لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Assume that a company's headquarters network and branch networks are connected through the Internet. Which of the following VPN technologies is most capable of ensuring secure and reliable data transmission between the headquarters and branches?
A. SL VPN
B. Psec VPN
C. 2TP VPN
D. PLS VPN
عرض الإجابة
اجابة صحيحة: B
السؤال #2
The GRE tunnel supports the MPLS LDP function.
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #3
In the campus VXLAN network, which of the following equipment is used to connect the Fabric and the external network of the Fabric?
A. Extended
B. Brdercorrect
C. Transparent
D. Edge
عرض الإجابة
اجابة صحيحة: B
السؤال #4
BGP routing policies can control the publication and acceptance of routes
A. TRUEcorrect
B. FLASE
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which of the following parameters is not included in an IPsec security association (SA)?
A. Security parameter index (SPI)
B. Destination IP address
C. Source IP addresscorrect
D. Security protocol ID (AH or ESP)
عرض الإجابة
اجابة صحيحة: C
السؤال #6
In a virtualized campus network scenario deployed through iMaster NCE-Campus, some key parameters need to be configured when configuring the authorization results for access authentication. Which of the following does not include?
A. Authorized security groups
B. Authorization result name
C. Binding site
D. Bind authentication rulescorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Which of the following descriptions about Prefix Segmente is incorrect?
A. On Huawei devices, Prefix Segment ID supports manual configuration and automatic protocol configuration
B. Prefix Segment is identified by Prefix Segment ID (SID)
C. Prefix Segment is used to identify a destination address prefix in the network
D. Prefix Segment spreads to other network elements through IGP protocol, globally uniquecorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #8
In BGP/MPLS IP VPN deployment, the address space of a site that is shared by two VPNs must not overlap with the address spaces used by other sites of the two VPNs, there is no any risk in this scenario.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #9
The following statement about the NSSA area is correct (multiple choice).
A. In the NSSA area where the OSPF neighbor sends hello packets, the N position 0, E within the option field Position 1
B. The NSSA zone must automatically generate a default LSA to access the external network
C. The NSSA zone generates a Category VII LSA to advertise external routing, and the FA address in the Category VII LSA acts to prevent loops
D. In the OSPF neighbor in the NSSA region sends hello packets, position 1 within the option field, position Ecorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #10
In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correct
A. ASBR-Sunmary-LSA is allowed to be published to the NSSA region
B. AS-External-LSA is allowed to be published to the Stub region
C. Any OSPF zone can be configured as a special zone
D. Zone can be equipped with zhiyicorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #11
For the same MAC address, a manually con?gured MAC entry has a higher priority than an automatically generated MAC entry.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #12
In the campus network, in order to facilitate the management of servers, printers, video surveillance and other equipment, which of the following methods is recommended for address allocation?
A. DHCP dynamically obtains a non-fixed IP address
B. Use BOOT protocol to dynamically obtain an IP address
C. Use PPPoE authentication and perform address binding during authorization
D. DHCP static address allocation based on MAC addresscorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #13
There are three different roles in strategic linkage. Which of the following is not a role defined in strategic linkage?
A. Authentication execution point
B. Authentication Control Point
C. Policy execution pointcorrect
D. Terminal
عرض الإجابة
اجابة صحيحة: C
السؤال #14
As shown in the figure, PE1 and PE2 exchange private network route information with their respective CEs through OSPF, and the same domain ID is configured on PE1 and PE2. Which of the following LSA types may be transmitted to CE2 when PE2 imports BGP routes to the OSPF process?
A. ype 1 LSA
B. ype 3 LSA
C. ype 5 LSA
D. ype 7 LSA
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Segment Routing (SR) is a technical architecture designed to forward data packets on a network based on the source routing paradigm. SR-MPLS, as its name suggests, is SR based on MPLS label forwarding.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which of the following descriptions about the purpose of configuring LSP fragmentation on IS-IS equipment is correct?
