Exam4Training

H3C GB0-192-ENU H3CNE-RS+ Online Training

Question #1

The following devices that work at the data link layer of the OSI reference model are______.

  • A . WAN switch
  • B . Router
  • C . Repeater
  • D . Hub

Reveal Solution Hide Solution

Correct Answer: A
Question #2

During the establishment process of the TCP connection as shown in the figure, the Z part in SYN should be filled with ________.

  • A . a
  • B . b.
  • C . a+1
  • D . b+1

Reveal Solution Hide Solution

Correct Answer: D
Question #3

The control protocol port used by FTP by default is ______.

  • A . 20
  • B . 21
  • C . 23
  • D . 22

Reveal Solution Hide Solution

Correct Answer: B
Question #4

Use the ______ command to specify the operating system software to be used for next startup.

  • A . startup
  • B . boot-loader
  • C . bootfile
  • D . boot startup

Reveal Solution Hide Solution

Correct Answer: B
Question #5

Normally, routers will fragment packets whose length is greater than the interface MTU. In order to detect the line MTU, you can ping the destination address with the ______ parameter.

  • A . -a
  • B . -d
  • C . -f
  • D . -c

Reveal Solution Hide Solution

Correct Answer: C
Question #6

If a port running STP in an Ethernet switch does not receive or forward data, receives and sends BPDUs, and does not perform address learning, then the port should be in the ______ state.

  • A . Blocking
  • B . Listening
  • C . Learning
  • D . Forwarding
  • E . Waiting
  • F . Disable

Reveal Solution Hide Solution

Correct Answer: B
Question #7

The command to configure the bridge priority of the switch SWA to 0 is ______.

  • A . [SWA] stp priority 0
  • B . [SWA-Ethernet1/0/1] stp priority 0
  • C . [SWA] stp root priority 0
  • D . [SWA-Ethernet1/0/1] stp root priority 0

Reveal Solution Hide Solution

Correct Answer: A
Question #8

The IP address 10.0.10.32 and the mask 255.255.255.224 represent a ______.

  • A . Host address
  • B . Network address
  • C . Broadcast address
  • D . None of the above is correct

Reveal Solution Hide Solution

Correct Answer: B
Question #9

The subnet mask of IP address 132.119.100.200 is 255.255.255.240, then the broadcast address of the subnet where it is located is ______.

  • A . 132.119.100.207
  • B . 132.119.100.255
  • C . 132.119.100.193
  • D . 132.119.100.223

Reveal Solution Hide Solution

Correct Answer: A
Question #10

The well-known port number of the transport layer used by TFTP is ______.

  • A . 67
  • B . 68
  • C . 69
  • D . 53

Reveal Solution Hide Solution

Correct Answer: C

Question #11

In Windows operating system, which command can display ARP entry information?

  • A . display arp
  • B . arp-a
  • C . arp -d
  • D . show arp

Reveal Solution Hide Solution

Correct Answer: B
Question #12

Two empty-configured MSR routers are connected as shown in the figure. By configuring IP addresses, the GE0/0 interfaces of the two routers can communicate with each other. Now add the following configurations to the two routers:

RTA:

[RTA]ospf

[RTA-ospf-1] area 0

[RTA-ospf-1-area-0.0.0.0] network 192.168.1.1 0.0.0.3

[RTA-GigabitEthernet0/0] ospf dr-priority 2

RTB:

[RTB]ospf

[RTB-ospf-1] area 0

[RTB-ospf-1-area-0.0.0.0] network 192.168.1.1 0.0.0.3

[RTB-GigabitEthernet0/0] ospf dr-priority

Then after the OSPF neighbor status is stable, ______.

  • A . The OSPF interface priorities are the same, and OSPF DR election is not performed on the 192.168.1.0/30 network segment.
  • B . Of the two routers, one is DR and the other is BDR.
  • C . Of the two routers, one is DR and the other is DRother.
  • D . The neighbor status of the two routers is FULL and 2-Way respectively.

