Massive Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Huawei H12-224 HCNP-Routing&Switching (Fast Track) (Huawei Certified Network Professional -Routing&Switching) Exam Practice Test

Demo: 58 questions
Total 392 questions

HCNP-Routing&Switching (Fast Track) (Huawei Certified Network Professional -Routing&Switching) Questions and Answers

Question 1

which command is used to enable association between bfd and ospf on all interfaces

Options:

A.

bfd enable

B.

Bfd all-interface enable

C.

all-interface bfd enable

D.

Undo bfd all-interface disable

Question 2

If router priority is set to 0 for a router.it is allowed to elect this router as a DR or BDR

in an OSPF routing domain, but its priority is the lowest

Options:

A.

TRUE

B.

FALSE

Question 3

Which of the following causes may result in an is-is neighbor relationship fault

Options:

A.

The devices on two ends of a link have the same system ID

B.

The devices on two ends of a link have inconsistent IS-IS levels

C.

When an IS-IS level-1neighbor relationship is established the devices on two ends of a link have inconsistent area addresses

D.

The IP addresses of interfaces on two ends of a link are on different network segments

Question 4

For inter zone packet filtering, which traffic is belong to transmitted to outbound direction?

Options:

A.

Trusted zone — Untrusted zone

B.

Untrusted zone --Trusted zone

C.

Untrusted zone --DMZ

D.

Trusted zone — Local zone

Question 5

Which of the following statements regarding the basic concept of link aggregation is false?

Options:

A.

link aggregation bundles a group of physical interfaces together into a logical interface

to increase bandwidth and improve reliability

B.

Link aggregation complies with IEEE 802.3ad

C.

Link Aggregation Group(LAG),also called trunk refers to the logical link that is formed by binding several physical links together

D.

Link aggregation involves only the active interface

Question 6

VPN models are classified into two types overlay vpn and peer-to-peer vpn iliw —

Options:

A.

TRUE

B.

FALSE

Question 7

which of the following statements regarding the OSPF protocol is false?

Options:

A.

An ABR is connected to multiple areas and maintains the same LSDB for all areas.

B.

The metric of an AS-external-LSA can be specified during the import of external mutes

and defaults to 1.

C.

External muting information can carry a tag, the tag information is contained in a Type 5

or Type 7 LSA.

D.

The Link State ID. in an ASBR-Summary-LSA is ser as the muter ID. of this ASBR.

Question 8

Which of the following information be learned on the industry background of the project?

Options:

A.

Common solutions in the industry

B.

Problems to resolve by the project

C.

Organizational structure of customer’s Implementation scope of the project

Question 9

Which of the following command is used to configure the listening address of the SDN controller?

Options:

A.

openflow listening-ip 1.1.1.1

B.

sdn controller souce-addressl.1.1.1

C.

controller-ip 1.1.1.1

D.

sdn listening-ip 1.1.1.1

Question 10

Employees in an enterprise often need to connect to the enterprise intra net for remote access when going on business which of the following technologies can meet this Demand.

Options:

A.

MPLS VPN

B.

IPSec VPN

C.

SSL VPN

D.

Lsdn Dial-in

Question 11

Which command is used to configure association between VRRP and a physical interface?

Options:

A.

vrrp vrid 1track interface Gigabit EthernetO/O/O

B.

Track vrrp vrid 1interface Gigabit EthernetO/O/OC. vrrp vrid linterface Gigabit EthernetO/O/O track

C.

vrrp vrid 1interface Gigabit EthernetO/O/O

Question 12

bgp routers establish peer relationships using udp

Options:

A.

TRUE

B.

FALSE

Question 13

For inter zone packet filtering, which of following traffic is not transmitted in the outbound direction?

Options:

A.

Traffic from the DME to the untrusted zone

B.

Traffic form the trusted zone to the DMZ

C.

Traffic form the trusted zone to the untrusted zone

D.

Traffic form the trusted zone to the local zone

Question 14

Which of the following statements regarding authentication in BGP configuration is true?

Options:

A.

All the routers in the same AS must use the same password

B.

A pair of BGP peers must use the same plaintext password

C.

All BGP peers of a router must use the same password

D.

A pair of BGP peers must use the same MD5 password

Question 15

Ethernet supports broadcast once a network loop occurs this simple broadcast mechanism will cause catastrophic consequences which of the following symptoms may

be caused by a loop?

Options:

A.

Users cannot log in to the device remotely

B.

The display interface coming output shows a large number of broadcast packets received on an interface

C.

The CPU usage exceeds 70%

D.

A lot of ICMP packets are lost in ping tests

Question 16

The device installation procedure is as follows: tool -> Install mounting ears -> installing floating nuts and guide rails based on the requirements -> installed the device in the cabinet.

Options:

A.

TRUE

B.

FALSE

Question 17

Which are lower-layer physical devices of NFV framework?

Options:

A.

Storage device

B.

Network device

C.

Server

D.

Air conditioning system

Question 18

Which of the following statements regarding the firewall zone ts true?

Options:

A.

Different zones of firewall can use the same priority.

B.

A firewall interface can belong to different

C.

Different firewall interfaces can belong to the

D.

The default firewall zone can be deleted.

Question 19

When BFD detection intervals at both ends are 30ms and

40ms.Which of the following statement is true?

Options:

A.

A BFD, session can be set up. After the negotiation, the detection interval of 90ms is used.

B.

A BFD, session can be set up. After the negotiation, the detection interval of 30ms is used.

C.

A BFD, session can be set up. And packets are sent at respective interval at both ends.

D.

A BFD, session cannot be established.

Question 20

ASFF enables the firewall to support multi-channel protocols such as FTP and to define security policies for complex applications

Options:

A.

TURE

B.

FALSE

Question 21

Which of the following statements regarding network-summary-LSA are true?

Options:

A.

link State ID in Network-Summary-LSA is set as the destination network IP address

B.

Net mask in Network-Summary-LSA is set as the network mask of the destination network segment

C.

Metric in NETwork-Summary-LSA is set the cost of a route from an ABR to a destination network segment

D.

Network-Summary-LSA is generated by an ASBR.

Question 22

Which of the following hello packets are used in IS-IS?

Options:

A.

Level-1LAN IIH

B.

Level-2 LAN IIH

C.

Level-3 LAN IIH

D.

P2P LAN IIH

Question 23

Which of the following commands can display OSPF neighbor information on the VRP platform?

Options:

A.

Display ospf peer

B.

Display ospf interface

C.

Display ospf Isdb

D.

Display ospf routing

Question 24

Which of the following statements regarding the OSPF feature is false?

Options:

A.

OSPF uses the link state algorithm

B.

Each router advertises local link state information by flooding LSAs

C.

Each OSPF device collects LSAs sent by other routers All LSAs form the link state database (LSDB)

D.

AII the routers in OSPF Area 0 have the same 13DML Based on the directed graph each router uses a SPF algorithm to compute the shortest path tree with itself as the root

Question 25

Which of the following LSPs are established in Downstream Unsolicited (DU) label advertisement mode and ordered label distribution control mode?

Options:

A.

When the edge node finds a new destination address in its routing table that does not belong to any existing FEC the edge bode not crate

B.

An LSP is established by binding an FEC to a label and advertising the binding relationship to the neighboring LSR

C.

lf the egress node has available labels for distribution it allocates labels for the FEC and sends a label mapping message to the upstream node

D.

After receiving a label mapping message the LSR adds the corresponding entry to the label forwarding table

Question 26

Which of the following statements regarding OSPF special areas is false?

Options:

A.

A totally stub area allows the Type 3 default route advertised by an ABR .and does not allow AS external routes and inter-area routes.

B.

Different from a totally stub area stub a

C.

Different from a stub area an NSSA area allows importing AS external routes An ABR advertises these routes within its area using Type

D.

Different from an NSSA area, a totally stub area does not allow inter-area mutes.

Question 27

An attacker sends ICMP Request packets with the destination address as the broadcast address of the attacked user host. What is this attack?

Options:

A.

IP spoofing attack

B.

Smurf attack

C.

ICMP redirection attack

D.

SYN Flood attack

Question 28

Which of the following statements regarding the route injected into BGP using the network command are false?

Options:

A.

this route must exist in the IP routing table and be the optimal route.

B.

this route must match the specified prefix and does not need to accurately match the mask length.

C.

this route must accurately match the specified mask length.

D.

this route must be on IGP route.

