When the Trunk port send the data frame, how to deal with?
- A . When the VLAN ID is the same as the PVID of the port and is a VLAN ID allowed by the port, remove the Tag and send the message
- B . When the VLAN ID is different from the PVID of the port, the data frame is dropped
- C . When the VLAN ID is different from the PVID of the port, replace it with PVID forwarding
- D . When the VLAN ID is different from the PVID of the port, strip off the TAG and forward
How many bits are there in the VLAN ID in the VLAN format defined by IEEE802.1Q?
- A . 12
- B . 6
- C . 10
- D . 8
In the network shown in the figure below, the output information of switch A is shown in the figure. Then in the MAC address table of switch A, which interface does the MAC address of host B correspond to?
- A . GigabitEthernet 0/0/3
- B . GigabitEthernet0/0/2
- C . Eth-Trunk 1
- D . GigabitEthernet0/0/1
All ports on the root-bridge switch are designated ports.
- A . True
- B . False
In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear?
- A . 8192 00-01-02-03-04-CC
- B . 4096 00-01-02-03-04-CC
- C . 0 00-01-02-03-04-CC
- D . 2048 00-01-02-03-04-CC
The number of VLANs that can be created using the commands "vlan batch 10 20" and "vlan batch 10 to 20" respectively is
- A . 11 and 11
- B . 11 and 2
- C . 2 and 2
- D . 2 and 11
By default, the root path cost of the root bridge in the STP protocol must be 0.
- A . True
- B . False
The administrator wants all hosts to be unable to access the Internet between 8:00-17:00 every day, so which ACL rule needs to be bound to the traffic-filter outbound in the GO/0/1 interface allocation?
- A . time-range am9topm5 08:00 to working-day
Acl number 2003
rule 5 deny time-range am9topjni5 - B . time-range am9topm5 08:00 to 17:00 off-day
#
acl number 2004
rule 5 permit time-range - C . time-range am9topm5 08:00 to 17:00 daily
acl number 2001
rule 5 deny time-range am9topm5 - D . time-range am9topm5 07:00 to 18:00 daily
Acl number 2002
As shown in the figure below, the wrong statement is:
acl number 2000]
rule 5 deny source 200.0.12.00.0.0.7 rule 10permit source200.0.12.00.0.0.15 #
interface GigabitEthernetO/0/1 traffic-filteroutbound acl2000
- A . The host whose source IP address is 200.0.12.4 cannot access the Internet
- B . The host whose source IP address is 200.0.12.2 cannot access the Internet
- C . The host whose source IP address is 200.0.12.8 cannot access the Internet
- D . The host whose source IP address is 200.0.12.6 cannot access the Internet
On Huawei equipment, if you use aaa authentication for authorization. When the remote server does not respond, you can authorize from the network equipment side.
- A . True
- B . False
What percentage does the DHCP client expect to send the lease renewal message for the first time?
- A . 0.5
- B . 0.875
- C . 1
- D . 0.25
After the administrator successfully logs in to the router through Telnet, and finds that the router’s interface IP address cannot be allocated, the possible reasons are ()
- A . The Telnet user level is incorrectly configured
- B . SNMP parameter is incorrectly configured
- C . The Telnet user authentication mode is incorrectly configured
- D . The administrator uses the telnet terminal software to prohibit the corresponding operation
vty configuration as shown in the figure, the user authority level is set to level 3.
[Huawei]user-interface vty o 14
[Huawei-ul-vtyo-14]acl 200o inbound
[Huavei-ui-vtyo-14]user privilege level 3
[Huavei-ui-vtyo-14]authentication-node password Please configure the login password (maxim length 16):huawei
- A . False
- B . True
When AP and AC are on different Layer 3 networks, what method is recommended for AP to discover AC? (Multiple Choice)
- A . Broadcasting method
- B . DNS
- C . DHCP
- D . Manually specified on AP
What frequency does IEEE 802.11n support? (Multiple Choice)
- A . 2.5GHz
- B . 2.4GHz
- C . 5GHz
- D . 6GHz
In IPv4 networks, AP supports static and DHCP methods to obtain IP addresses.
- A . True
- B . False
What is the maximum negotiation rate supported by the IEEE 802.llg standard?
- A . 300Mbps
- B . 150Mbps
- C . 54Kbps
- D . 1200Mbps
Which WLAN security policies support the link authentication method of Open mode? (Multiple Choice)
- A . WPA2-802.IX
- B . WPA2-PSK
- C . WEP
- D . WPA
Which of the following SNMP packets are sent to the NMS by the Agent on the managed device?
- A . Set-Request
- B . Get-Request
- C . Get-Next-Request
- D . Response
Which field is added to the IPv6 packet header than the IPv4 packet header?
- A . Destination Address
- B . Flow Label
- C . Version
- D . Source Address
Which of the following statements about RA and RS in IPv6 are correct? (Multiple Choice)
- A . RS is used to reply address prefix information
- B . RA is used to request address prefix information
- C . RS is used to request address prefix information
- D . RA is used to reply address prefix information
Telnetlib is a module that implements the Telnet protocol that comes with Python.
- A . True
- B . False
The controller is the core component of SDN. The controller connects to the device through the southbound interface. Which of the following belong to the controller southbound protocol? (Multiple Choice)
- A . SNMP
- B . PCEP
- C . OpenFlow
- D . NETCONF
In the campus network, network reliability can be improved by using link aggregation and stacking technology.
- A . True
- B . False
Using the command mkdir test in the VRP operating platform, the system will create a directory named test.
- A . True
- B . False
As shown in the figure, after the two routers are configured with OSPF, the administrator configures the <silent -interface s0/0/0> command on RTA, then the correct description of the following is (). (Multiple Choice)
- A . The neighbor relationship between the two routers will be down
- B . The neighbor relationship between the two routers will not be affected
- C . RTA will no longer send OSPF packets
- D . RTA will continue to receive, analyze and process OSPF packets sent by RTB
Which of the following statements about the default route are correct? (Multiple Choice)
- A . If the destination address of the message cannot match any other routing entries in the routing table, the router will forward the message according to the default route
- B . There must be a default route in the routing table of any router
- C . The default route can only be manually configured by the administrator
- D . In the routing table, the default route appears as a route to the network 0.0.0.0 (the mask is also 0.0.0.0)
In the network shown in the figure below, the router receives a data packet with a destination IP address of 11.0.12.1 from host A. After this data packet is forwarded by the router, what are the destination MAC and destination IP?
- A . MAC-C, 11.0.12.1
- B . MAC-D, 10.0.12.2
- C . MAC-D, 11.0.12.1
- D . MAC-B, 11.0.12.1
In the network shown in the figure below, assuming that all routers enable the OSPF protocol at the same time, which router is the BDR in this network?
- A . Router D
- B . Router B
- C . Router C
- D . Router A
There are multiple route entries to the same destination network in the routing table. These routes are called:
- A . Sub-optimal routing
- B . Multi-path routing
- C . Default route
- D . Equal cost routing