Reveal Solution Hide Solution

Correct Answer: B
Question #13

In the network environment as shown in the figure, perform the following NAT configuration on RTA:

[RTA]acl number 2000

[RTA-acl-basic-2000] rule 0 permit source 10.0.0.0 0.0.0.255

[RTA-acl-basic-2000] nat address-group 1 200.76.28.11 200.76.28.11

[RTA]interface Ethernet0/1

[RTA-Ethernet0/1] nat outbound 2000 address-group 1

After configuration, both Client_A and Client_B are accessing the Server, so the NAT table of RTA may be ______ at this time.

  • A . Protocol GlobalAddr Port InsideAddr Port DestAddr Port
    1 200.76.28.11 12289 100.0.0.1 1024 200.76.29.4 1024
    VPN: 0, status: NOPAT, TTL: 00:01:00, Left: 00:00:59
    1 200.76.28.11 12288 100.0.0.2 512 200.76.29.4 512
    VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:51
  • B . Protocol GlobalAddr Port InsideAddr Port DestAddr Port
    1 200.76.28.11 12289 100.0.0.1 1024 200.76.29.4 1024
    VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:59
    1 200.76.28.12 12288 100.0.0.2 512 200.76.29.4 512
    VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:51
  • C . Protocol GlobalAddr Port InsideAddr Port DestAddr Port
    1 200.76.28.12 12289 100.0.0.1 1024 200.76.29.4 1024
    VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:59
    1 200.76.28.11 12288 100.0.0.2 512 200.76.29.4 512
    VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:51
  • D . Protocol GlobalAddr Port InsideAddr Port DestAddr Port
    1 200.76.28.11 12289 100.0.0.1 1024 200.76.29.4 1024
    VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:59
    1 200.76.28.11 12288 100.0.0.2 512 200.76.29.4 512
    VPN: 0, status: 11, TTL: 00:01:00, Left: 00:00:51

Reveal Solution Hide Solution

Correct Answer: D
Question #14

In the network environment as shown in the figure, two routers are connected back-to-back through serial ports. The rate of the interconnection link must be set to 2Mbps. Which of the following statement below is correct?

  • A . It is necessary to confirm that the interface type and cable meet the V.24 regulations
  • B . Use the baudrate 2048000 command to configure the synchronization port of RTA.
  • C . Use the baudrate 2048000 command to configure the RTB synchronization port.
  • D . Use the virtual-baudrate 2048000 command to configure the synchronization port of RTB.
  • E . Use the bandrate2048000 command to configure the synchronization port of RTA, and use the virtual-baudrate2048000 command to configure the synchronization port of RTB.

Reveal Solution Hide Solution

Correct Answer: B
Question #15

When configuring ISDN DCC, the customer configured the following dialer-rule on his MSR router:

[MSR] dialer-rule 1 acl 3000. So which of the following statements about this configuration are correct?

  • A . Only data packets matching ACL3000 can trigger dial-up
  • B . Only data packets matching ACL3000 will be sent by the router through the dial-up link
  • C . There is no permit or deny defined, and the configuration is wrong.
  • D . The correct configuration should be: [MSR] dialer-rule 1 acl 3000 permit

Reveal Solution Hide Solution

Correct Answer: A
Question #16

The hub works on ______ of the OSI reference model.

  • A . Physical layer
  • B . Data link layer
  • C . Network layer
  • D . Transport layer

Reveal Solution Hide Solution

Correct Answer: A
Question #17

The device that implements network interconnection at the network layer is ______.

  • A . Router
  • B . Switch
  • C . Hub
  • D . Repeater

Reveal Solution Hide Solution

Correct Answer: A
Question #18

In the Open Systems Interconnection reference model (OSI), ______ transmits data streams in the form of frames.

  • A . Network layer
  • B . Session layer
  • C . Transport layer
  • D . Data link layer

Reveal Solution Hide Solution

Correct Answer: D
Question #19

Which of the following statement about the OSI reference model is correct?

  • A . The data at the transport layer is called a frame (Frame)
  • B . The data at the network layer is called a segment (Segment)
  • C . The data at the data link layer is called a packet (Packet)
  • D . The data in the physical layer is called bit (Bit)

Reveal Solution Hide Solution

Correct Answer: D
Question #20

The main function of the physical layer of the OSI reference model is ______.

  • A . Physical address definition
  • B . Establish an end-to-end connection
  • C . Transmitting bit streams between terminal devices, defining voltage, interface, cable standard and transmission distance, etc.
  • D . Transfer data from one host to another

Reveal Solution Hide Solution

Correct Answer: C

Question #21

Configure a static route on the router. It is known that the destination address is 192.168.1.0, the mask is 20 bits, the outbound interface is GigabitEthernet0/0, and the outbound interface IP address is 10.10.202.1. Which of the following configurations are correct?

  • A . ip route-static 192.168.1.0 255.255.240.0 GigabitEthernet0/0
  • B . ip route-static 192.168.1.0 255.255.248.0 10.10.202.1
  • C . ip route-static 192.168.1.0 255.255.240.0 10.10.202.1
  • D . ip route-static 192.168.1.0 255.255.248.0 GigabitEthernet0/0

Reveal Solution Hide Solution

Correct Answer: C
Question #22

The IP protocol corresponds to layer ______ of the OSI reference model.

  • A . 5
  • B . 3
  • C . 2
  • D . 1

Reveal Solution Hide Solution

Correct Answer: B
Question #23

In the OSI reference model, the function of the network layer is mainly ______.

  • A . Transmit the original bit stream on the channel
  • B . Ensure that each piece of information reaching the other party is correct
  • C . Determine how data packets are routed from source to destination
  • D . Strengthen the function of transmitting raw bit streams of physical layer data and perform traffic control

Reveal Solution Hide Solution

Correct Answer: C
Question #24

Data segmentation is done in ______ in the OSI reference model.

  • A . Physical layer
  • B . Network layer
  • C . Transport layer
  • D . Access layer

Reveal Solution Hide Solution

Correct Answer: C
Question #25

Providing end-to-end reliable data transmission and flow control is the ______ of the OSI reference model.

  • A . Presentation layer
  • B . Network layer
  • C . Transport layer
  • D . Session layer

Reveal Solution Hide Solution

Correct Answer: C
Question #26

In the OSI reference model, encryption is a function of ______.

  • A . Physical layer
  • B . Transport layer
  • C . Session layer
  • D . Presentation layer

Reveal Solution Hide Solution

Correct Answer: D
Question #27

TCP belongs to ______ of the OSI reference model.

  • A . Network layer
  • B . Transport layer
  • C . Session layer
  • D . Presentation layer

Reveal Solution Hide Solution

Correct Answer: B
Question #28

UDP belongs to ______ of the OSI reference model.

  • A . Network layer
  • B . Transport layer
  • C . Session layer
  • D . Presentation layer

Reveal Solution Hide Solution

Correct Answer: B
Question #29

SPX belongs to ______ of the OSI reference model.

  • A . Network layer
  • B . Transport layer
  • C . Session layer
  • D . Presentation layer

Reveal Solution Hide Solution

Correct Answer: B
Question #30

DNS works on ______ of the OSI reference model.

  • A . Network layer
  • B . Transport layer
  • C . Session layer
  • D . Application layer

Reveal Solution Hide Solution

Correct Answer: D

Question #31

Use an Ethernet cable to connect the two switches. The MDI type of the interconnection port is configured as across, so the Ethernet cable should be ________.

  • A . Only crossover network cables can be used
  • B . Only direct network cables can be used
  • C . Both parallel network cables and crossover network cables are acceptable
  • D . Neither parallel network cables nor crossover network cables are allowed.

Reveal Solution Hide Solution

Correct Answer: A
Question #32

The standard physical medium of 100BASE-TX is ______.

  • A . Thick coaxial cable
  • B . Thin coaxial cable
  • C . Category 3 twisted pair
  • D . Category 5 twisted pair
  • E . Optical fiber

Reveal Solution Hide Solution

Correct Answer: D
Question #33

802.11b protocol defines 14 channels in the 2.4GHz frequency band, and adjacent channels overlap in the spectrum. In order to maximize the use of frequency band resources, which of the following sets of channels can be used for wireless coverage?

  • A . 1, 5, 9
  • B . 1, 6, 11
  • C . 2, 6, 10
  • D . 3, 6, 9

Reveal Solution Hide Solution

Correct Answer: B
Question #34

802.11b protocol defines 14 channels in the 2.4GHz frequency band, and adjacent channels overlap in the spectrum. In order to maximize the use of frequency band resources, which of the following sets of channels can be used for wireless coverage?

  • A . 1, 5, 9
  • B . 1, 6, 10
  • C . 2, 7, 12
  • D . 3, 6, 9

Reveal Solution Hide Solution

Correct Answer: C
Question #35

There are many types of WAN interfaces, which of the following description of WAN interfaces is incorrect?

  • A . V24 protocol interface can work in both synchronous and asynchronous modes. In the asynchronous mode, the link layer uses PPP encapsulation.
  • B . V35 protocol interface can work in both synchronous and asynchronous modes. In the asynchronous mode, the link layer uses PPP encapsulation.
  • C . The BRI/PRI interface is used for ISDN access. The default link encapsulation is PPP.
  • D . G.703 interface provides high-speed data synchronization communication services.

Reveal Solution Hide Solution

Correct Answer: B
Question #36

ping is actually an application developed based on ______ protocol.

  • A . ICMP
  • B . IP
  • C . TCP
  • D . UDP

Reveal Solution Hide Solution

Correct Answer: A
Question #37

IP address 203.108.2.110 is ______ address.

  • A . Class A
  • B . Class B
  • C . Class C
  • D . Class D

Reveal Solution Hide Solution

Correct Answer: C
Question #38

IP address 133.18.2.110 is ______ address.

  • A . Class A
  • B . Class B
  • C . Class C
  • D . Class D

Reveal Solution Hide Solution

Correct Answer: B
Question #39

When the source host pings the destination device, if the network is working normally, the destination device will respond with an ICMP______ message to the source host after receiving the message.

  • A . Echo Request
  • B . Echo Reply
  • C . TTL-Exceeded
  • D . Port-Unreachable

Reveal Solution Hide Solution

Correct Answer: B
Question #40

Which of the following options describes parameters that uniquely determine a TCP connection?

  • A . Source port number, source IP address
  • B . Destination port number, destination IP address
  • C . Source port number, destination port number
  • D . Source MAC address, destination MAC address
  • E . None of the above is correct

Reveal Solution Hide Solution

Correct Answer: E

Question #41

TCP protocol distinguishes different connections through ______.

  • A . Port number
  • B . Port number and IP address
  • C . Port number and MAC address
  • D . IP address and MAC address

Reveal Solution Hide Solution

Correct Answer: B
Question #42

During the establishment process of the TCP connection as shown in the figure, the X part in SYN should be filled with ________.

  • A . a
  • B . b
  • C . a+1
  • D . b+1

Reveal Solution Hide Solution

Correct Answer: C
Question #43

During the establishment process of the TCP connection as shown in the figure, the Y part in SYN should be filled with ________.

  • A . a
  • B . b
  • C . a+1
  • D . b+1

Reveal Solution Hide Solution

Correct Answer: C
Question #44

During the teardown process of the TCP connection as shown in the figure, the X part in the ACK should be filled with ______.

  • A . p
  • B . q
  • C . p+1
  • D . q+1

Reveal Solution Hide Solution

Correct Answer: C
Question #45

During the teardown process of the TCP connection as shown in the figure, the Y part in FIN should be filled in with ______.

  • A . p
  • B . q
  • C . p+1
  • D . q+1

Reveal Solution Hide Solution

Correct Answer: B
Question #46

Configure the MSR router that has just left the factory without configuration through the console port. The serial port baud rate of the terminal should be set to _____.

  • A . 9600
  • B . 2400
  • C . 115200
  • D . 38400

Reveal Solution Hide Solution

Correct Answer: A
Question #47

Which of the following description of VTY features in H3C equipment is correct?

  • A . Only used for Telnet to the device
  • B . Each device can support simultaneous access by multiple VTY users
  • C . Each VTY user corresponds to a physical interface
  • D . Passwordless verification is not supported

Reveal Solution Hide Solution

Correct Answer: B
Question #48

SSH uses the TCP port number ______ by default.

  • A . 20
  • B . 21
  • C . 22
  • D . 23

Reveal Solution Hide Solution

Correct Answer: C
Question #49

If you need to configure the IP address of the Ethernet port on the MSR, you should configure it under ______.

  • A . System view
  • B . User view
  • C . Interface view
  • D . Routing protocol view

Reveal Solution Hide Solution

Correct Answer: C
Question #50

Which of the following description of the startup process of the router system is correct?

  • A . Memory detection——start bootrom——application decompression——-application loading
  • B . Start bootrom——memory detection——application loading
  • C . Application decompression——Application loading——Start bootrom——Memory detection
  • D . Memory detection——application decompression——application loading

Reveal Solution Hide Solution

Correct Answer: A

Question #51

If you want to upgrade the router but do not have a network cable, you can use the configuration cable and use the ______ protocol to upgrade through the Hyper Terminal.

  • A . TFTP
  • B . Xmodem
  • C . Ymodem
  • D . Zmodem

Reveal Solution Hide Solution

Correct Answer: B
Question #52

On MSR routers , configuration files are files saved in ______ format.

  • A . Batch file
  • B . Text file
  • C . Executable file
  • D . Database files

Reveal Solution Hide Solution

Correct Answer: B
Question #53

If the user-specified configuration file does not exist, the router is initialized with _____.

  • A . Default configuration
  • B . Last saved configuration
  • C . The most used configuration
  • D . Use minimal configuration

Reveal Solution Hide Solution

Correct Answer: A
Question #54

The default data transmission port used by FTP is ______.

  • A . 20
  • B . 21
  • C . 23
  • D . 22

Reveal Solution Hide Solution

Correct Answer: A
Question #55

FTP protocol is a protocol based on ______.

  • A . UDP
  • B . TCP
  • C . IPX
  • D . SSH

Reveal Solution Hide Solution

Correct Answer: B
Question #56

TFTP protocol is a protocol based on ______.

  • A . UDP
  • B . TCP
  • C . IPX
  • D . SSH

Reveal Solution Hide Solution

Correct Answer: A
Question #57

Use the ______ command on the MSR router to turn off the information center function.

  • A . info-center disable
  • B . undo info-center enable
  • C . disable info-center
  • D . undo info-center

Reveal Solution Hide Solution

Correct Answer: B
Question #58

On the MSR router, if you want to modify some configurations after logging in to the device with access level, you can use the ______ command to switch to level 3.

  • A . super
  • B . level 3
  • C . password
  • D . login

Reveal Solution Hide Solution

Correct Answer: A
Question #59

When viewing the configuration, if there are too many configuration commands to be displayed on one screen, you can press ______ to display the next page after one screen is displayed.

  • A . <Ctrl+c> keys
  • B . <Enter> key
  • C . <Ctrl+p> keys
  • D . <Space> key

Reveal Solution Hide Solution

Correct Answer: D
Question #60

On the MSR router, by default, the configuration file is suffixed with ______.

  • A . .bin
  • B . .sys
  • C . .txt
  • D . .cfg

Reveal Solution Hide Solution

Correct Answer: D

Question #61

Use the ______ command on the MSR series router to display the current path of the file system.

  • A . dir
  • B . pwd
  • C . path
  • D . current-path

Reveal Solution Hide Solution

Correct Answer: B
Question #62

In the command line, if the user wants to return to the previous view from the current view, he should use ______.

  • A . return command
  • B . quit command
  • C . <Ctrl+z> key
  • D . <Ctrl+c> key

Reveal Solution Hide Solution

Correct Answer: B
Question #63

Users can use the ______ command to view historical commands.

  • A . display history-cli
  • B . display history-area
  • C . display history-command
  • D . display history-cache

Reveal Solution Hide Solution

Correct Answer: C
Question #64

On the MSR router, type the first few letters of a keyword in the command and press ______ to complete the command.

  • A . <Esc> key
  • B . <Space> key
  • C . <Enter> key
  • D . <Tab> key

Reveal Solution Hide Solution

Correct Answer: D
Question #65

On the MSR router, if a certain file has been set as a startup file, you can use the ______ command to check whether the setting is correct.

  • A . display boot
  • B . display begin
  • C . display startup
  • D . display start-configuration

Reveal Solution Hide Solution

Correct Answer: C
Question #66

On the MSR router, if you want to download files from the FTP Server, you should use the ______ command in the FTP command.

  • A . get
  • B . put
  • C . download
  • D . load

Reveal Solution Hide Solution

Correct Answer: A
Question #67

On the MSR router, once the system time is inaccurate, you can use the ______ command to adjust the system time.

  • A . time
  • B . clock
  • C . clock datetime
  • D . set datetime

Reveal Solution Hide Solution

Correct Answer: C
Question #68

On the MSR router, use the ______ command to view the current running version of the device.

  • A . display running
  • B . display software
  • C . display version
  • D . display current-version

Reveal Solution Hide Solution

Correct Answer: C
Question #69

On the MSR router, each functional module has its corresponding information display command. Generally, to view the running information of each functional module, you need to run the corresponding display commands one by one. In order to collect more information at one time and facilitate daily maintenance or problem location, you can execute the ______ command in any view to display the statistical information about the current operation of each major functional module of the system.

  • A . display all
  • B . display ip interface
  • C . display system-information
  • D . display diagnostic-information

Reveal Solution Hide Solution

Correct Answer: D
Question #70

During system startup, type ______ according to the prompts, and the system will interrupt booting and enter BootROM mode.

  • A . <Ctrl+a>
  • B . <Ctrl+b>
  • C . <Ctrl+z>
  • D . <Ctrl+c>

Reveal Solution Hide Solution

Correct Answer: B

Question #71

On the MSR router, when you use the delete command without parameters to delete files, the deleted files will be saved in ______.

  • A . RAM
  • B . ROM
  • C . Memory
  • D . Recycle-bin

Reveal Solution Hide Solution

Correct Answer: D
Question #72

On the MSR router, if you want to completely delete a discarded file in the Recycle Bin, you can execute the ______ command.

  • A . clear trash
  • B . reset recycle-bin
  • C . clear all
  • D . reset trash-bin

Reveal Solution Hide Solution

Correct Answer: B
Question #73

On the MSR router, if you want to view the files in the recycle bin, you can use the ______ command.

  • A . dir recycle-bin
  • B . dir trash
  • C . dir /all
  • D . dir all-file

Reveal Solution Hide Solution

Correct Answer: C
Question #74

On the MSR router , the -t parameter of the ping command specifies the timeout time of the ICMPEchoReply message . The value range is 1 ~ 65535, and the unit is milliseconds . Its default value is ______ milliseconds.

  • A . 200
  • B . 100
  • C . 2000
  • D . 1000

Reveal Solution Hide Solution

Correct Answer: C
Question #75

On the MSR router , the -m parameter of the ping command specifies the time interval for sending ICMPEchoRequest messages . The value range is 1 ~ 65535, in milliseconds . Its default value is ______ milliseconds.

  • A . 1000
  • B . 100
  • C . 200
  • D . 2000

Reveal Solution Hide Solution

Correct Answer: C
Question #76

There are two hops from the source device to the destination device. Use the tracert command to detect the path. When detecting the first hop, the source device sends a UDP packet with a TTL of 1 to a larger port of the destination device. When the packet reaches the intermediate hop, the TTL will change to 0, so the device sends a message to the source device. Respond to an ICMP______ message.

  • A . Time Exceeded
  • B . Echo Request
  • C . Echo Reply
  • D . Port Unreachable

Reveal Solution Hide Solution

Correct Answer: A
Question #77

There are two hops from the source device to the destination device. Use the tracert command to detect the path. When detecting the first hop, the source device sends a UDP packet with a TTL of 1 to the intermediate hop; when detecting the second hop, the source device sends a UDP packet with a TTL of 2. The packet reaches the intermediate hop first, and the TTL decreases. is 1. When the packet reaches the destination, the TTL will be decremented to 0. At this time, the destination device will send an ICMP______ message to the source to inform the source device that it has tracked the destination address.

