As shown in the figure, PE1 establishes an EVPN peer relationship with each of PE2 and PE3. When the network is initialized, CE1 sends an ARP request packet.
Which of the following statements are correct about how a PE processes the packet?
BGP Link State (BGP-LS) introduces a new NLRI into BGP. The NLRI carries link, node, topology prefix, and other information, and is also referred to as the link state NLRI.
In theHuawei CloudCampus Solution, which of the following devices can go online through theregistration query center?
Exhibit:
The following figure shows the inter-AS MPLS VPN Option C (solution 2). RRs are deployed, and no traffic passes through the RRs during forwarding. If a data packet sent from PE2 to192.168.1.1carries two labels, which of the following statements about the two labels are correct?
Which of the following inter-AS MPLS L3VPN solutions does not require MPLS to run between ASBRs?
When aclient invokes the iMaster NCE-Campus RESTful API, it sends anHTTP request. The server then returns thestatus code 401.
Which of the following errors has occurred?
In the CloudCampus public cloud scenario, if deployment through the Huawei registration query center is used, you do not need to configure DHCP Option 148 on the DHCP server of the campus network.
According to the following information displayed on a router, which of the following are the causes of the failure in establishing an OSPF adjacency relationship?
OSPF error statistics:
1: Hello timer mismatch
0: Netmask mismatch
0: Bad checksum
0: Bad authentication type
0: Unknown neighbor
0: Extern option mismatch
On the campus network shown, IPv6 is deployed for service tests. Four routers are deployed on the network, and these routers use OSPFv3 for network connectivity. Which of the following statements about LSAs generated by the OSPFv3 network is incorrect?
Refer to the output information of a device below. According to the information, which of the following MPLS labels is carried in a data packet forwarded by the device to 10.0.1.1?
Which of the following intelligent traffic steering policies can be used to fully utilize link bandwidth and implement link bandwidth-based load balancing on an enterprise network with multiple links?
MPLS is located between the data link layer and network layer in the TCP/IP protocol stack and can provide services for all network layer protocols.
Which of the following statements about SR-MPLS characteristics are correct? (Select all that apply)
Which of the following functions can be provided by iMaster NCE-Campus when it functions as a relay agent for authentication?
On a campus network, which of the following problems may occur when you manually create a static VXLAN tunnel?
Complete the basic processing procedure for DiffServ model-based QoSshown in the figure
On the network shown in the following figure, a remote LDP session needs to be established between SWA and SWC. Which of the following statements is correct?
[SWA] mpls lsr-id 1.1.1.1
[SWA] mpls
[SWA-mpls] mpls ldp
[SWC] mpls lsr-id 33.3.3.3
[SWC] mpls
[SWC-mpls] mpls ldp
SWA ---- SWB ---- SWC
<------ Remote LDP Session ------>
Huawei Open Programmability System (OPS) uses HTTP methods to access managed objects to manage network devices. To facilitate script compilation, Huawei OPS provides the Python script template. In the Python script template, what are the contents of the Content-type and Accept fields in the header of an HTTP request packet?
OSPF is a mature protocol and is unlikely to have route computation errors in a regular networking environment under correct configurations. Which of the following statements are correct about the possible causes preventing an OSPF neighbor relationship from entering Full state?
On the bearer WAN shown in the figure,SR (Segment Routing)is deployed, and the controller is used to compute paths. Drag network technologies on the left to the corresponding application locations on the right.
In OSPF, an ABR translates all Type 7 LSAs in a Not-So-Stubby Area (NSSA) into Type 5 LSAs.
During the evolution from OSPFv2 to OSPFv3, LSA formats and functions remain unchanged, except that the network layer addresses in LSAs are changed from IPv4 to IPv6.
MPLS supports both static and dynamic LSP establishment. Which of the following protocols cannot dynamically establish LSPs in MPLS TE scenarios? (Select all that apply)
On aCloudCampus virtualized campus network, which of the following modes can be used by afabricto connect to external networks?
Which of the following statements are correct about authentication points and policy enforcement points in Huawei's free mobility solution?
NETCONF provides a set of mechanisms for managing network devices. NETCONF operations take place on a configuration datastore of network devices. Which of the following statements is incorrect about the configuration datastore?
This figure shows anSRv6 (Segment Routing over IPv6)packet. If theDestination Addressfield in the IPv6 basic header isFC04::4, the value of theSL (Segment Left)field in the SRv6 header should be____.(Enter only digits.)
Python Paramikoimplements theSSH protocol. In thePython Paramiko module, which of the following classes is used tocreate SFTP sessions and perform remote file operations?
Which of the following statements regarding OSPF neighbor relationship faults is incorrect?
In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following BGP EVPN routes is used to advertise MAC addresses, ARP entries, and IRB routes?
What can be determined from the following figure?
Total Number of Routes: 2
*>i Network : 3002::3
NextHop : 3000:FDEA::3
MED : 0
Path/Orgn : i
*>i Network : 3002::4
NextHop : 3000:FDEA::3
MED : 0
PrefixLen : 128
LocPrf : 100
PrefVal : 0
Path/Orgn : 65001 i
The following figure shows some configurations of R1. Based on these configurations, which of the following statements about IS-IS on R1 are correct?
isis 1
is-level level-2
cost-style wide
network-entity 49.0022.ee8c.a0c2.baf1.00
isis 2 vpn-instance tt
is-level level-2
cost-style wide
network-entity 47.00ce.390d.efdc.b3e1.00
isis 3 vpn-instance rr
is-level level-2
cost-style wide
network-entity 47.cc0a.3efb.bbdd.aae1.00
Whenstatic IPsec VPNis used for WAN interconnection in theHuawei CloudCampus Solution, theAP, Router, and ____can be used as egress devices.
Which of the following roles is NOT a core role in Huawei's Free Mobility solution?
As shown in the figure, a sham link is established between PE1 and PE2 through the loopback interfaces. CE2 can learn the 192.168.1.0/24 route (directed route on CE1) through the sham link and backdoor link. If other parameters use their default settings, the cost of the 192.168.1.0/24 route on CE2 should be ______. (Enter an Arabic numeral without symbols.)
In a VXLAN scenario, which of the following features can be enabled to reduce ARP packet flooding between VTEPs?
Which MPLS label will be used by PE2 for forwarding traffic to 10.0.1.1 based on the following SR-MPLS database?
Given Data (LSDB Information):
Prefix-SID:100
SRGB Base:40000
In the figure,SR-MPLSis enabled onR1, R2, and R3. TheSRGB (Segment Routing Global Block) rangeonR3is from20000 to 21000, and theprefix SID indexconfigured on theloopback1 interface of R3 is 30.
In this case, theMPLS label corresponding to the loopback1 interface of R3 is _____.
(Enter anArabic numeralwithout symbols.)
Congestion management technology can be used to discard data packets in the buffer queue to prevent the buffer queue from being exhausted.
An HTTP request line consists of three fields. Select the fields to form a complete HTTP request message.
An Ethernet Segment Identifier (ESI) is 10 bytes long and unique on the entire network.
Which of the following factors does not need to be considered during the selection of core devices for the enterprise bearer WAN?
SSH connections are usually established based on TCP/IP connections. In specific cases, SSH connections can be established based on UDP connections.
How long is an IPv6 prefix assigned to a host when an IPv6 address is configured for the host in SLAAC mode?
The Ingress VTEP performs both Layer 2 and Layer 3 table lookup for packet forwarding. The forwarding mode is ______ IRB forwarding. (Capitalize the first letter.)
To obtain thetoken IDofiMaster NCE, you need to send anHTTP requestusing the followingPython codeto invoke aniMaster NCE RESTful API:
Which of the following statements isincorrect?
Portal authentication is recommended for scenarios with high mobility and numerous terminal types, such as shopping malls and supermarkets. MAC address authentication is recommended for dumb terminals that do not support Portal authentication, such as printers, fax machines, and IP phones.
TheNETCONF content layercontainsdevice configuration data.
Which of the following statements are correct about the followingNETCONF configuration?
The command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)
In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, which of the following statements about symmetric IRB forwarding are correct?
When Huawei iMaster NCE-IP is used to configureSR-MPLS TE tunnels, which of the following protocols is used by the controller to collect device running status information?
When an NVE encapsulates a data frame into a VXLAN packet, information of which of the following protocols is encapsulated between the outer IP header and the VXLAN header?
An SRLB is a set of user-specified local labels reserved for SR-MPLS. These labels are locally configured and have only local significance. Therefore, they are not advertised through the IGP.
MPLS supports Forwarding Equivalence Class (FEC). Which of the following cannot be used as a FEC allocation standard?
The following figure shows the inter-AS MPLS L3VPN Option C (Solution 2). ASBR-PE2 is connected to CE3 and runs eBGP.
To enable all CEs to communicate with each other, which of the following address families must peer relationships be enabled in the BGP process of ASBR-PE2?
Which of the following are application optimization functions in the Huawei SD-WAN Solution?
You write the following Python code to invoke a RESTful API to obtain the token ID of iMaster NCE. Which of the following statements are correct?
import requests
response = requests.get("https://139.9.213.72 ")
print(response.json())
Error returned:
requests.exceptions.SSLError: HTTPSConnectionPool(host='139.9.213.72', port=18002): Max retries exceeded with url: /controller/v2/tokens (Caused by SSLError(CertificateError('hostname '139.9.213.72' doesn't match 'devzone.huawei.com')))
Options:
On a VXLAN-based virtualized network, if the fabric networking mode is centralized gateway networking, the gateway is located on the _____ device. (Capitalize the first letter.)
In BGP4+, what is the content of the next hop network address field carried in the MP_REACH_NLRI attribute of an Update packet?
The path of an SR-MPLS TE tunnel can be calculated by the controller or tunnel ingress.
NETCONF provides a set of mechanisms for managing network devices. What layers can NETCONF be conceptually partitioned into?
What can be determined from the following figure?
Public Routing Table : ISIS
Summary Count: 6
ISIS Routing Table's Status : < Active >
Summary Count: 6
Destination : 3000:FDEA::4
NextHop : FE80::2E0:FCFF:FE98:2577
Cost : 20
Interface : GigabitEthernet0/0/1
PrefixLength : 128
Preference : 15
Protocol : ISIS-L2
Flags : D
Which of the following statements aboutSR-MPLS Policy candidate pathsare correct?
In a BGP/MPLS IP VPN scenario, if a PE and CE use OSPF to exchange routing information, domain IDs are used to identify whether the routes imported to VPN instances are from the same OSPF domain.
In an MPLS VPN network, two-layer MPLS labels are added into data packets before they are transmitted over the public network. Which of the following statements regarding data packet processing are correct?
Which of the following statements is incorrect about access control on small and midsize campus networks based on the Huawei CloudCampus solution?
Among NETCONF operations, the
VLAN-based MAC address flapping detection is configured. If MAC address flapping occurs, actions to be taken on an interface can be configured as required. Which of the following actions cannot be configured?
Which of the following technologies can be used to measure performance based on actual service traffic in Huawei's CloudWAN solution?
Which of the following statements about configuring user access authentication is incorrect?
In the firewall hot standby scenario, when VGMP works in load balancing mode, which of the following functions must be enabled on the firewalls to prevent the return traffic from being discarded because it does not match any session entry in the case of inconsistent forward and return paths?
In Huawei's NAC solution, which of the following cannot be used for Portal authentication?
A client sends an HTTP request to a server, and the server sends back an HTTP response. Which of the following parameters isnotcarried in the HTTP response?
Free mobility is deployed on a campus network through iMaster NCE-Campus. During this deployment, which of the following steps are performed by administrators and which are automatically performed by iMaster NCE-Campus? Drag the administrators and iMaster NCE-Campus icons on the left to the corresponding steps on the right.
Which of the following statements is incorrect about intranet security design for a large or medium-sized virtualized campus network?
Which of the following parameters is not included in an IPsec security association (SA)?
During the implementation of iMaster NCE-Campus Wi-Fi location-based services (LBS), terminal location data is sent to an LBS platform through HTTP requests. Which of the following data formats is used in such HTTP requests?
Which of the following statements is incorrect about the user authentication points on the network?
Which of the following number sequences can be matched by the regular expression100.$?
As shown in the figure, what is known about the default routes on R4?
Routing Table on R4:
Destination/Mask Proto Pre Cost Flags NextHop Interface
0.0.0.0/0 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1
ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0
172.16.1.2/32 ISIS-L1 15 10 D 10.1.24.1 GigabitEthernet0/0/1
172.16.1.3/32 ISIS-L1 15 10 D 10.1.34.1 GigabitEthernet0/0/0
The ________ command can be run to completely isolate Layer 2 and Layer 3 of different interfaces in a VLAN. (Use lowercase letters to supplement the command, which cannot be abbreviated.)
When you configure avirtualized campus networkoniMaster NCE-Campus, Fit APs can immediately go online after you add them toiMaster NCE-Campus.
Which of the following inter-AS MPLS L3VPN solutions need VPN user data packets to carry MPLS labels when being forwarded between ASs?