Question 29

Which of the following statements regarding BGP state machine is false?

Options:

A.

in idle state, bgp denies all connection requests, this is the initial state of bgp.

B.

In active state bgp attempts to establish a tcp connection, this is the intermediate state

of bgp.

C.

in established state, bgp peers can exchange update, route-refresh, keepalive, and

notification message.

D.

A BGP peer relationship can be established only when both

BGP peers are in open confirm state, two bgp peers send update messages to exchange

routes.

Question 30

Only MD5 authentication is supported between BGP peers.

Options:

A.

TURE

B.

FALSE

Question 31

Which of the following messages are supported by BGP?

Options:

A.

Keepalive

B.

Open

C.

Update

D.

Hello

Question 32

What is the default hello interval of a DIS in a broadcast network?

Options:

A.

5s

B.

10s

C.

3.3 s

D.

40s

Question 33

The peer default-mute-advertise command is executed on a BGP muter to advertise

a default mute to neighboring routers. Which of the following statements regarding the

change of local BGP muting table is true?

Options:

A.

An inactive default mute will be generated in the local BGP muting table, but this mute will not be delivered to the IP muting table

B.

An active default mute will be generated in the local BGP muting table and delivered to the IP muting table.

C.

No default mute will be generated in the local BGP muting table

D.

A default mute will be generated in the local BGP muting table. Whether the default muting will be delivered to the IP muting table default

Question 34

Using default routes between routers is a cost-effective solution but this consumes more system resource than complete routing table

Options:

A.

TRUE

B.

FALSE

Question 35

In DU label advertisement mode if the liberal label retention modes is used the device reserves labels received from all the LDP peers regardless of whether the LDP destination network.

Options:

A.

TRUE

B.

FALSE

Question 36

Which of the following is not overlay VPN technology?

Options:

A.

GRE

B.

IPSec VPN

C.

SSL VPN

D.

L2TP VPN

Question 37

In a non-broadcast network, OSPF has two running modes NBMA and P2MP,and DR/BDR need to be elected in a NBMA network

Options:

A.

TRUE

B.

FALSE

Question 38

Stp ensures a loop-free network but has a slow network topology convergence speed, affecting communication quality RSTP has made some improvements based on

STP which of the following improvements is not included?

Options:

A.

RSTP deletes three port states and adds two port roles

B.

RSTP reduces five port states and adds two port roles

C.

The non-root switch running RSTP sends configuration

BPDUs at the interval specified by the hello timer which is performed independently by each device

D.

lf a port does not receive configuration BPDUs from the upstream device within four hello intervals the switch considers that the negotiation with the neighbor fails

Question 39

What are the features of SDN network architecture?

Options:

A.

Separated forwarding and control layers centralized control and open interfaces

B.

Separated forwarding and control layers distributed control and open interfaces

C.

Centralized forwarding and control layers centralized control and open interfaces

D.

Separated forwarding and control layers centralized control and closed interfaces

Question 40

Which of the following methods is used to control internal employees and guests access networks in the agile controller wireless access control scenario?

Options:

A.

Access control by user name

B.

According to whether the wireless terminal MAC address registration control access

C.

Access control by SSID (different SSIDs for internal employees and guests)

D.

Access control by wireless terminal type

Question 41

IGMP not only supports IGMP General query and IGMPv2 group-specific query and also IGMPv3 source/group-specific query

Options:

A.

TRUE

B.

FALSE

Question 42

When configuring source NAT with no-pat configuration parameters which of the following statements is true

Options:

A.

only the source IP address is translated

B.

Only the destination IP address is translated

C.

The source IP address and source port number are both translated

D.

The destination IP address and destination port number are both translated

Question 43

Which of the following firewalls has the highest forwarding efficiency when processing non- first-packet data flows?

Options:

A.

Packet filtering firewall

B.

Proxy firewall

C.

Stateful inspection firewall

D.

Software firewall

Question 44

Which of the following is not the application scenario of the guest access management function of the Agile Controller?

Options:

A.

Customers access the enterprise network public resources or Internet during exchanges with or visits to the enterprise

B.

Citizens access the Internet through the network provided by public utilities

C.

Consumers connect to the Internet over the enterprise network

D.

Enterprise employees on a business trip connect to the enterprise network through branch network

Question 45

When a bgp muter receives a route with an unreachable next hop how does it process the route?

Options:

A.

it sends an error message to the router that sends the update message

B.

it does not add this route to its BGP routing table and discards this route

C.

it accepts and adds this route to its BGP routing table However this route will not be preferred by BGP and not added to the IP routing table

D.

it accepts and adds this route to its BGP muting table this route will participate in BGP mute selection and may become the optimal route

Question 46

In the multicast network environment how do an IGMPv1 host and an IGMPv2 muter on the same LAN interact with each other?

Options:

A.

If any host on a LAN is running IGMPv1 all hosts on the LAN must also use IGMPv1.

B.

Membership Report message sent from the IGMPv1 host will be received by the IGMPv2 muter.

C.

If the IGMPv1 is in a specific group theIGMPv2 muter must ignore all Leave messages received from this group.

D.

The version 2 muter must set a countdown timer associated with the group that takes into account the presence of the version 1host.

Question 47

How many bits does an MPLS label field have?

Options:

A.

8

B.

3

C.

1

Question 48

On a carrier's MPLS VPN network, PEI and PE2 transmit data packets between VPNs, after PEI receives VPN route

172.16.1.0/24 from a client to the packet after the packet arrives at PE2 distributes label 1025 to the packet. When a client on PE2 accesses this route, what are the outer and inner labels in the packet transmitted over the carrier network?

Options:

A.

Outer label:1027; inner label:1025

B.

Outer label:1025; inner label :1025

C.

Outer label:1027; inner label :1027

D.

s Outer label : 1025; inner label:1027

Question 49

What are differences between the DiffServ and IntServ models?

Options:

A.

The DiffServ model provides different services destined for different destinations.

B.

The DiffServ model provides different services destined for different sources.

C.

The DiffServ model does not need to maintain the status of each flow.

D.

The DiffServ model applies to large-scale backbone network.

Question 50

On the border between an enterprise network and its external network, which of the following devices is deployed at the outermost side of the enterprise network?

Options:

A.

IDS

B.

PS

C.

FW

D.

VPN

Question 51

During network design, VLANs are assigned in many ways which of the following ways is seldom adopted?

Options:

A.

10

B.

5

C.

25

D.

20

Question 52

On a large-scale network, some switches run MSTP and some switches run RSTP. If an MSTP switch detects that the neighboring switch works in RSTP mode, which mode does the MSTP switch work?

Options:

A.

STP

B.

RSTP

C.

MSTP

D.

Uncertain

Question 53

Which of the following route selection tools can be used by other routing protocols in addition to BGP?

Options:

A.

route-policy

B.

IP- prefix

C.

as-path-filter

D.

community-filter

Question 54

Which of the following statements regarding OSPF intra-area or into-area router roles are true?

Options:

A.

An internal router is a router of which all the interfaces belong to the same area.

B.

An Area Border Router (ABR) is a router connected to one or more areas , one of which

is the backbone area. ABR

C.

A backbone router is a router with at least two interfaces belonging to the backbone

area.

D.

An Autonomous System Boundary Router ( ASBR ) can be an internal router , a backbone router , or an ABR

Question 55

Which of the following statements regarding PIM-SM hello packets is false?

Options:

A.

On a PIM-SM network multicast routers that have just started need to send Hello messages to discover neighbors and maintain neighbor relationships

B.

Multicast routers periodically send Hello Messages to each other to maintain communication

C.

A DR is selected on a network segment based on Hello messages exchanged between routers

D.

Hello messages are sent to multicast group address

Question 56

On a network running RSTP, some devices use STP. When SRTP-enabled switches detect a topology change, which method is used by the RSTP-enabled switches.

Options:

A.

RSTP BPDUs with the TC are used

B.

STP BPDUs with the TC are used

C.

RSTP BPDUs with the TCA are used

D.

STP BPDUs with the TCA are used

Question 57

TWOLEVEL-1routersindifferentareascanestablisha neighbor relationship.

Options:

A.

TRURE

B.

FALSE

Question 58

Congestion means that the service rate is reduced because of insufficient network resources Congestion avoidance technologies include RED and WRED.

Options:

A.

TRUE

B.

FALSE

Demo: 58 questions
Total 392 questions