A. Prevent the device from learning IS-IS routing information
B. Without any practical purpose
C. Prevent the device from establishing IS-IS neighbors
D. Allow the device to support more IS-IS routing entriescorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #17
By default, the domain ID of an OSPF process is the same as the process ID. You can run the domain-id command in the OSPF process view to change a domain ID.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #18
As a network administrator, which of the following protocols can I use for network device configuration?
A. SSHcorrect
B. NETCONFcorrect
C. LLDP
D. SNMPcorrect
عرض الإجابة
اجابة صحيحة: ABD
السؤال #19
According to different network conditions, Layer 2 Portal authentication or Layer 3 Portal1 authentication can be deployed in the network. Which of the following descriptions is wrong?
A. When there is a Layer 2 network between the client and the access device, that is, the client and the access device are directly connected (or only Layer 2 devices exist between them), then Layer 2 Portal authentication can be configured
B. When using Layer 2 authentication, the access device can learn the MAC address of the client, and the access device can only use the MAC address to identify the usercorrect
C. When there is a Layer 3 network between the client and the access device, that is, there is a Layer 3 forwarding device between the client and the access device, you need to configure Layer 3 Portal authentication
D. When using Layer 3 authentication, the access device can learn the IP address of the client and use the IP address to identify the user
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Network admission control can be deployed at di?erent network layers based on actual network requirements. Deploying it at the access layer can achieve more granular permission management and higher network security than doing so at the aggregation or core layer.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Is the following description of ospf virtual links correct?
A. A virtual connection can be established in any area, after which it itself belongs to the region
B. The virtual connection ip is used as the link address
C. Virtual links can be used to solve the problem of zone 0 being segmentedcorrect
D. The cost of a virtual connection is zero and is the optimal link
عرض الإجابة
اجابة صحيحة: C
السؤال #22
When there are multiple redundant links in the IS-IS network, there may be multiple equal-cost routes. Which of the following descriptions about equal-cost routing in an IS-IS network is wrong?
A. When the number of equal-cost routes in the network is greater than the number configured by the command, and these routes have the same priority, the route with the larger system ID of the next hop device is preferred for load balancing
B. If load balancing is configured, the traffic will be evenly distributed to each link
C. After the equal-cost route priority is configured, when the IS-IS device forwards the traffic reaching the destination network segment, it will not adopt the load balancing method, but forward the traffic to the next hop with the highest prioritycorrect
D. For each route in the equal-cost route, a priority can be specified, the route with the highest priority will be preferred, and the rest will be used as backup routes
عرض الإجابة
اجابة صحيحة: C
السؤال #23
In a scenario where BGP EVPN is used to dynamically establish a VXLAN tunnel, which of the following statements is incorrect when EVPN Type 2 is used to advertise host ARP entries and IP routes?
A. Both host ARP entries and IP routes carry MAC addresses
B. Both host ARP entries and IP routes carry host IP addresses
C. Both host ARP entries and IP routes carry L2VNIs
D. Both host ARP entries and IP routes carry L3VNIs
عرض الإجابة
اجابة صحيحة: D
السؤال #24
Based on the information given in the figure, which of the following descriptions is correct?
A. R4 and ee8c
B. R4 does not have any IS-IS neighbors
C. R4 and ee8c
D. R4 and ee8c a0c2
عرض الإجابة
اجابة صحيحة: A
السؤال #25
There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute? (Confirmed).
A. 300 4200correct
B. 1234 1400correct
C. 3100correct
D. 100correct
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #26
In Huawei SD-WAN Solution, atter a CPE goes online, it automatically selects an RR without the help of iMaster NCE-WAN.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #27
After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?
A. Send an alert
B. The MAC address blocks
C. Interface blocking
D. Traffic filteringcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #28
In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?
A. ype 1
B. ype 2
C. ype 3
D. ype 4
عرض الإجابة
اجابة صحيحة: B
السؤال #29
In the topology shown in the following figure, OSPFv3 runs on the entire network. If no external routes are imported, which of the following types of LSAs will not be generated on R1?
A. Inter-Area-Router LSA
B. Link- LSA
C. Intra-Area-Prefix- LSA
D. Inter-Area-Prefix- LSAcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #30
The default priority of VRRP devices in the backup group is?
A. 0
B. 100correct
C. 150
D. 200
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: