Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

H12-891_V1.0 Questions and Answers

Question # 4

What are the three ways to send IPv4 messages?

A.

broadcast

B.

Unicast

C.

Multicast

D.

Any broadcast

Full Access
Question # 5

Link state information is isolated by default between different IS-IS processes on the same router.

A.

TRUE

B.

FALSE

Full Access
Question # 6

The most effective way to view device warnings through the CLI is ?

A.

Display alarm

B.

Display current-configuration

C.

Display interface brief

D.

Display clock

Full Access
Question # 7

In an MPLS BGPVPN networking that does not enable MPLS penultimate hop pop-up technology. When the message reaches the last hop PE, the message has two layers of labels, and the two layers of label values can be the same.

A.

TRUE

B.

FALSE

Full Access
Question # 8

Auto-negotiate mode is to obtain the maximum interface rate and operating mode, the network administrator configures all Ethernet interface rates of a working switch to 10OMbps, and the operating mode is configured as Full-duplex, when a network card is configured After the auto-negotiate workstation is connected to the switch, the negotiation result is that the interface rate is 10OMbps and the working mode is half-duplex, which of the following explanations is the most reasonable for this phenomenon?

A.

The problem is on the workstation's NIC, mostly due to the aging of the NIC driver on the workstation , which causes the workstation NIC to learn the interface rate and operating mode configured on the switch

B.

Port rate negotiation is negotiated through the initial port sending FLP , and the operating mode is not negotiated through FLP

C.

STP initializes the port into the blocking state, causing auto-negotiation to fail, so the port should be configured as an edge port

D.

At higher port rates and operating modes, the workstation's network interface card cannot be configured as auto-negotiate

E.

Auto-negotiation is not configured on the switch, resulting in the switch not being able to send FLP messages to the workstation, causing the workstation to set its own operating mode to Half-duple

Full Access
Question # 9

You expect to deploy multicast video applications on your private, on-premises network. To achieve this, you need to have a private multicast IP address in your network . So which range of IP addresses can be used?( Single choice questions).

A.

239000-239255255255

B.

241.000-241.255255255

C.

224000-224255255255

D.

240000-254255255255 E. 226000-226255255255

Full Access
Question # 10

What are the differences between traffic policing and traffic shaping?

A.

Traffic shaping is applied in the inlet direction and traffic supervision is applied in the outlet direction

B.

For traffic shaping, the router caches excess packets until bandwidth is available again

C.

The token bucket algorithm is used for traffic supervision, and the SPD algorithm is used for traffic shaping

D.

For traffic policing, the usage of the buffer can be adjusted for traffic exceeding the CIR

E.

For traffic shaping, it can be over-CIR Traffic adjustment for the usage of the buffer

Full Access
Question # 11

The HTTP protocol is based on TCP, so http Flood attacks can be defended against HTTP Flood attacks using the TCP Flood attack prevention method.

A.

True

B.

False

Full Access
Question # 12

Which of the following tools cannot be referenced directly by the If-match clause in Route-policy?

A.

Regular expression

B.

IP-prefix

C.

AS-path-filter

D.

Community-filt

Full Access
Question # 13

In the use of the LACP protocol, the following description is correct ?( Multiple select).

A.

You can avoid the Eth-Trunk interface from frequently shaking interface eth-trunk 1l lacp preempt enable lacp preempt delay delay-time with the following command

B.

Source IP address load sharing, interface eth-trunk1Load-balance src-dst-ip, can be configured in an enabled link aggregation group with the following command

C.

The member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthemeto/0/1 Shutdown nterface Gigabithemet/O/1undo eth-trunklinterface GigabitEthemet0/0/1 undo shutdown

D.

A chain cluster that can be initiated through an order Join the member interface :interface GigabitEthemeto/0/1 shutdown interface igabitEthemetO/0/1 tunkportGigabitEthermet0/0/1 interface GigabitEthermet0/0/1 Undo shutdown

Full Access
Question # 14

The following description of the RD attribute filter for BGP is correct?

A.

If RD-filter is not configured, but the RD-filter is referenced for filtering, the matching result is deny.

B.

If RD-filter is configured, but the routed RD is not matched with any of the RDs defined in the rule, the default match result is permit.

C.

Multiple rules are matched in the order in which they are configured.

D.

There is always an "or" relationship between the rules configured by RD-filter.

Full Access
Question # 15

What is wrong with the following statement about digital certificates?

A.

Digital signatures guarantee the integrity of digital certificates.

B.

Digital certificates contain public key information.

C.

Authentication fails when the peer certificate is received within the validity period, but the device itself is in the wrong time if it is not within the validity period of the certificate.

D.

Even if two PRI entities are not in the same CA system, authentication can be completed as long as both parties can recognize each other's CA.

Full Access
Question # 16

What are the wrong statements about OSTPF's Router LSA and Network LSA?

A.

There must be both Router LSA and Network LSA in the OSPF network

B.

Network LSA carries both topology and routing information

C.

A router running OSPF must produce a Network LSA

D.

A router running OSPF must produce a Router LSA

Full Access
Question # 17

In VXLAN scenarios, what features can be turned on to reduce flooding of ARP messages between VTEPs?( Multiple select).

A.

Host Information Collection

B.

Local ARP agent

C.

port isolation

D.

ARP broadcast suppression

Full Access
Question # 18

Regarding the domain-authentication-mode md5 hello command in the ISIS process, the correct explanation is ?

A.

ISIS authentication cannot be applied in IPv6 environments.

B.

This command is mainly used to make is the ISIS Hello message carry authentication information during the transmission process.

C.

All router domain authentication methods of the same routing domain are MD5, the password is hello, and lS-IS SNP and LSP will spread normally.

D.

outing domain authentication is primarily used to allow level-1 and Level-2 SNP and LSP messages to carry authentication information during delivery.

Full Access
Question # 19

What commands are related to BGP route reflectors?( Multiple select).

A.

reflect between-clients

B.

group 1 internal

C.

peer reflect-client

D.

reflector cluster-id

Full Access
Question # 20

Regarding BGP MED, which of the following descriptions is correct?

A.

In the BGP routing rules, MED has a lower priority than AS Path, Praferred-value, Local-Preference, etc Origin

B.

The default value for the B. BGP routing MED is 0

C.

By default, if there is no MED value in the route attribute, it is processed by 0 If the bestroute med-none-as-maximum command is configured, MED is processed as the maximum 4294967295

D.

By default, BGP routing rules can MED comparison of routes from different autonomous systems

Full Access
Question # 21

When deploying BGP/MPLS IPVPN, OSPF's VPN route tag is not present

The extended properties of MP-BGP are passed only locally, only locally, and only meaningful on routers that receive MP-BGP routes and generate OSPF LSAs.

A.

TRUE

B.

FALSE

Full Access
Question # 22

Router HW1 exists in the carrier HW's network as an MPLSLSR router. The router receives a packet carrying a label, but the label entry does not exist in its LFIB. So how does the router handle that message?

A.

Router HW1 strips off the label and looks for the FIB using the P destination address

B.

Router HW1 uses LDP to create an LSP and creates a new path in LFIB for the label carried in the message

C.

Router HW1 drops the message

D.

Router HW1 will forward the message with the default label

Full Access
Question # 23

As shown in the figure, private network routing information is exchanged between PEl and PE2 and their respective CE via OSPF, and the same is configured on PEI and PE2 Domain D. When routing is introduced from BGP to OS9PF on PE2, the following limited types of LSAs may be passed to E2?

A.

Type7 LSA

B.

Type5 LSA

C.

Type3 LSA

D.

Type1 LSA

Full Access
Question # 24

Which of the following does the digital certificate not contain?

A.

Digital envelopes

B.

Issued by

C.

Digital signature

D.

Public key information

Full Access
Question # 25

What messages can Huawei equipment suppress traffic for?

A.

Multicast

B.

Known unicast

C.

Broadcast

D.

Unknown unicast

Full Access
Question # 26

The router connects two EBGP neighbors through two parallel Serial cables, what do you do to achieve bidirectional negative sharing between two EBGP neighbors connected by these two parallel Serial cables? ( Single choice questions).

A.

Without any method, BGP automatically implements load sharing of traffic across different autonomous systems on the available links

B.

Use the Loopback interface to establish an EBGP neighbor relationship, configure EBGP Muti-hop, configure the Loopback interface as the update source, and then use IGP to implement Equivalent path load sharing between Loopback addresses

C.

Configure the EBGP neighbor relationship with the Loopback interface as the update source, and the IGP in each AS needs to introduce two equivalent paths to the loopback address of the EBGP neighbor; And you need to use the command "next-hop?local"

D.

Use the command "ebgp-load-balance" at both ends

E.

To configure an EBGP neighbor relationship with the Loopback interface as the update source, the IGP in each AS needs to introduce two equivalent paths to the EBGP neighbor loopback address ; And the commands "ebgp maxhop" and "next-hop-local" are used

Full Access
Question # 27

In broadcast networks, elections to DIS begin only after a neighbor relationship has been established

A.

True

B.

False

Full Access
Question # 28

As shown in the figure, all routers run OSPF, which is correct in the following statement:

A.

Both R2 and Zone 0 generate Router LSA

B.

R2 generates Router LSA only in Zone 0

C.

R2 forwards the R1-generated Router LSA to R3

D.

R2 Forwards the R3-generated Router LSA to R1

Full Access
Question # 29

When configuring AS-Path-Filter, ip as-path-filter 10 permit_100$ indicates a matching route received from the A5100 but not from the AS100

A.

TRUE

B.

FALSE

Full Access
Question # 30

Regarding Route Policy, is the following description correct?

A.

Advanced ACLs can be applied in route-policy to filter routes

B.

The table entries pernit::0 Less an equal 128 indicate that all IPV6 routes are allowed through

C.

If more than one node is defined in Route one policy, there should be at least one node in each node that matches permit

D.

Route one policy filters only the default route

Full Access
Question # 31

When running OSPFv3 on a Huawei router, the OSPFv3 process automatically selects an interface address as the process router id

A.

True

B.

False

Full Access
Question # 32

??? aggregate ipv4-address { mask/masklength }[as-set lattribute-policy route-policy-namel ldetail-suppressedlorigin-policy route-

in policy-name2[suppress3policy route-policy-name3], multiple parameters can be used to influence summary routes and their results. The correct description about the command is ?( Multiple choice questions).

A.

If As-set is configured, the A S_PATH of the aggregate route contains ass path information for all specific routes in case the route loop is blocked

B.

If Suppress-policy is configured, aggregate routes are also generated, and the if-match clause in Route-policy is used to pick suppressed detail routes. Detail routes that match Route-policy are still advertised to other BGP neighbors

C.

If Origin-policy is configured, only detail routes that match Route-policy can participate in aggregation

D.

If You configure The Interface-policy, you can change the properties of the aggregate route

Full Access
Question # 33

Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, then which class LSA Will it be aggregated?

A.

1 Class LSA

B.

2 kind LSA

C.

3 kind LSA

D.

4 kind LSA

E.

5 Class LSA

Full Access
Question # 34

VrRP priority is not configured as O, devices that issue VRRP priority of 0 stop participating in the VRRP backup group, notifying the backup device to become a laster device as soon as possible without having to wait until the Master_Down_Interval timer times out

A.

True

B.

False

Full Access
Question # 35

The value of OSPF and BFD linkage is ? Radio

A.

Any change in BFD status is realized by detecting the BFD at the millisecond level, which correlates the OSPF state and realizes the purpose of OSPF rapid sensing link state

B.

Does not affect OSPF neighbor status

C.

BFD packet transmission interval can reach the 100-second level, which is slower than the OSPF induction link state

D.

OSPF's hello send interval is seconds, which is faster than BFD inductive link state

Full Access
Question # 36

The basic header length of an IPv6 message is a fixed value.

A.

TRUE

B.

FALSE

Full Access
Question # 37

In the evolution from IPv4 networks to IPv6, some transition technologies have emerged, which of the following are common types of transition technologies?

A.

Dual-stack technology

B.

Tunneling Technology

C.

Compatible with Technology

D.

Conversion Technology

Full Access
Question # 38

The Serial Number field of LS is used to detect expired and duplicate LSAs. The field is a 32bt signed integer, so the small serial number is Ox8000000

A.

True

B.

False

Full Access
Question # 39

Configure queue-based traffic shaping, which defaults to tailing if the queue length exceeds the cache size

A.

True

B.

False

Full Access
Question # 40

The following description of CBWFQ is correct?

A.

CBwFQ can be configured with MQC and service-policy is applied to the exit direction

B.

CBwFQ can be used for both egress and inbound interfaces

C.

CBwFQ is delayed, jittered and bandwidth guaranteed for traffic catch

D.

CBWFQ can only be configured in hierarchical policies-maps. The parent policy-map performs supervision and the child policy-map performs

Full Access
Question # 41

To build a loopless Layer 2 network, which of the following schemes is optimal?( Single Choice)

A.

Stacking + Link Aggregation

B.

TRILL+MSTP

C.

??+MSTP

D.

Link Collection + MSTP

Full Access
Question # 42

What is correct about the multicast message forwarding?

A.

RPF check failure indicates that the multicast data packets are received from a suboptimal interface, but the interface still receives multicast traffic and forwards it downstream

B.

IGMP snooping function can not control the range of multicast traffic in the Ethernet flood

C.

In the multicast transmission mode, the destination address of the message can specify the location of the receiver

D.

The source address of the multicast message is the unicast address

Full Access
Question # 43

If you have a LOCAL AREA NETWORK running 8021D Spanning Tree Protocol, the non-root switch does not receive which parameter under the root switch?

A.

MaxAge

B.

Root cost

C.

Forward delay

D.

Hold time

E.

Hello time

Full Access
Question # 44

Regarding route Policy, the following description is correct as ?( Multiple selection) Multiple selection

A.

Advanced ACLs can be applied in route-policy to filter routes

B.

The table entry exceed::0 less-equal 128 indicates that all IPv6 routes are allowed through

C.

If more than one node is defined in Route-policy, at least one node in each node should have a matching pattern of permit

D.

Route-Policy can filter only the default route

Full Access
Question # 45

Underneath, what doesn't belong to EVPN Type2 routing is ?( Multiple choice question)

A.

Host ARP advertisement

B.

BUM message forwarding

C.

Host MAC address advertisement

D.

Host IP Route Advertisement

Full Access
Question # 46

The following statement about IPSec VPN is correct ?qo

A.

Two routers establish an IPSec VPN in brutal mode, so that the two devices can interact with a minimum of 4 messages to establish a tunnel.

B.

Brutal mode can support NAT traversal, while main mode does not support NAT traversal.

C.

The two routers can establish OSPF neighbor relations and exchange intranet routes through the IPSec VPN tunnel

D.

The two routers establish IPSecVPN in main mode, and from the 5th packet (included), the payload's data will be encrypted.

Full Access
Question # 47

The following description of the process of sending and receiving data frames in switch interface Access mode is correct? ( Single choice questions).

A.

In Access mode, labeled data frames are discarded directly when they are received.

B.

Access mode strips off the VLAN tag of the dataton when sending .

C.

Access mode receives only unlabeled data frames.

D.

When a data frame enters the switch interface, the switch learns the destination MAC address in the data frame.

Full Access
Question # 48

The following description of Filter-Policy is correct?( Radio).

A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied The build is filtered.

B. Prefix lists can be used to filter both routes and packets.

C. Filter-policy filters the link state information received or published, and can modify the properties of route entries.

D. When filtering routes using the pre-slow list, the table entry ip-prefxldeny0000 0 lese-qual 32 indicates that only the default route matches

Full Access
Question # 49

There are routers as follows, according to which the compromise conclusion is wrong?

A.

R3 must be the DIS of some Level-1 link

B.

The R3 router is a Level-1-2 router

C.

R3 must be the DIS of some Level-2 link

D.

The system ID of the R3 router is 000300000000

Full Access
Question # 50

IPv6 introduces the Solicited-Node address, which is described correctly below (multiple choice)

A.

This is a specific address that is used for resolution in ARPv6 The MAC address.

B.

The Solicited-Node address on the router interface is automatically generated and can have multiple.

C.

If the Solicited-Node address is not configured , the router automatically generates one on each interface.

D.

IPv6 introduced the Solicited-Node address to support IPv6 multicast.

Full Access
Question # 51

After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?

A.

Send an alert

B.

The MAC address blocks

C.

Interface blocking

D.

Traffic filtering

Full Access
Question # 52

Regarding the site in the BGP/MPLSIP VPN network architecture, the following description is correct?

A.

Under no circumstances can different sites that belong to the same VPN use overlapping address spaces

B.

Two geographically separated networks must belong to different sites

C.

Terminals connected to the carrier network through the same CE may belong to different sites

D.

A site is a set of IP systems, and a network of hosts cannot be called site

Full Access
Question # 53

The following description of ISIS's routed infiltration is correct?( Multi-select)

A.

ISIS routing penetrates | Can be used in Pv6 environments.

B.

Route penetration for ISIS can be deployed on Level-1 routers.

C.

Route penetration for ISIS does not include aggregated routes.

D.

Route penetration of ISIS does not cause neighbor concussions.

E.

Route infiltration of ISIS is used to prevent routing loops.

Full Access
Question # 54

The RSTP protocol provides a variety of protection functions, such as when the edge port is configured as a protection state, the edge port receives the BPDU packet processing method;

A.

Directly discard the BPDU packet

B.

Close the port

C.

After parsing the BPDU message, the relevant information is obtained

D.

Forward BPDU packets as required

Full Access
Question # 55

The OSPF3 protocol is a separately developed protocol that differs somewhat from OSPF2 in that OSPFv3 is link-based rather than network segmented, and the following statement is incorrect?(). Single choice questions).

A.

Two OSPF routers connected to the link can establish a neighbor relationship even if their IPv6 address prefixes are different

B.

The routing information obtained by the B. OSPFv3 router from the neighbor uses the neighbor's Link-Local address as the next hop in the forwarded packet

C.

For two OSPF routers connected to the link, you can establish a neighbor relationship even if you do not configure a unicast IPv6 address

D.

All OSPFv3 interfaces use the Link-Local address as the destination address of the message

Full Access
Question # 56

Regarding BGP's recognized arbitrary attributes, which of the following descriptions is correct?

A.

must be passed between BGP neighbors

B.

All BGP routers must be recognized

C.

There is no requirement to be present in the Update message, and you can decide whether to add it to the Update message on a case-by-case basis

D.

The BGP router cannot recognize the

Full Access
Question # 57

Which of the following messages does the BGP protocol support?

A.

Update

B.

Open

C.

Hello

D.

Keepalive

Full Access
Question # 58

In a multicast network running PIM-SM mode, how does the router choose the upstream interface?

A.

looks up the outgoing interface corresponding to the RP address in the unicast routing table

B.

Interfaces to which multicast group members are directly connected

C.

Find the outbound interface corresponding to the mapping proxy in the unicast routing table

D.

The interface that is fast to the PIlM Join message

E.

Interface for sending PIM Heilo messages.

Full Access
Question # 59

In an Hw IP multicast network—which of the following multicast features are associated with (*, G) table entries? ( Multiple select)

A.

Dense mode

B.

Source tree

C.

Sparse mode

D.

PIM bidirectional E. Share the tree

E.

Dense Tree

Full Access
Question # 60

There are many ways to establish a cluster on a box switch, what methods does Huawei frame switch support to establish a cluster?

A.

Set up via a cluster card on the motherboard

B.

Establish

C.

through the cluster daughter card on the interface board. Establish

D.

through the service interface on the interface board Established by switching the cluster card on the network board

Full Access
Question # 61

What is the security level for untrust zones in the USG Series firewalls? ( Radio).

A.

50

B.

5

C.

10

D.

15

Full Access
Question # 62

The network administrator defines a traffic policing policy as follows:

A.

256K bytes

B.

48128 bytes

C.

32K bytes

D.

80128 bytes

Full Access
Question # 63

In an MPLS BGPVPN environment, if tags are distributed only through BGP and LDP, the MPLS tags of the message can be up to two layers of tags

A.

True

B.

False

Full Access
Question # 64

The following message about OSPFV3 is correct?

A.

The Option field of the Hello and DD packets extends to 24-bit

B.

LSR packets containing the full LSA header information for requesting an update to the LSA

C.

The LSACK message contains LSA header information to confirm receipt of the LSU message

D.

The Hello message must contain the interface ID of the sending interface

Full Access
Question # 65

Which of the following options is described correctly for the assertion mechanism?( Radio).

A.

Winner's election process does not make IP address size a condition of the election

B.

In the assertion mechanism, the winner is responsible for forwarding multicast data to the broadcast segment

C.

The assertion mechanism is used for the election of DR

D.

In the assertion mechanism, the loser will shut down the interface with the broadcast network necklace

Full Access
Question # 66

The following about BGP routing, describing the error, is ?

A, non-aggregate routes take precedence over aggregate routes

B. In PrefVal, Local_ Preference is equal to the case if the route is generated locally, IBGP Routing, the BGP preference for EBGP routing, is generated effectively referring to route priority.

C. See the following entry in the BGP routing table:* 172161.11/32 000010 0? Indicates that the route is available non-optimal

D. For next_hop unreachable routes when invalid routes, do not participate in the preferred.

Full Access
Question # 67

What mechanisms or techniques can VRRP combine with to monitor uplink connectivity?

A.

IP-link

B.

BFD

C.

NQA

D.

Interface trace

Full Access
Question # 68

As shown in the following figure, R1 and R2 establish a neighbor relationship for Level2, which is critical: placed as follows, then the following about The route entry for R2 is correct

A.

The 0:/64 router appears in the IP routing table

B.

2022:/64 Routers appear in the IP routing table c.2019::/64 Routers appear in the P routing table

C.

2021:-/64 Router will appear in the P routing table

Full Access
Question # 69

Which of the following statement about isis protocol route aggregation is correct?

A.

Route aggregation can be configured and takes effect on all types of routers

B.

Route aggregation can only take effect if configured on Leve-1 port routers

C.

Route aggregation can only be configured on Leve-2 routers to take effect

D.

Route aggregation can only be configured on Leve-1-2 routers to take effect with

Full Access
Question # 70

The existing router HWl running BGP is configured with both IBGP neighbors and EBGP tenants. The following descriptions about IBGP Neighbors and EBGP Neighbors are correct?

A.

The router will have an EBGP BGP neighbor from it must be connected directly, otherwise, IBGP-Multi-hop must be configured

B.

The router sends BGP updates learned from its EBGP neighbors to its other IBGP neighbors and EBGP neighbors

C.

IBGP neighbors can establish neighbor relationships through the Loopback interface

D.

The router sends BGP updates learned from its IBGP neighbors to its other IBGP neighbors and EPGP neighbors

E.

EBGP neighbors must be directly connected, otherwise, EBGP-Multi-hop must be configured with

Full Access
Question # 71

How do 8021w and 8021D handle BPDUs?( Confirmed) The

A.

8021D bridge only forwards BPDU packets received from the root bridge

B.

The 8021D bridge does not forward BPDU messages

C.

The 8021w bridge forwards only BPDU packets received from the root bridge

D.

8021w Bridge does not forward BPDU packet

Full Access
Question # 72

HW users are transferring a very large number of files via TFTP. What protocol does TFTP rely on for transmission?

A.

ICMP and UDP

B.

IP ?TCP

C.

UDP

D.

NFS E. FTP

Full Access
Question # 73

If you delete a declared route entry on a BGP router, the BGP routing ring is triggered to send an Update message for route scattering, which carries the accepted mandatory attribute of the route entry that was discarded.

A.

True

B.

False

Full Access
Question # 74

Communityflter has two types of basic group nature filters and advanced group property filters. Which of the following filters makes the Advanced Group Genus Filter more flexible than the Basic Group Attribute Filter to match group attributes?

A.

IP-prefix

B.

AS-path-filter

C.

Regular-expression

D.

ACL

Full Access
Question # 75

For Layer 2 VPN technology, the following statement is correct?( Multiple choice questions).

A.

VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access.

B.

The VPLS configuration is complex and the Layer 2 network transmits BUM packets.

C.

BGP EVPN supports features such as tenant isolation, Multi-homing , and broadcast suppression.

D.

BGP EVPN addresses issues such as MAC address drift and multi-tenancy that VPLS cannot support.

Full Access
Question # 76

Which is the correct description of optimal routing election for each protocol in the following options?( Radio).

A.

Route entries in BGP that are unreachable for the next hop are also placed in the IP routing table.

In the

B.

BGP protocol, the best route to reach the same destination circumference is selected by comparing the cost values of the route entries.

C.

The OSPF protocol puts all the routing information in the LSDB into the IP routing table.

D.

From BGP and OSPF, different route entries to reach the same destination segment are learned, and the optimal route is selected to join the IP route table by comparing the protocol's preference value .

Full Access
Question # 77

Is the following description of the BSR/RP mechanism correct?

A.

PIM-SM domain can have more than one C-BSR, but only one BSR can be elected by the C-BSR that receives the C-RP Packets are collected C-one RP information

B.

BSR advertises BSR and C-RP information to all routers in the PIM-SM domain by flooding Bootstrap packets

C.

A C-BSR can also collect C-RP information by receiving C-RP packets

Full Access
Question # 78

Mainstream Layer 2 tunneling technologies include VXLAN TRILL, NVGB and MPLS.

A.

FALSE

B.

TRUE

Full Access
Question # 79

Which of the following DNS resource records are legitimate?

A.

FQDN

B.

NS

C.

PTR

D.

MX

E.

A

Full Access
Question # 80

In the VXLAN implementation, the mapping relationship between VNI and BD is

A.

1:N

B.

N:1

C.

1:1

D.

N: M

Full Access
Question # 81

BGP EVPN advertises external routes, which of the following routes?

A.

Type1

B.

Type2

C.

Type3

D.

Type4

E.

Type5

Full Access
Question # 82

Which of the following BGP attributes is not required in the Update message for a BGP route?

A.

WITH

B.

Local-Preference

C.

AS_PATH

D.

Origin

Full Access
Question # 83

Router A has an IP route entry with a purposeful CIDR block of 10001/32 and an outgoing interface of GigabitEthernetO/0/1. Now add the following configuration: acd number 2000 rule 10 permit source1001.10#traffic classifier test if-match acl 2000 # traffic behavior test remarkdscp cs3#traffic policy test classifier test behavior test#

interfaceGigabitftherneto/0/1 ip address 1001212552552550 traffic-policy test outbound#assuming router A received a destination IP of 10001 Of packets, the following statements are correct:

A.

If the data packet source lIP address is 1001.2, it can be forwarded with the DSCP field marked CS3

B.

If the packet source IP address is 1001.1, it can be forwarded while the DSCP field is marked as CS3

C.

If the packet source IP address is 1001.2, it cannot be forwarded

D.

If the packet source IP address is 1001.2, it can be forwarded while the DSCP field remains unchanged

Full Access
Question # 84

Regarding the BGP alliance, the following description is wrong? Radio

A.

The consortium divides an AS into sub-AS, and the alliance external AS still considers the consortium to be an AS

B.

Subsystems within a consortium can use private AS numbers. Huawei NE/AR routers, a consortium can be configured with up to 32 subsystems.

C.

Consortium can easily detect the routing loop within the AS because EBGP is running between the subAS

D.

The subas number of the federation, which by default is advertised to the BGP peer outside the federation

Full Access
Question # 85

The following description of BGP load sharing is wrong with ?( Multiple choice question)

A.

The AS_Path properties of the equivalent routes that form load sharing must be different.

B.

The destination CIDR blocks are the same, and load sharing can be formed between BGP routes with different sources.

C.

If BGP load sharing is implemented , the local device needs to configure the peer next-hop-local command to change the next hop address to its own address when issuing a route to an IBGP peer group .

D.

IBGP routes and EBGP routes that reach the same destination in the public network can form a load sharing

Full Access
Question # 86

The following statement about IS-IS (IPv6) is correct?

A.

In order to support the processing and calculation of IPv6 routes, IS-IS has added TLV232 and 236

B.

By default, IS-IS has the multi-topology feature turned on

C.

IS-IS works at the data link layer and only needs to add a new TLV to support IPv6

D.

In order to support the processing and calculation of IPv6 routes, IS-IS has added NLPID to the 129 TLV

Full Access
Question # 87

In an IPv6 network, two nodes A and B are neighbors to each other if Node A sends NS messages to Node B if node B is B After receiving the message, reply to the NA message, then view it on node A, what will the neighbor status be marked? (Single Choice Questions).

A.

Reachable

B.

Incomplete

C.

Stale

D.

Probe

Full Access
Question # 88

There is an existing router running OSPF HWL, HW1 interface serial0 is published in zone 1, configure commands under the OSPF process nssa default-route-advertise, based on the previous description, infers which of the following options are correct?

A.

When HW1 injects a default route into Zone 1, HW1's local route table can not contain a single default route

B.

HW1 injects a Type 7 default route into Zone 0

C.

HW1 injects a type 7 default route into zone 1

D.

HW1 injects a Type 3 default route into Zone 1

E.

When HW1 injects a default route into zone 1, HW1's local route table needs to answer the default route

Full Access
Question # 89

Regarding the mpLS handling mode of TTL, is the following description correct?

A.

Pipe mode. When an IP message passes through the MPLS network, the IPTTL minus 1 is mapped to the WLSTTL field at the incoming node.

B.

The TTL in the B. MPLS label has the same meaning as the TTL field in the head. TTL prevents mpLS networks from developing bad routing.

C.

Unifore style, when an IP packet passes through the MPLS network, the IPTTL of the incoming node is minus l. The MPLS TTL field is a fixed value.

D.

In MPLSVPI, if you need to hide the structure of the MPLS backbone network, you can use Uniform mode on Ingress for private network messages .

Full Access
Question # 90

Regarding the certification of the ISIS protocol, there is a correct statement

A.

Connection authentication can realize the authentication of the hello messages of Leve-1 and Leve-2

B.

After configuring the connection authentication, the IIH issued by the router must carry the authentication TLV

C.

After configuring zone authentication, the router issues an IIH, SNP, LSP—strap-to-tape authentication TLV

D.

The two routers are configured for area authentication and interface authentication, and the passwords are the same, so the two can establish an isocopied relationship

Full Access
Question # 91

Regarding the tag space for MPLS, the description is incorrect

A When the penultimate hop LSR performs a label swap, if the swapped tag value is found to be

B. the tag is popped up by default and the message is sent to the last hop

C. Above 1024 is the tag space shared by dynamic signaling protocols such as LDP, RSVP-TE, MP-BGP, etc

D. 16-1023 is a label control shared by static LSPs and static CR-LSPs

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 26 Sep 2022