H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 33
-
BGP is an enhanced distance-vector routing protocol. Which is the major reason for this?
- BGP does not accept the routes whose AS_Path attribute contains the local AS number.
- Nexthop is a well-known mandatory attribute of BGP routes.
- The AS_Path attribute records all the ASs that a BGP route passes through on the transmission path. In route selection rules, a route with a shorter AS_Path is preferred.
- The AS_Path attribute records all the ASs that a BGP route passes through on the transmission path. In route selection rules, a route with a shorter AS_Path is preferred, and the AS_Path attribute is also checked in IBGP.
-
Once a BGP connection is established, if load balancing is not configured, a BGP Speaker just advertises the optimal route in its BGP routing table to its neighbors.
- TRUE
- FALSE
-
Which of the following configuration can enable indirectly connected EBGP peers to establish a connection normally?
- peer connect-interface
- peer ebgp-max-hop
- peer ignore
- peer as-number
-
When the Hold Time parameter negotiated between two BGP peers is 0, no Keepalive messages will be sent.
- TRUE
- FALSE
-
Which of the following statements regarding BGP message types and characteristics is false?
- Open messages are used to establish a peer relationship between two neighbors.
- Hello messages are periodically sent between BGP peers to maintain their connection.
- Update messages are used to exchange routing information between BGP peers.
- Notification messages are used to transmit error information between BGP Speakers.
- Route-refresh messages are used by a BGP device to notify its peer that it has the route refresh capability.
-
The first four bits of a multicast IP address are fixed as 1110 and are mapped to the most significant 25 bits of a multicast MAC address.
Among the last 28 bits of a multicast IP address, only 23 bits are mapped to a multicast MAC address, and information about the other 5 bits is lost. As a result, 32 multicast IP addresses are mapped to the same MAC address.
- TRUE
- FALSE
-
IGMP Snooping runs on the data link layer to manage and control multicast groups and prevents multicast packets on Layer 3 broadcasts.
- TRUE
- FALSE
-
Which of the following route selection tools can be used by other routing protocols in addition to BGP? (Choose all that apply.)
- route-policy
- IP-prefix
- as-path-filter
- community-filter
-
Which of the following statements regarding routing policy and policy-based routing are true? (Choose all that apply.)
- Policy-based routing is used to control packet forwarding without following routes in the routing table.
- A routing policy is used to control import, advertisement, and receiving of routing information.
- A routing policy is used to control packet forwarding without following routes in the routing table.
- Policy-based routing is used to control import, advertisement, and receiving of routing information.
-
Which of the following statements regarding LACP are true? (Choose all that apply.)
- LACP is based on IEEE802.3au.
- The local device sends LACPDUs to exchange information with the remote end.
- Devices at both ends determine the Active side based on the LACP system priority and system ID.
- Devices at both ends determine active interfaces based on the LACP priority and ID of the interface on the passive side.
-
Which of the following statements regarding preemption in static LACP mode are true? (Choose all that apply.)
- Preemption in static LACP mode is enabled by default.
- When a high-priority interface switches to the inactive interface due to a fault and then is restored, if preemption is enabled, the restored high-priority interface becomes the active interface after a delay. If preemption is disabled, the interface cannot become the active interface.
- To prevent unstable transmission due to frequent link status changes, can set a preemption delay.
- If the preemption delays at both ends are different, the larger preemption delay is used.
-
Which of the following statements regarding MUX VLAN is true?
- The MUX VLAN contains a principal VLAN and subordinate VLANs. The principal VLAN and subordinate VLANs cannot communicate.
- The MUX VLAN contains a principal VLAN and subordinate VLANs. The subordinate VLANs are classified into subordinate separate VLANs and subordinate group VLANs. The interfaces in the subordinate group VLAN can communicate with each other.
- The interfaces between subordinate separate VLANs can communicate with each other, but cannot communicate with the interfaces in the principal VLAN.
- The principal VLAN and subordinate VLANs cannot communicate.
-
Huawei switches provide port isolation. Which of the following statements regarding port isolation is false?
- You can configure Layer 2 and Layer 3 isolation or Layer 2 isolation and Layer 3 interworking.
- Huawei switches support 64 isolation groups numbered 0 to 63.
- If interface A is isolated from interface B, packets sent from interface A cannot reach interface B, but packets sent from interface В can reach interface A.
- FE interfaces, GE interfaces, XGE interfaces, and Eth-Trunks can be isolated from one another, but an interface cannot be isolated from itself or from the management interface unidirectionally. In addition, an Eth-Trunk cannot be isolated unidirectionally from its member interfaces.
-
RSTP is different from STP regarding defining port states. Which port states does RSTP define?
- Discarding
- Learning
- Forwarding
- Discarding, Learning, and Forwarding
-
On the network running STP, when the network topology changes, multiple topology change notifications are sent. How many types of RSTP TC BPDUs are defined?
- One
- Two
- Three
- Four
-
What happens when the topology of a network running RSTP changes?
- Packets are flooded on the entire network.
- The aging time of MAC address entries is changed.
- Some MAC address entries are deleted.
- The entire MAC address table is deleted.
-
In MSTP, each MSTI calculates an independent spanning tree by using the RSTP algorithm.
- TRUE
- FALSE
-
MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as a FEC allocation standard?
- Fragment offset
- Destination address
- Application protocol
- Class of Service (CoS)
-
Which of the following statements regarding forwarding equivalence class (FEC) in MPLS are false? (Multiple Choice)
- Packets with the same FEC are processed differently on a MPLS network.
- FECs can be divided flexibly by source IP address, destination IP address, source port, destination port, protocol type, VPN, or any combinations of them.
- MPLS classifies packets with the same forwarding processing mode into one FEC.
- One FEC has only one unique label marker.
-
On a carrier’s MPLS VPN network, PE1 and PE2 transmit data packets between VPNs. After PE1 receives VPN route 172.16.1.0/24 from a client, it converts the route into a VPNv4 route and distributes label 1027 to the packet. After the packet arrives at PE2, PE2 distributes label 1025 to the packet. When a client on PE2 accesses this route, what are the outer and inner labels in the packet transmitted over the carrier network?
- Outer label: 1027; inner label: 1025
- Outer label: 1025; inner label: 1025
- Outer label: 1027; inner label: 1027
- Outer label: 1025; inner label: 1027
Subscribe
0 Comments
Newest