لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An interface has the following configuration: isitimerhello5level-2. Which of the following descriptions is correct?
A. The CSNP packet sending interval for Level-2 on this interface is 5s
B. The hello packet sending interval for Level- on this interface is 5s
C. The hello packet sending interval for Level -2 of this interface is 5s
D. The hello packet sending interval for Level-1 and Level-2 of this interface is both 5s
عرض الإجابة
اجابة صحيحة: C
السؤال #2
When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?
A. CP
B. DP
C. P
D. thernet
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following descriptions of Underlay in VXLAN virtualized campus applications is wrong?
A. When using IMaster NCE-Camspus to implement automatic orchestration of Underlay network routing domains, only OSPF routing protocol is supported
B. The virtualized campus solution uses VXLAN technology and adopts MAC IN UDP encapsulation method to virtualize a layer of logical network on the traditional IP network
C. The underlay network implements IP reachability so that VXLAN-encapsulated service packets can be communicated between VTEP nodes
D. When using IMaster NCE-Campus to implement automatic orchestration of Underlay network routing domains, only single-area deployment of routing protocols is supported
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Regarding the description of the permanent multicast address, the error is ?
A. AAll routers running the PIM protocol listen on 22400100
B. BAll routers listen on 224002
C. CAll hosts and routers in the network segment listen on 224001
D. DAll routers running the OSPF protocol listen to 224005
عرض الإجابة
اجابة صحيحة: A
السؤال #5
In the use of the CP protocol, the following description is correct?
A. The Eth-Trunk interface can be avoided by frequent oscillation interface eth-trunkllacppreemptenablelacppreemptdelaydelay-time by following commandcorrect
B. Source A address can be configured for load sharing in an enabled link aggregation group with the following command: interface eth-trunk 110ad-balance src-dst-ip
C. A member interface can be removed from an enabled link aggregation group with the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 undo eth-trunk 1 interfaceGigabitEthernet0/0/1undoshutdown
D. The member interface can be joined in the link aggregation group by enabling the following command: interface GigabitEthernet0/0/1 shutdown interface GigabitEthernet0/0/1 trunkport
عرض الإجابة
اجابة صحيحة: A
السؤال #6
For scenarios where advanced security functions such as UR filtering, IPS, security defense, and AV anti-virus need to be supported, and multi-link uplink needs to be supported, which of the following can be selected for the egress device?
A. FWcorrect
B. AC
C. AP
D. AR
عرض الإجابة
اجابة صحيحة: A
السؤال #7
IS-IS is a link-state routing protocol that uses the SPF algorithm for route calculation. As shown in the figure, a campus deploys both IPv4 and IPv6 and runs IS-IS to achieve network interconnection. R2 only supports IPv4.
A. If you want IPv4 and IPv6 network computation to form the same shortest path tree, you need to run the ipv6 enable topology ipv6 command to enable the IPv6 capability in the IS-IS process
B. By default, since R2 does not support IPv6, in the shortest path tree formed by IPv6 network calculation, the path from R1 to R4 is: R1-R3-R4
C. By default, IPv4 and IFv6 networks will be calculated separately to form different shortest path trees
D. By default, in the shortest path tree formed by IFv6 network calculation, the path from R1 to R4 is R1-R2-R4
عرض الإجابة
اجابة صحيحة: D
السؤال #8
In different scenarios, RSTP provides different protection functions. Which of the following is wrong?
A. For a designated port with root protection enabled, its port role can only remain as a designated port
B. After enabling the anti-TC-BPDU packet attack function, the number of times the switching device processes IC BPDU packets within a unit time can be configured
C. After the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set as a non-edge port and the spanning tree calculation will be re-calculated
D. Enable root protection on the designated port
عرض الإجابة
اجابة صحيحة: C
السؤال #9
There is an As-path-filter.ip as-path-filter 1 permit*(100l400) $, which As-path-filter can match which of the following AS_PATH Attribute? (Confirmed).
A. 300 4200correct
B. 1234 1400correct
C. 3100correct
D. 100correct
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #10
Which of the following IEEE standards is specific to Gigabit Ethernet?
A. 8023zcorrect
B. 8023abcorrect
C. 8023ad
D. 8023af
عرض الإجابة
اجابة صحيحة: AB
السؤال #11
In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, which of the following descriptions about the role of BGP EVPN Type3 routing is wrong?
A. Type3 routing transmits Layer 2 VNI and VTEP IP address information
B. When the Type3 routing VTEP IP address is reachable at Layer 3, if the peer VNI is the same as the local end, create a head-end replication table for subsequent BUM packet forwarding
C. Type3 routing will carry L3 VNIcorrect
D. If the VTEP IP address carried by the received Type3 route is reachable by Layer 3 routes, a VXLAN tunnel will be established to the opposite end
عرض الإجابة
اجابة صحيحة: C
السؤال #12
After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs . Which of the following is not a configurable action?
A. Send an alert
B. The MAC address blocks
C. Interface blocking
D. Traffic filteringcorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #13
VXLAN identi?es tenants using VNIs, which are 24 bits long. A tenant can have one or more VNIs, and VXLAN supports a maximum of 12 million tenants.
A. True
B. Falsecorrect
عرض الإجابة
اجابة صحيحة: B
السؤال #14
In the Huawei SD-WAN solution, which of the following routing protocols are used to transmit VPN routes between CPEs?
A. BGPcorrect
B. RIP
C. SPF
D. IS-IS
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which of the following does not belong to the scope of dynamic data collection on the live network before cutover?
