Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Huawei H31-161 HCIE-Carrier IP (Written) Exam Practice Test

Demo: 27 questions
Total 180 questions

HCIE-Carrier IP (Written) Questions and Answers

Question 1

Which statement about the MPLS LSP Ping is true?

Options:

A.

The LSP Ping Echo request must contain the downstream mapping TLV

B.

A unique Sender's Handle is generated during each LSP Ping operation

C.

A unique sequence number is generated during each LSP Ping operation

D.

The LSP Ping Echo request may contain the FEC stack TLV

Question 2

display current-configuration

multicast routing-enable

#

acl number 2000

rule 5 permit source 225.0.0.0 0.0.0.255

#

interface Ethernet6/1/0

ip address 10.1.1.1 255.255.255.0

igmp enable

pim sm

#

igmp

#

pim

ssm-policy 2000

#

return

The preceding are partial multicast router configurations. Which of the following configurations

are required to configure the SSM Mapping on Ethernet 6/1/0 and map IGMPv2 Report messages for multicast group 225.0.0.1 to multicast source 2.2.2.2?

Options:

A.

ssm-mapping 225.0.0.0 255.255.255.0 2.2.2.2

B.

igmp on-demand

C.

igmp prompt-leave

D.

igmp ssm-mapping enable

Question 3

Exhibit.

As shown in the figure, RTA and have one BGP session. To detect fault fast, the BFD for BGP feature needs to be configured on RTA and RTB. BGP-related configurations are as follows:

The only Ethernet link between RTA and RTB becomes faulty when the BGP neighbor session is in ESTABLISHED state and the BFD session is in the UP state. Which statements is true? (Note: BFD works in asynchronous mode)

Options:

A.

RTA detect the fault faster than RTB.

B.

The BGP session between RTA and RTB is interrupted when the BGP hold time (time duration is 180s by default) express.

C.

RTB detect the fault faster than RTA.

D.

RTA and RTB detect the fault simultaneously.

Question 4

In MPLS QoS , traffic policies are developed on simple traffic classified and complex traffic classification policies based on simple traffic classification the service class color, and drop priority of packet are reset based on the packet in the traffic policies on complex traffic classification measures such as traffic classification is applied on border routers in Different domain, and traffic classification core routers. QoS policies are configured by performing the following operations:

  • Defines DiffSer domain and configuring a traffic policy.
  • Classification traffic
  • Defines traffic behavior and configures characteristics of behaviors.
  • Defines a traffic policy and specifies for traffic categories
  • Applies the traffic policy
  • Configure L-LSP
  • Configures reserve address checks
  • Adds interface to the DiffSer domain

Which of the proceeding operations are required when you configured simple traffic classification?

Options:

A.

1 6 8

B.

2 3 4 8

C.

1 5 6

D.

2 4 5 7

Question 5

On the IP bearer network, which of the following methods can be used to manage devices on the backbone network and switches on the signaling VPN?

Options:

A.

Construct an outband NM network to manage all devices.

B.

Leak public and private network routes to manage devices on the public and private networks.

C.

Establish two physical or logical links with the PE to manage devices on the public and private networks. One link belongs to the public network and the other belongs to the private network.

D.

Establish a physical or logical link with the PE and mount MCEs to the PE to manage devices on the public and private networks.

Question 6

As shown in the figure, DUT stands for the device under test and RTA is

used to support the test. Which combination of the following configurations is mandatory for fast convergence?

1. BFD

2. Minimum LSP refreshing interval

3. Most sensitive SPF timer

4. Minimum Hello packet sending interval

5. Minimum LSP sending interval

6. Longest computing time of SPF slices

7. Minimum LSP retransmission interval

8. Minimum LSP generation time

9. Flash-flood

10. GR function

11. Setting cost-style to wide

Options:

A.

3, 5, 6

B.

3, 5, 6, 8, 9C.1, 3, 5, 6, 9

C.

1, 2, 3, 5, 7, 8, 9

Question 7

With the SA, which of the following, option is correct?

Options:

A.

KE SA is unidirectional

B.

IKE SA is bidirectional

C.

IPSec SA is unidirectional

D.

IPSec SA is bidirectional

Question 8

User A want to obtain a better network service for business development and signs an SLA with a corner. User A purchases a bandwidth of 5 Mbit/s to ensure the voice service (requiring short delay), vide service, key data services, and other services, If you were corner network administrator.

What would you do on the PE to ensure these services?

Options:

A.

Mark the VoIP service as EF, set the CIR to 0Mbit/s, and set the PIR to 1 Mbit/s mark the video service as AF 4 and set the CIR and PIR to 2 Mbit/s mark key data services as AF3, set the CIR to 1 Mbit/s and the PIR to 5 Mbit/s: mark other services as AF1, set the CIR to 2 Mbit/s and Set PIR to 5 Mbit/s.

B.

Mark the VoIP service as EF, set the CIR to 0Mbit/s, and set the PIR to 1 Mbit/s mark the video service as AF 4 and set the CIR and PIR to 2 Mbit/s mark key data services as AF3, set the CIR to 1 Mbit/s and the PIR to 5 Mbit/s: mark other services as AF1, set the CIR to 2 Mbit/s and Set PIR to 5 Mbit/s.

C.

Mark the VoIP service as EF, set the CIR to 1 0Mbit/s, and set the PIR to 1 Mbit/s mark the video service as AF 4 and set the CIR and PIR to 2 Mbit/s mark key data services as AF3, set the CIR to 2 Mbit/s and the and the PIR to 5 Mbit/s : mark other services as BE, set the CIR to 0 Mbit/s and set PIR to 5 Mbit/s.

D.

Mark the VoIP service as EF, set the CIR to 2 Mbit/s: marks the video service as AF 3 and set the CIR and PIR to 2 Mbit/s: mark key data services as AF4, set the CIR to 2 Mbit/s and the PIR to 5 Mbit/s mark other service as BE, set the CIR to 0 Mbit./s and set PIR to 5 Mbit/s

Question 9

A gold user and a common user access a carrier network through the MPLS Layer 3 VPN. On the entire MPLS network (from PE to PE), the carrier performs queue scheduling for the gold user by trusting the IP priority of the user and for the common user by using the carrier's own operation policy. Which of the following is the tunnel mode of the MPLS differentiated service for the gold user and common user, respectively?

Options:

A.

pipe; short pipe

B.

short pipe; pipe

C.

uniform; pipe

D.

uniform; short pipe

Question 10

Which of the following will cause an MPLS L2VPN VC to be Down?

Options:

A.

Public LDP LSP tunnels are not Up.

B.

Interfaces connecting PEs to CEs use VLAN encapsulation, but the VLAN IDs are different.

C.

In Martini L2VPN, interfaces connecting PEs to CEs at both ends of a VC are configured with different VC IDs.

D.

In Kompella L2VPN, the two PEs allocate the same CE ID for the CEs connected to them.

Question 11

On the IP bearer network, different VPN users (VPN A and VPN B) must access the internet through the same egress. Which of the following schemes can achieve security isolation VPNs and have the best scalability?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 12

RTA is a leaf router that directly connects to host A through interface GigabitEthernet 1/0/0. The

interface is configured as follows:

interface GigabitEthernet1/0/0

undo shutdown

ip address 192.168.4.2 255.255.255.0

pim sm

igmp enable

igmp version 3igmp ssm-mapping enable

igmp static-group 232.1.1.1

Configurations in the IGMP view are as follows:

igmp

ssm-mapping 232.1.1.0 255.255.255.0 10.10.1.1

ssm-mapping 232.1.2.0 255.255.255.0 10.10.1.1

Host A sends an IGMPv2 Report message to group 232.1.2.2. Which entry can be displayed by the

display igmp ssm-mapping group command?

Options:

A.

(10.10.1.1, 232.1.1.1)

B.

(10.10.1.1, 232.1.2.2)

C.

(10.10.1.1, 232.1.1.1) and (10.10.1.1, 232.1.2.2)

D.

No entry

Question 13

Which statement about the edge access layer is true?

Options:

A.

It connects users to the network by providing various access means, and converts the format of

information so that the information can be transmitted on the network.

B.

Using the packet technology, it provides a comprehensive transport platform that boasts high

reliability, quality of service (QoS) assurance, and large capacity.

C.

It implements call control. With the softswitch technology as the core, it completes basic realtime call control and connection control.

D.

It provides additional value-added services and operation support for established calls

Question 14

Exhibit.

As shown in the figure, RTA belongs to AS 100 and has an EBGP neighbor relationship with RTC, RTD, and TTB is an IBGP neighbor of RTC, RTD, and RTE, and the four router all belong to AS 200.

(Note: The attributed not involved In the question use the default values)

1. Import route 1.1.1/32 from RTA and advertise this route to RTB by way of RTC, RTD, and RTE, respectively (suppose the three routers between is IGP, EGP, and INCOMPL:ETE, respectively. Which route will RTB prefer?

2. Suppose the preceding policy is retained. Apply inbound routing policies on RTC, RTD, and RTE so that the values of the MED attribute of route 1.1.1.32 learned by RTB are 40, and 20 respectively. Which route will RTB prefer?

3. Suppose the preceding policy is retained. Apply an inbound routing policy on RTB so that the values of the AS_ PATH attribute of route 1.1.1.1/32

Learned from RTC, RTD, and RTE are 10 20 30,and 10 20, respectively. Which route will RTB prefer?

4. Suppose the preceding policy is retained. Apply an inbound routing policy on RTB so that the values of the local-preference attribute of route 1.1.1.1.32 learned from RTC and RTE are 30 and 120 , respectively. Which route will RTB prefer.

5. Suppose the preceding policy is retained. Apply inbound policies on RTC. RTD and RTE so that the values of the preferred-value attribute of route 1.1.1.132 are 50.40 and 30 respectively. Which route will RTB prefer?

Options:

A.

RTC., RTC, RTE, RTC, RTE

B.

RTC, RTD, RTD, RTE. RTE

C.

RTC, RTC, RTD, RTC, RTE

D.

RTC, RTC, RTD, RTE, RTE

Question 15

As shown in the figure, RTA, RTB, and RTC use the OSPF protocol. The default cost value is used for links, and unicast routes converge on the entire network. The Loopback 0 interface is set to configure RTC as the RP or BSR. The SPT switching threshold uses the default value on RTB. The receiver joins the multicast group 225.1.1.1. The multicast source sends multicast data to the destination address 225.1.1.1. Which interface is the inbound interface in the (10.1.1.1, 225.1.1.1) entry on RTB?

Options:

A.

Ethernet 1/0/0

B.

Ethernet 1/0/1

C.

Ethernet 2/0/0

D.

Null

Question 16

Which statement about the configuration of route target (RT) and route distinguisher (RD) is true?

Options:

A.

If routes need to exchange between two VPNs, the value of import RT of one VPN must be partially the same as Export RT of the other VPN.

B.

RD and RT of a VPN instance cannot be the same as those of another VPN instance on the same PE.

C.

If routers need to exchanged two VPNs, the value of import RT of one of the same as that of RT of the other VPN.

D.

Two instances of a VPN share an RT.

Question 17

As shown in the figure, RTA connects to RTB and RTC. A TE tunnel is configured on RTA to reach RTC. The TE tunnel cannot be successfully established. However, CSPFbased path calculation is successful and RTA does not receive any PathErro messages. What are possible causes?

Options:

A.

The reserved bandwidth is insufficient at interface RTB-2.

B.

An interface address on RTB is the same as the address of interface RTA-1.

C.

RSVP-TE is not configured at interface RTB-2.

D.

Different authentication keys are configured on interfaces RTB-2 and RTC-1.

Question 18

Interface Ethernet 3/1/0 is configured as follows:

Ethernet 3/1/0 receives multicast group 232 0.0.31 IGMFV2 Report messages, If no multicast traffic sent to group 232.0.31 can be detected on Ethernet 3/1/0, which of the following causes may be true?

Options:

A.

The TTL value is less than 20 in data messages sent to group 232.0.0.31.

B.

Ethernet 3/1/0 does not function as a PIM DR

C.

The multicast border of group 232 0.0.31 is configured on Ethernet 3/1/0.

D.

SSM mapping is not configured for group 232 0 0 31.

Question 19

Which of the following are conditions for bringing the remote CCC connection Up? (ABE)

Options:

A.

The interface that is bound to a CCC connection is physically Up.

B.

MPLS is enabled on the outbound interface of the public network.

C.

MPLS LDP is enabled on the outbound interface of the public network.

D.

If a next hop is specified in CCC configuration, a route to the next hop is available.

E.

If an outbound interface is specified in CCC configuration, the outbound interface is Up.

Question 20

On a metropolitan area network, VIP customers access the network through the MPLS VPN to ensure their security. Which of the following security deployments are required for PEs?

Options:

A.

Configure the CP-CAR on the interface connected to the CE.

B.

Deploy protocol authentication if a router protocol is used between PEs and CEs.

C.

Configure the ACL to filter out data packets with common network viruses at the interface

connected to the CE.

D.

Configure the ACL to filter out IP packets that use the IP address of the CE-connected interface as the destination address.

Question 21

As shown in the figure, CEs connect to users 1 and 2 through access

interfaces or links.

[Quidway-GigabitEthernet1/0/4]portswitch

[Quidway-GigabitEthernet1/0/4]port link-type access

[Quidway-GigabitEthernet1/0/4]port default vlan 1

[Quidway-GigabitEthernet1/0/6]portswitch

[Quidway-GigabitEthernet1/0/6]port link-type access

[Quidway-GigabitEthernet1/0/6]port default vlan 2

[Quidway-GigabitEthernet1/0/3]portswitch

[Quidway-GigabitEthernet1/0/3]port link-type trunk

[Quidway-GigabitEthernet1/0/3]port trunk permit-pass vlan 1 to 2

Users 1 and 2 require different network transmission quality. Which of the following methods are

feasible to configure 802.1p priority 1 for packets of user 1 and 802.1p priority 2 for packets of user

2?

Options:

A.

On a PE, configure Dot1q tunnel interfaces and simple traffic classification (STC) for interfaces on

the private network.

B.

On a PE, configure vlan-mapping and STC for interfaces on the private network for users 1 and 2.

C.

On a PE, configure vlan-stacking and STC for interfaces on the private network for users 1 and 2.

D.

On a CE, configure STC for user VLANs on the user access side.

Question 22

When configure IPSec VPN, Which kind of encryption algorithms is more excellent in security

Options:

A.

AES

B.

3DES

C.

SHA

D.

MD5(128-bit)

Question 23

Exhibit.

As shown in the figure, Super VLAN is enabled on SWA (a LAN switch). The Super VLAN configuration is as follows:

Which of the following specifics the time order in which the preceding debugging information is generated?

Options:

A.

3--4--1--2

B.

1--2--3--4

C.

1--4--2--3

D.

3--2--1--4

Question 24

Refer to the exhibit.

OSPF process 1 is started on RTA and assigned to the vpn1 instance.

After the vpn-instance-capability simple command is configured in the OSPF view, which of the following statements are false?

Options:

A.

Bit B is not set in the router LSA generated by RTA in area 1.

B.

When RTA receives a Type 3 summary LSA with the DN bit in area 1, it ignores the calculation of the LSA.

C.

After RTA imports a BGP route from the MPLS VPN backbone network, if Domain ID of the BGP route is the same as that used in the local OSPF area and the BGP route is an intra-area route, a Type 3 summary LSA is generated and flooded to area 1.

D.

When RTA imports a BGP route from OSPF process 1, an extended community identification must be carried to specify the OSPF attributes of the route.

Question 25

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP)

snooping function are true?

Options:

A.

It prevents DHCP starvation attacks.

B.

It prevents fake DHCP server attacks.

C.

It prevents Mac Flood attacks.

D.

It prevents denial-of-service (Dos) attacks from changing the CHADDR value

Question 26

Refer to the exhibit.

As shown in the figure, inter-AS VPN Option A is used. CE 1 and CE 2 belong to the same VPN.AS 100 and AS 200 run IGP and LDP, respectively. ASBRs communicate with each other through EBGP. The loopback interface address of CE 1 is 10.1.1.1/24. Suppose CE 2 can ping CE 1. Which router allocates an inner label when PE 2 forwards packets from CE 2 to CE

1?

Options:

A.

PE 1

B.

P1

C.

ASBR 1

D.

ASBR 2

E.

P2

Question 27

Which of the following statements about the Martini VPLS are true?

Options:

A.

When LDP is used to transmit signaling, LDP TLVs carry the VPLS information.

B.

Labels are allocated for PWs in DU mode when they are established.

C.

Labels are allocated for PWs in DoD mode when they are established.

D.

Labels are retained using the liberal label retention method.

E.

A VC must be established using remote LDP.

Demo: 27 questions
Total 180 questions