H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 37

  1. Which of the following statements regarding the static LACP mode are false?

    • If a high bandwidth of the link between two directly connected devices is required bot the remote device does not support LACP, you can use the manual load balancing mode.
    • In static LACP mode, a larger LACP priority of an interface indicates a higher priority of the interface and a high probability of becoming the active interface.
    • The interface that forwards data is called the active interface, whereas the interfaces that does not forward data is called the inactive interface. The backup interface changes from inactive to active only when the active interface dails.
    • When preemption is enabled and an active interface fails, the backup interface with a larger priority becomes the active interface after a delay. If preemption is disabled, the faulty interface cannot automatically become the active interface.
  2. Which of the following statements regarding MUX VLAN is false?

    • Each group VLAN must be bound to a principal VLAN.
    • If the VLAN ID has been used by the principal VLAN, this VLAN cannot be used for the VLANIF interface, super-VLAN, or sub-VLAN.
    • After MUX VLAN is enabled on an interface, VLAN mapping and VLAN stacking can be configured on the interface.
    • An enterprise can use the principal port to connect to the enterprise server, a separate port to connect to enterprise customers, and a group port to connect to enterprise employees. Enterprise customers and employees can both access enterprise servers, enterprise employees can communicate with each other, enterprise customers cannot communicate with each other, and enterprise customers and employees cannot communicate with each other.
  3. Port isolation provides secure and flexible networking solutions for users. Which of the following statements regarding port isolation is false?

    • Port isolation can be used for configuring Layer 2 isolation.
    • By default, interfaces are isolated at Layer 2 but can communicate at Layer 3.
    • Before the port isolation function takes effect on an interface, the port isolation function must be enabled.
    • The port-isolate enable command can run in the system view.
  4. Which are the two subfields in the port identifier of the uplink port on a non-root switch in RSTP?

    • 1-byte port priority and 1-byte port number
    • 1-byte port priority and 2-byte port number
    • 2-byte port priority and 1-byte port number
    • 2-byte port priority and 2-byte port number
  5. RSTP provides faster convergence than STP. What are causes? (Choose all that apply.)

    • RSTP defines the edge port role. The edge port does not receive and process configuration BPDUs, and not participate in RSTP calculation. The edge port can directly change from the Disable state to the Forwarding state.
    • When the root port fails, the optimal alternate port will become the root port and enter the Forwarding state.
    • In RSTP, when a port is elected as the designated port, it enters the Discarding state. Then the port immediately enters the Forwarding state through the Proposal/Agreement mechanism.
    • In RSTP, when a port receives RST BPDUs from the upstream designated bridge, the port will compare the own stored RST BPDU will the received RST BPDU.
    • When the designated port fails, the optimal alternate port will become the root port and enter the Forwarding state.
  6. Which problems of the single spanning tree network can be solved by MSTP? (Choose three.)

    • Some VLAN paths are unreachable
    • Traffic cannot be load balanced.
    • The secondary optimal path is selected.
    • Improve the network reliability
  7. Which of the following LSPs are established in Downstream Unsolicited (DU) label advertisement mode and ordered label distribution control mode? (Choose three.)

    • When the edge node finds a new destination address in its routing table that does not belong to any existing FEC, the edge node does not create a new FEC for the destination address.
    • An LSP is established by binding an FEC to a label and advertising the binding relationship to the neighboring LSR.
    • If the egress node has available labels for distribution, it allocates labels for the FEC and sends a label mapping message to the upstream node.
    • After receiving a label mapping message, the LSR adds the corresponding entry to the label forwarding table.
  8. If some devices on a network run MPLS (MPLS domain is encapsulated in the IP domain), labels are generated only for direct routes of devices running MPLS. Labels are not generated for the routes originated from other devices in the IP domain.

    • TRUE
    • FALSE
  9. Which of the following is not overlay VPN technology?

    • GRE
    • IPSec VPN
    • SSL VPN
    • L2TP VPN
  10. In a MPLS VPN network, two-layer MPLS labels are added to data packets before they are transmitted over the public network. Which of the following statements regarding two-layer labels are false? (Choose two.)

    • The outer label is the private network label and the inner label is the public network label.
    • The MPLS VPN outer label is distributed manually by the LDP protocol. The inner label is distributed by the peer MP-BGP neighbor.
    • By default, the outer label in data packets is popped out before being forwarded to the last hop.
    • The outer label is used to instruct the PE to send data packets to the correct VPN.
  11. In a MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are true? (Choose two.)

    • The penultimate hop removes the outer label before forwarding the data packet to a peer PE.
    • The IP data packet received by the peer PE does not carry labels.
    • The penultimate hop removes the outer label if the outer label in the data packet is explicit null label 3.
    • The peer PE sends the data packet to the correct VPN based on the inner label.
  12. A DHCP server allocates IP addresses to clients. Which of the following steps are required when configuring a DHCP server? (Choose three.)

    • Enable DHCP globally.
    • Configure the DHCP Option 82 field.
    • Configure the global address pool if the DHCP server based on the global address pool is used.
    • Configure the interface address pool if the DHCP server based on the interface address pool is used.
  13. A DHCP client needs to obtain an IP address from the DHCP server when accessing a network for the first time. When the client accesses the network again, which of the following statements are true? (Choose two.)

    • The DHCP client broadcasts a DHCP Discover packet. The DHCP server replies to the packet.
    • The DHCP client only needs to broadcast a DHCP Request packet containing the IP address obtained last time, but does not need to send a DHCP Discover packet again.
    • After receiving the DHCP Discover packet, the DHCP server sends a DHCP Offer packet containing the leased IP address and other settings to the DHCP client.
    • After receiving the DHCP Request packet, the DHCP server returns a DHCP ACK packet if the requested IP address is not allocated to another client.
  14. Which of the following are included in the full lifecycle guest management of the Agile Controller? (Choose all that apply.)

    • Account registration
    • Account approval and distribution
    • Account authentication
    • Account audit and deregistration
  15. Which of the following are roles in port mirroring? (Choose three.)

    • Mirrored port
    • Local observing port
    • Remote mirroring port
    • Trunk port
  16. Which of the following statements regarding the physical topology monitoring function of eSight are true? (Choose all that apply.)

    • eSight displays the layout and status of NEs, subnets, and links on the GUI.
    • eSight supports visualized monitoring of the network-wide running status.
    • eSight displays the architecture of the entire network and relationship between network entities.
    • The physical topology monitoring provides an entry for unified network monitoring, improving O&M efficiency.
  17. Congestion means that the service rate is reduced because of insufficient network resources. Congestion avoidance technologies include RED and WRED.

    • TRUE
    • FALSE
  18. Which packet information can be used for complex traffic classification? (Choose three.)

    • Packet length
    • Source and destination addresses
    • Protocol type
    • Source and destination MAC addresses
  19. Single-packet attacks indicate that an attacker controls botnet hosts to send a large number of attack packets, causing link congestion on the attacked network and system resource exhaustion.

    • TRUE
    • FALSE
  20. Which of the following attacks is not the network layer attack?

    • IP spoofing attack
    • Smurf attack
    • ARP spoofing attack
    • ICMP attack
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments