Month End Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

H12-891_V1.0 Questions and Answers

Question # 4

What improvements have been made to the IGMPv2 protocol compared to IGMPv1? ( Multiple Choice)

A.

Added maximum response time field

B.

Added high group messages

C.

Added specific group query message

D.

Added a specific source group query packet

Full Access
Question # 5

Which of the following LSAs propagate in a single region only?

A.

Router LSA

B.

Summary LSA

C.

Network LSA

D.

AS External LSA

Full Access
Question # 6

Which of the following DNS resource records are legitimate?

A.

FQDN

B.

NS

C.

PTR

D.

MX

E.

A

Full Access
Question # 7

WRED is configured on the newly deployed router HW The following description of the WRED feature is correct as ?( Multiple select).

A.

WRED can set different drop thresholds and packet loss rates for packets of different priority

B.

When traffic exceeds the minimum threshold, WRED starts dropping all ingress traffic (tail drops).

C.

Avoid global synchronization by selectively dropping multiple TCP streams Low-bandwidth traffic is easier to drop than high-bandwidth traffic

Full Access
Question # 8

As shown in the figure, there are two IP6 networks that can access the IPv4 network, and the IPsec tunnel needs to be established between the two IPv6 networks to communicate, which of the following requirements?(). Single choice questions).

A.

ESP + tunnel mode

B.

AH + transmission mode

C.

AH + tunnel mode

D.

None of the above options are correct

Full Access
Question # 9

Regarding BGP route filtering, the following description is wrong?

A.

The filtering relationship between Route-Policy's noodes is "or." ", that is, as long as a node filter is passed, it can pass through the Route-policyo

B.

For routes published locally, configure a routing policy that takes effect before the route is added to the BGP route table.

C.

In the same node of Route-Policy, multiple if-match clauses for different attributes are "or" relationships.

D.

When a route to a BGP peer is received, a routing policy is enforced to filter unwanted BGP routes that are not added to the local BGP routing table.

Full Access
Question # 10

Which of the following is the benefit of VLAN aggregation?

A.

Implements isolation of broadcast domains between Sub-VLANs

B.

Reduce the waste of IP addresses

C.

Increased number of available VLANs

D.

Increased flexibility in addressing

Full Access
Question # 11

0SPFV2 is running on the IPV4 network IGP: OSPF3 is running in the IPV6 network, OSPF35 OSPFV2 has the same message type. Includes hello messages, DOD messages, LSR messages, LAU messages, and SAX messages about OSPP The following statement is correct?

A.

The hello packet of OSPFv3 carries the IPV6 address prefix of the router interface

B.

OSPFv3 uses the authentication field of the packet header to complete the packet authentication

C.

OSPFv3 uses the link-local address as the source address for sending packets, which can be forwarded outside the range of the originating link

D.

OSPFv3 sends OSPFv3 packet using the IPV6 multicast addresses FF02::5 and FF02

Full Access
Question # 12

What command can be used to prevent users from accessing multiple devices through the HUB on the switch's access port?( Radio).

A.

[Huawe interface Gigabithemeto/0/1[Huawei-GigabiEthermeto/O/lport linktypetrunk [Huawel-GigabithemetO/1]port trunk allow pass vlan 10

B.

[Huawei interface GigabiEthemet/0/1[Huawe-GigablEthemetO/0/1Jpor ink type acess(Huawei GigabitEthemet/O/Tipsg enable

C.

Huawei interface GigabiEthemetO/0/1Huawei-GigabiEthemetO/OJport link-type acces Huawei GigabilEthemet/0/1port-secunty enable0

D.

[Huawei iterface Gigabithemeto/0/1 (Huawei-GigabitEthemeto//1)pot ink type access(Huawel-CigabiEthemeto/1]portisolate enable

Full Access
Question # 13

To achieve an on-machine migration in the BGP EVPN distributed gateway scenario, which of the following messages is required?

A.

Type5

B.

Type4

C.

Typel

D.

Type2

E.

Type3

Full Access
Question # 14

Cross-device link aggregation realizes the back-to-back transmission of data traffic and the mutual spare of the heap member switches, but due to the limited bandwidth of the heap cable between the heap devices, the forwarding efficiency can be improved in the following ways?

A.

Enable traffic to be forwarded locally first

B.

Connect the stacking device via a stacking card

C.

Configure the stacking system MAC address switching

D.

Enables the stacking multi-master check function

Full Access
Question # 15

The correct description of the scene shown in the following figure is:

A.

LSDB

B.

R1, which exists in both Level-1 and Leve-2, can ping the interface address of R2 loopback0

C.

R there is a route to R2 loopback0 10022/32

D.

No neighbor relationship can be established between R1 and R2

Full Access
Question # 16

BGP can only automatically aggregate routes whose source is Incomplete.

A.

True

B.

False

Full Access
Question # 17

The following statement about isis protocol LSP messages is correct

A.

The isP rapid diffusion feature, which first diffuses out LSPs that are smaller than a specified number , speeding up the synchronization process of LSDB

B.

By configuring an LSP-generated smart timer, the timer automatically adjusts the delay time based on the frequency at which the routing information changes

C.

As link status information increases, the packet length of the LSP can be increased so that each ISP can carry more information.

D.

Reducing the minimum interval at which LSPs are sent per port can speed up the diffusion of LSPs.

Full Access
Question # 18

An advanced access control list is a sequence of rules consisting of permit |deny statements that can match IP messages based on which attributes ?(). Multiple select).

A.

Destination port number

B.

Source address

C.

Destination address

D.

Source port number

Full Access
Question # 19

Which of the following sequences can be matched by the regular expression [^100|200]$?

A.

300200 100

B.

200 100 300

C.

100 200 300

D.

100,300,200

Full Access
Question # 20

In EPIM-SM, the following description of the PIM Join message is correct?

APIM Join messages are sent every 3 minutes, and status B. PIM Join messages for the multicast tree are only sent when the multicast tree is first established

C. The PIM Join message is sent every 60 seconds to refresh the status of the upstream router mroute for the multicast tree

D. The upstream router sends a PIM Join acknowledgment in response to each PIM Join message received from the downstream router

Full Access
Question # 21

The network administrator defines a traffic policing policy as follows:

A.

256K bytes

B.

48128 bytes

C.

32K bytes

D.

80128 bytes

Full Access
Question # 22

The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration

A.

[Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quit

B.

[Qudway ineface gigabtethemnet /0'1

[Quidway-GigabitEfthemetO0/O/1]multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit

C.

Quidway inteface gigabiethenet ou0/1

[Quidway-GigabtEthernet/0/1J,broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut

D.

[Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20

E.

[Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit

Full Access
Question # 23

When configuring ISIS zone authentication, which ISIS message will carry the authentication letter? ( Single choice questions).

A.

ISIS ?Level-1 ?SNP ?LSP?

B.

ISIS ?Level-2 ?SNP ?LSP?

C.

Hello message of ISIS's Level-1.

D.

Hello message of ISIS's Level-2

Full Access
Question # 24

The following description of the link state protocol is plausible?

A.

CPU utilization is high and loops are easy to generate

B.

Slow convergence and low CPU utilization

C.

Fast convergence and low CPU utilization

D.

Fast convergence and high CPU utilization

Full Access
Question # 25

The following statements about the VRRP protocol are correct (multiple choice).

A.

Both VRRPv2 and VRRPv3 support authentication

B.

VRRPv3 does not support authentication, while VRRPV2 does

C.

VRRPv2 only applies to IPv4 networks, and VRRPv3 only applies to IPv6 networks

D.

The owner of the Master IP address has a VRP priority of 255, and all configurable priorities range from 0 to 254

Full Access
Question # 26

The following statement about the concept of multicast is wrong?

A.

Multicast Source: The sender of the message needs to join the multicast group to provide forwarding of multicast group messages

B.

Multicast router: A router or layer-three switch that supports layer-3 multicast functionality

C.

Multicast Group Members: Multicast group members can be widely distributed anywhere in the network

D.

Multicast Groups: A collection identified by ip multicast addresses

Full Access
Question # 27

The command ip as-path-fiter as-path-fiter-number (denylpermit) regular-expression to configure as-path-ilter, in this command , multiple sentences can form an as-path-filter statement, what is the relationship between so many statements?

A.

Routes match in order When a route matches to a clause, the relationship between

B.

and is no longer matched downwards

C.

or relationships

D.

Routes match in order and routes need to match all sub-directions

Full Access
Question # 28

Which of the following statements about RADIUS is correct?( Single choice questions).

A.

MAC authentication does not require a username password, so you cannot use RADIUS to authenticate the user.

B.

RADIUS supports both wired and wireless access modes.

C.

SEPARATION OF RADIUS PROTOCOL AUTHENTICATION, AUTHORIZATION, AND AUDIT.

D.

RADIUS authentication and Portal authentication cannot be used together because the Portal server can typically be used to authenticate users when portal authentication is deployed.

Full Access
Question # 29

In which of the following cases, RSTP refreshes the MAC address table?( Multi-select)

A.

When the port state transitions from Forwarding to Disking

B.

Only when the port state transitions from Listening to Disccarding

C.

When a topology change notification is received

D.

When the status of a port changes

E.

CE when the port state transitions from Disking to Forwarding

Full Access
Question # 30

The following statement about ISIS (IPv6) is correct?

A.

In order to support the processing and calculation of IPV6 routes, IS-IS has added TLV232, 236

B.

By default, IS-IS has the multi-topology feature turned on

C.

IS-IS works at the data link layer and only needs to add a new TLV to support IPv6

D.

To support the processing and computation of IPv6 routes, IS-IS has added NLPID to the 129TLV

Full Access
Question # 31

You are now troubleshooting a LAN, and you suspect that the error is due to a mismatch in the work mode. Which switch interface error indicates that the 10/100/100O IEE gigabit interface operating mode does not match?( Multiple choice questions).

A.

Alignment error

B.

FCS error

C.

Super Small Frame

D.

Excess Conflict

E.

Lag conflicts

Full Access
Question # 32

In route-policy, what are the BGP attributes that can be used for the apply clause?

A.

AS-Path

B.

MED

C.

Local-Preference

D.

Day

Full Access
Question # 33

Router HW cannot access hosts in the remote network, router HW runs routing protocols and only pings the remote file server address 105401 on router HW with extensions through a default route remote network , the result of ping on the router HW is rendered as 'requ.' est time out', according to the above description, the error in the following analysis is ?

A.

The next hop router for router HW did not reach the destination address

B.

Router HW does not have a legitimate router to reach the destination address

C.

Ping is successful, but congestion occurs on the path to the destination address

D.

There is a firewall in the remote destination network, and the destination address can be reached without releasing ICMP traffic E. ICMP packets, but the destination device fails to reply

Full Access
Question # 34

ICMPv6 has two types: Error Messages and Information Messages.

A.

TRUE

B.

FALSE

Full Access
Question # 35

In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between VTEPs?( Multiple select).

A.

Host Information Collection

B.

Local ARP agent

C.

port isolation

D.

ARP broadcast suppression

Full Access
Question # 36

As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).

A.

The 2::/64 route appears in the P route table

B.

The 2019:/64 route appears in the IP routing table

C.

2020::/64 The route appears in the IP routing table

D.

The 2021/64 route will appear in the IP routing table

Full Access
Question # 37

The following statement about IPv6 Over VXLAN is wrong as ?( Single choice questions).

A.

The tunnel between VXLAN Layer 2 and Layer 3 gateways is an IPv4 network.

B.

IPv6 over VXLAN solves the problem of insufficient IP address resources for end tenants.

C.

IPv6 Over VLANs do not generate ND table entries.

D.

IPv6 over VXLAN means that the Overlay network of the VXLAN is an IPv6 network.

Full Access
Question # 38

For Layer 2 VPN technology, the following statement is correct?( Multiple choice questions).

A.

VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access.

B.

The VPLS configuration is complex and the Layer 2 network transmits BUM packets.

C.

BGP EVPN supports features such as tenant isolation, Multi-homing , and broadcast suppression.

D.

BGP EVPN addresses issues such as MAC address drift and multi-tenancy that VPLS cannot support.

Full Access
Question # 39

By default, which of the following security MAC address types lose table entries after the device restarts?

A.

Sticty MAC address

B.

Black hole MAC address

C.

Secure static MAC address

D.

Secure dynamic MAC address

Full Access
Question # 40

What mechanisms or techniques can VRRP combine with to monitor uplink connectivity?

A.

IP-link

B.

BFD

C.

NQA

D.

Interface trace

Full Access
Question # 41

A multi-protocol network, the topology is shown in the figure. Take a closer look at the topology, router R4 (in Areal) is introduced into the OSPF process via the routes learned by BGP. So what categories of LS4 will R3 advertise to zone 0?( Multiple choice questions).

A.

5 ?LSA

B.

7 ?LSA

C.

1 ?LSA

D.

4 ?LSA

E.

2 ?? ??

Full Access
Question # 42

What information does this contain in a basic layer packet? (Multiple choice) A Data link layer header

B. Upper-level data

C. The network layer header

D. path records

E. Network Layer Tail

Full Access
Question # 43

The following link-LSA for OSPFv3 is correct?

A.

Contains both the link-local address of this interface and all IPV6 prefixes of the same area on this router.

B.

Contains both the link-local address of the interface and all IPv6 prefixes on the interface.

C.

?Link-LSA ???Prefix ?Prefixoptions ???Ox00,?? Prefix ????IPv6??????

D.

The Option field exists in the header of the LSA, not in the data area of the Link-LSA

Full Access
Question # 44

As shown in the figure, a company wants to achieve secure mutual access between the head office and branches through MPLSVPN, and at the same time requires that the IPN traffic of the branch bank must be forwarded through the head office to achieve traffic monitoring

A.

VPN routing information can be exchanged between A. CE and PE using BGP messages

B.

When Hub-CE passes routing information with Hub-PE, you need to configure a route on Hub-PE that allows receiving AS numbers to be repeated 1 time to receive routes published by Hub-CE

C.

Between Hub-CE and Hub-PE, and between Spoke-PE and Plan-CE, routing information can be exchanged using the OSPF protocol

D.

An MP-IBGP peer relationship is established between Spoke-PE and THE VPN routing information is exchanged.

Full Access
Question # 45

Which timer for spanning tree protocol dictates how often to see the root bridge send configuration BPDUs?

A.

forwarding delay timer

B.

STP timer

C.

HOLD timer

D.

Maxage timer

E.

Hello timer

Full Access
Question # 46

When an administrator configures VRRP, which of the following is not required?

A.

Preemption mode

B.

Priority of the virtual router

C.

Preemption delay

D.

Virtual IP address

Full Access
Question # 47

In a network in MPLSVPN, different CE devices can exchange routing information with the same PE device using different routing protocols, and different CE devices can exchange routing information with the same PE The routing protocols used between devices are independent of each other

A.

True

B.

False

Full Access
Question # 48

The following message about the Register in PIM-SM describes the correct ?( Multiple choice questions).

A.

The Register message enables the RP to learn the multicast source information

B.

The Register message is sent by the receiver router

C.

Register messages are sent to RPv via unicast instead of multicast

D.

The Register message is sent by the source DR

Full Access
Question # 49

The fields that represent priority in the VLAN (8021Q) data encapsulation are a total of 6 bits.

A.

True

B.

False

Full Access
Question # 50

Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct?

A.

Under no circumstances can different sites that belong to the same VPN use overlapping address spaces

B.

Two geographically separated networks must belong to different sites

C.

Terminals connected to the carrier network through the same CE may belong to different sites

D.

A site is a set of IP systems, and a network of hosts cannot be called site

Full Access
Question # 51

Based on the configuration shown in the figure below, it can be known that R4 has () interfaces advertised into IS-IS?

A.

2

B.

3

C.

1

D.

0

Full Access
Question # 52

Regarding the Stub region in the OSPF protocol, the following statement is correct.

A.

Virtual connections cannot traverse the Stub region

B.

Backbone zones cannot be configured as Stub zones

C.

ASBR cannot exist in the Stub zone

D.

Type7 LSA injection is not allowed in the Stub zone

Full Access
Question # 53

Which of the following options enables encapsulation and unencapsulation of VXLAN messages?

A.

VBDIF

B.

VLANIF

C.

BD

D.

VTEP

Full Access
Question # 54

Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test#

interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct:

A.

If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3

B.

If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3

C.

If the packet source IP address is 1001.2, it cannot be forwarded

D.

If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains unchanged

Full Access
Question # 55

Off-stem cross-domain VPN-Option B scenario, the following description is incorrect?

A.

During the packet forwarding process, it is necessary to exchange the VPN's private network LSP on the

B.

two ASBRs IP-EBGP neighbor relationships.

C.

The cross-domain VPN-Option B scheme is not limited by the number of interconnection links between ASBRs

D.

The outer layer tag is exchanged between two ASBRs to vpnV4 routes.

Full Access
Question # 56

Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS.

A.

FALSE

B.

TRUE

Full Access
Question # 57

The following description of IGMPv1 and IGMPv2 is correct?( Multiple select).

A.

IGMPv2 message types include member departure packets

B.

IGMPv2 does not support specific group queries

C.

IGMPv1 supports universal group queries

D.

The IGMPv1 message type does not contain members leaving the packet AD

Full Access
Question # 58

What type of prefix does a router running BGP advertise to its IBGP neighbor (assuming the router is not configured as a route reflector)? (radio).

A.

Prefixes are learned through other IBGP neighbors, or prefixes are learned from EBGP neighbors, or prefixes are learned through routing introduction

B.

A prefix that exists in the routing table

C.

Prefixes are learned through other BGP neighbors, or prefixes are learned locally through network or routing introduction

D.

Prefixes are learned through EBGP neighbors, or prefixes are learned locally through network or routing introduction

E.

The prefix is learned through an EBGP neighbor, or the prefix is learned from an from RR

Full Access
Question # 59

The correct description of the extended features of ISIS is ?

A.

When the amount of information in the Link State Protocol data packet PDU to be released by ISIS is too large, the ISIS router will generate multiple LSP shards to carry more ISIS information.

B.

ISIS can choose whether to authenticate incoming SNP and LSP packets

C.

If there are other vendors' devices on the network and do not support the LSP sharding function, the sharding expansion mode must be configured as Model-1, otherwise the message will not be recognized by other vendors' devices.

D.

After you enable the LSP shard extension feature of your router, you can use it without restarting the ISIS process.

Full Access
Question # 60

Regarding the MPLS basic forwarding process, the following description is incorrect? Radio

A.

By default, the PHP-enabled Erass node assigns a label value of 3 to the inverted second-hop node.

B.

When an IP message enters the MPLS domain, the MPLS boundary device inserts a new label between the layer 2 header and the IP header.

C.

When the P message enters the MPLS domain, check whether the Tunel lD value corresponding to the destination IP address is Ox0O If the Tunel IlD value is Ox0 Then enter the MPLS forwarding process.

D.

The transport node device replaces the existing top-of-stack label (outermost label) with the label assigned by the next hop device.

Full Access
Question # 61

After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?

A.

Send an alert

B.

The MAC address blocks

C.

Interface blocking

D.

Traffic filtering

Full Access
Question # 62

When you deploy LLQ, you need to configure bandwidth parameters, what is the significance of bandwidth parameters?( Single choice questions).

A.

Provides a built-in policer to limit the maximum available bandwidth of a low-latency queue during congestion

B.

The parameter should be as small as possible. It means that the bandwidth is always preserved, and even if the LLQ is set, changing the parameters will reduce the available bandwidth of the interface

C.

It represents a reference CIR to calculate the burst size D of the built-in tactician token bucket Changing parameters is an option because LLQ always takes precedence over other queues

Full Access
Question # 63

Which of the following are single-packet attacks?

A.

Special control message attacks

B.

Scan Probe Attack

C.

DDos Attack

D.

Malformed Message Attack

Full Access
Question # 64

The following statement about IPSec VPN is correct

A.

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

B.

The two routers establish IPSecVPN in main mode, and from the 5th message (included), the payload's data is often encrypted.

C.

Two routers establish an IPSec VPN in brutal mode, so that the tunnel is built with a minimum of 4 messages interacting between the two devices.

D.

The two routers can establish an OSPF neighbor relationship through the IPSec VPN (19) channel and exchange intranet devices by

Full Access
Question # 65

As shown in the following figure, R1 and R2 establish a neighbor relationship for Level2, which is critical: placed as follows, then the following about The route entry for R2 is correct

A.

The 0:/64 router appears in the IP routing table

B.

2022:/64 Routers appear in the IP routing table c.2019::/64 Routers appear in the P routing table

C.

2021:-/64 Router will appear in the P routing table

Full Access
Question # 66

The following about BGP routing, what is the wrong description?

A.

Non-aggregate routes take precedence over aggregate routes.

B.

In the case of PrefVal, Local_Preference equality, if the BGP preference of the locally generated route, IBGP route, EBGP route is equal, the valid reference of this generation is preceded by priority.

C.

See the following entry in the BGP routing table: • *172 16 1. 11/32 0 00010 0? Indicates that the route is available non-optimal.

D.

For next_hop unreachable routes are invalid cat by and do not participate in the preference. Flogging case

Full Access
Question # 67

Regarding the sliding window of TCP, what are the following descriptions that are enough to be wrong? ( Multiple choice question)

A.

The sender declares the initial window size

B.

The sender does not need to transmit messages of full window size

C.

The TCP sliding window allows multiple packets to be sent before an acknowledgment is received

D.

After the retransmission timer times out, the sender has not received an acknowledgment and will retransmit unacknowledged data

E.

The receiver needs to acknowledge the sender's packet

F.

Sliding window size can only be increased or remain unchanged

Full Access
Question # 68

As shown below, RI, R2 establish EBGP neighbors, and once turned on, the BFD detection function, the following statement is correct?

A.

RDetection time for BFD packets for 2 Detection time for BFD messages 800m5

B.

RI Detection time for BFD messages for 1280ms

C.

RI The detection time for bFD messages for 660ms

D.

R2 is 600ms

Full Access
Question # 69

The following description of the Layer 6 functionality in the OSI reference model is correct?

A.

Synchronous communication

B.

Establishing, maintaining, and terminating communication sessions

C.

Provides a common data compression and encryption scheme

D.

Determines the availability of resources

Full Access
Question # 70

What kind of scenario can use AS one path and one filter?

A.

Filter routes received from BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peer x.X.x.x as path-filter import

B.

The apply clause in Routepolicy

C.

Filter routes sent to BGP neighbors based on the AS PATH attribute that the route carries. For example, the command peerx. X.x.x as path-filter export

D.

If-natch clause answer in Route-policy.

Full Access
Question # 71

Regarding the MPLS handling mode of TTL, the following description is correct?

A.

Pipe mode. When an IP message passes through an MPLS network, the IPTTL minus l at the entry point is mapped to the MPLS TTL field

B.

MPLS tags in the TTL, which mean the same as the TTL domain in the IP header. TTL prevents mpLS networks from creating routing loops

C.

In Unifor mode, when an IP message passes through an MPLS network, the inbound IPTTL is minus 1. The MPLSTTL field is a fixed value

D.

In MMLSVPI, if you need to hide the structure of the MPLS backbone network, you can use the Uniform mode on Ingress for private network messages

Full Access
Question # 72

/R1Jospf1lRL-osp- jarea.2[RLospf-1-arca-0002]network1001310000 As shown in the configuration, the administrator configured OSPF but RI on R1 You cannot learn routes for other routing rings. Then the possible cause is the question).

A.

This router does not have an OSPF process number configured

B.

This router is configured with a different zone ID than its neighbor router's zone ID

C.

This router does not have authentication features configured, but neighbor routers configure authentication features

D.

The declared network address of this router does not match the interface mask

Full Access
Question # 73

Which address prefix in the following options indicates that the address is globally unique and globally routable among unicast addresses in IPv6, similar to a public address in IPv4?(). Single choice questions).

A.

::1/128

B.

FE80:/10

C.

FE80::/10

D.

2000:;/3

Full Access
Question # 74

Which of the following options is described correctly for the assertion mechanism?( Radio).

A.

Winner's election process does not make IP address size a condition of the election

B.

In the assertion mechanism, the winner is responsible for forwarding multicast data to the broadcast segment

C.

The assertion mechanism is used for the election of DR

D.

In the assertion mechanism, the loser will shut down the interface with the broadcast network necklace

Full Access
Question # 75

As shown in the following figure, R1 and R2 establish a neighbor relationship with LeveL2, and the key configuration is as follows, so is the following route entry for R2 correct?

A.

0::/64 The router will appear in the IP routing table

B.

2022::/64 Routers appear in the IP routing table

C.

2019::/64 Routers appear in the IP routing table

D.

2021::/64 Routers appear in the IP routing table

Full Access
Question # 76

Without dividing the zone, is the following description of the link state routing protocol correct?

A.

Each router establishes a topology for the entire floodplain

B.

Each router learns route entries directly from the route update and adds them to the routing table

C.

Routers in the flood domain may receive the same link state information repeatedly

D.

Routers throughout the flood domain have the same database of wrong-state states

E.

The router will send all the mis-routing status information from one neighbor to all other neighbors to ensure the synchronization of the database

Full Access
Question # 77

In an MPLS VPN network, different CE devices exchange routing information with the same PE device using different routing protocols, and different CE devices use routing protocols that are independent of each other

A.

True

B.

False

Full Access
Question # 78

In OSPFv3, Router-LSA is generated by each router, which describes the interface address and cost of the router's links, as well as the RouteriD of the neighbor router.

A.

True

B.

False

Full Access
Question # 79

One of the things you're doing is compressing the length of ip6 addresses as much as possible . The existing IP6 address is

2013xX0C130F006009cO87641308, to be able to make this P6 address more concise, you can compress the IP6 address into which of the following?( Single choice questions).

A.

2013:0:130F:0:0:09CO:876Answer: 130B

B.

2013:130F::9CO:876Answer: 130B

C.

2013:0:130F:0:0:9CO:876Answer: 130B

D.

213::13F::9C:876Answer: 13B

E.

2013:0:130F::9CO:876Answer: 130B

Full Access
Question # 80

The following description of the attributes of BGP is correct? Radio

A.

The AS number of the adjacent AS, ranked to the far right of the list of AS_Path in the BGP route entry.

B.

When a BGP Speaker publishes a route learned from an EBCP peer to an IBGP peer, it does not change the next hop attribute of that routing information.

C.

Local_Pref is valid only between EBGP peers and is not advertised to third-party AS

D.

A route can have only one community attribute value.

Full Access
Question # 81

To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter

A.

FALSE

B.

TRUE

Full Access
Question # 82

Which of the following messages does the BGP protocol support?

A.

Update

B.

Open

C.

Hello

D.

Keepalive

Full Access
Question # 83

A router receives a BGP route with the community attribute NO-Export , how will the router handle the BGP route?

A.

Drop the route directly.

B.

No more advertising to other BGP routers.

C.

Advertise only to IBGP neighbors.

D.

The route is advertised normally, but the route is not used to forward data.

Full Access
Question # 84

Protocols with TCP ports 443, 179, 137, 110, and 23 are, in order: radio

A.

Finger,DHCP Server,NetBios Name Server,POP3,TelnetB

B.

LDAP,SNMP,TFTP,POP3,Telnet

C.

HTTPS,SNMP,POP3,DNS ,Telnet

D.

HiPS,BGP, NetBios Name Server ,POP3,TelnetE. BGP,POP3,SNMP,TFTP,Teinet

Full Access
Question # 85

Router R1 runs the OSPF protocol, use the "display ip routing-table" command to view the routing table of the router R1, the following about the OSPF in the routing table Is the information described correctly?

A.

In the routing table, route table entries identified by the "OSPF" identifier can only be learned through LSAs of Type 3

B.

In the routing table, the routing table entries identified by the "OSPF" identifier can only pass Class 1 LSA

C.

In the routing table, the routing table entries identified by the "OSPF" identifier can be learned through the 1/2/3/5 LSA

D.

In the routing table, the routing table entry identified with the "O_ASE" identifier can only be learned by routing introduction

Full Access
Question # 86

For a non-directly connected EBGP neighbor to establish properly, what configurations must be included as follows?

A.

peer ebgp-max-hop

B.

peer ignore

C.

peer as-number

D.

peer connect-interface

Full Access
Question # 87

RTA is the source DR router, RTB is the RP router, and the multicast source sends multicast data to the RTA, but the PIM is not visible on the RTB Register the multicast source to which the message is registered, then the possible causes are ?

A.

Multicast network statically configures RP, while RTA router does not statically configure RP

B.

The RP elected by RTA is not an RTB

C.

RTB to RTA has no unicast routing, causing the RTB to fail RPF checks for the source

D.

The multicast network dynamically elects the RP instead RTA failed RPF check for BSR

Full Access
Question # 88

If there is a switch running RSTP, which interface on that switch sends the BPDU with the Proposal logo??

A.

The specified port

B.

in the forwarding state. The specified port in a non-forwarding state

C.

Alternate port

D.

The root port in the Blocking state

Full Access
Question # 89

What are the main reasons why RSTP converges faster than STP?

A.

RSTP increases the variety of port states

B.

RSTP has a smaller overhead

C.

RSTP does not converge based on timer

D.

RSTP has a smaller timer

Full Access
Question # 90

The advantages of building a campus network using stacking, clustering technology include which of the following?( Multi-select)

A.

Improved network equipment and link utilization

B.

It can effectively reduce network power consumption

C.

Business disruption time is greatly reduced

D.

Simplifies network management and reduces the complexity of network deployment planning

Full Access
Question # 91

Which of the following parameters are not required when configuring BGP Peers?

A.

as-number

B.

password

C.

peer IP Address

D.

Description

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 28 Sep 2023