  • A . Time Exceeded
  • B . Echo Request
  • C . Echo Reply
  • D . Port Unreachable

Reveal Solution Hide Solution

Correct Answer: D
Question #78

On the MSR router, the -tos parameter of the ping command specifies the ToS (Type of Service, service type) field value in the ICMPEchoRequest message. The value range is 0~255, and the default value is ______.

  • A . 46
  • B . 0
  • C . 63
  • D . 2

Reveal Solution Hide Solution

Correct Answer: B
Question #79

After turning on debugging, you can use the ______ command to turn off debugging.

  • A . no debugging all
  • B . undo debugging all
  • C . undo terminal monitor
  • D . undo terminal debugging

Reveal Solution Hide Solution

Correct Answer: B
Question #80

When using the ping command on the MSR router, you can use the ______ parameter to set the length of the ICMP message sent.

  • A . -n
  • B . -c
  • C . -b
  • D . -s

Reveal Solution Hide Solution

Correct Answer: D

Question #81

On the MSR router, if you want to specify the source address of the packet sent during the ping operation, you should use the ______ parameter.

  • A . -s
  • B . -i
  • C . -a
  • D . -d

Reveal Solution Hide Solution

Correct Answer: C
Question #82

The MSR router sent 5 packets by default during the last ping. If you want to specify the number of packets to send, you can use the ______ parameter.

  • A . -n
  • B . -d
  • C . -s
  • D . -c

Reveal Solution Hide Solution

Correct Answer: D
Question #83

After turning on the console’s system information monitoring function, use the ______ command to turn on the screen output of debugging information.

  • A . terminal monitor
  • B . terminal debugging
  • C . terminal screen
  • D . terminal information

Reveal Solution Hide Solution

Correct Answer: B
Question #84

The Layer 2 Ethernet switch searches for an entry in the MAC address table that matches the destination MAC address of the frame and forwards the frame out of the corresponding interface. If the search fails, the switch will ______.

  • A . Drop the frame
  • B . Send the frame out through all other ports except the incoming port
  • C . Find the fast forward table
  • D . Find the routing table

Reveal Solution Hide Solution

Correct Answer: B
Question #85

The MAC address table on a layer 2 switch is as shown in the figure. When the switch receives a frame with the destination MAC address 00-13-72-8E-4B-C1 from the E1/0/2 interface, the switch ______ the frame.

  • A . Sent from the E1/0/1 interface
  • B . Sent from the E1/0/2 interface
  • C . Sent from the E1/0/3 interface
  • D . Sent from the E1/0/4 interface
  • E . Send out from all interfaces on the switch
  • F . Discard directly

Reveal Solution Hide Solution

Correct Answer: F
Question #86

To configure Trunk on the link between Ethernet switches and allow the transmission of VLAN 10 and VLAN 20 information, ______ must be configured on the switch.

  • A . [Switch-Ethernet0/1] port link-type trunk
  • B . [Switch] port link-type trunk
  • C . [Switch] port link-type access
  • D . [Switch-Ethernet0/1] port trunk pvid 10

Reveal Solution Hide Solution

Correct Answer: A
Question #87

If a port of an Ethernet switch running STP does not receive or forward data, receives but does not send BPDUs, and does not perform address learning, then the port should be in the ______ state.

  • A . Blocking
  • B . Listening
  • C . Learning
  • D . Forwarding
  • E . Waiting
  • F . Disable

Reveal Solution Hide Solution

Correct Answer: A
Question #88

If a port running STP in an Ethernet switch receives and forwards data, receives, processes and sends BPDUs, and performs address learning, then the port should be in the ______ state.

  • A . Blocking
  • B . Listening
  • C . Learning
  • D . Forwarding
  • E . Waiting
  • F . Disable

Reveal Solution Hide Solution

Correct Answer: D
Question #89

In the switched network as shown in the figure, all switches have the STP protocol enabled. Based on the information in the figure, which switch will be selected as the root bridge?

  • A . SWA
  • B . SWB
  • C . SWC
  • D . Insufficient information to judge

Reveal Solution Hide Solution

Correct Answer: A
Question #90

In the switching network as shown in the figure, all switches have the STP protocol enabled. Based on the information in the figure, which switch will be selected as the root bridge?

  • A . SWA
  • B . SWB
  • C . SWC
  • D . Insufficient information to judge

Reveal Solution Hide Solution

Correct Answer: B

Question #91

In the switching network as shown in the figure, all switches have the STP protocol enabled.

Based on the information in the figure, which switch will be selected as the root bridge?

  • A . SWA
  • B . SWB
  • C . SWC
  • D . SWD
  • E . Insufficient information to judge

Reveal Solution Hide Solution

Correct Answer: C
Question #92

In the switched network as shown in the figure, all switches have the STP protocol enabled.

Based on the information in the figure, which switch will be selected as the root bridge?

  • A . SWA
  • B . SWB
  • C . SWC
  • D . SWD
  • E . Insufficient information to judge

Reveal Solution Hide Solution

Correct Answer: B
Question #93

In the switched network as shown in the figure, all switches have the STP protocol enabled. SWA was chosen as the root bridge.

According to the information in the figure, the ______ port should be set to the Blocking state. (select one or more)

  • A . P1 of SWB
  • B . P2 of SWB
  • C . P1 of SWC
  • D . P2 of SWC
  • E . Insufficient information to judge

Reveal Solution Hide Solution

Correct Answer: D
Question #94

802.1x defines a port-based network access control protocol, and only defines the point-to-point connection method between access devices and access ports. The access port can only be a physical port.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #95

Both VLAN technology and port isolation technology can achieve Layer 2 isolation of data.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #96

A company purchased switches from two manufacturers, A and B, for network engineering implementation. Link aggregation technology needs to be used between switches from two vendors. After consulting the relevant documents, I learned that the switch of manufacturer A does not support the LACP protocol.

In this case, which of the following configuration methods are reasonable?

  • A . One side configures static aggregation and the other side configures dynamic aggregation.
  • B . One side configures static aggregation and the other side configures dynamic aggregation.
  • C . Configure dynamic aggregation on both sides
  • D . Configure static aggregation on both sides
  • E . Unable to use link aggregation

Reveal Solution Hide Solution

Correct Answer: D
Question #97

According to user requirements, the administrator needs to configure the switch SWA port Ethernet1/0/1 as a Trunk port. Which of the following commands is the correct configuration command?

  • A . [SWA] port link-type trunk
  • B . [SWA-Ethernet1/0/1] port link-type trunk
  • C . [SWA] undo port link-type access
  • D . [SWA-Ethernet1/0/1] undo port link-type access

Reveal Solution Hide Solution

Correct Answer: B
Question #98

The port Ethernet1/0/1 of the switch SWA was originally an Access port type, and now it needs to be configured as a Hybrid port type. Which of the following commands is the correct configuration command?

  • A . [SWA]port link-type hybrid
  • B . [SWA-Ethernet1/0/1] port link-type hybrid
  • C . [SWA]undo port link-type trunk
  • D . [SWA-Ethernet1/0/1] undo port link-type trunk

Reveal Solution Hide Solution

Correct Answer: B
Question #99

The switch SWA port Gigabi Ethernet1/0/24 has been configured as a Trunk port type.

If you want to allow this port to allow VLAN2 and VLAN3 to pass, which of the following commands needs to be used?

  • A . [SWA] port trunk permit vlan 2 3
  • B . [SWA- Gigabi Ethernet1/0/24] port trunk permit vlan 2 3
  • C . [SWA] undo port trunk permit vlan 1
  • D . [SWA- Gigabi Ethernet1/0/24] undo port trunk permit vlan 2

Reveal Solution Hide Solution

Correct Answer: B
Question #100

If you want to check which VLANs currently exist on the switch , which of the following commands should be used ?

  • A . [SWA]display vlan all
  • B . [SWA]display vlan
  • C . [SWA]display vlan 1
  • D . [SWA]display vlan 2

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version