لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?
A. TCP
B. UDPcorrect
C. IP
D. Ethernet
عرض الإجابة
اجابة صحيحة: B
السؤال #2
In the process of establishing an LDP session, the active party will first send Initialization information to negotiate parameters. If the passive party does not accept the negotiated parameters, which of the following messages will be sent?
A. Error Notification Messagecorrect
B. Initialization Message
C. Hell Message
D. Keepalive Message
عرض الإجابة
اجابة صحيحة: A
السؤال #3
As shown in the following figure, R1, R2, R3 establish a neighbor relationship of Level2 The IP routing table for R3 is correct (multiple choice).
A. The 2::/64 route appears in the P route table
B. The 2019:/64 route appears in the IP routing table
C. 2020::/64 The route appears in the IP routing table
D. The 2021/64 route will appear in the IP routing table
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #4
Which of the following descriptions of data encryption methods is wrong?
A. Data encryption methods are divided into symmetric encryption and asymmetric encryption
B. Asymmetric encryption uses public key encryption and private key decryption
C. The keys used in the symmetric encryption algorithm must be exchanged via email, otherwise there is a risk of key leakagecorrect
D. Symmetric encryption algorithms use the same key to encrypt and decrypt data
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, then which class LSA Will it be aggregated?
A. 1 Class LSAcorrect
B. 2 kind LSAcorrect
C. 3 kind LSA
D. 4 kind LSA
E. 5 Class LSA
عرض الإجابة
اجابة صحيحة: AB
السؤال #6
Which of the following items is not involved in dynamic data collection before a migration is performed?
A. SNMP version
B. Routing protocol status
C. ARP entriescorrect
D. Interface status
عرض الإجابة
اجابة صحيحة: C
السؤال #7
According to the information given in the figure, which of the following descriptions of the IPv6 routing information calculated by the R router through ISIS is correct?
A. R4 has no IS-IS routing entry
B. R4 has 2 equal-cost IS-IS default routescorrect
C. R4 has 2 non-equivalent IS-1S default routes
D. R4 has 1 1S-IS default route
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A switch joins a running stacking system after powering up, a behavior known as heap overlay.
A. ATRUE
B. BFALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #9
As shown in the figure, PE1 enables the SR-MPLS function based on OSPF. Based on this, it can be inferred that the label when PE1 forwards the data packet to 10.0.3.3 is?
A. 24001
B. 24004
C. 24003correct
D. 3
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Fabric nodes need to be planned during fabric design on a CloudCampus virtualized campus network. Which of the following statements about node planning on a fabric is incorrect?
A. It is recommended that core devices be deployed as border nodes, and access or aggregation devices be deployed as edge nodes
B. It is recommended that access devices be deployed as edge nodes to implement end-to-end automatic VXLAN deployment
C. When the fabric needs to connect to two external networks located in different physical locations, two border nodes need to be deployed
D. If a BGP EVPN RR is required on a VXLAN network, BGP peer relationships need to be established between edge nodes and border nodes and between edge nodes
عرض الإجابة
اجابة صحيحة: D
السؤال #11
In VXLAN, which of the following is similar to a VLAN ID on a traditional network and identifies a VXLAN segment?
A. RF
B. NI
C. D
D. TEP
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Assuming that there are 5 segment IDs in the SRH of an SRv6 packet, when the packet reaches the third router on the forwarding path, the node will set the segment ID numbered by which of the following as the IPv6 destination address?
A. 5
B. 2
C. Not sure
D. 3correct
عرض الإجابة
اجابة صحيحة: D
السؤال #13
In Huawei's SD-WAN solution, the topology orchestration results are delivered to the RR through which of the following methods?
A. BGP configurationcorrect
B. Flow table
C. OSPF configuration
D. SNMP configuration
عرض الإجابة
اجابة صحيحة: A
السؤال #14
The network administrator uses ACL and only wants to match the four routing entries whose Num numbers are 1, 3, 5, and 7 in the figure. What are minimum numbers of ACL ruler need to be configured by the network administrator?
A. 3
B. 3
C. 1correct
D. 2
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Router HW enables OSPF and router HW has the role of ABR and is configured with abr-summary, then which class LSA Will it be aggregated?
A. 1 Class LSAcorrect
B. 2 kind LSAcorrect
C. 3 kind LSA
D. 4 kind LSA
E. 5 Class LSA
عرض الإجابة
اجابة صحيحة: AB
السؤال #16
In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?
A. Local proxy ARP
B. ARP broadcast suppression
C. Host information collection
D. Port isolation
عرض الإجابة
اجابة صحيحة: ABC
السؤال #17
A multi-protocol network, the topology is shown in the figure. Take a closer look at the topology, router R4 (in Areal) is introduced into the OSPF process via the routes learned by BGP. So what categories of LS4 will R3 advertise to zone 0?( Multiple choice questions).
A. 5 ?LSA
B. 7 ?LSA
C. 1 ?LSA
D. 4 ?LSA
E. 2 ?? ??
عرض الإجابة
اجابة صحيحة: ACE
السؤال #18
CMPv6 uses the Type field to identify the message type, and according to the value of the type field, we can divide the ICMPv6 message into two categories, one is the error message and the other is the information message
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #19
SSH must be configured before you can enable NETCONF on Huawei network devices.
A. True
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Which of the following Internet access modes can be used to implement centralized security control over Internet access traffic?
A. ocal Internet access
B. entralized Internet access
C. ybrid Internet access
D. riority-based Internet access
عرض الإجابة
اجابة صحيحة: B
السؤال #21
If the K bit in the GRE header is set to 1, a 4-byte Key ?eld is inserted into the GRE header. The sender and receiver then authenticate each other based on this key.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Which of the following statements about choosing an authentication point location in a network is incorrect?
A. Deploying authentication at the access layer of the network is conducive to fine-grained management of permissions and high network security
B. After the user authentication point is moved from the access layer to the aggregation layer, the user's MAC authentication may failcorrect
C. Setting the user authentication point at the access layer has advantages and disadvantages compared to setting it at the aggregation layer or the core layer
D. When the user authentication point is moved from the access layer to the aggregation layer and the core layer, the number of authentication points is greatly reduced, which can effectively relieve the pressure on the AAA server
عرض الإجابة
اجابة صحيحة: B
السؤال #23
The following description of the link state protocol is plausible?
A. CPU utilization is high and loops are easy to generate
B. Slow convergence and low CPU utilization
C. Fast convergence and low CPU utilization
D. Fast convergence and high CPU utilizationcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #24
The following description of the link state protocol is plausible?
A. CPU utilization is high and loops are easy to generate
B. Slow convergence and low CPU utilization
C. Fast convergence and low CPU utilization
D. Fast convergence and high CPU utilizationcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Which of the following descriptions about traffic policing is correct?
A. Traffic policing can only be used in the inbound direction
B. Traffic policing will cache traffic that exceeds the limit
C. Traffic policing can only be done in the outbound direction
D. Traffic policing will drop traffic that exceeds the limitcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #26
An SRv6 Policy can be either statically con?gured on a device, or be delivered to a device after being dynamically generated by the controller.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #27
On a CloudCampus virtualized campus network, virtual networks are de?ned based on services. Each virtual network corresponds to a service, and isolation needs to be manually con?gured between virtual networks.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #28
There are many types of token buckets. Which type of token bucket should be used for long-term burst traffic?
A. Double bucket double speed token bucketcorrect
B. Single bucket double speed token bucket
C. Single bucket single speed token bucket
D. Single bucket double speed token bucket
عرض الإجابة
اجابة صحيحة: A
السؤال #29
What is the wrong description of the function of OSPFv3 protocol authentication?
A. OSPFv3 can only establish a security alliance SA using manual mode
B. Huawei router OSPFv3 IPSec authentication can not only support transmission mode, but also support tunnel modecorrect
C. OSPFv3 authentication relies on IPv6 packet authentication headers and encapsulationsecurity net load headers
D. The OSPFv3 protocol header removes the Type and Automation fields
عرض الإجابة
اجابة صحيحة: B
السؤال #30
On a carrier's MPLS VPN network, PE1 and PE2 transmit data packets between VPNs. After PE1 receives VPN route 172.16.1.0/24 from a client, it converts the route into a VPNv4 route and distributes label 1027 to PE2. For the FEC of LSR-ID in PE1, the label value distributed by PE2 is 1025. When a client on PE2 accesses this route, what are the outer and inner labels in the packet transmitted out of PE2?
A. Outer label: 1027; inner label: 1025
B. Outer label: 1025; inner label: 1025
C. Outer label: 1027; inner label: 1027
D. Outer label: 1025; inner label: 1027
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: