H12-224 : HCNP-R&S Fast Track (Huawei Certified Network Professional – Routing & Switching Fast Track) : Part 40

  1. LSRs use various label distribution control modes to set up LSPs. Which of the following statements is false?

    • There are two label distribution control modes: independent and ordered.
    • If the label advertisement mode is DU and the label distribution control mode is Independent, an LSR distributes labels without waiting for labels from the downstream device.
    • If the label advertisement mode is DoD and the label distribution control mode is Independent, the transit device distributes labels only after receiving a label mapping message from the egress device. 
    • If the label advertisement mode is DU and the label distribution control mode is Ordered, the transit LSR distributes labels to the ingress device only after receiving a label mapping message from the egress device.
  2. Which of the following statements regarding different LSA types is false?

    • DD packets contain only LSA summary information, including LS Type, LS ID, Advertising Router, and LS Sequence Number.
    • LS Request packets contain only LS Type, LS ID, and Advertising Router.
    • LS Update packets contain complete LSA information.
    • LS Ack packets contain complete LSA information.
  3. MPLS supports multi-layer labels and connection-oriented on the forwarding plane, therefore it is widely used. So, which of the following is not the cause for MPLS deployment?

    • Wide recognition by vendors
    • Traffic engineering capabilities
    • Simplifying route query on software-based routers 
    • Using VPN services 
  4. Which of the following statements regarding multicast routing are true? (Choose all that apply.)

    • A multicast routing protocol is used to create and maintain multicast routes, and to forward multicast data packets correctly and efficiently.
    • Multicast routes form a unidirectional loop-free data transmission path from a data source to multiple receivers. This transmission path is a multicast distribution tree.
    • Multicast routing protocols can be divided into intra-domain and inter-domain multicast routing protocols.
    • The multicast routing protocol includes the IGMP protocol.
  5. DHCP snooping is a valid security mechanism. Which of the following attack prevention methods can DHCP snooping provide? (Choose all that apply.)

    • Defense against bogus DHCP server attacks
    • Defense against DoS attacks on the DHCP server
    • Defense against MAC address flooding attacks
    • Source MAC address check for data packets in collaboration with DAI
    • Source IP address check for data packets in collaboration with IPSG
  6. Which of the following causes will lead to a failure to establish BGP peer relationships?

    • An ACL is configured to prohibit all TCP connections between two BGP neighbor. 
    • Two IBGP peers are not physically directly connected.
    • BGP synchronization is enabled on fully-meshed IBGP peers
    • Two BGP peers are configured with different routing Update intervals.
  7. When two BGP peers establish a TCP connection normal but their AS numbers and BGP versions are inconsistent, a BGP peer often sends a Notification message to disconnect the TCP connection after they establish a TCP connection and exchange some information. Which message will be identified as incorrect during negotiation in the Error Code of the Notification message?

    • Route-refresh
    • Open 
    • Keepalive
    • Update
  8. Which of the following is a valid address within the IPv4 SSM group address range assigned by the IANA?

    • 232.137.1.1/24
    • 225.137.1.1/8
    • 232.137.1.1/8 
    • 192.168.1.1
  9. A customer needs to select Layer 3 100M switches from a series of Huawei’s campus switches. Which of the following series is proper?

    • S2700
    • S3700
    • S5700
    • S6700
  10. MUX VLAN provides a mechanism for network resource control based on VLANs. Which of the following concepts do not belong to the MUX VLAN?

    • Principal VLAN
    • Subordinate VLAN
    • Guest VLAN 
    • Subordinate group VLAN
  11. Which of the following statements regarding Agile Controller guest account application mode is false?

    • Created by the administrator
    • Created by employees with guest management rights
    • Created by the receptionist 
    • Registered by guests
  12. A DHCP server supports various types of address allocation policies to meet different requirements. Which of the following is not a correct address allocation policy?

    • Automatic allocation
    • Dynamic allocation
    • Duplicated allocation 
    • Manual allocation
  13. DHCP uses different types of packets to implement different functions. Which of the following is the function of the DHCP Offer packet?

    • The DHCP Offer packets are broadcast by the DHCP client to detect available servers.
    • The DHCP server sends DHCP Offer packets to respond to the DHCP Discover packets sent by the DHCP client, providing requested configuration parameters. 
    • The DHCP client sends a DHCP Offer packet to the DHCP server to request configuration parameters, configuration acknowledgement, or extension of the IP address lease.
    • The DHCP server sends a DHCP Offer packet to the client, carrying configuration parameters, such as the IP address.
  14. Which of the following statements regarding the MPLS forwarding process is false?

    • If an LSP fails to forward data, the MPLS control plane responsible for LSP setup can detect this error. 
    • The main function of MPLS forwarding plane can add labels or delete labels from an IP packet, and forward the received packets based on the label forwarding table. The forwarding plane is connection-oriented.
    • After an IP packet enters the MPLS network, the ingress LER will analyze the IP packet and add proper labels to the packet.
    • MPLS can use Ping or Traceroute to detect LSP errors and locate faulty nodes.
  15. Which of the following statements regarding the transit node in the MPLS forwarding process is correct?

    • Queries the corresponding the FIB table based on the MPLS label to obtain the token.
    • Obtains the corresponding NHLFE entry based on the token in the FIB table.
    • Checks the NHLFE entry to obtain the outbound interface, next hop, outgoing label, and label operation type. 
    • If the label value is 1, the transit node directly pops out the label, processes the EXP and TTL fields, and then performs IP forwarding or forwarding by the inner label.
    • If the label value is higher than or equal to 15, the transit node replaces the old label of the MPLS packet with a new label, processes the EXP and TTL fields, and sends the MPLS packet to the next hop.
  16. MPLS technology replaces IP forwarding with label switching. Which of the following encapsulation modes is used when MPLS runs on Ethernet networks?

    • Packet mode
    • Frame mode 
    • Transport mode
    • Channel mode
    • Pipe mode
  17. Which of the following aspects should be considered for migration risk assessment? (Choose all that apply.)

    • Key risk positions
    • Risk impact scope
    • Risk impact time
    • Loss caused by risks
  18. MPLS uses LDP to provide different label distribution modes. Which of the following statements regarding LDP label distribution control modes are false? (Choose all that apply.)

    • LDP label distribution can be controlled in ordered mode.
    • In ordered mode, when an LSR is the origin of a route, it can send label mapping messages to the upstream router initiatively and does not need to wait for label mapping messages from the next hop LSR.
    • LDP label distribution cannot be controlled in independent mode.
    • In independent mode, an LSR cannot send label mapping messages to the upstream router before it receives label mapping messages from the next hop LSR.
  19. Which of the following statements regarding advantages of IGMP snooping are true? (Choose all that apply.)

    • It reduces broadcast packets on a Layer 2 network and therefore conserves network bandwidth.
    • It enhances security of multicast data.
    • It enables separate accounting for each host.
    • It is not recommended because IGMP consumes many CPU resources on a Layer 2 switch.
  20. Which are the new requirements on the enterprise network stimulated by the mobility trend? (Choose all that apply.)

    • Unified wired and wireless management
    • Consistent service experience anytime, anywhere
    • Fast deployment of mobile applications
    • Strict hierarchical networking
  21. Which of the following statements regarding multicast MAC addresses are false? (Choose all that apply.)

    • The high 24 bits of the multicast MAC address are 0x01005f, the 25th bit is fixed to 1, and the lower 23 bits of the MAC address map to the lower 23 bits of the multicast IP address. 
    • One multicast MAC address maps to 32 multicast IP addresses.
    • A multicast MAC address identifies receivers of a multicast group on the data link layer.
    • One multicast MAC address maps to only one multicast IP address. 
  22. Which of the following statements regarding the designated router (DR) are true? (Choose all that apply.)

    • In DR election on a network segment, if two routers have the same DR priority, the one with a larger IP address wins. 
    • The source DR sends Register messages to the RP by multicast.
    • The receiver DR sends Join messages to the multicast source or RP.
    • The assert winner on a shared network segment may not be the DR on the network segment.
  23. On a campus network, the gateway is usually configured on the aggregation layer. What advantages does this design have compared with configuring the gateway on the access layer? (Choose all that apply.)

    • Reduce the broadcast domain on the network and the probability of broadcast storms.
    • Achieve separate convergence of Layer 2 and Layer 3 to increase the convergence speed and network stability.
    • Properly design the Layer 2 network scale, reduce network segment allocation, and improve network management efficiency.
    • Allow configuring access devices as Layer 2 devices, reducing network construction costs.
    • Leverage the STP and VRRP mechanisms to improve network reliability.
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments