لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Is the following description of ospf virtual links correct?
A. A virtual connection can be established in any area, after which it itself belongs to the region
B. The virtual connection ip is used as the link address
C. Virtual links can be used to solve the problem of zone 0 being segmentedcorrect
D. The cost of a virtual connection is zero and is the optimal link
عرض الإجابة
اجابة صحيحة: C
السؤال #2
When an SSH client logs in to the SSH server that is con?gured only with user name and password authentication in SSH mode, the key exchange phase is not involved (no key is generated).
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #3
YANG, deriving from NETCONF, is not only applicable to NETCONF. Currently, both the YANG modeling language and YANG ?le have been uni?ed.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #4
The switch can suppress traffic by suppressing traffic and extremely other failures can affect operations, which of the following traffic suppression configurations is the wrong configuration
A. [Quidway] wan 10 [Quidway-wan10] multicast-suppression 1000 [Quidway-van10] quitcorrect
B. [Qudway ineface gigabtethemnet /0'1 [Quidway-GigabitEfthemetO0/O/1] multicast-suppression 80TQuidway-GigabitEthernet0/0/1]quit
C. Quidway inteface gigabiethenet ou0/1 [Quidway-GigabtEthernet/0/1], broadcast-suppression 80 IQuidway-GigabitEthernet//1]Jqut
D. [Quidway] icmp rate-limit enable [Quidway] icmp rate-limit total threshold 20
E. [Quidway ] wan 10 [Quidway-wani0] broadcast-suppression 1000 [Quidway-van10] quit
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which of the following is the drop probability of packets exceeding the upper threshold in WRED?
A. 0
B. 0
C. 0
D. 1correct
عرض الإجابة
اجابة صحيحة: D
السؤال #6
When deploying virtual networks on iMaster NCE-Campus, you need to configure authentication and authorization after creating user accounts. Which of the following does not need to be configured?
A. uthentication rule
B. uthentication result
C. uthorization result
D. uthorization rule
عرض الإجابة
اجابة صحيحة: D
السؤال #7
The OSPF-based SR-MPLS function is enabled on all routers in a network. The SREB of each router is shown in the figure. By default, when R3 forwards a packet whose destination address is 10.0.4.4, which of the following MFLS labels is carried item?
A. 3
B. 100
C. 40100
D. 50100correct
عرض الإجابة
اجابة صحيحة: D
السؤال #8
If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?
A. PIM routers with long interface masks are elected dr
B. Compare the DR priority first; With the same priority, you need to compare the interface IP addresses of the PIM routers to elect drcorrect
C. PIM routers with small IP addresses are elected D
D. PIM routers with low
E. DR priority values are elected D
عرض الإجابة
اجابة صحيحة: B
السؤال #9
The following is a part of the NETCONF protocol message, Where is it located in the NETCONF architecture layer?
A. Transport layer
B. Message layercorrect
C. Content Layer
D. Operation layer
عرض الإجابة
اجابة صحيحة: B
السؤال #10
To prevent hackers from attacking user devices or networks using MAC addresses, you can con?gure MAC addresses of untrusted users as blackhole MAC addresses to ?lter out such invalid MAC addresses. When receiving a packet whose source or destination MAC address is a blackhole MAC address on a device, the device discards the packet.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #11
To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter
A. FALSE
B. TRUEcorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #12
SR-MPLS Policy can use BGP extension to transmit tunnel information, as shown in the figure. Among them, SR-MPLS Policy is optimized by which of the following parameters?
A. Priority
B. Preference
C. Weightcorrect
D. Binding SID
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which of the following BGP routing attributes cannot control BGP route selection?
A. Originator ID
B. MED
C. AS_Path
D. Communitycorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which of the following are key technologies used to implement SRv6 Policies based on Huawei’s CloudWAN solution architecture?
A. GP-LS
B. GP IPv6 SR Policy
C. CEP
D. ETCONF
عرض الإجابة
اجابة صحيحة: B
السؤال #15
In the dual-system hot backup scenario of the firewall, the heartbeat interface can be directly connected physically, or it can be connected through an intermediate device such as a switch or router.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #16
NCE-Campus. The figure shows the configured policy control matrix. Which of the following statements about the policy control matrix is incorrect?
A. The guest group can access the guest group
B. If the server group is a resource group, the server group can be specified as the source group of a policy
C. The sales group and guest group cannot communicate with each other
D. If the policy enforcement point does not find the security group corresponding to an IP address, traffic from the IP address can be forwarded to the server group
عرض الإجابة
اجابة صحيحة: D
السؤال #17
What of the following actions can enable fast failure detection on multicast networks?
A. Shorten the Holdtime of Join/Prune messages
B. Reduce the interval at which the interface sends Hello messagescorrect
C. A PIM BFD session is established between neighbors
D. Reduce the interval between sending Join/Prune messages
عرض الإجابة
اجابة صحيحة: B
السؤال #18
When the switch is deployed with DHCP option 148, which of the following information will not be provided by the DHCP server to the switch to be deployed?
A. The IP address of the cloud management platform
B. The port number of the cloud management platform
C. The port number of the device to be deployed
D. The IP address of the device to be deployedcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Part of the configuration of device H is as shown in the figure. Which item is wrong in the following description of this configuration?
A. Configure GigabitEthernet0/0/1 interface as a trusted interface
B. Enable DHCP Snooping configuration to prevent ARP spoofing attackscorrect
C. If the DHCP request message received by the GigabitEthernet0/0/1 interface does not contain the SubOption information of Option82, the device will generate Option82 and insert it into the message
D. Enabling DHCP Snooping configuration can be used to prevent DHCP Server bogus attacks
عرض الإجابة
اجابة صحيحة: B
السؤال #20
When there is a relay device between the DHCP client and the server, if the IP address in the global address pool of the DHCP server is not in the same network segment as the IP address of the VLANIF interface connected to the client on the relay device, it will cause a DHCP failure.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which of the following descriptions of BGP/MPLS IP VPN network architecture is wrong?
A. The P device only needs to have basic MPLS forwarding capabilities and does not maintain VPN related information
B. Under normal circumstances, CE devices are not aware of the existence of VPN, and CE devices do not need to support MPLS, MP-BGP, etc
C. The BGP/MPLS IP VPN network architecture consists of three parts: CE (Customer Edge), PE (Provider Edge) and P (Provider)
D. Sites can access each other through VPN, and a site can only belong to one VPcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #22
SSH must be con?gured before you can enable NETCONF on Huawei network devices.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #23
For telemetry data push, data can be transferred between devices and collectors using the TLS protocol. TLS must be con?gured for data encryption if data is pushed based on gRPC.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which of the following regular expressions can match only the BGP route entries that pass through AS300 and then AS200?
A. ^200|^300
B. 200$|300$
C. _200 (200 300) _correct
D. _200[200 300]_
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Network slicing technology can divide exclusive network resources in the network to carry high-value service traffic. Which of the following descriptions about network slicing is wrong?
A. The channelized sub-interface technology adopts single-layer scheduling to realize flexible and refined management of interface resources and provide bandwidth guaranteecorrect
B. Generally, network slicing can be realized based on the channelized sub-interface FlexE technology
C. The layer used by the network slicing technology is different from that of the SR tunnel, and can be used at the same time as the SR tunnel
D. FlexE technology divides resources according to TDM time slots, satisfies the requirements of exclusive resource sharing and isolation, and realizes flexible and refined management of interface resources
عرض الإجابة
اجابة صحيحة: A
السؤال #26
In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN network
A. NVE interface
B. VXVAN L2 Gatewaycorrect
C. VXLAN L3 Gateway
D. VLANIF interface
عرض الإجابة
اجابة صحيحة: B
السؤال #27
In the virtualized campus network deployed through ilMaster NCE-Campus, some key parameters need to be configured in the authorization rules for access authentication. Which of the following is not included?
A. Binding authentication rules
B. Access methodcorrect
C. Bind the authorization result
D. Authorization Rule Name
عرض الإجابة
اجابة صحيحة: B
السؤال #28
As shown in the figure, which of the following descriptions is wrong? The packet information of VLAN configuration delivered by NETCONF protocol is as follows:
A. The purpose of this NETCONF message is to create VLAN 10 on the device
B. The tag indicates the configuration library used by the NETCONF message
C. indicates that the function of the message is to modify, create or delete configuration data
D. means modify the existing or non-existing target data in the configuration database, create if the target data does not exist, and modify if the target data exists
عرض الإجابة
اجابة صحيحة: B
السؤال #29
As shown in the figure, if you want to allow only legal users (users who obtain IP addresses through a legal DHCP server or specific static IP users) to access the network in the network, which of the following solutions can be used?
A. DAI+IPSG
B. DHCP Snooping+DAI
C. DAI+Port Security
D. DHCP Snooping+IPSGcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #30
In the use of the CP protocol, the following description is correct?
A. The Eth-Trunk interface can be avoided by frequent oscillation interfaceeth-trunkllacppreemptenablelacppreemptdelaydelay-time by following commandcorrect
B. Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip
C. A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
D. The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: