Router C?

 Attempt
 2-way
 Fu11
 Down
13. Which parameter is used in the spanning tree protocol for root bridge
election?
 Port ID
 Bridge priority
 Root path cost
 Bridge ID
14. MIB (Management Information Base) is a virtual database that exists only
in NMS.
 True
 False
15. Now it is necessary to implement a Python automation script Te1net to
the device to view the device running configuration. Which of the following
statements is wrong?
 Telnet lib can achieve this function.
 Use telnet. Telnet (host) to connect to the Telnet server.
 can use telnet. write (b"display current-configuration
") to input the command to view the current configuration of the device.
 telnet.c1ose () is used after a command entered every time, the function is that
the user waits for the switch to return information.
16. The network administrator of a certain company wants to uniformly divide
the users who often access the company network from different switches into
VLAN 10 when they frequently change office locations. Which of the following
methods should be used to divide VLANs?
 Divide VLAN based on protocol
 Divide VLAN based on MAC address
 Divide VLAN based on port
 Divide VLAN based on subnet
17. The picture shows the display startup information of AR2200 router.
Regarding this information, which of the following statement is wrong?

 next system startup file system can use the command "startup system software
<startup-software-name>" to modify
 The running configuration file is not saved
 The system file used by the device this time is ar2220-v200r003c00spc00.cc
 The system file cannot be modified when the device is started next time
18. The administrator plans to implement route backup by configuring static
floating routes, what is the correct way to achieve this?
 The administrator needs to configure different metric values for the main static
route and the standby static route
 The administrator needs to configure different TAGs for the main static route and
the standby static route
 The administrator only needs to configure two static routes
 The administrator needs to configure different protocol priority values for the
main static route and the standby static route
19. There are hosts in a private network that need to access the Internet. In
order to achieve this requirement, which of the following configurations
should the administrator do on the edge router of the network? (Multiple
Choice)
 Default route
 STP
 DHCP
 NAT
20. Which of the following descriptions about Trunk port and Access port is
correct?
 Trunk port can only send untagged frames
 Access port can only send untagged frames
 Access port can only send tagged frames
 Trunk port can only send tagged frames
21. Which of the following statements about the division of OSPF protocol
area is wrong?
 Area 0 is the backbone area, and other areas must be connected to this area
 The LSDBs in the routers in the same OSPF area are completely consistent
 Dividing OSPF areas can reduce the LSDB scale of some routers
 Only ABR can be used as ASBR

22. NFV (Network Functional Virtualization), network function virtualization


realizes the deployment of network applications in a software-based way.
 True
 False
23. UDP cannot guarantee the reliability of data transmission, and does not
provide functions such as message sequencing and flow control. It is suitable
for flows with low transmission reliability requirements but high transmission
speed and delay requirements.
 True
 False
24. The administrator cannot log in to the Huawei router through Telnett, but
other administrators can log in normally, so which of the following are the
possible reasons? (Multiple Choice)
 The authority level of the administrator user account has been modified to
0correct
 The administrator user account has been disabled
 The Te1net service of the AR2200 router has been disabled
 The administrator user account has been deleted
25. VRP operating system commands are divided into 4 levels: access level,
Monitoring level, Configuration level, and Management level. Which level can
run various business configuration commands but cannot operate the file
system?
 Configuration level
 Monitoring level
 Access level
 Management level
26. Using a traditional landline to make calls is a way of network
communication.
 True
 False
27. In the VRP interface, use the command delete vrpcfg.zip to delete a file,
which must be emptied in the recycle bin to completely delete the file.
 True
 False
28. In what state does the OSPF protocol determine the master-slave
relationship of DD packets?
 ExStart
 Full
 2-way
 Exchange
29. The following two configuration commands can realize the router RTA to
the same destination 10.1.1.0 routing master and backup.

【 RTA 】 ip route-static 10.1.1.0 24 12.1.1.1 permanent

【 RTA 】 ip route-static 10.2.2.0 24 13.1.1.1.


 True
 False
30. In the network shown in the figure below, the bridge ID of the switch has
been marked. Enter the command stp root secondary on the SWD switch, and
which of the following switch will become the root bridge of this network?

 SWC
 SWA
 SWB
 SWD
31. If the Length/Type of an Ethernet data frame = 0x8100, which of the
following statements is correct?
 There must be an IP header in the upper layer of this data frame
 This data frame must carry VLAN TAG
 There must be a UDP header in the upper layer of this data frame
 There must be a TCP header in the upper layer of this data frame
32. FAT AP can independently complete wireless user access, wireless user
authentication, and business data forwarding without AC.
 True
 False
33. There is no channel overlap in the 14 available frame segments in the
185.2.4 GHz frame segment.
 True
 False
34. In the WLAN network architecture, what is terminal equipment that
supports the 802.11 standard called?
 Client
 AC
 STA
 AP
35. Which of the following characteristics does the OSPF protocol have?
(Multiple Choice)
 Easy to produce routing loops
 Calculate the shortest path by number
 Support the division of areas
 Trigger an update
36. Which of the following statement about static routing is wrong?
 Cannot automatically adapt to changes in network topology
 Manual configuration by the network administrator
 Low system performance requirements
 Routers need to exchange routing information

37. In the network shown in the figure below, which of the following
commands can be entered on the router to enable host A to ping host B?
(Multiple choice)

 RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.2


RTB: ip route-static 10.0.12.1 255.255.255.252 11.0.12.1
 RTA: ip route-static 10.0.12.5 255.255.255.252 11.0.12.1
RTB: ip route-static 10.0.12.1 255.255.255.252 11.0.12.2
 RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2
RTB: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1
 RTA: ip route-static 0.0.0.0 0.0.0.0 11.0.12.1
RTB: ip route-static 0.0.0.0 0.0.0.0 11.0.12.2
38. Which of the following IPv4 addresses can be used by a host to directly
access the Internet?
 192.168.1.1/24
 172.32.1.1/24
 172.16.255.254/24
 10.255.255.254/24
39. The switch becomes a logical switch after stacking and clustering, and
Eth-Trunk across physical devices can be deployed to improve network
reliability.
 True
 False
40. What is the value of TPID defined by IEEE802.1Q?
 0x8200
 0x7200
 0x8100
 0x9100
41. As shown in the figure below, assuming the other configurations of the
switch are kept in the default state, which port of the following switch will
become the designated port? (Multiple Choice)

 SWC's G0/0/1
 SWA's G0/0/3
 SWC's G0/0/2
 SWB's G0/0/1
42. The management of users by NAS devices is based on domains. Each user
belongs to a domain, and a domain is a group of users who belong to the
same domain.
 TRUE
 FALSE

43. Which of the following fields does the MPLS header include? (Multiple
choice)
 EXP
 TTL
 Label
 Tos
44. Huawei ARG3 series routers have all SNMP versions (SNMPv1, SNMPv2c
and SNMPv3) by default.
 True
 False
45. IPv6 address 2001: ABEF: 2240E: FFE2: BCC0: CD0: DDBE: 8D58 cannot be
abbreviated.
 True
 False
46. Which state does the OSPF protocol use to indicate that the adjacency
relationship has been established?
 Full
 2-way
 Attempt
 Down
47. The tracert diagnostic tool in Huawei routers is used to track the data
forwarding path.
 TRUE
 False
48. The routing table output information of a router is shown in the figure.
Which of the following statements is correct? (Multiple choice)

 the local router to the NextHop of 10.0.2.2 is 10.0.21.2


 the local router to the NextHop of 10.0.2.1 is 10.0.21.2
 the local router to the NextHop of 10.0.2.2 is 10.0.12.2
 the local router to the NextHop of 10.0.0.1 is 10.0.12.2
49. Which of the following OSPF protocol packets can ensure the reliability of
LSA updates?
 LSACK
 DD
 LSU
 LSR
50. The last option field of IPv4 is variable-length optional information. What
is the maximum length of this field?
 10B
 40B
 60B
 20B

51. Which of the following advantages does router-on-a-stick achieve inter-


VLAN routing intercommunication?
 Reduce the number of equipment
 Reduce the use of IP addresses
 Reduce the number of link connections
 Reduce routing table entries

52. If STP is not turned on for the network composed of switches, there must
be a Layer 2 loop.
 TRUE
 False
53. The switch receives a unicast data frame. If the destination MAC of the
data frame can be found in the MAC table, the data frame will be forwarded
from the corresponding MAC port.
 TRUE
 False
54. The output information of the link aggregation port of a certain switch is
as follows. If you want to delete Eth-Trunk 1, which of the following
commands is correct?

 undo interface Eth-trunk 1


 inte GigabitEthernet 0./0/2
Undo eth-trunk
Quit
Undo interface eth-trunk 1
 inte GigabitEthernet 0./0/1
Undo eth-trunk
Quit
inte GigabitEthernet 0./0/2
Undo eth-trunk
Quit
 inte GigabitEthernet 0./0/1
Undo eth-trunk
Quit
Undo interface eth-trunk 1

55. Which information of the data frame does the VLANIF interface use to
determine whether to perform Layer 2 or Layer 3 forwarding?
 Destination MAC
 Source MAC
 Destination port
 Source IP
56. If the value of the Type/Length field of an Ethernet data frame is 0 x 0800,
the length of the upper layer message header carried by this data frame is in
the range of 20-60B.
 TRUE
 False

57. When using FTP for file transfer, how many TCP connections will be
established?
 2
 1
 3
 4
58. What are the user authentication methods that can be deployed in wlan?
(Multiple choice)
 Portal authentication
 MAC authentication
 Radius certification
 802.1X authentication
59. Which of the following IEEE 802.11 standards support operation in the
5GHz frequency band? (Multiple choice)
 802.11a
 802.11n
 802.11g
 802.11a
60. In order to join the wireless network STA needs to obtain wireless network
information first. Which of the following messages is used by the STA to
actively obtain the SSID information?
 Probe
 Join
 Discovery
 Beacon

You might also like