A. Routing Protocol Status
B. ARP entry
C. Port Statuscorrect
D. SNMP version
عرض الإجابة
اجابة صحيحة: C
السؤال #16
OSPF fast convergence is an extended feature designed to speed up route convergence. When the network topology changes, partial route calculation (PRC) recalculates routes only for a?ected nodes, speeding up route calculation.
A. Truecorrect
B. False
عرض الإجابة
اجابة صحيحة: A
السؤال #17
Which of the following descriptions about "security group" and "resource group" is wrong in Business Travel?
A. The resource group supports static binding of IP addresses or address segments
B. On iMaster NCE-Campus, the UCL group is the security group
C. The any group can be used as both a source group and a destination groupcorrect
D. The security group supports static binding of IP addresses or address segments
عرض الإجابة
اجابة صحيحة: C
السؤال #18
There are multiple protocols that can change or obtain network device data. Which of the following protocols cannot be used to change network device data?
A. SNMP
B. NETCONF
C. RESTC NF
D. IPseccorrect
عرض الإجابة
اجابة صحيحة: D
السؤال #19
SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data
A. TRUEcorrect
B. FALSE
عرض الإجابة
اجابة صحيحة: A
السؤال #20
result :(moloteric question).
A. When sending a packet with a destination address of 4444, it is sent without labeling
B. When the router receives a packet with the label 1024, it replaces the label with 1027 and sends it
C. When a packet with a destination address of 2222 is sent , it is sent without labeling
D. When sending a packet with a destination address of 3333, label 1026 and send it
عرض الإجابة
اجابة صحيحة: C
السؤال #21
To allow only authorized users (users who obtain IP addresses through authorized DHCP servers or use specified static IP addresses) to access the network shown in the figure, which of the following solutions can be used?
A. DAI + Port Security
B. DHCP Snooping + IPSG
C. DHCP Snooping + DAI
D. DAI + IPSG
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Which of the following is used to implement inter-subnet communication on a VXLAN network and allow access from a VXLAN network to an external non-VXLAN network?
A. LAN IF interface
B. VE interface
C. ayer 2 VXLAN gateway
D. ayer 3 VXLAN gateway
عرض الإجابة
اجابة صحيحة: D
السؤال #23
As shown in the figure is the output information of a network engineer when troubleshooting OSPF faults.
A. Hello message sending intervals are inconsistent
B. Authentication passwords are inconsistent
C. The IP address masks of the interfaces are inconsistentcorrect
D. Inconsistent area types
عرض الإجابة
اجابة صحيحة: C
السؤال #24
The RF function of the BGP protocol can control the routing entries sent by the neighbors. Which of the following tools does a BGP router need to use for this purpose?
A. Filter-Policy
B. IP Prefix Listcorrect
C. ACL
D. Route-Policy
عرض الإجابة
اجابة صحيحة: B
السؤال #25
In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is
A. The root protection feature is enabled for the specified port, and its port role can only remain as the specified port
B. When the anti-TC-BPDU packet attack feature is enabled, the number of times the switching device processes IC BPDU packets per unit time is configurable
C. after the BPDU protection function is enabled on the switching device, if the edge port receives RST BPDU, the edge port will be set to a non-remote port and the spanning tree calculation will be re-performedcorrect
D. Start the specified port of root protection, when the port receives a better RSTBPDU, the port will enter the Discarding state and is no longer forwarding packets
عرض الإجابة
اجابة صحيحة: C
السؤال #26
If you need to configure routing policies on one router. Which of the following parameters does an administrator use to route when deploying a routing policy?( Multiple select).
A. AProtocol
B. BApplication
C. CSize of the packet
D. DThroughput
E. EIdentification of a specific terminal system
عرض الإجابة
اجابة صحيحة: ABCE
السؤال #27
Portal authentication is also called Web authentication. Users can authenticate user identities through the Web authentication page. Which of the following descriptions of Porta1 authentication is wrong?
A. Generally, Portal authentication does not require the installation of specialized client software, so it is mainly used in terminal access scenarios that do not require client software
B. Porta1 authentication can authenticate users based on the combination of user name, VLAN, IP address, and MAC address
C. When Porta1 authentication is deployed on the network, the authenticated client needs to support the Porta1 protocol
D. Before performing Porta1 authentication, the client must obtain an IP address and the IP address must be reachable with the Porta1 server
عرض الإجابة
اجابة صحيحة: C
السؤال #28
As shown in the figure, in the HUB & Spoke networking mode of MPLS BGPVPN, in order to achieve the division can only communicate with the headquarters, the division can not communicate with each other When setting up RT, which of the following scenarios is this?( Radio).
A. A???:import Target:12:3EpodTarget:12:3
B. BHeadquarters: importTarget:1:1EpodTarget:3:3
C. CHeadquarters: Impot Target:2:2; Expor Target:3:3
D. DHeadquarters: importTarget: 12:3EpodTarget: 3:12
عرض الإجابة
اجابة صحيحة: D
السؤال #29
As shown below, what routes will R2 learn?( Single choice questions).
A. R2 can learn the 101
B. R2 can learn the 101
C. R2 can receive an LSP for R1, but cannot join to the routing table
D. R2 can learn all routes to R1
عرض الإجابة
اجابة صحيحة: D
السؤال #30
SR-MPLS Policy needs to introduce business traffic into the tunnel for forwarding. If there are different business traffic going to the same destination address, in order to better ensure the quality of different services, which of the following traffic diversion methods is best to use?
A. Drainage based on quintuple
B. Driving traffic based on End Point
C. Traffic diversion based on DSCPcorrect
D. Driving traffic based on Color
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: