Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Huawei H12-821_V1.0 HCIP-Datacom-Core Technology V1.0 Exam Practice Test

Page: 1 / 30
Total 299 questions

HCIP-Datacom-Core Technology V1.0 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A large number of routes typically exist in a BGP routing table, and transmitting such extensive routing information brings a heavy burden to a device. In order to address this problem, it is necessary to filter those routes to be advertised. You can configure a device to advertise only necessary routes or those that its peers require.

Options:

A.

TRUE

B.

FALSE

Question 2

BFD for OSPF is deployed on a directly connected link. If the physical link is disconnected, drag the following BFD processes to the corresponding sequence numbers.

Options:

Question 3

STAs stay on different subnets before and after Layer 3 roaming. To enable the STAs to access the original network after roaming, network engineers need to configure user traffic to be forwarded to the original subnet over a CAPWAP tunnel.

Options:

A.

TRUE

B.

FALSE

Question 4

Which of the following PIM protocol packets have unicast destination addresses.

Options:

A.

Register Stop

B.

Bootstrap

C.

Graft

D.

Assert

Question 5

On a broadcast IS-IS network shown in the following figure, a DIS needs to be elected to create and update pseudonodes. Which of the following routers is elected as the DIS?

Options:

A.

R1

B.

R3

C.

R4

D.

R2

Question 6

When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.

Options:

A.

TRUE

B.

FALSE

Question 7

Both MQC and PBR can be applied on device interfaces to filter received and sent packets or control packet forwarding paths.

Options:

A.

TRUE

B.

FALSE

Question 8

An IP prefix list is configured on a router using the following command:

ip ip-prefix huawei index 10 permit 10.1.1.0 24 greater-equal 26

In this case, the value of greater-equal-value is ____, and the value of less-equal-value is ____.

Options:

Question 9

Which of the following statement regarding the display ospf peer command output is true?

Options:

A.

Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1.

B.

Through negotiation during DD packet exchange, the local end becomes the slave.

C.

Router ID indicates that the local router ID Is 10.1.1.1.

D.

The DR address is 10.1.1.1

Question 10

Which command is used to configure the VRRP preemption delay?

Options:

A.

vrrp vrid 1 timer delay 20

B.

vrrp vrid 1 preempt-delay 20

C.

vrrp vrid 1 preempt-mode timer delay 20

D.

vrrp vrid 1 preempt-timer 20

Question 11

What parameters can a DHCP6 server assign to a DHCPv6 client?

Options:

A.

Gateway address

B.

DNS server address

C.

IPV6 address/prefix

D.

SNTP server address

Question 12

Which of the following statements about WLAN roaming are false?

Options:

A.

APs with which a STA is associated before and after roaming can work on different channels.

B.

During roaming, the STA sends a Reassociation Request frame containing home AP information to the foreign AP.

C.

During roaming, the STA sends an Association Request frame containing home AP information to the foreign AP.

D.

APs with which a STA is associated before and after roaming must work on the same channel.

Question 13

STP ensures a loop-free network but has a slow network topology convergence speed, affecting communication quality. RSTP has made some improvements based on STP. Which of the following improvements is not included?

Options:

A.

If a port does not receive configuration BPDUs from the upstream device within four Hello intervals, the switch considers that the negotiation with the neighbor fails.

B.

The non-root switch running RSTP sends configuration BPDUs at the interval specified by the Hello timer, which is performed independently by each device.

C.

RSTP reduces five port states to three port states based on user traffic forwarding and MAC address learning.

D.

RSTP deletes three port states and adds two port roles.

Question 14

NETCONF is a network configuration protocol that automates network configuration in a programmable manner, simplifying and accelerating network service deployment. Which of the following operations can be performed by using this protocol?

Options:

A.

Modifying configurations

B.

Deleting configurations

C.

Restoring configurations

D.

Backing up configurations

Question 15

Which of the following statements is false about the default processing of the next hop address when a BGP device advertises a route?

Options:

A.

When advertising a locally originated route to an IBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

B.

When advertising a non-labeled route received from an EBGP peer to an IBGP peer, a BGP device changes the next hop address to the IP address of its interface connected to the IBGP peer.

C.

When advertising a route to an EBGP peer, a BGP device sets the next hop address to the IP address of its interface connected to the peer.

D.

A BGP device does not change the next hop address of a route if the route is received from an IBGP peer and is to be sent to another IBGP peer.

Question 16

To prevent inter-area routing loops, OSPF does not allow advertising routing information between two non-backbone areas and allows sing routing information only within an area or between the backbone area and a non-backbone area. Therefore, each ABR must be connected to the backbone area.

Options:

A.

TRUE

B.

FALSE

Question 17

GRE is a VPN technology that can implement packet transmission over heterogeneous networks. Which of the following statements are true about GRE?

Options:

A.

GRE is a Layer 2 VPN encapsulation technology.

B.

GRE enables encapsulated data packets to be transmitted over another network layer protocol, but cannot encapsulate multicast data.

C.

GRE tunnels can work with IPsec to ensure the security of multicast services such as voice and video.

D.

GRE tunnels can extend the working range of network protocols with hop limits.

Question 18

Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. Which of the following statements is true?

Options:

A.

The LSDB of R2 does not contain the LSP of R4.

B.

The LSDB of R1 does not contain the LSP of R4.

C.

The LSDB of R2 does not contain the LSP of R3.

D.

The LSDB of R3 does not contain the LSP of R4.

Question 19

ASPF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications.

Options:

A.

TRUE

B.

FALSE

Question 20

The Next_Hop attribute in BGP records the next hop of a route. Similar to the next hop in an IGP, the Next_Hop attribute in BGP must be the IP address of a peer interface.

Options:

A.

TRUE

B.

FALSE

Question 21

ACLs are a common tool for matching routes. ACLs are classified into multiple types based on ACL rule functions. An ACL can be identified by a number, and the number range for each type of ACLs is different. Which of the following type of ACLs are numbered from 4000 to 4999?

Options:

A.

User-defined ACL

B.

Basic ACL

C.

Layer 2 ACL

D.

Advance ACL

Question 22

A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.

Options:

A.

TRUE

B.

FALSE

Question 23

During the DHCP interaction process, the DHCP server and client exchange various types of packets. Which of the following packets is not sent from the client to the server?

Options:

A.

DHCP Release

B.

DHCPNAK

C.

DHCP Request

D.

DHCP Discover

Question 24

On an OSPF network, all OSPF routers generate Router LSAs. If the E bit in a Router LSA is set to 1, the router that generates this LSA is a/an ______.

Options:

A.

ABR

B.

IR

C.

ASBR

D.

DR

Question 25

In an IPv4 address space, Class D addresses are used for multicast. Among Class D addresses, which of the following is the permanent group address range reserved for routing protocols?

Options:

A.

232.0.0.0 to 232.255.255.255

B.

239.0.0.0 to 239.255.255.255

C.

224.0.0.0 to 224.0.0.255

D.

224.0.1.0 to 231.255.255.255

Question 26

On an OSPF network, an IR in area 0 must be a BR, but an ASBR may not be an ABR.

Options:

A.

TRUE

B.

FALSE

Question 27

Which of the following configurations are not mandatory when an administrator configures VRRP?

Options:

A.

Preemption mode

B.

Preemption delay

C.

Virtual router priority

D.

Virtual IP address

Question 28

A forwarding information database (FIB) can directly guide packet forwarding on a router.

Options:

A.

TRUE

B.

FALSE

Question 29

On an RSTP network, port priorities may be compared during root port or designated port election. Which of the following values is the default priority of a port on a Huawei switch?

Options:

A.

1

B.

128

C.

4096

D.

32768

Question 30

Which of the following statements are true about the packet filtering firewall?

Options:

A.

The packet filtering firewall can analyze associated packets to improve security.

B.

The packet filtering firewall supports per-packet detection.

C.

The packet filtering firewall can check application-layer data.

D.

The packet filtering firewall filters data packets based on ACLs.

Question 31

Regarding the route-policy set-cost configuration below, which of the following statements is true?

Options:

A.

The route 11.1.0.0/16 is permitted by node 10, and its tost Is set to 300.

B.

The cost of all routes is set to 200.

C.

All the routes that are not permitted by node 10 will be denied.

D.

The route 11.1.0.0/16 will continue to match node 20 after permitted by node 10, and (he final cost is set to 200.

Question 32

As shown in the figure, VRRP is associated with a BFD session. When a backup device detects a fault through BFD, the backup device immediately assumes the master role after the Master_Down_Timer timer expires.

Options:

A.

TRUE

B.

FALSE

Question 33

Which of the following statements about WLAN roaming are true?

Options:

A.

APs for roaming do not need to have overlapping signal coverage.

B.

APs for roaming must be in the same extended service set (ESS).

C.

APs for roaming must have overlapping signal coverage.

D.

APs for roaming must be in the same basic service set (BSS).

Question 34

Access control lists can be classified into which types as follows?

Options:

A.

Basic ACL

B.

User-defined ACL

C.

Advanced ACL

D.

Layer 2 ACL

Question 35

On an OSPF network, one router with P2P as the network type is directly connected to another router with P2MP as the network type. If the Hello intervals on the two routers are changed to be the same, neighbor relationship establishment and LSDB synchronization are not affected.

Options:

A.

TRUE

B.

FALSE

Question 36

RSTP provides different functions in different scenarios. Which of the following statements Is false?

Options:

A.

After TC-BPDU attack defense function is enabled, you can set the number of times the switch processes TC BPDUs within a certain period

B.

The role of the designated port that is enabled with root protection cannot be changed

C.

If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation

D.

When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state

Question 37

On an OSPF network, if a router functions as an ABR, the router must also be a BR.

Options:

A.

TRUE

B.

FALSE

Question 38

A filter named si is configured on a device using the as-path-filter command and is applied to a specified BGP peer. The detailed configurations are as follows:

csharp

Copy

[SW1] ip as-path-filter si permit _65500$

[SW1] bgp 65100

[SW1-bgp] ipv4-family unicast

[SW1-bgp-af-ipv4] peer 10.1.1.2 as-path-filter si import

After the configuration is complete, which of the following statements is true about the way the local device processes the routes received from the peer?

Options:

A.

It accepts only the routes whose AS_Path contains AS 65500.

B.

It accepts only the routes originated from AS 65500.

C.

It accepts only the routes that last pass through AS 65500.

D.

It accepts only the routes forwarded by AS 65500.

Question 39

Similar to the OSPF DR, the IS-IS DIS needs to be elected on a broadcast network. However, the OSPF DR is preemptive by default, whereas the IS-IS DIS is not preemptive by default.

Options:

A.

TRUE

B.

FALSE

Question 40

See the following figure. All routers on the network run IS-IS and are in area 49.0001. By referring to the LSDB of R1, the Level-2 DIS is. (Enter the device name, for example, R1.)

Options:

Question 41

The Neighbor Discovery Protocol (NDP) is an important basic protocol in the IPv6 protocol suite and plays an important role. Which of the following functions and features does it support?

Options:

A.

Address resolution

B.

Neighbor state tracing

C.

Duplicate address detection

D.

Redirection

Question 42

When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements is false about BFD optimization?

Options:

A.

After a high priority is configured for BFD packets, BFD packets are preferentially forwarded.

B.

To quickly learn about the network status and performance requirements, you can set the interval for sending BFD packets to the minimum value.

C.

On a live network, some devices switch traffic only when a BFD session changes to the Up state. If a routing protocol goes Up later than an interface, no route is available for switching traffic back, leading to traffic loss. To resolve this issue, configure a delay to compensate for the time difference caused when the routing protocol goes Up later than the interface.

D.

If a BFD session flaps, master/backup switchovers are frequently performed on the application associated with the BFD session. To prevent this, set the WTR time of the BFD session.

Question 43

According to BGP route selection rules, the route with the higher Local_Pref is preferred.

Options:

A.

TRUE

B.

FALSE

Question 44

ACLs are a common matching tool in routing policies. An ACL can be configured on a router to match routes.

Options:

A.

TRUE

B.

FALSE

Question 45

When two routers exchange LSDB information using DD packets, a master/slave relationship is formed first, the router with a larger router ID is the master, and determine the MS bit.

Options:

A.

TRUE

B.

FALSE

Question 46

A router performs a lookup in its FIB table for a packet. If the tunnel ID in the matching entry is 0, the packet needs to be forwarded through a tunnel, such as an MPLS tunnel.

Options:

A.

TRUE

B.

FALSE

Question 47

To overcome the disadvantages of STP, RSTP changes the format of configuration BPDUs. Which of the following fields in STP BPDUs is used to specify the port role?

Options:

A.

Flags

B.

BPDU Type

C.

PID

D.

PVI

Question 48

Which of the following statements is true about BGP?

Options:

A.

If the export routing policy applied to a BGP peer changes, manual intervention is required so that the device resends Update messages to the peer.

B.

IGP routes can be converted into BGP routes only through the network command.

C.

A router cannot be configured with multiple BGP processes.

D.

Open messages carry only the BGP header.

Question 49

On an IS-IS network, two directly connected routers establish a neighbor relationship through the three-way handshake mechanism by default, regardless of whether the network type is P2P or broadcast.

Options:

A.

TRUE

B.

FALSE

Question 50

After a BGP device establishes a peer relationship, it advertises routes. Which of the following statements are true about BGP route advertisement?

Options:

A.

Routes obtained from EBGP peers are advertised to all peers.

B.

When routes are updated, the BGP device sends all BGP routes.

C.

When there are multiple valid routes to the same destination, a BGP device advertises only the optimal route to its peers.

D.

Routes obtained from an IBGP peer are not sent to other IBGP peers.

Question 51

Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.

Options:

A.

TRUE

B.

FALSE

Question 52

In IP multicast transmission, packets are transmitted from a source to a group of receivers. Which of the following statements are true about IP multicast technologies?

Options:

A.

Compared with broadcast, IP multicast prevents information flooding.

B.

Compared with broadcast, IP multicast effectively conserves network bandwidth.

C.

Compared with unicast, IP multicast improves information transmission security.

D.

Compared with unicast, IP multicast increases the load of information sources.

Question 53

The Interface \P address and VRRP virtual IP address can be the same.

Options:

A.

TRUE

B.

FALSE

Question 54

As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.

Options:

A.

TRUE

B.

FALSE

Question 55

Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?

Options:

A.

Users cannot receive multicast data because the device forwards received IGMP Report messages only to router ports and does not generate group member ports or forwarding entries.

B.

Users cannot receive multicast data, but the device generates forwarding entries after receiving IGMP Report messages.

C.

The IGMP snooping version of the device is automatically degraded, and users can receive multicast data properly.

D.

The IGMP versions of the hosts are automatically upgraded, and users can receive multicast data properly.

Question 56

Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?

Options:

A.

80

B.

50

C.

40

D.

30

Question 57

Depending on the type of algorithms used, routing protocols are classified into distance-vector protocols and link-state protocols. Which of the following routing protocols are link-state protocols?

Options:

A.

RIP

B.

OSPF

C.

IS-IS

D.

BGP

Question 58

OSPF networks are classified into broadcast, P2P, P2MP, and NBMA networks. Which of the following types of networks use the default Hello time (30s)?

Options:

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Question 59

By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.

Options:

A.

TRUE

B.

FALSE

Question 60

Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?

Options:

A.

Multiple values can be configured for a single matching condition, and the values are logically ANDed.

B.

If a security policy contains multiple matching conditions, the relationship between them is AND.

C.

The system has a default security policy named default, where all matching conditions are any and the default action is permit.

D.

When multiple security policy rules are configured, they are sorted in a list by configuration sequence by default. A security policy rule configured earlier is placed higher in the list and has a higher priority.

Question 61

An IP prefix list is a common matching tool in routing policies. When an IP prefix list is configured on a Huawei router, which of the following parameters are optional?

Options:

A.

Index of the prefix list

B.

Longest mask length to be matched

C.

Shortest mask length to be matched

D.

Mask length

Question 62

The traffic limiting policy feature only supports the number of connections initiated by the specified IP or the number of connections received.

Options:

A.

TRUE

B.

FALSE

Question 63

When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?

Options:

A.

1.1.1.1/26

B.

1.1.1.2/16

C.

1.1.1.1/32

D.

1.1.1.1/24

Question 64

Which of the following statements about stack split is false?

Options:

A.

After a stack splits, the MAC addresses of the two stacks change immediately.

B.

If the master and standby switches are still in the same stack after the stack splits, the slave switches separated from the original master and standby switches re-elect the master and standby switches due to protocol packet timeout.

C.

If the master and standby switches are in two stacks after the split, the stack where the original master switch resides updates the topology and selects a new standby switch. The original standby switch becomes the master switch in the new stack and a new standby switch is elected.

D.

After a stack splits, multiple stacks have the same IP address and MAC address. To prevent network faults, the stacks perform MAD detection. The stack that fails the MAD detection shuts down all physical ports except reserved ports.

Question 65

The following figure shows a campus network. IS-IS is configured on all routers, and the network runs normally.

By default, which of the following routers have specific routes on the entire network?

Options:

A.

R2

B.

R3

C.

R1

D.

R7

Question 66

On an OSPF network, if two indirectly connected routers with the same router ID run in the same area, Type 1 LSA calculation fails.

Options:

A.

TRUE

B.

FALSE

Question 67

On the OSPF network shown in the figure, R1, R2, and R3 run OSPF, and R1 advertises four VPN routes to OSPF. A filter-policy needs to achieve the following goal: R1's and R3's routing tables contain the routes to 192.168.3.0/24, but R2's routing table does not. Which of the following filter-policies cannot meet this requirement?

Options:

A.

A filter-policy on R2 for filtering received routes

B.

A filter-policy on R2 for filtering the routes to be advertised

C.

A filter-policy on R1 for filtering the routes to be imported

D.

A filter-policy on R1 for filtering the imported routes to be advertised

Question 68

Which of the following statements is false about BFD?

Options:

A.

The asynchronous mode is the primary BFD operating mode.

B.

In asynchronous mode, two systems periodically exchange BFD Control packets at the negotiated interval. If one system does not receive any BFD Control packets from the other within the detection interval, the BFD session is declared down.

C.

The asynchronous mode does not support the echo function.

D.

In demand mode, after a BFD session is set up, the system does not periodically send BFD Control packets.

Question 69

An engineer sets the CAPWAP heartbeat detection interval to 20 of the active link before an active/standby switchover occurs?

Options:

A.

75s

B.

20s

C.

60s

D.

90s

Question 70

When receiving a packet, a Huawei router matches the packet against ACL rules. The default ACL matching order used by the Huawei router is.

Options:

Question 71

ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?

Options:

A.

If the firewall security policy permits packets to pass, the session table is created.

B.

By default, when status detection is disabled and the permit policy is configured packets can pass.

C.

Packets must pass the firewall, and a session table is established.

D.

If the firewall security policy permits packets to pass, the packets can pass the firewall.

Question 72

On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?

Options:

A.

10.1.4.0/24

B.

10.1.3.0/24

C.

10.1.2.0/24

D.

10.1.1.0/24

Question 73

On an OSPF or IS-IS network, the filter-policy import command can be run on a router to filter out the LSAs forwarded by its neighbors.

Options:

A.

TRUE

B.

FALSE

Question 74

On Huawei switches, which of the following planes provides network information and forwarding entries that are mandatory for data plane forwarding?

Options:

A.

Forwarding plane

B.

Control plane

C.

Data plane

D.

Monitoring plane

Question 75

Which of the following statements is false about the session table mechanism on firewalls?

Options:

A.

Generally, the default session aging time of the system can be used. To change the aging time, you need to estimate and determine the traffic type and number of connections on the network.

B.

