Exam4Training

Huawei H12-223_V2.5-ENU HCIP-Routing & Switching-IEEP V2.5 Online Training

Question #1

Enterprise networks often use DHCP to allocate IP addresses to users. Compared with static address allocation, DHCP address allocation greatly reduces the workload of network address management.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #2

Which of the following troubleshooting methods instead of using the TCP/IP reference model as a theoretical basis?

  • A .  Comparative configuration method
  • B .  From top to button method
  • C .  Bottom-up method
  • D .  Replacement method

Reveal Solution Hide Solution

Correct Answer: A
Question #3

Determining the project team members is the work content of the implementation phase.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #4

Which of the following reasons may lead to the MSTP protocol in LAN does not work? (Multiple Choice)

  • A . MSTP configuration error
  • B . The physical link oscillates, triggering the device to send many TC packets
  • C .  Enable MSTP device to receive the client or pass-through of MSTP TC messages
  • D .  The priority of the unconfigured port in the specified spanning tree instance

Reveal Solution Hide Solution

Correct Answer: ABC
Question #5

Regarding the gathering information stage in the processing of the troubleshooting in the structured network, which of the following items need to focus on? (Multiple Choice)

  • A .  What information needs to be collected
  • B .  How to collect the information
  • C . Whether authorization is required
  • D .  Risk assessment at the information gathering stage

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #6

 Huawei’s enterprise network management products are the eSight, and is divided into three versions: Starter Edition, Standard Edition, and, Professional Edition. Compared with the Standard Edition, what are the main characteristics of the following are added in the Professional Edition?

  • A .  Professional Edition provides database backup tools
  • B .  Support multi-user management
  • C .  Support WLAN, MPLS VPN management
  • D .  Support hierarchical management model

Reveal Solution Hide Solution

Correct Answer: D
Question #7

 Which of the following options is the work that needs to be done at the project planning stage? (Multiple Choice)

  • A .  Determine the technical plan
  • B .  Understand the project background
  • C .  Choose network products
  • D .  Determine project requirements
  • E .  Plan IP address

Reveal Solution Hide Solution

Correct Answer: BD
Question #8

 In a complex network environment with financial, OA ( Office Automation System , Office Automation), production, and even more business systems, which of the following should be first concerned during the network troubleshooting?

  • A .  Assignment of IP address
  • B .  Model of network equipment
  • C .  Data flow direction of each business system
  • D .  The environment of the computer room

Reveal Solution Hide Solution

Correct Answer: C
Question #9

 In what occasions is the " looping " test generally used?

  • A .  Test whether the application can connect normally
  • B .  Test whether the routing protocol can effectively avoid loops
  • C .  Test whether the switch can effectively carry out loop containment and broadcast containment
  • D .  Test whether the physical circuit is interrupted

Reveal Solution Hide Solution

Correct Answer: D
Question #10

 As an effective security mechanism, DHCP SNOOPING can prevent which of the following attacks? (Multiple Choice)

  • A .  Prevent DHCP spoofing attacks
  • B .  Prevent DOS attacks on the DHCP server
  • C .  Prevent MAC address flooding attacks
  • D .  Combine the DAI function to check the source MAC address of the data packet
  • E .  Combine the IPSG function to check the source IP address of the data packet 

Reveal Solution Hide Solution

Correct Answer: ABE

Question #11

 Which of the following is the key to network design?

  • A .  Innovation of key technologies
  • B .  Selection of equipment lines and other elements
  • C .  Improve performance at a reasonable cost
  • D .  Ensure that the network is stable and reliable

Reveal Solution Hide Solution

Correct Answer: B
Question #12

 Enterprises in order to improve the reliability of the interconnection of exports, often use the method of a plurality of links connecting different operators. When using this method, you need to focus on the flow path of the outgoing direction and incoming direction, or may affect the quality of the network.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #13

 Project acceptance as long as party A and Party B are present, no third party involved.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #14

 Optical power is generally used DBM represented, which of the following DBM is the current most optical transceiver device to receive and identify data?

  • A . -30DBM
  • B . -10DBM
  • C . 10DBM
  • D . 30DBM

Reveal Solution Hide Solution

Correct Answer: B
Question #15

 When the network administrator tries to access the internal network devices through telnet, found it impossible to access. Which of the following is least likely reason?

  • A . The route is unreachable, and the client and server cannot establish a TCP connection
  • B .  The number of users logging in to the device has reached the upper limit
  • C .  ACL is bound to the VTY user interface
  • D . VTP user interface is configured with protocol inbound all

Reveal Solution Hide Solution

Correct Answer: D
Question #16

 Ethernet is a network supporting broadcast network, once the network has a loop, this simple broadcast mechanism will lead to disastrous consequences. Which of the following phenomena may be caused by loops? (Multiple Choice)

  • A . The device cannot log in remotely
  • B .  When using the DISPLAY INTERFACE command on the device to view the interface statistics, it is found that the interface has received many broadcast-packets
  • C . CPU usage exceeds 70%
  • D .  Severe packet loss during network testing through the PING command

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #17

 Which device of the following is forwarding data based on the MAC address of data frames?

  • A . HUB
  • B .  Bridge
  • C .  Router
  • D .  Firewall

Reveal Solution Hide Solution

Correct Answer: B
Question #18

 During the inspection of operation equipment, which of the following statements is correct?

  • A . You can check the memory usage of the device by executing the display memory-usage command. If "Memory Using Percentage Is" exceeds 80%, you need to pay special attention currently.
  • B . You can check the running status of the board by executing the display device command, the “Online” of the board should be “Present”
  • C . You can view the fan status by executing the display fan command. When the Present item is NO, it means normal
  • D . You can view the FTP network service port by executing the display ftp-server command, and the unused FTP network service port needs to be recorded

Reveal Solution Hide Solution

Correct Answer: B
Question #19

 Which of the following link can run the PPP protocol but cannot run the HDCL protocol? (Multiple Choice)

  • A . ATM
  • B . ISDN
  • C . MSTP
  • D . PSTN
  • E . E1

Reveal Solution Hide Solution

Correct Answer: BD
Question #20

 The event marking the end of the network planning phase is:

  • A .  Project establishment
  • B .  Issuing bids
  • C .  Contract signing
  • D .  Project preliminary inspection

Reveal Solution Hide Solution

Correct Answer: B

Question #21

 Project ranges may be defined in terms of three aspects, which of the following are not included?

  • A .  Functional boundaries
  • B .  Coverage area
  • C .  Investment quota
  • D .  Engineering boundary

Reveal Solution Hide Solution

Correct Answer: C
Question #22

 When the DHCP client and DHCP server exists the device, if the IP address of the DHCP server global address pool and the IP address on the VLANIF interface of client connecting on a relay device is not in the same network segment, it will cause DHCP failure.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #23

 In the current Internet access market, the FTTH (Fiber To The Home) is mainly popularize, which of the following technology will be mainly used by FTTH?

  • A . GPON/EPON
  • B . XDSL
  • C . FTTH
  • D . HFCs

Reveal Solution Hide Solution

Correct Answer: A
Question #24

 About description of IP address assignment, which of the following is correct? (Multiple Choice)

  • A .  Unless AnyCast is used, the IP address of the entire network must remain unique
  • B . IPv4 address space is divided into three categories: A, B, and C
  • C . When assigning addresses, if the /24 -bit mask length is used uniformly, the network design can be simplified
  • D .  In order to improve the efficiency of the use of IP addresses, we generally use VLSM and determine the mask length as needed

Reveal Solution Hide Solution

Correct Answer: AD
Question #25

 The high-risk operation plan is generally approved and finalized one day before implementation.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #26

 Layer 2 network architecture compared with the Layer 3 network architecture, with a simple structure, high efficiency advantages of data forwarding, so the future network structure will be fully turned to a Layer 2 network architecture, Layer 3 network architecture will be phased out.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #27

 Which of the following belong to the sub-process or stage of the structured network troubleshooting process? (Multiple Choice)

  • A .  Comparison configuration
  • B .  Report failure
  • C .  Reasons list
  • D .  Investigate one by one

Reveal Solution Hide Solution

Correct Answer: CD
Question #28

 In the network design, we can provide higher reliability for business customers through a network of redundant topology selection, which of the following topological structure can provide with redundancy? (Multiple Choice)

  • A .  Star topology
  • B .  Ring topology
  • C .  Bus topology
  • D .  Double star topology

Reveal Solution Hide Solution

Correct Answer: BD
Question #29

 Currently, which of the following architecture is the mainstream use of switches ? A. Bus type

B. Shared memory type

C. Switching matrix

D. Distributed

E. CLOS architecture

Reveal Solution Hide Solution

Correct Answer: C
Question #30

 Network Optimization major work content does not include:

  • A .  Hardware optimization
  • B .  Software optimization
  • C .  Network expansion
  • D .  Replace the computer room air conditioner

Reveal Solution Hide Solution

Correct Answer: D

Question #31

 Which of the following is the source of demand for network optimization? (Multiple Choice)

  • A .  After long-term network maintenance, some summarized problems and improvement points, put forward relevant suggestions, and carry out centralized rectification
  • B .  Video conferencing services need to be carried out in the network, and switching equipment supporting Layer 2 multicast functions needs to be added
  • C . The environmental problem of a weak current well, the signal line is seriously aging, and needs to be replaced collectively
  • D . For corporate information security needs, add new security equipment

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #32

 The current internal corporate networks often use private IP addresses to communicate, then which of the following addresses belong to private IP addresses?

  • A . 0.1.1.1
  • B . 127.5.4.3
  • C . 128.0.0.5
  • D . 172.24.35.36
  • E . 231.33.24.35

Reveal Solution Hide Solution

Correct Answer: D
Question #33

 What are the main difficulties of cutover? (Multiple Choice)

  • A .  Minimize the scope that affects the business
  • B .  Do the best in risk avoidance
  • C .  Develop a complete cutover plan
  • D .  Smoothly execute cutover

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #34

 In order to save the cost of equipment, the position of the network monitoring optimization can be a network outlet, server interface, the key link.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #35

 S7700 and S9700 are both Huawei’s modular campus switches. Compared with S7700, S9700 has the characteristics as follows:

  • A . S9700 switches provide more slots and more ports
  • B . S9700 switches provide non-blocking data exchange capabilities
  • C . S9700 provides provide redundant engines, redundant power supplies and redundant fans
  • D . S9700 switches provide data center features such as TRILL ratio and FCOE

Reveal Solution Hide Solution

Correct Answer: B
Question #36

 When troubleshooting the EBGP neighbor relationship faults, you find two directly connected devices use LOOPBACK port to establish a connection, so execut the DISP; AY-CURRENT CONFIGURATION CONFIGURATION BGP to view PEER EBGP-MAX-HOP HOP- COUNT configuration, which of the following statements is correct?

  • A . hop-count must be greater than 1
  • B . hop-count must be greater than 2
  • C . hop-count must be greater than 15
  • D . hop-count must be greater than 255

Reveal Solution Hide Solution

Correct Answer: A
Question #37

 During the software and configuration backup, which of the following statements is correct?

  • A .  To back up the software version, and the same product, the same version should be backed up multiple times
  • B . License does not need to be backed up
  • C .  After the configuration of the device is changed, there is no need to back up the configuration file
  • D .  The purpose of backup is to restore network functions in extreme cases

Reveal Solution Hide Solution

Correct Answer: D
Question #38

 Regarding the description of the OSPF neighbor relationship faults, which of the following statement is incorrect?

  • A .  Stuck in the ExStart state indicates that the MTU between neighboring routers does not match or the OSPF RID (Router ID) is duplicated
  • B .  For non-DR/BDR routers on the Ethernet link. It is acceptable to be stuck in a 2-way state
  • C .  Stuck in the Init state indicates that the router has received the Hello message from the neighbor, but the Hello message does not contain the OSPF RID (Router ID) of the receiving router
  • D .  Stuck in the Attempt state indicates that the router does not send unicast Hello packets to the configured neighbors

Reveal Solution Hide Solution

Correct Answer: D
Question #39

 Coaxial cable typically used to carry video signals, data signals cannot be carried

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #40

 When checking service running status, which of the following statements is correct?

  • A .  When checking the multicast forwarding table information, you can execute the display multicast forwarding-table command to view the Layer 2 multicast forwarding table entries
  • B .  When checking the multicast routing protocol, you can view the multicast routing table by executing the display multicast routing-table command. If the intra-domain multicast routing protocol uses PIM-SM, then the interfaces connected to the multicast do not need to enable IGMP
  • C .  When checking VRRP state, by performing display vrrp and display vrrp statistics command to view, "State" should be "Initailize" state
  • D .  When checking the anti-attack detection configuration, you can execute the display current-configuration | include car command, and there should be anti-attack configuration. If it is not configured, use the car command to configure the anti-attack function for the device

Reveal Solution Hide Solution

Correct Answer: D

Question #41

 The purpose of the organization cutover started coordination is mainly for good customer communication and project information, and communicate with other parties is not very important.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #42

 Which of the following is the event that no need the customer’s signature in the cutover project?

  • A .  Finalized cutover plan
  • B .  Change application form
  • C .  Change reminder
  • D .  Cutover completion report

Reveal Solution Hide Solution

Correct Answer: C
Question #43

 What are the reasons below may cause IS-IS fault neighbor relations? (Multiple Choice)

  • A .  The device at both ends of the link is configured with the same System ID
  • B .  IS-IS Levels at both ends of the link do not match
  • C . When establishing IS-IS Level-1 neighbors, the area addresses of the devices at both ends of the link do not match
  • D .  The IP addresses of the interfaces on both ends of the link are not in the same network segment

Reveal Solution Hide Solution

Correct Answer: ABCD
ABCD

44 . Industry background to understand what the project can grasp the following information ?


Question #44

On Monday morning, you received a phone call at the office seat, an employee said he could not through the PC to access the Internet, you want to get technical support. So you use the ping command on his PC to test, and use the tracert command to see where the packet is lost.

Which of the following methods of network troubleshooting belong to ?

  • A .  Comparative configuration method
  • B .  Bottom-up approach
  • C .  Confirm business traffic path
  • D .  Self-term down method

Reveal Solution Hide Solution

Correct Answer: C
Question #45

In the layer 2 switching network, the device forwards data based on the MAC address, so the data can be filtered according to the MAC address. Therefore, the firewall running in transparent mode cannot filter the layer 3 information of the data packet.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #46

When unpacking and inspecting the goods, what content needs to be checked on the packing list ? (Multiple Choice)

  • A . Part code
  • B . Part model
  • C . Number of parts
  • D . Project name

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #47

When configuring the DHCP Relay function on the device, the VLANIF interface connecting the relay to the client must be bound to the DHCP server group, and the binding DHCP server group must be configured with the proxy DHCP server IP address.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #48

What are the main difficulties in cutover? (Multiple Choice)

  • A . Minimize the scope of business impact
  • B . Do the best in risk avoidance
  • C . Develop a complete cutover plan
  • D . Profit execution cutover

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #49

When a structured network troubleshooting process is used for troubleshooting, the results are predictable, and the impact of the troubleshooting process is controllable, and no new risks will be introduced.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #50

Two hosts are connected to the same switch and belong to the same VLAN and the same network segment. Now the two hosts cannot ping each other. Which of the following is the possible cause ? (Multiple Choice)

  • A . The host is configured with incorrect static ARP
  • B . Port isolation is configured on the switch
  • C . The interface is manually shut down or the physical interface is damaged
  • D . Wrong port and MAC address binding is configured on the switch

Reveal Solution Hide Solution

Correct Answer: ABCD

Question #51

In the preliminary analysis of the cutover project, which of the following aspects should be considered? (Multiple Choice)

  • A . Necessity
  • B . Feasibility
  • C . Risk
  • D . Cost

Reveal Solution Hide Solution

Correct Answer: ABC
Question #52

When troubleshooting the network, you find that there may be a problem with the OSPF configuration on a certain router, but when you log in to the network device to check the OSPF configuration, you find that the OSPF and BFD linkage configuration is also wrong, so you modify the configuration of OSPF and BFD.

The network troubleshooting method belongs to which one of the following?

  • A . Block method
  • B . Comparative configuration method
  • C . Segmentation method
  • D . Bottom-up approach

Reveal Solution Hide Solution

Correct Answer: A
Question #53

What are the main tasks in the acceptance phase of cutover? (Multiple Choice)

  • A . Transfer of data
  • B . Transition training
  • C . Acceptance meeting
  • D . Accounting for business expenses

Reveal Solution Hide Solution

Correct Answer: ABC
Question #54

Which of the following steps or measures belong to the troubleshooting phase of the structured network troubleshooting process?  (Multiple Choice)

  • A . Emergency plan
  • B . Preparation for rollback
  • C . Temporary environment construction
  • D . Information filtering

Reveal Solution Hide Solution

Correct Answer: AB
Question #55

Which of the following aspects should be considered in the cutover risk assessment? (Multiple Choice)

  • A . Key locations of risk points
  • B . Scope of risk impact
  • C . Time of risk impact
  • D . Loss caused by risk

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #56

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

  • A . Stable
  • B . Bandwidth
  • C . Delay
  • D . Jitter
  • E . Security

Reveal Solution Hide Solution

Correct Answer: BCD
Question #56

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

  • A . Stable
  • B . Bandwidth
  • C . Delay
  • D . Jitter
  • E . Security

Reveal Solution Hide Solution

Correct Answer: BCD
Question #56

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

  • A . Stable
  • B . Bandwidth
  • C . Delay
  • D . Jitter
  • E . Security

Reveal Solution Hide Solution

Correct Answer: BCD
Question #56

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

  • A . Stable
  • B . Bandwidth
  • C . Delay
  • D . Jitter
  • E . Security

Reveal Solution Hide Solution

Correct Answer: BCD
Question #56

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

  • A . Stable
  • B . Bandwidth
  • C . Delay
  • D . Jitter
  • E . Security

Reveal Solution Hide Solution

Correct Answer: BCD

Question #56

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

  • A . Stable
  • B . Bandwidth
  • C . Delay
  • D . Jitter
  • E . Security

Reveal Solution Hide Solution

Correct Answer: BCD
Question #56

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

  • A . Stable
  • B . Bandwidth
  • C . Delay
  • D . Jitter
  • E . Security

Reveal Solution Hide Solution

Correct Answer: BCD
Question #56

Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)

  • A . Stable
  • B . Bandwidth
  • C . Delay
  • D . Jitter
  • E . Security

Reveal Solution Hide Solution

Correct Answer: BCD
Question #64

Solve the fault

  • A . 1->2->3->6->4->5->7
  • B . 1->2->3->6->5->4->7
  • C . 2->1->3->5->6->4->7
  • D . 2->1->5->3->4->6->7

Reveal Solution Hide Solution

Correct Answer: D
Question #65

Cutover rollback refers to roll back the current changes to the state before execution.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #66

A user reported that he could not receive emails through the email client. What are the possible reasons? (Multiple choice)

  • A . The user does not have corresponding permissions
  • B . Mail server failure
  • C . Link failure
  • D . User client setting error

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #67

In the judgment and analysis stage of the structured network troubleshooting process, as long as the failure information, maintenance information, and change information are summarized, a list of causes of network failures can be obtained.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #68

Which of the following WAN links belong to the message switching network? (Multiple choice)

  • A . ATM
  • B . ISDN
  • C . MSTP
  • D . PSTN
  • E . X.25

Reveal Solution Hide Solution

Correct Answer: AE
Question #69

Which businesses in the enterprise usually need to optimize the user experience? (Multiple choice)

  • A . Video surveillance business
  • B . Video conferencing business
  • C . Voice phone service
  • D . Network management business

Reveal Solution Hide Solution

Correct Answer: ABC
Question #70

The essence of SDN is to build a centralized brain for the network, and achieve the optimal global traffic through a global view and centralized control.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A

Question #71

Which of the following parameters do we generally use to measure the performance of the switch? (Multiple choice)

  • A . Port density
  • B . CPU frequency
  • C . Exchange capacity
  • D . Packet forwarding rate
  • E . MAC table capacity
  • F . Port rate

Reveal Solution Hide Solution

Correct Answer: CD
Question #72

What are the main contents of the cutover project plan? (Multiple choice)

  • A . Cutover preparation
  • B . Cutover implementation
  • C . Rollback plan
  • D . Emergency plan

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #73

Regarding the use of the network management system, which of the following options are correct? (Multiple choice)

  • A . The network management software has an alarm management function. For example, the UP/DOWN changes of the device port can be immediately fed back to the network management software through TRAP messages, so that the network administrator can discover and deal with network faults in time
  • B . The network management software has a performance management function. The network management software can automatically collect and count the points and rates of the device’s CPU and memory, and can assist the network administrator to analyze the network performance bottleneck.
  • C . The network management software has a configuration file management function, which can perform automatic backup, comparison, and restoration of configuration files, so that network administrators can automatically back up configuration files in batches
  • D . The network manager can regularly output reports according to user needs to provide reference for later network optimization

Reveal Solution Hide Solution

Correct Answer: ABCD
Question #74

When troubleshooting a network, if you need to confirm the business traffic path, which of the following tasks may be required? (Multiple choice) 

  • A . Confirm the data link layer service traffic path
  • B . Confirm the network layer business traffic path
  • C . Investigate business traffic path planning in the network design stage
  • D . Confirm the frequency of failure

Reveal Solution Hide Solution

Correct Answer: ABC
Question #75

When upgrading the equipment software, which statement about the operating window time is wrong?

  • A . Determined by the user’s service interruption time
  • B . The time must be greater than the execution time of the upgrade operation
  • C . Allow a certain amount of time for troubleshooting
  • D . The operating window time only needs to be notified to the network maintenance personnel, not to the user.

Reveal Solution Hide Solution

Correct Answer: D
Question #76

When troubleshooting a network fault, you locate the fault location on a router. This router and another router in the network are mutually redundant. Then which of the following troubleshooting methods is most suitable?

  • A . Comparative configuration method
  • B . Bottom-up approach
  • C . Confirm business traffic path
  • D . Top-down method

Reveal Solution Hide Solution

Correct Answer: A
Question #77

Which of the following is not an external risk of the project ?

  • A . Exchange rate changes
  • B . Heavy rain
  • C . Social unrest
  • D . Differences in industry standards

Reveal Solution Hide Solution

Correct Answer: D
Question #78

For the purpose of optimizing access security, which of the following is the most appropriate ?

  • A . Ensure that sensitive management information is not stolen illegally
  • B . Prevent and reduce external network attacks and harm
  • C . Ensure the access security of key business
  • D . Realize user’s secure access control

Reveal Solution Hide Solution

Correct Answer: D
Question #79

After replacing the twisted pair, the user finds that he cannot access the network. In this case, which troubleshooting method is most appropriate?

  • A . Comparative configuration method
  • B . Top-down method
  • C . Bottom-up approach
  • D . Replacement method

Reveal Solution Hide Solution

Correct Answer: D
Question #80

The biggest difference between fat AP and thin AP is that fat AP can access more users, provide higher performance, and is more suitable for large-scale company networking.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B

Question #81

Which of the following is not an operation to verify the cutover plan?

  • A . Set up an experimental bureau for testing
  • B . Technical review by all parties
  • C . Original factory expert review
  • D . Risk prediction

Reveal Solution Hide Solution

Correct Answer: D
Question #82

Which of the following different types of line interfaces is not in the same category as the others?

  • A . BNC interface
  • B . FC interface
  • C . LC interface
  • D . SC interface

Reveal Solution Hide Solution

Correct Answer: A
Question #83

The current switches all run the MSTP protocol by default, so in the description of the default state, which of the following options is correct?

  • A . All switches run in the same region by default
  • B . The calculation speed of STP is faster than when multiple instances are configured
  • C . Because of lack of configuration, all switches will switch the operating mode to RSTP
  • D . Each switch runs in an independent region

Reveal Solution Hide Solution

Correct Answer: D
Question #84

Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is the most unlikely

  • A . The VRRP backup group configurations on both ends are inconsistent
  • B . The link that transmits the VRRP notification message is faulty
  • C . The low-priority VRRP backup group discards the received VRRP notification packets as illegal packets
  • D . Master device sends 1 notification message per second

Reveal Solution Hide Solution

Correct Answer: D
Question #85

In the finishing work of the structured network troubleshooting process, which of the following are the documents that need to be handed over ? (Multiple choice)

  • A . Troubleshooting process documentation
  • B . Troubleshooting summary report
  • C . Change backup and maintenance recommendations
  • D . User communication plan

Reveal Solution Hide Solution

Correct Answer: ABC
Question #86

The current Huawei firewall product USG6X00 series is a UTM firewall product. While supporting stateful inspection packet filtering, it also supports functions such as intrusion detection, anti-virus and URL filtering.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #87

If the network transformation in the project will affect the business running on the existing network, then the implementer needs to formulate strict implementation process specifications and risk avoidance measures. We generally define this type of project as a cutover project.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #88

You use a Huawei router as an SSH client to log in to another Huawei router, but the login fails.

You suspect that it may be a configuration error on the SSH server. When checking the cause of the server configuration failure, which of the following is the most unlikely?

  • A . The SSH protocol is not bound to the VTY interface of the user interface
  • B . User service type, authentication type, user authentication service type are not configured
  • C . The server and client SSH versions are inconsistent
  • D . SSH first authentication function is not enabled

Reveal Solution Hide Solution

Correct Answer: D
Question #89

Regarding the purpose of managing security optimization, which of the following is the most appropriate?

  • A . Ensure that sensitive management information is not stolen illegally
  • B . Prevent/reduce external network attacks and harm
  • C . Ensure the access security of key business
  • D . Realize user’s secure access control

Reveal Solution Hide Solution

Correct Answer: A
Question #90

During the unpacking inspection, Xiao Wang found that the appearance of the device was not damaged, and all the modules of the device were operating normally when the device was powered on for the first time, but after 24 hours of continuous operation, the board failed, then This situation is not eligible for the DOA process.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B

Question #91

When troubleshooting VRRP backup group flapping, you execute the vrrp vrid timer advertise command on the router to increase the interval between VRRP packets, and then repeatedly execute the display vrrp command on the Backup device to view the State field, and you find that the displayed information is always Keep it unchanged, which of the following descriptions is correct regarding the above operations?

  • A . The state of the Backup device may fluctuate because the interval between sending VRRP packets is too small.
  • B . The state of the Backup device may fluctuate because the interval between sending VRRP packets is too long.
  • C . The oscillation of the backup device status has nothing to do with the interval between VRRP packets.
  • D . The cause of the failure is not found, and the time interval needs to be restored.

Reveal Solution Hide Solution

Correct Answer: A
Question #92

When troubleshooting MSTP, you executed the DISPLAY CURRENT-CONFIGURATION command to obtain the configuration file of the device. Which of the following statements is wrong?

  • A . Check the port configuration and confirm whether the MSTP-enabled port is enabled with the protocol message sending command, such as: BPDU ENABLE
  • B . Whether the MSTP port connected to the user terminal device is disabled or configured as an edge port
  • C . No matter whether the BPDU TUNNL is configured on the device, it will not affect MSTP
  • D . Check whether the device port is added to the correct VLAN

Reveal Solution Hide Solution

Correct Answer: C
Question #93

After the project is delivered, operation and maintenance costs will continue to be incurred. Which of the following items are costs incurred during operation and maintenance? (Multiple choice)

  • A . Energy costs
  • B . Route suggestion fee
  • C . Line rental fee
  • D . Equipment depreciation expenses
  • E . Staff costs

Reveal Solution Hide Solution

Correct Answer: ACE
Question #94

When selecting equipment, Xiao Wang needs to choose a Layer 3 switch with 100M interface from a series of campus switches provided by Huawei. Then which series of switches should he choose?

  • A . S2700
  • B . S3700
  • C . S5700
  • D . S6700

Reveal Solution Hide Solution

Correct Answer: B
Question #95

Ethernet is currently the most mainstream local area network. What factors usually need to be considered when selecting an Ethernet network? (Multiple choice)

  • A . Network speed
  • B . Network media
  • C . Network size
  • D . Network hierarchy
  • E . Packaging standards

Reveal Solution Hide Solution

Correct Answer: AB
Question #96

In a complex network environment, the use of non-institutionalized network troubleshooting procedures may lead to new failures, which will make the troubleshooting of network failures more difficult.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #97

When there are a large number of IP telephones and WLAN APs in the network, which function switch will we generally consider?

  • A . Switches with STP edge port function
  • B . Switch with POE function
  • C . Switches with SACG function
  • D . Switch with QOS function

Reveal Solution Hide Solution

Correct Answer: B
Question #98

What is the core idea of network troubleshooting?

  • A . Confirm business traffic path
  • B . Judgment analysis
  • C . Collect information
  • D . Top-Down approach

Reveal Solution Hide Solution

Correct Answer: A
Question #99

 The exclusion TELNET logon failure, which is a priority step to do?

  • A .  Check whether the client can ping the server
  • B .  Check whether the number of users logging in to the device has reached the upper limit
  • C .  Check whether ACL is configured in the VTY user interface view on the device
  • D .  Check whether the protocol configuration allowed for access in the VTY type user interface view is correct

Reveal Solution Hide Solution

Correct Answer: A
Question #100

 Device as SSH server, you must configure the local key pair

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A

Question #101

 The current corporate networks often use OSPF as the routing protocol, then use OSPF doing routing protocol, which of the following issues should be paid attention to? (Multiple choice)

  • A .  Confirm that the backbone area will not split
  • B .  Confirm whether there will be sub-optimal routes in the network under the OSPF routing rules
  • C .  Confirm that all non-backbone areas and backbone areas have correct and reliable links
  • D .  Confirm the topology of the OSPF network to ensure that OSPF does not have loops during route calculation
  • E .  Confirm that OSPF ‘s COST can correctly reflect the real bandwidth of links above 100M

Reveal Solution Hide Solution

Correct Answer: ABCE
Question #102

 Which of the following is not a major role in the development of the project delivery process?

  • A .  Increase customer satisfaction
  • B .  Clear division of responsibilities
  • C .  Improve work efficiency
  • D .  Reduce project risks

Reveal Solution Hide Solution

Correct Answer: B
Question #103

 The formula is the availability of

  • A . MTBF/MTTR/100%
  • B . MTTR/RTBF*100%
  • C . (MTBF+MTTR)/MTBF*100%
  • D . MTBF/(MTBF+MTTR)*100%

Reveal Solution Hide Solution

Correct Answer: D
Question #104

 The current network design patterns can generally be summarized into which of the following items? (Multiple choice)

  • A .  Modularity
  • B .  Automation
  • C .  Hierarchical
  • D .  Modernization
  • E .  Standardization

Reveal Solution Hide Solution

Correct Answer: AC
Question #105

 When troubleshooting a network failure is performed, you try to ping the remote destination host, discovery packets are lost, so which troubleshooting method is best to take next?

  • A .  Comparative configuration method
  • B .  Bottom-up approach
  • C .  Confirm business flow method
  • D .  Self-term down method

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version