H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 33

  1. BGP is an enhanced distance-vector routing protocol. Which is the major reason for this?

    • BGP does not accept the routes whose AS_Path attribute contains the local AS number.
    • Nexthop is a well-known mandatory attribute of BGP routes.
    • The AS_Path attribute records all the ASs that a BGP route passes through on the transmission path. In route selection rules, a route with a shorter AS_Path is preferred.
    • The AS_Path attribute records all the ASs that a BGP route passes through on the transmission path. In route selection rules, a route with a shorter AS_Path is preferred, and the AS_Path attribute is also checked in IBGP.
  2. Once a BGP connection is established, if load balancing is not configured, a BGP Speaker just advertises the optimal route in its BGP routing table to its neighbors.

    • TRUE
    • FALSE
  3. Which of the following configuration can enable indirectly connected EBGP peers to establish a connection normally?

    • peer connect-interface
    • peer ebgp-max-hop
    • peer ignore
    • peer as-number
  4. When the Hold Time parameter negotiated between two BGP peers is 0, no Keepalive messages will be sent.

    • TRUE
    • FALSE
  5. Which of the following statements regarding BGP message types and characteristics is false?

    • Open messages are used to establish a peer relationship between two neighbors.
    • Hello messages are periodically sent between BGP peers to maintain their connection.
    • Update messages are used to exchange routing information between BGP peers.
    • Notification messages are used to transmit error information between BGP Speakers.
    • Route-refresh messages are used by a BGP device to notify its peer that it has the route refresh capability.
  6. The first four bits of a multicast IP address are fixed as 1110 and are mapped to the most significant 25 bits of a multicast MAC address.

    Among the last 28 bits of a multicast IP address, only 23 bits are mapped to a multicast MAC address, and information about the other 5 bits is lost. As a result, 32 multicast IP addresses are mapped to the same MAC address.

    • TRUE
    • FALSE
  7. IGMP Snooping runs on the data link layer to manage and control multicast groups and prevents multicast packets on Layer 3 broadcasts.

    • TRUE
    • FALSE
  8. Which of the following route selection tools can be used by other routing protocols in addition to BGP? (Choose all that apply.)

    • route-policy
    • IP-prefix
    • as-path-filter
    • community-filter
  9. Which of the following statements regarding routing policy and policy-based routing are true? (Choose all that apply.)

    • Policy-based routing is used to control packet forwarding without following routes in the routing table.
    • A routing policy is used to control import, advertisement, and receiving of routing information.
    • A routing policy is used to control packet forwarding without following routes in the routing table.
    • Policy-based routing is used to control import, advertisement, and receiving of routing information.
  10. Which of the following statements regarding LACP are true? (Choose all that apply.)

    • LACP is based on IEEE802.3au.
    • The local device sends LACPDUs to exchange information with the remote end.
    • Devices at both ends determine the Active side based on the LACP system priority and system ID.
    • Devices at both ends determine active interfaces based on the LACP priority and ID of the interface on the passive side.
  11. Which of the following statements regarding preemption in static LACP mode are true? (Choose all that apply.)

    • Preemption in static LACP mode is enabled by default.
    • When a high-priority interface switches to the inactive interface due to a fault and then is restored, if preemption is enabled, the restored high-priority interface becomes the active interface after a delay. If preemption is disabled, the interface cannot become the active interface.
    • To prevent unstable transmission due to frequent link status changes, can set a preemption delay.
    • If the preemption delays at both ends are different, the larger preemption delay is used.
  12. Which of the following statements regarding MUX VLAN is true?

    • The MUX VLAN contains a principal VLAN and subordinate VLANs. The principal VLAN and subordinate VLANs cannot communicate.
    • The MUX VLAN contains a principal VLAN and subordinate VLANs. The subordinate VLANs are classified into subordinate separate VLANs and subordinate group VLANs. The interfaces in the subordinate group VLAN can communicate with each other.
    • The interfaces between subordinate separate VLANs can communicate with each other, but cannot communicate with the interfaces in the principal VLAN.
    • The principal VLAN and subordinate VLANs cannot communicate.
  13. Huawei switches provide port isolation. Which of the following statements regarding port isolation is false?

    • You can configure Layer 2 and Layer 3 isolation or Layer 2 isolation and Layer 3 interworking.
    • Huawei switches support 64 isolation groups numbered 0 to 63.
    • If interface A is isolated from interface B, packets sent from interface A cannot reach interface B, but packets sent from interface В can reach interface A.
    • FE interfaces, GE interfaces, XGE interfaces, and Eth-Trunks can be isolated from one another, but an interface cannot be isolated from itself or from the management interface unidirectionally. In addition, an Eth-Trunk cannot be isolated unidirectionally from its member interfaces.
  14. RSTP is different from STP regarding defining port states. Which port states does RSTP define?

    • Discarding
    • Learning
    • Forwarding
    • Discarding, Learning, and Forwarding
  15. On the network running STP, when the network topology changes, multiple topology change notifications are sent. How many types of RSTP TC BPDUs are defined?

    • One
    • Two
    • Three
    • Four
  16. What happens when the topology of a network running RSTP changes?

    • Packets are flooded on the entire network.
    • The aging time of MAC address entries is changed.
    • Some MAC address entries are deleted.
    • The entire MAC address table is deleted.
  17. In MSTP, each MSTI calculates an independent spanning tree by using the RSTP algorithm.

    • TRUE
    • FALSE
  18. MPLS supports forwarding equivalence class (FEC). Which of the following cannot be used as a FEC allocation standard?

    • Fragment offset
    • Destination address
    • Application protocol
    • Class of Service (CoS)
  19. Which of the following statements regarding forwarding equivalence class (FEC) in MPLS are false? (Multiple Choice)

    • Packets with the same FEC are processed differently on a MPLS network.
    • FECs can be divided flexibly by source IP address, destination IP address, source port, destination port, protocol type, VPN, or any combinations of them.
    • MPLS classifies packets with the same forwarding processing mode into one FEC.
    • One FEC has only one unique label marker.
  20. On a carrier’s MPLS VPN network, PE1 and PE2 transmit data packets between VPNs. After PE1 receives VPN route 172.16.1.0/24 from a client, it converts the route into a VPNv4 route and distributes label 1027 to the packet. After the packet arrives at PE2, PE2 distributes label 1025 to the packet. When a client on PE2 accesses this route, what are the outer and inner labels in the packet transmitted over the carrier network?

    • Outer label: 1027; inner label: 1025
    • Outer label: 1025; inner label: 1025
    • Outer label: 1027; inner label: 1027
    • Outer label: 1025; inner label: 1027
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments