Exam4Training

Huawei H31-161-ENU HCIE-Carrier IP (Written) Online Training

Question #1

Which statements about the edge access layer is true?

  • A . Using the packet technology it provides a comprehensive transport platform that boasts high reliability, quality of service (QoS) assurance, and large capacity.
  • B . It implement call control. With the software technology as the core, it completes basic real-time call control and connection control.
  • C . It connections users to the network by providing various access means, and converts the format of information can be transmitted on the network.
  • D . It process additional value-added service and operation support for established callas.

Reveal Solution Hide Solution

Correct Answer: B
Question #2

Which statement describes the delay variation requirement of the voice service for the IP bearer network?

  • A . No strict requirement
  • B . Bearer network delay variation + 1s
  • C . Bearer network delay variation +100 ms, allowed maximum delay variation +200ms
  • D . Bearer network delay variation = 10 ms. Allowed maximum delay variation =20ms

Reveal Solution Hide Solution

Correct Answer: D
Question #3

Which statement describes the packet loss ratio requirement of the voice service for the IP bearer network?

  • A . Allowed maximum packet loss =10-6
  • B . Allowed maximum packet loss =1%
  • C . No strict requirement
  • D . Allowed maximum packet loss =1%

Reveal Solution Hide Solution

Correct Answer: B
Question #4

Which of the following can be implemented in an IP backbone network?

  • A . RIP
  • B . BGP
  • C . ISIS
  • D . MPLS

Reveal Solution Hide Solution

Correct Answer: B, C, D
Question #5

RTA is a provider edge (PE) router. OSPF is deployed between RTA and a customer edge (CE) .

Which of the following can be used to avoid routing loops when RTA generate an autonomy system-external (ASE) link-state advertisement (LSA) and sends it to the CE?

  • A . Configuring the same VPN route tag on the PE
  • B . Configuring Shame Link among PEs
  • C . Setting DN-bit in the ASE LSA
  • D . Configuring the same domain ID on the PE

Reveal Solution Hide Solution

Correct Answer: C, D
Question #6

Exhibit:

As shown in the figure, external route 1.1.1.0/24 is imported to RTA that is located in the NSSA area RTD is a backbone area router. RTB and RTC are both area border router (ABRs).

OSPF configuration are as follows.

Which statement is true?

  • A . RTD receive two external LSAs whose LS_ID is 1.1.1.0
  • B . RTD receive an external LSAs whose LS_ID is 1.1.1.0 and advRouter is 2.2.2.2.
  • C . RTD receive an external LSAs whose LS_ID is 1.1.1.0 and advRouter is 3.3.3.3.
  • D . RTD receive an external LSAs whose LS_ID is 1.1.10/24 based on category 7 LSAs sent by RTA

Reveal Solution Hide Solution

Correct Answer: C
Question #7

1- On the backbone network, if a PE is connect to a CE, VPN instances need to b reconfigured on the PE, and interface on the PE for connecting to the CE must be bound to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface between PEs, IS-IS configured for PE interworking. PLSA basic capabilities and MPLS LSP are configured for LSP establishment, and MP _IBGP is configured for VPN route exchange VPN routes exchange , LDAP is short for Label Distribution Protocol, and IBGP is short for interior Border gateway protocol.

2-A CE exchange route exchange routers with a PE over External Border gateway Protocol (EBGP. Configure interior gateway protocol (IGP) on the IS-IS+MPLS backbone networking to achieve the interworking between PEs and IP routers.

  • A . -4
  • B . -3
  • C . -2
  • D . -5
  • E . -1

Reveal Solution Hide Solution

Correct Answer: D
Question #8

As shown in the figure. CE 1 and CE 3 belong to VPN-A, and CE 2 CE 2 4 belong to VPN-B VPN-target VPN-A is 111:1 and that of VPN-B is 222:2 users on different VPNs are not allowed to access each other.

Configuration principles are as follows:

On the backbone network VPNs are not connected to a CE, VPN instance need to be configured on the PE, and an interface on the PE for connecting to the CE must be bounded to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface Between

PEs, IS-IS is configured for PE interworking. MPLS basic capabilities and MPLS LDP are configured for MPLS LSP establishment, and MP-IBGP is configured for VPN route exchange.

How to enable CE 1 to learn routes from AS 64430?

  • A . Import IS-IS 200 routes in IS-IS process 100
  • B . Import IS-IS 100 routes in IS-IS process 100
  • C . Import BGP routes in IS-IS process 100
  • D . Import BGP routes in IS-IS process 200

Reveal Solution Hide Solution

Correct Answer: C
Question #8

As shown in the figure. CE 1 and CE 3 belong to VPN-A, and CE 2 CE 2 4 belong to VPN-B VPN-target VPN-A is 111:1 and that of VPN-B is 222:2 users on different VPNs are not allowed to access each other.

Configuration principles are as follows:

On the backbone network VPNs are not connected to a CE, VPN instance need to be configured on the PE, and an interface on the PE for connecting to the CE must be bounded to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface Between

PEs, IS-IS is configured for PE interworking. MPLS basic capabilities and MPLS LDP are configured for MPLS LSP establishment, and MP-IBGP is configured for VPN route exchange.

How to enable CE 1 to learn routes from AS 64430?

  • A . Import IS-IS 200 routes in IS-IS process 100
  • B . Import IS-IS 100 routes in IS-IS process 100
  • C . Import BGP routes in IS-IS process 100
  • D . Import BGP routes in IS-IS process 200

Reveal Solution Hide Solution

Correct Answer: C
Question #8

As shown in the figure. CE 1 and CE 3 belong to VPN-A, and CE 2 CE 2 4 belong to VPN-B VPN-target VPN-A is 111:1 and that of VPN-B is 222:2 users on different VPNs are not allowed to access each other.

Configuration principles are as follows:

On the backbone network VPNs are not connected to a CE, VPN instance need to be configured on the PE, and an interface on the PE for connecting to the CE must be bounded to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface Between

PEs, IS-IS is configured for PE interworking. MPLS basic capabilities and MPLS LDP are configured for MPLS LSP establishment, and MP-IBGP is configured for VPN route exchange.

How to enable CE 1 to learn routes from AS 64430?

  • A . Import IS-IS 200 routes in IS-IS process 100
  • B . Import IS-IS 100 routes in IS-IS process 100
  • C . Import BGP routes in IS-IS process 100
  • D . Import BGP routes in IS-IS process 200

Reveal Solution Hide Solution

Correct Answer: C

Question #8

As shown in the figure. CE 1 and CE 3 belong to VPN-A, and CE 2 CE 2 4 belong to VPN-B VPN-target VPN-A is 111:1 and that of VPN-B is 222:2 users on different VPNs are not allowed to access each other.

Configuration principles are as follows:

On the backbone network VPNs are not connected to a CE, VPN instance need to be configured on the PE, and an interface on the PE for connecting to the CE must be bounded to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface Between

PEs, IS-IS is configured for PE interworking. MPLS basic capabilities and MPLS LDP are configured for MPLS LSP establishment, and MP-IBGP is configured for VPN route exchange.

How to enable CE 1 to learn routes from AS 64430?

  • A . Import IS-IS 200 routes in IS-IS process 100
  • B . Import IS-IS 100 routes in IS-IS process 100
  • C . Import BGP routes in IS-IS process 100
  • D . Import BGP routes in IS-IS process 200

Reveal Solution Hide Solution

Correct Answer: C
Question #8

As shown in the figure. CE 1 and CE 3 belong to VPN-A, and CE 2 CE 2 4 belong to VPN-B VPN-target VPN-A is 111:1 and that of VPN-B is 222:2 users on different VPNs are not allowed to access each other.

Configuration principles are as follows:

On the backbone network VPNs are not connected to a CE, VPN instance need to be configured on the PE, and an interface on the PE for connecting to the CE must be bounded to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface Between

PEs, IS-IS is configured for PE interworking. MPLS basic capabilities and MPLS LDP are configured for MPLS LSP establishment, and MP-IBGP is configured for VPN route exchange.

How to enable CE 1 to learn routes from AS 64430?

  • A . Import IS-IS 200 routes in IS-IS process 100
  • B . Import IS-IS 100 routes in IS-IS process 100
  • C . Import BGP routes in IS-IS process 100
  • D . Import BGP routes in IS-IS process 200

Reveal Solution Hide Solution

Correct Answer: C
Question #8

As shown in the figure. CE 1 and CE 3 belong to VPN-A, and CE 2 CE 2 4 belong to VPN-B VPN-target VPN-A is 111:1 and that of VPN-B is 222:2 users on different VPNs are not allowed to access each other.

Configuration principles are as follows:

On the backbone network VPNs are not connected to a CE, VPN instance need to be configured on the PE, and an interface on the PE for connecting to the CE must be bounded to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface Between

PEs, IS-IS is configured for PE interworking. MPLS basic capabilities and MPLS LDP are configured for MPLS LSP establishment, and MP-IBGP is configured for VPN route exchange.

How to enable CE 1 to learn routes from AS 64430?

  • A . Import IS-IS 200 routes in IS-IS process 100
  • B . Import IS-IS 100 routes in IS-IS process 100
  • C . Import BGP routes in IS-IS process 100
  • D . Import BGP routes in IS-IS process 200

Reveal Solution Hide Solution

Correct Answer: C
Question #14

Suppose the preceding policy is retained. Apply inbound policies on RTC. RTD and RTE so that the values of the preferred-value attribute of route 1.1.1.132 are 50.40 and 30 respectively .

Which route will RTB prefer?

  • A . RTC, RTC, RTE, RTC, RTE
  • B . RTC, RTD, RTD, RTE. RTE
  • C . RTC, RTC, RTD, RTC, RTE
  • D . RTC, RTC, RTD, RTE, RTE

Reveal Solution Hide Solution

Correct Answer: A
Question #15

Exhibit:

As shown in the figure, RTA and have one BGP session. To detect fault fast, the BFD for BGP feature needs to be configured on RTA and RTB.

BGP-related configurations are as follows:

The only Ethernet link between RTA and RTB becomes faulty when the BGP neighbor session is in ESTABLISHED state and the BFD session is in the UP state .

Which statements is true? (Note: BFD works in asynchronous mode)

  • A . RTA detect the fault faster than RTB.
  • B . The BGP session between RTA and RTB is interrupted when the BGP hold time (time duration is 180s by default) express.
  • C . RTB detect the fault faster than RTA.
  • D . RTA and RTB detect the fault simultaneously.

Reveal Solution Hide Solution

Correct Answer: C
Question #16

Exhibit:

As shown in the figure, virtual private LAN service (VPLS) is enabled on routers PE 1 and PE 2. CEs are connected to PEs through QinQ and PC A and PC B are connected to the two CEs. The two PCs belong to the same VPN and can communicate with each other properly .

Which of the following statements about the communication process when you ping PC B from PC A are true?

  • A . PE 1 receives packets with a VLAN tag from CE 1 and adds a VLAN tag to these packets.
  • B . If the penultimate hop popping (PHP) feature of MPLS is enabled on PEs, a packet received by PE 2 from a P router has two VLAN tags one MPLS label.
  • C . PE 1 add two MPLS labels to a packet before sending the packet to a router.
  • D . A packet received by CE 2 from PE 2 has two VLAN tags CE 2 removed the outer tab and forwards the packets to PC B based on the inner tag

Reveal Solution Hide Solution

Correct Answer: A, B, C
Question #17

Exhibit:

As shown in the figure, Super VLAN is enabled on SWA (a LAN switch).

The Super VLAN configuration is as follows:

Which of the following specifics the time order in which the preceding debugging information is generated?

  • A . 3–4–1–2
  • B . 1–2–3–4
  • C . 1–4–2–3
  • D . 3–2–1–4

Reveal Solution Hide Solution

Correct Answer: D
Question #18

Configure VRFs and relevant policies on a PE as follows:

If a route is imported to the routing table of VRF 1, which VRF can the route match?

  • A . vrf4
  • B . vrf3
  • C . vrf2

Reveal Solution Hide Solution

Correct Answer: C
Question #19

Which statement about the configuration of route target (RT) and route distinguisher (RD) is true?

  • A . If routes need to exchange between two VPNs, the value of import RT of one VPN must be partially the same as Export RT of the other VPN.
  • B . RD and RT of a VPN instance cannot be the same as those of another VPN instance on the same
    PE.
  • C . If routers need to exchanged two VPNs, the value of import RT of one of the same as that of RT of the other VPN.
  • D . Two instances of a VPN share an RT.

Reveal Solution Hide Solution

Correct Answer: A
Question #20

Which statement about the Hub s MPLS VPN networking is false?

  • A . The Hub PE can receive the VPN_IPv4 routes advertised by all Spoke PEs.
  • B . When an MP-IBGB neighbor relationship is established between two spoke PEs, the value of the Import VPN Target attribute of one Spoke PE can be the same as tat of the Export VPN Target attribute of the other Spoke PE.
  • C . The Hub PE advertises the routes learned from one Spoke PE to other Spoke PEs. Therefore, Spoke sites can access other through the Hub site.
  • D . All Spoke PEs can receive the VPN-IPv4 routes advertised by the Hub PE.

Reveal Solution Hide Solution

Correct Answer: B

Question #21

Exhibit:

Which statement about inter-AS MPLS VPN Option_B is false?

  • A . The ASBR cannot be used as a PE simultaneously and a CE cannot be connected to an ASBR.
  • B . When ASBRs are directly connected, packets transmitted on the VPN between them have only one label.
  • C . The undo policy vpn-target command must be configured in the VPN4 address family view of the BGP neighbor of the ASBR to prevent routes from being filtered automatically.
  • D . When ASBRs are directly connected, VPN traffic can be forwarder between them only after MPLS is enabled on the interfaces.

Reveal Solution Hide Solution

Correct Answer: A
Question #22

Exhibit:

As shown in the figure, inter-AS VPN Option A is used. CE 1 and CE 2 belong to the same VPNAS 100 and AS 200 run IGP and LDP, respectively.

ASBRs communicate with each other through EBGP. the loopback interface address of CE 1 is 10.1.1.1/24 Suppose VPNs configured on the PE and ASBR are both named vpn-1 and CE 2 can ping CE1 .

Which command can be ruin on ASBR 2 to find out route 10.1.1.1/24?

  • A . Display ip routing-table vpn-instance vpn_1
  • B . Display ip routing-table
  • C . Display bgp vpnv4 all routing-table

Reveal Solution Hide Solution

Correct Answer: A
Question #23

Which of the following statements about the merits of the HoVPN networking are true?

  • A . If the UPE are SPE are separated by an IP/IPMLS network, they can be connected through a generic routing encapsulation (GRE) or LSP runnel. A hierarchical MPLS VPN provides good scalability.
  • B . The SPE and UP exchange routes and advertise labels through MP-BGP. Each UPE runs only one C BGP peer, reducing system overheads and simplifying configuration.
  • C . The BGP/MPLS VPN can be deployed layers by layer. When the performance of a super strum provider edge (SPE) is insufficient, a user-end provider edge (UPE) can be added and the SPE moved to a lower layer. When the access capability of a UPE is insufficient, and SPE can be added.
  • D . Packets are forwarded between a UPE and an SPE after being label. The UPE and SPE are connected through an interface (or a subinterface), helping reduce the usage of limited interface resources.
  • E . Only local VPN routes need to be maintained on an SPE and remote routes on the SPE are represented by a default route or an aggregate route, reducing the load of the SPE.

Reveal Solution Hide Solution

Correct Answer: B, D, A
Question #24

Exhibit:

As shown in the figure, OSPF process 100 runs on both PEs and CEs, and VPN routers are transmitted between PE 1 and PE 2 through PGB CE 1 enables interface address 43.1.1.0/24 in area 0.A route to 43.1.10/24 .

How ever, does not exist in the routing table of CE 2 .

What are the possible causes?

  • A . The VPN route to 43.1.1.0/24 does not exist in the routing table of PE 2.
  • B . The LSDB of PE 1 does not have the type 1 LSA generated by CE 1.
  • C . The LSDB of PE 12 does not have the type 1 LSA generated by CE 1.
  • D . The public network rout to 43.1.1.0/24 does not exist in the routing table of PE2

Reveal Solution Hide Solution

Correct Answer: B, D
Question #25

As shown in the figure, a CE requires access to the internet, and PE 1is connected to the gateway.

Configurations on PE 1 are as follows:

PE 1 is connected to the internet gateway through interface 175.311.2 CE and CE 2 cannot ping the interface .

Which of the following statements are true?

  • A . NAT translation must be configured on interface pos2/1.0 instead of interface s0./01.0
  • B . A private network route must be configured on the internet gateway.
  • C . The public parameter of a static default route must be configured.
  • D . A default must be configured on CE an CE 2.

Reveal Solution Hide Solution

Correct Answer: B
Question #26

Which statement about primary VPN tunnel binding is false?

  • A . Only the data destined for the specific peer device is transmitted through the n=bound primary VPN tunnel Data to other devices is transmitted using the default tunnel policy.
  • B . Primary tunnel ensures that data can be transmitted from a VPN t a specific peer device permanently through a dedicate TE tunnel.
  • C . Primary VPN tunnel binding means to bind a tunnel to a specific VPN. The bound tunnel is exclusive to the VPN.
  • D . The bound primary tunnel can be selected sequentially.

Reveal Solution Hide Solution

Correct Answer: D
Question #27

As shown in the figure, CE and CE 2 belong to VPN A, CE 3 and CE 4 belong to VPN B, VPN A and VPN B share the public network tunnels between border PE 1 and PE 2, and LDP tunnels are configured between PE 1 and PE 2. To isolate resources for VPN service data from PE 2 to PE 1, a unidirectional TE tunnel is configured t forward data from PE1. The QoS policy propagation though the border gateway protocol (QPPB) feature is configured on PE 2, and a QoS policy is defined when VPNs are bound to tunnel interfaces.

Which of the following statements about the configurations on PE 2 are true?

  • A . The mpls te commit command must be configured on the Tunnel1/0/0 interface,
  • B . The mpls te cspf command must be configured in the global MPLS view.
  • C . The maximum reserved bandwidth must not exceed the bandwidth of the tunnels.
  • D . The maximum reserved bandwidth must not exceed the bandwidth of the physical links.
  • E . The mpls te commit command must be configured on the Post/0/0 interface.

Reveal Solution Hide Solution

Correct Answer: A, B, D
Question #28

Which of the following statements about control words in the L2VPN are true?

  • A . When SVC VLL is used, if PEs at two ends of a VC use different control words, the may not become Up.
  • B . When Martini VLL is used, if PEs at two ends of a virtual connection (VC) use different control words, the VC may not become Up
  • C . The control word can be used to identically the packet sequence.
  • D . A control word generally has two bytes and can ne extended to four bytes.
  • E . The control word can be used for packet padding For example, when the public network uses
    Ethernet and the AC uses Peer-to-protocol (PPP), control words can be used to transfer and identify
    PPP packet with a bytes.

Reveal Solution Hide Solution

Correct Answer: D
Question #29

Which of the following statements about the VPLS packet forwarding are true?

  • A . If a PE receives broadcast packets from a local user, the PE forwards the packets to all other interfaces In the same VSI and all other PEs.
  • B . If the destination MAC address of a packet is not a broadcast address and a PE has not learned the MAC address, the broadcast this packet in one VSI
  • C . If the destination MAC address of a packets is not a broadcast address and a PE has not learned the MAC address, the PE broadcast this packet in on VSI.
  • D . If a receive broadcast packet sent a remote PE, it forwards the packet only to the AC interface instead of other PEs.

Reveal Solution Hide Solution

Correct Answer: A, C, D
Question #30

Exhibit:

As shown in the figure, one enterprise has VPN A, the other has VPN B, and the two VPNs each have two CEs. The following requirements needs to be met.

VPNA-CA 1 can interwork with VPNA-CE 2

2>VPNA-CE 1 can interwork with VPNA-CE 2.

The figure shows the types of links between CEs and PEs and the IDs used in Martini mode .

Which the following VC ID configurations are correct?

  • A . VCID1 =1, VCID2 = 2, VCID3 =3, VCID4 +4
  • B . VCID1 =2, VCID2 = 2, VCID3 =2, VCID4 +2
  • C . VCID1 =1, VCID2 = 2, VCID3 =1, VCID4 +2
  • D . VCID1 =1, VCID2 = 1, VCID3 =2, VCID4 +2

Reveal Solution Hide Solution

Correct Answer: A

Question #31

On a VPLS network a PE router receive a packet that containers layer 2 user data from a PE .

How does the PE router determine the source VSI of this packet?

  • A . Outer label of the packets
  • B . Destination MAC address in the L2 PDU encapsulation in the packet
  • C . MAC address and VLAN ID in the PDU encapsulated in the packet
  • D . Inner label of the packet

Reveal Solution Hide Solution

Correct Answer: D
Question #32

When the RSVP LSP FRR protection is enables, which of the following statements about the original RSVP LSP are true?

  • A . The point of local repair (PLR) and the merge point (MP) can perceive the application of FRR but other nodes on the original RSVP LSP
  • B . The RESV message is sent by the MP to an upstream node through a bypass LSP after modified.
  • C . The PATH message is sent by the PLR to the MP through a bypass LSP after modified.
  • D . The MP sends the ResvTear message to the upstream node of the original RSVP LSP.

Reveal Solution Hide Solution

Correct Answer: B, D
Question #33

As shown I the figure, the asymmetric VLL FRR networking is used AC interfaces on PE 1, PE 2 and PE 3 are configured as follows:

Which of the following statements are the true on the condition that IGP and MPLS are configured correctly on the public network?

  • A . If a forwarding fault is detected on the PW between PE a and PE 2, traffic from CE 1 to CE 2 can be switched to the PW between PE 1 and PE 3.
  • B . If a forwarding fault is detected on the PW between PE a and PE 2, traffic can be switched to the backup PW on PE 1.
  • C . If a forwarding fault is detected on the public network side of the between PE 1 and PE 2, traffic from CE 2 to CE 1 can be switched to the PW between PE 1 and PE3.
  • D . The PW between PE1 and PE 2 is the primary PW.

Reveal Solution Hide Solution

Correct Answer: A
Question #34

Which of the following statements about the working principle f LDAP FRR are true?

  • A . After LDP FRR is enabled, a backup LSP is generated both the primary and backup LSPs are stored in the forwarding table.
  • B . LDP TFRR can be deployed on the ingress node and the intermediate node. The primary and backup LSPas are recorded in the ILM table on the intermediate node and on the FIB table on the ingress node.
  • C . After LDP FRR enable, a backup can degenerated for a primary LSP to prevent serious packet loss during fats flapping of the primary LSP.
  • D . Multiple LSPs can be up on the ingress node, that is entries about multiple backup LSPs are generated in the forwarding table according to the priority of the FRR, implementing multi-layer protection.

Reveal Solution Hide Solution

Correct Answer: C
Question #35

In MPLS QoS , traffic policies are developed on simple traffic classified and complex traffic classification policies based on simple traffic classification the service class color, and drop priority of packet are reset based on the packet in the traffic policies on complex traffic classification measures such as traffic classification is applied on border routers in Different domain, and traffic classification core routers.

QoS policies are configured by performing the following operations:

Defines DiffSer domain and configuring a traffic policy.

Classification traffic

Defines traffic behavior and configures characteristics of behaviors.

Defines a traffic policy and specifies for traffic categories

Applies the traffic policy

Configure L-LSP

Configures reserve address checks

Adds interface to the DiffSer domain

Which of the proceeding operations are required when you configured simple traffic classification?

  • A . 1 6 8
  • B . 2 3 4 8
  • C . 1 5 6
  • D . 2 4 5 7

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version