The fast session aging function also takes effect for persistent connection sessions.

C.

A created session entry needs to be matched by packets constantly.

D.

When stateful inspection is disabled, the firewall still creates session tables for non-first packets. This allows services to run properly without the need to enable the persistent connection function.

Question 76

On a network, some switches are enabled with RSTP and some switches are enabled with STP. What will happen?

Options:

A.

A Huawei switch changes from RSTP to STP. After the STP-enabled switch is removed from the network, the RSTP-enabled switch can be moved back to the RSTP mode.

B.

A Huawei switch changes its mode from STP to RSTP. After the RSTP-enabled switch is removed from the network, the STP-enabled switch can be moved back to the RSTP mode.

C.

STP and RSTP are compatible with each other, but the rapid convergence of RSTP is unavailable.

D.

STP and RSTP calculation are performed independently.

Question 77

There are two types of BGP peer relationships: EBGP and IBGP. When configuring EBGP, ensure that the peer IP address is routable and the UDP connection can be correctly established.

Options:

A.

TRUE

B.

FALSE

Question 78

On an OSPF network, interfaces are classified into four types based on link layer protocols. Which of the following types can interfaces on an IS-IS network be classified into based on physical links?

Options:

A.

P2P

B.

Broadcast

C.

P2MP

D.

NBMA

Question 79

On an OSPF network, Type 7 LSAs can be generated only by ASBRs in NSSAs or stub areas and describe AS-external routes.

Options:

A.

TRUE

B.

FALSE

Question 80

When creating a single-hop BFD session for the first time, bind the single-hop BFD session to the peer IP address and the local address. To modify a configured BFD session, delete it and create a new one.

Options:

A.

TRUE

B.

FALSE

Question 81

As a next-generation wireless technology, Wi-Fi 6 greatly improves bandwidth rate and performance. Which of the following statements is false about the features of Wi-Fi 6?

Options:

A.

Uses OFDMA technology to achieve high concurrency.

B.

Realizes zero latency, ensuring efficient service running.

C.

Provides high bandwidth, up to 9.6 Gbps.

D.

Uses TWT technology to reduce terminal power consumption.

Question 82

In a route-policy, which of the following BGP attributes can be used in apply clauses?

Options:

A.

MED

B.

AS_Path

C.

Tag

D.

Local-Preference

Question 83

An enterprise uses Huawei routers to deploy an IS-IS network for network-wide communication. An engineer wants to change the interface cost to control route selection. By default, which of the following values is the maximum cost that can be configured?

Options:

A.

67

B.

63

C.

64

D.

68

Question 84

A route-policy can have multiple nodes, and each node can have multiple if-match and apply clauses. Which of the following statements are false?

Options:

A.

The operator between if-match clauses under a node is AND.

B.

The operator between nodes is AND.

C.

The operator between if-match clauses under a node is OR.

D.

The operator between nodes is OR.

Question 85

Compress the 2001:0DB8:0000:C030:0000:0000:09A0 address.

Options:

Question 86

There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.

Options:

Question 87

The IP prefix list configuration on a Huawei router is shown below. Which of the following routes can match this IP prefix list?

bash

Copy

[huawei] ip ip-prefix test index 10 permit 10.0.0.0 8 less-equal 32

Options:

A.

10.1.1.1/32

B.

10.1.1.0/6

C.

10.1.1.0/24

D.

10.0.0.0/16

Question 88

On an OSPF network, if two routers with the same router ID run in different areas and one of the routers is an ASBR, LSA flapping occurs.

Options:

A.

TRUE

B.

FALSE

Question 89

Which of the following statements regarding the LSA age field are true?

Options:

A.

The unit of this field is seconds. In a LSDB, the LS age of a LSA increases with time.

B.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), any router can regenerate an instance of this LSA again.

C.

The unit of this field is seconds. In a LSDB, the LS age of a LSA decreases with time.

D.

If the LS age of a LSA has reached the LSRefreshTime (30 minutes), the originator of this LSA needs to regenerate an instance of this LSA again.

Page: 1 / 30
Total 299 questions