The TCP protocol uses the three-way handshake mechanism to establish and disable connections. Therefore, TCP supports reliable data transmission.
RSTP uses the proposal/agreement mechanism to shorten the time that an upstream port waits before transitioning to the Forwarding state, but no temporary loop occurs. Why?
UDP does not guarantee data transmission reliability and does not provide packet sorting and traffic control functions. It is suitable for the traffic that has low requirements for data transmission reliability, but high requirements for the transmission speed and delay.
The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.
On the network shown in the figure, router A adopts link aggregation in manual load balancing mode, and G0/0/1 and G0/0/2 are added to link aggregation group (LAG) 1. Which of the following statements is false about Eth-Trunk 1 on router A?
On Huawei routers, which of the following is the default preference of static routing?
Network Address and Port Translation (NAPT) allows multiple private IP addresses to be mapped to the same public IP address through different port numbers. Which of the following statements about port numbers in NAPT is true?
Which of the following information is displayed when an entered command is incomplete on the Versatile Routing Platform (VRP)?
When the ACL in the following figure is configured on a Telnet server, only the device with an IP address of 172.16.105.2 can remotely log in to the Telnet server.
bash
Copy code
acl number 2000
rule 5 permit source 172.16.105.2 0
According to OSI reference model, which layer is responsible for end-to-end error checking and flow control?
A routing entry contains multiple fields. Which of the following statements about these fields is false?
The router ID of the OSPF process takes effect immediately after being changed.
Which of the following port states are included in Rapid Spanning Tree Protocol (RSTP)?
Which of the following statements are true about the dynamic MAC address table?
If a device running STP receives an RSTP configuration BPDU, it discards the BPDU.
(Which of the following statements is true about active interface election for an Eth-Trunk in LACP mode?)
Assuming that OSPF has been enabled on all routers in the following figure, which router is the BDR on this network?
The users who log on the router through Telnet are not permitted to configure an IP address. What is the possible reason?
When the "delete vrpcfg.zip" command is run on the Huawei VRP user interface, the file can be permanently deleted only after it is cleared from the recycle bin.
After an Eth-Trunk in LACP mode is created, devices on both ends send LACPDUs to elect the Actor. Which of the following parameters in LACPDUs determine the Actor election?
What is used as the data link-layer MAC address that identifies each VAP on an AP?
(Network Functions Virtualization (NFV) implements software-based network application deployment.)
The tree topology is a hierarchical star topology, facilitating network expansion. A consequence of this topology is that faults on a node at a higher layer are more severe.
Refer to the following configuration of an interface on a switch. What is the PVID of the interface?
interface GigabitEthernet0/0/1
port hybrid tagged vlan 2 to 3 100
port hybrid untagged vlan 4 6
Assume that an OSPF-enabled router has no loopback interface configured. What would be used as the router ID?
Which of the following commands is used to configure the country code on an AC?
Which of the following is correct regarding the configuration of the trunk port and access port on a switch?
In RSTP mode, both alternate and backup ports cannot forward user traffic and cannot receive, process, and send BPDU.
Refer to the following configuration of GigabitEthernet0/0/1 on the switch. For which VLAN does the switch forward untagged data frames?
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 10
port trunk allow-pass vlan 10 20 30 40
Which of the following mask lengths is recommended for device interconnection IP addresses during campus network planning?
If AAA authentication is used on Huawei devices and the remote server does not respond, the authentication can be performed on network devices.
While inspecting packets in the network, a network administrator discovers a frame with the destination MAC address of 01-00-5E-A0-B1-C3. What can the administrator determine from this?
If Spanning Tree Protocol (STP) is disabled on the network consisting of switches, a Layer 2 loop will definitely occur.
The network administrator has decided to configure link aggregation in the enterprise network. Which of the following represent advantages of link aggregation?
Refer to the following VLAN configurations on a Huawei switch. Which of the following statements are true?
Which of the following MAC addresses cannot be used as the MAC address of host network adapters?
Refer to the graphic, which of the following statements is true about OSPF topology and configuration?
The following figure shows the configuration of a sub-interface on a router. For which VLAN does the sub-interface receive tagged data frames?
In STP, the bridge ID on the switching network is as follows. With which of the following bridge IDs is the switch selected as the root bridge?
Which of the following configurations can prevent Host A and Host B from communicating with each other?
(The administrator performs the configuration shown in the figure on a router, and a host is connected to Gi/0/0 of the router. Which of the following statements is true about the IP address obtained by the host through DHCP?)
Which statement is true regarding the following command?
ip route-static 10.0.12.0 255.255.255.0 192.168.1.1
Which of the following statements about the routing table shown in the figure are true?
A router that runs OSPF can enter the Full state only after Link-State Database (LSDB) synchronization is completed.
You can run the user-interface maximum-vty command to configure the maximum number of users who can log in to the device through Telnet simultaneously.
With SNMP, an NMS can only display the device running status but cannot deliver configurations.
When forwarding a data packet, a router needs to change the destination IP address of the packet.
Which of the following statements regarding static routing and dynamic routing is incorrect?
On an STP-enabled switch, a port in the Learning state can transition to the Forwarding state only after the Forward Delay timer expires.
The following figure shows the display stp command output on an STP-enabled port — Ethernet 0/0/1. Which of the following statements about the command output is false?
By referring to the topology and the configurations of G0/0/1 interfaces on LSW1 and LSW2 shown in the figure, it can be determined that data frames tagged with VLAN 10 can be normally forwarded between LSW1 and LSW2.
(By default, in the SNMP protocol, which port number is used by the proxy process to send alarm messages to the NMS?)
Which of the following WLAN security policies support open link authentication?
Refer to the following configuration of a switch interface. Which of the following statements is false?
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 200
port trunk allow-pass vlan 100
The router that runs OSPF first enters the Full state and then synchronizes the LSDB.
(Which of the following descriptions regarding the STP forwarding state is incorrect?)
The network administrator performs the configuration shown in the following figure on RTA. If a user needs to be authenticated in the authentication domain named huawei, which of the following statements is true?
On the network shown in the figure, VLAN 2 is created on SWA and SWB, and interfaces connected to hosts are access ports added to VLAN 2. G0/0/1 on SWA and G0/0/2 on SWB are trunk interfaces allowing all VLANs. What additional configuration is needed on SWC to ensure communication between Host A and Host B?
As shown in the figure, RTA uses NAT and has an address pool configured to implement many-to-many non-NAPT address translation, so that hosts on the private network can access the public network. Assume that the address pool has only two public IP addresses, which are translated for Host A and Host B. If Host C wants to access the public network, which of the following statements is true?
An administrator wishes to manage the router in the remote branch office, which method can be used?
The authentication, authorization, and accounting schemes and HWTACACS or RADIUS server templates created on AR routers take effect only after being applied to a domain.
To provide the information about the IP addresses that a user packet traverses along the path to the destination, which of the following does Tracert record in each expired ICMP TTL packet?
Which SNMP version focuses on two main aspects, namely security and administration? The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.
On an STP-enabled switch, a port in the forwarding state can receive BPDU packets.
Which of the following statements are true about the shortcut keys of the Versatile Routing Platform (VRP)?
When two switches are connected through link aggregation, what are the requirements for the interfaces on the two switches?
A company applies for a class C IP address for subnetting. It has eight branches, and the largest branch has a subnet that should support at least 14 hosts. What would be an appropriate subnet mask?
When Fit APs go online on an AC, they will necessarily download the system software package from the AC.
The Network Management Station uses SNMP to manage devices. Which SNMP message is sent when an SNMP-registered abnormal event occurs?
Assuming all STP enabled switches have the same bridge priority. The MAC address of switch A is 00-e0-fc-00-00-40, the MAC address of switch B is 00-e0-fc-00-00-10, the MAC address of switch C is 00-e0-fc-00-00-20, and the MAC address of switch D is 00-e0-fc-00-00-80. Which switch will be elected as the root switch?
When a router is powered on, the router reads the configuration file saved in the default save directory to get itself initialized. If the configuration file does not exist in the default save directory, what does the router use to initialize itself?
Which of the following DHCP options needs to be configured on the DHCP server to allow Fit APs to obtain the IP address of an AC and establish CAPWAP tunnels?