· 6 years ago · Oct 17, 2019, 07:38 AM
1
2Question 1
3Incorrect
4Mark 0 out of 1
5Not flagged
6Question text
7(Multiple Choice) Which of the following network topologies are the widely used backbone network topologies?
8Select one or more:
9a. Plane Hierarchical structure
10b. Full Mesh
11c. Multi-homing structure
12d. Plane and Space Hierarchical structure
13Feedback
14The correct answers are: Plane Hierarchical structure, Plane and Space Hierarchical structure
15Question 2
16Incorrect
17Mark 0 out of 1
18Not flagged
19Question text
20(Multiple Choice) The metropolitan area network which is located between backbone network and access network consists of
21Select one or more:
22a. Carrier layer
23b. Access layer
24c. Convergence layer
25d. Core layer
26Feedback
27The correct answers are: Core layer, Convergence layer, Access layer
28Question 3
29Incorrect
30Mark 0 out of 1
31Not flagged
32Question text
33(Single Choice) In a complete IP network, which of the following networks does a Layer 2 network under the service access control point belong to?
34Select one:
35a. Metropolitan area network (MAN)
36b. Core network
37c. Access network
38d. Backbone network
39Feedback
40The correct answer is: Access network
41Question 4
42Incorrect
43Mark 0 out of 1
44Not flagged
45Question text
46(Multiple Choice) When a backbone network uses dual planes, which of the following statements are true?
47Select one or more:
48a. When a fault occurs on one plane, the other plane cannot function as the backup of the faulty plane.
49b. In normal situations, the services on the two planes do not affect each other.
50c. Compared with a dual-plane structure, a hierarchical plane is more reliable.
51d. The two planes generally carry different services.
52Feedback
53The correct answers are: The two planes generally carry different services., In normal situations, the services on the two planes do not affect each other.
54Question 5
55Incorrect
56Mark 0 out of 1
57Not flagged
58Question text
59(Multiple Choice) On Huawei VRP platform, which of the following can be used to invoke the history command saved by the command line interface?
60
61Select one or more:
62a. Ctrl+P
63b. Up cursor key < >
64c. Left cursor key < >
65d. Ctrl+U
66Feedback
67The correct answers are: Up cursor key < >, Ctrl+P
68Question 6
69Incorrect
70Mark 0 out of 1
71Not flagged
72Question text
73(Single Choice) Which of the following commands is used to enter the system-view from the user view on a Huawei router?
74
75Select one:
76a. enable
77b. configure terminal
78c. system-view
79d. interface system
80Feedback
81The correct answer is: system-view
82Question 7
83Incorrect
84Mark 0 out of 1
85Not flagged
86Question text
87(Single Choice) On VRP platform, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?
88Select one:
89a. Management level
90b. Configuration level
91c. Visit level
92d. Monitoring level
93Feedback
94The correct answer is: Configuration level
95Question 8
96Partially correct
97Mark 1 out of 1
98Not flagged
99Question text
100(Multiple Choice) Which of the following statements about the command view of VRP are true?
101Select one or more:
102a. The System-view command can switch a view from the user view to the system view.
103b. The Quit command can switch a view from the system view to the user view.
104c. Different views may have different commands.
105d. A service command can switch a view from the system view to the corresponding service view.
106Feedback
107The correct answers are: The System-view command can switch a view from the user view to the system view., A service command can switch a view from the system view to the corresponding service view., The Quit command can switch a view from the system view to the user view., Different views may have different commands.
108Question 9
109Incorrect
110Mark 0 out of 1
111Not flagged
112Question text
113(Single Choice) Which of the following must be used to establish the configuration environment when a router is powered on for the first time?
114Select one:
115a. SSH
116b. Console port
117c. SSL
118d. Telnet
119Feedback
120The correct answer is: Console port
121Question 10
122Incorrect
123Mark 0 out of 1
124Not flagged
125Question text
126(Single Choice) Which of the following parameter settings for terminal emulation are correct when configuring a Huawei router through the Console port?
127Select one:
128a. 19200bps, 8 data bits, 1 stop bits, no parity check, and no flow control
129b. 4800bps, 8 data bits,1 stop bits, odd parity check, and no flow control
130c. 9600bps, 8 data bits, 1 stop bits, no parity check, and no flow control
131d. 9600bps, 8 data bits, 1 stop bits, even parity check, and hardware flow control
132Feedback
133The correct answer is: 9600bps, 8 data bits, 1 stop bits, no parity check, and no flow control
134Question 11
135Incorrect
136Mark 0 out of 1
137Not flagged
138Question text
139(Single Choice) Which of the following commands can be used to view the current configurations on a Quidway router?
140Select one:
141a. view saved-configuration
142b. show startup- configuration
143c. display saved-configuration
144d. display current-configuration
145Feedback
146The correct answer is: display current-configuration
147Question 12
148Partially correct
149Mark 1 out of 1
150Not flagged
151Question text
152(Multiple Choice) Which of the following storage devices are supported by Huawei Quidway router?
153Select one or more:
154a. SDRAM
155b. NVRAM
156c. Hard Disk
157d. Flash
158e. CF Card
159Feedback
160The correct answers are: SDRAM, NVRAM, Flash, CF Card
161Question 13
162Incorrect
163Mark 0 out of 1
164Not flagged
165Question text
166(Single Choice) Which of the following storage devices is used to store the startup configuration files in a router?
167Select one:
168a. NVRAM
169b. Flash
170c. SDRAM
171d. BootROM
172Feedback
173The correct answer is: NVRAM
174Question 14
175Correct
176Mark 1 out of 1
177Not flagged
178Question text
179(Single Choice) On VRP platform, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?
180Select one:
181a. Management level
182b. Visit level
183c. Configuration level
184d. Monitoring level
185Feedback
186The correct answer is: Configuration level
187Question 15
188Incorrect
189Mark 0 out of 1
190Not flagged
191Question text
192(Single Choice) An adminstrator has been requested to replace the configuration file of a router in the network. The administrator has been instructed that after logging into the router, he must first permenantly erase the current configuration file config.zip from the system. Which command should he use to achieve this?
193Select one:
194a. reset config.zip
195b. delete /force config.zip
196c. delete /unreserved config.zip
197d. clear config.zip
198Feedback
199The correct answer is: delete /unreserved config.zip
200Question 16
201Incorrect
202Mark 0 out of 1
203Not flagged
204Question text
205(Multiple Choice) Which of the following products use the VRP platform as the core engine of their software?
206Select one or more:
207a. Ethernet switch
208b. Router
209c. Service gateway
210d. LTE
211Feedback
212The correct answers are: Router, Ethernet switch, Service gateway
213Question 17
214Incorrect
215Mark 0 out of 1
216Not flagged
217Question text
218(Multiple Choice) What functions does VRP provide?
219Select one or more:
220a. Provides the functions of a control plane.
221b. Defines interfaces of a forwarding plane.
222c. Blocks communication between a forwarding plane and the VRP control plane.
223d. Provides a unified user interface and a unified management window.
224Feedback
225The correct answers are: Provides a unified user interface and a unified management window., Provides the functions of a control plane., Defines interfaces of a forwarding plane.
226Question 18
227Correct
228Mark 1 out of 1
229Not flagged
230Question text
231(Single Choice) Which component of the VRP platform provides user authentication charging and user policy management?
232Select one:
233a. Versatile control plane
234b. Service control plane
235c. None of the above
236d. System management plane
237Feedback
238The correct answer is: Service control plane
239Question 19
240Incorrect
241Mark 0 out of 1
242Not flagged
243Question text
244(Single Choice) On VRP platform, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?
245Select one:
246a. Visit level
247b. Management level
248c. Monitoring level
249d. Configuration level
250Feedback
251The correct answer is: Configuration level
252Question 20
253Incorrect
254Mark 0 out of 1
255Not flagged
256Question text
257(Single Choice) <Huawei>display startup
258
259MainBoard:
260
261Startup system software: sd1:/ar2220-v200r003c00spc200.cc
262
263Next startup system software: sd1:/ar2220-v200r003c00spc200.cc
264
265Backup system software for next startup: null
266
267Startup saved-configuration file: null
268
269Next startup saved-configuration file: null
270
271Startup license file: null
272
273Next startup license file: null
274
275Startup patch package: null
276
277Next startup patch package: null
278
279Startup voice-files: null
280
281Next startup voice-files: null
282
283
284Refer to the display output. Which statement is false?
285
286Select one:
287a. The current configuration file has not been saved.
288b. The next startup system software cannot be changed.
289c. The next startup system software can be changed by using the “startup system software .cc
290d. The current startup system software is ar2220-v200r003c00spc200.cc
291Feedback
292The correct answer is: The next startup system software cannot be changed.
293Question 21
294Incorrect
295Mark 0 out of 1
296Not flagged
297Question text
298(Single Choice) Which of the following must be used to establish the configuration environment when a router is powered on for the first time?
299Select one:
300a. Telnet
301b. SSL
302c. Console port
303d. SSH
304Feedback
305The correct answer is: Console port
306Question 22
307Incorrect
308Mark 0 out of 1
309Not flagged
310Question text
311(Single Choice) Workstation A and workstation B are respectively connected to two ports of a switch. Assume the MAC table of the switch is empty now. Which of the following statements is true as soon as the switch receives the first packet sent by Workstation A to Workstation B?
312Select one:
313a. The switch will learn addresses of both A and B
314b. The switch will not learn any address
315c. The switch will learn address of A
316d. The switch will learn address of B
317Feedback
318The correct answer is: The switch will learn address of A
319Question 23
320Incorrect
321Mark 0 out of 1
322Not flagged
323Question text
324(Single Choice) <Quidway>display mac-address
325
326-------------------------------------------------------------------------------
327
328MAC Address VLAN/VSI Learned-From Type
329
330-------------------------------------------------------------------------------
331
3325489-98ec-f018 1/- GE0/0/13 dynamic
333
334-------------------------------------------------------------------------------
335
336Total items displayed = 1
337Select one:
338a. The switch will drop the frame because it does not have an entry in its MAC address table
339b. The switch will report that the destination is unreachable and report this to the source.
340c. The switch will send a request to obtain the MAC address of 5489-98ec-f011.
341d. The switch will flood the frame via all ports, with exception of the port on which the frame was received.
342Feedback
343The correct answer is: The switch will flood the frame via all ports, with exception of the port on which the frame was received.
344Question 24
345Incorrect
346Mark 0 out of 1
347Not flagged
348Question text
349(Single Choice) A server is linked to port interface G0/0/1 of a switch. The administrator wishes to allow only this server to be linked to this interface on the switch. Which method can be used to achieve this?
350Select one:
351a. Configure the default gateway of the switch to be the same as the server’s IP address.
352b. Configure a static ARP entry using the server’s IP address and MAC address in the switch.
353c. Configure a static MAC address binding entry of the server’s MAC address and the interface in the switch.
354d. It is not possible to enable a single device to be associated with an interface.
355Feedback
356The correct answer is: Configure a static MAC address binding entry of the server’s MAC address and the interface in the switch.
357Question 25
358Incorrect
359Mark 0 out of 1
360Not flagged
361Question text
362(Single Choice) An administrator connects two switches together in a local enterprise network. The ports of one switch support Fast Ethernet, while the ports of the other switch support Gigabit Ethernet. Hosts connected to one switch are able to communicate, however communication between the two switches fails. What is the possible reason for this?
363Select one:
364a. A Fast Ethernet port cannot communicate directly with a Gigabit Ethernet port.
365b. The ports have disabled auto-negoatition.
366c. The port of one switch is operating using half duplex mode, while the port of the other switch is using full duplex mode.
367d. One port is supporting auto-negotiation, while auto-negotiation is disabled on the port of the other switch.
368Feedback
369The correct answer is: The ports have disabled auto-negoatition.
370Question 26
371Incorrect
372Mark 0 out of 1
373Not flagged
374Question text
375(Single Choice) STP is short for ?
376Select one:
377a. Spanning tree protocol
378b. Shortest path tree protocol
379c. Sharing tree protocol
380d. Rapid spanning tree protocol
381Feedback
382The correct answer is: Spanning tree protocol
383Question 27
384Correct
385Mark 1 out of 1
386Not flagged
387Question text
388(Single Choice) Devices need to exchange information and parameters in order to calculate a spanning tree. Such information and parameters are encapsulated into a certain unit when they are exchanged between devices. Which type of unit are the information and parameters encapsulated into?
389Select one:
390a. Configured STP
391b. Configured BPDU
392c. TCP BPDU
393d. Configured RSTP
394Feedback
395The correct answer is: Configured BPDU
396Question 28
397Incorrect
398Mark 0 out of 1
399Not flagged
400Question text
401(Single Choice) How many root bridges does the STP protocol select from all the network bridges when calculating a spanning tree?
402Select one:
403a. 4
404b. 3
405c. 2
406d. 1
407Feedback
408The correct answer is: 1
409Question 29
410Incorrect
411Mark 0 out of 1
412Not flagged
413Question text
414(Single Choice) Which attribute is selection of a root bridge based on when the spanning tree is calculated by the STP?
415Select one:
416a. Bridge ID
417b. Port Cost
418c. Port ID
419d. Path Cost
420Feedback
421The correct answer is: Bridge ID
422Question 30
423Incorrect
424Mark 0 out of 1
425Not flagged
426Question text
427(Single Choice) STP calculates the overall cost of each path between a non-root bridge and a root bridge. What is a port on the non-root bridge called on the path that has the minimum overall cost?
428Select one:
429a. Queue port
430b. Designated port
431c. Root port
432d. Common port
433Feedback
434The correct answer is: Root port
435Question 31
436Incorrect
437Mark 0 out of 1
438Not flagged
439Question text
440(Single Choice) In STP calculation, a port identifier consists of two parts: one-byte ( ) and one-byte port number.
441Select one:
442a. Link priority
443b. Bridge MAC address
444c. Port priority
445d. Port MAC address
446Feedback
447The correct answer is: Port priority
448Question 32
449Incorrect
450Mark 0 out of 1
451Not flagged
452Question text
453(Multiple Choice) The existence of loop in switched network can lead to
454Select one or more:
455a. Destination unreachable
456b. Unstable MAC address table
457c. Route self-loop
458d. Broadcast storm
459Feedback
460The correct answers are: Broadcast storm, Unstable MAC address table
461Question 33
462Correct
463Mark 1 out of 1
464Not flagged
465Question text
466(Single Choice) Which of the following statements regarding layer-2 switch is incorrect?
467Select one:
468a. Layer-2 header is modified before the received packet is transmitted.
469b. Layer-3 header is modified before the received packet is transmitted
470c. Learn MAC address automatically
471d. Layer-2 LAN switch operates at data link layer
472Feedback
473The correct answer is: Layer-3 header is modified before the received packet is transmitted
474Question 34
475Incorrect
476Mark 0 out of 1
477Not flagged
478Question text
479(Multiple Choice) Which of the following are the functions of STP in switched network?
480Select one or more:
481a. Improve bridge network availability by providing physical path redundancy
482b. Eliminate the possible loops by blocking the redundant paths
483c. Activate the redundant backup path when the active path becomes faulty.
484d. Improve bridge network availability by providing logical path redundancy
485Feedback
486The correct answers are: Improve bridge network availability by providing physical path redundancy, Eliminate the possible loops by blocking the redundant paths, Activate the redundant backup path when the active path becomes faulty.
487Question 35
488Correct
489Mark 1 out of 1
490Not flagged
491Question text
492(Single Choice) The standard for STP defined by IEEE is
493Select one:
494a. 802.3
495b. 802.1D
496c. 802.11b
497d. 802.1Q
498Feedback
499The correct answer is: 802.1D
500Question 36
501Incorrect
502Mark 0 out of 1
503Not flagged
504Question text
505(Multiple Choice) Which of the following descriptions about STP are incorrect?
506Select one or more:
507a. All the ports of the root switch are designated port
508b. A layer-2 switching network can have only one designated switch
509c. The switch with the smallest priority value is elected as non-root switch
510d. All the ports of the root switch are root port
511Feedback
512The correct answers are: A layer-2 switching network can have only one designated switch, All the ports of the root switch are root port, The switch with the smallest priority value is elected as non-root switch
513Question 37
514Incorrect
515Mark 0 out of 1
516Not flagged
517Question text
518(Multiple Choice) In STP, the bridge ID consists of two parts. They are ( ) and ( ).
519Select one or more:
520a. Switch Port ID
521b. Switch IP address
522c. Switch MAC address
523d. Switch priority
524Feedback
525The correct answers are: Switch priority, Switch MAC address
526Question 38
527Correct
528Mark 1 out of 1
529Not flagged
530Question text
531(Single Choice) In STP, what is the length of bridge ID?
532
533Select one:
534a. 32 bits
535b. 64 bits
536c. 48 bits
537d. 8 bits
538Feedback
539The correct answer is: 64 bits
540Question 39
541Incorrect
542Mark 0 out of 1
543Not flagged
544Question text
545(Single Choice) Which of the following descriptions about STP is incorrect?
546Select one:
547a. STP can manage the redundant links
548b. STP can block redundant links to eliminate loops
549c. STP can make LAN switch operates normally in a switched network environment with loops
550d. STP can prevent from temporary loss of connectivity
551Feedback
552The correct answer is: STP can prevent from temporary loss of connectivity
553Question 40
554Incorrect
555Mark 0 out of 1
556Not flagged
557Question text
558(Single Choice) Which of the following descriptions about port state transition of STP are incorrect?
559Select one:
560a. Learning state can transit to Forwarding state directly
561b. Blocking state can transit to Forwarding state directly
562c. Learning state can transit to Blocking state directly
563d. Forwarding state can transit to Blocking state directly
564Feedback
565The correct answer is: Blocking state can transit to Forwarding state directly
566Question 41
567Incorrect
568Mark 0 out of 1
569Not flagged
570Question text
571(Single Choice) During STP calculation, STP selects a designated port and bridge for each network segment. In this selection process, STP first compares ( ) of the port connected to the network segment and selects the one with the lowest number.
572Select one:
573a. Port MAC address
574b. Port identifier
575c. Link priority
576d. Root path cost
577Feedback
578The correct answer is: Root path cost
579Question 42
580Incorrect
581Mark 0 out of 1
582Not flagged
583Question text
584(Multiple Choice) Which of the following ports are defined by STP and indicate that Physical Layer and Data Link Layer are working normally and STP is enabled at ports on a device?
585Select one or more:
586a. Root Port
587b. Disable Port
588c. Designated Port
589d. Alternate Port
590Feedback
591The correct answers are: Root Port, Designated Port, Alternate Port
592Question 43
593Incorrect
594Mark 0 out of 1
595Not flagged
596Question text
597(Single Choice) During STP calculation, when a port is in a certain state, it neither forwards any data frame nor learns MAC address tables. It takes part in only spanning tree calculation in addition to receiving and sending STP protocol packets. Which state does the abovementioned state refer to?
598Select one:
599a. Blocking
600b. Forwarding
601c. Listening
602d. Learning
603Feedback
604The correct answer is: Listening
605Question 44
606Incorrect
607Mark 0 out of 1
608Not flagged
609Question text
610(Single Choice) During STP calculation, when a port is in a certain state, it neither forwards any data frame nor learns MAC address tables. Instead, it only receives and processes STP protocol packets. Which state does the abovementioned state refer to?
611Select one:
612a. Learning
613b. Forwarding
614c. Listening
615d. Blocking
616Feedback
617The correct answer is: Blocking
618Question 45
619Incorrect
620Mark 0 out of 1
621Not flagged
622Question text
623(Single Choice) Workstation A and workstation B are connected to two different switch ports respectively. Assume that workstation B hasn't sent any packet yet. Which of the following statements is true when workstation A starts sending the first packet to workstation B?
624Select one:
625a. The destination port of workstation B is not found in switch's MAC table an the packet is discarded
626b. The switch learns the address of workstation B and sends the packet to the port that is connected with B
627c. The switch learns address of workstation A and broadcasts the packet out of all the ports except for the port that received the packet
628d. The switch learns address of workstation A and broadcasts the packet out of all the ports
629Feedback
630The correct answer is: The switch learns address of workstation A and broadcasts the packet out of all the ports except for the port that received the packet
631Question 46
632Incorrect
633Mark 0 out of 1
634Not flagged
635Question text
636(Single Choice) In OSI reference model, Layer 2 LAN switch operates at
637Select one:
638a. Application layer
639b. Network layer
640c. Physical layer
641d. Data link layer
642Feedback
643The correct answer is: Data link layer
644Question 47
645Partially correct
646Mark 0 out of 1
647Not flagged
648Question text
649(Multiple Choice) Which of the following descriptions about STP are correct?
650Select one or more:
651a. A network can have only one root switch
652b. The switch with the smallest priority value is elected as the root switch
653c. All the ports of the root switch are designated port
654d. All the ports of the root switch are root port
655Feedback
656The correct answers are: A network can have only one root switch, All the ports of the root switch are designated port, The switch with the smallest priority value is elected as the root switch
657Question 48
658Incorrect
659Mark 0 out of 1
660Not flagged
661Question text
662(Multiple Choice) In STP, the role of switch port includes ( )
663Select one or more:
664a. Alternate port
665b. Optional port
666c. Designated port
667d. Backup root port
668e. Root port
669Feedback
670The correct answers are: Root port, Alternate port, Designated port
671Question 49
672Incorrect
673Mark 0 out of 1
674Not flagged
675Question text
676(Single Choice) As specified by the RSTP protocol, when a root port fails, which type of port will function as a new root port and enters the forwarding state without any delay?
677Select one:
678a. Edge Port
679b. Alternate Port
680c. Backup Port
681d. Forwarding Port
682Feedback
683The correct answer is: Alternate Port
684Question 50
685Incorrect
686Mark 0 out of 1
687Not flagged
688Question text
689(Single Choice) The main idea of STP is to generate a loop-free tree by exchanging a special kind of message between bridges. This message is called
690Select one:
691a. TCN BPDU
692b. Update BPDU
693c. Configuration BPDU
694d. Hello BPDU
695Feedback
696The correct answer is: Configuration BPDU
697Question 51
698Correct
699Mark 1 out of 1
700Not flagged
701Question text
702(Single Choice) In the RSTP standard, a port is able to connect to a terminal directly and enter the forwarding state without delay. Which of the following ports represents such a port?
703Select one:
704a. Backup port
705b. Edge port
706c. Fast port
707d. Root port
708Feedback
709The correct answer is: Edge port
710Question 52
711Incorrect
712Mark 0 out of 1
713Not flagged
714Question text
715(Multiple Choice) Which of the following are the interface states of STP?
716Select one or more:
717a. Disabled
718b. Forwarding
719c. Learning
720d. Shut down
721e. Blocking
722Feedback
723The correct answers are: Disabled, Blocking, Learning, Forwarding
724Question 53
725Correct
726Mark 1 out of 1
727Not flagged
728Question text
729(Single Choice) Which of the following descriptions about learning state in STP is incorrect?
730Select one:
731a. The port in learning state can receive and send BPDU
732b. The port in learning state can forward part of the data packet
733c. The port in learning state can learn the source MAC address of data packet
734d. The port in learning state can only learn the source MAC address but cannot transmit the data packet.
735Feedback
736The correct answer is: The port in learning state can forward part of the data packet
737Question 54
738Correct
739Mark 1 out of 1
740Not flagged
741Question text
742(Single Choice) Which of the following descriptions about blocking state in STP is incorrect?
743Select one:
744a. The port in blocking state does not learn source MAC address of data packet
745b. The port in blocking state can receive BPDU
746c. The port in blocking state does not receive any data packets
747d. The port in blocking state does not forward data packets
748Feedback
749The correct answer is: The port in blocking state does not receive any data packets
750Question 55
751Incorrect
752Mark 0 out of 1
753Not flagged
754Question text
755(Single Choice) STP uses ( ) timer to prevent from temporary loop when the link is fault?
756Select one:
757a. Message Age
758b. Max Age
759c. Hello Time
760d. Forward Delay
761Feedback
762The correct answer is: Forward Delay
763Question 56
764Incorrect
765Mark 0 out of 1
766Not flagged
767Question text
768(Single Choice) On Huawei switches running STP,the default value of forward delay is ( ) seconds.
769Select one:
770a. 15
771b. 10
772c. 30
773d. 20
774Feedback
775The correct answer is: 15
776Question 57
777Partially correct
778Mark 1 out of 1
779Not flagged
780Question text
781(Multiple Choice) Which of the following are the advantages of RSTP compared with STP?
782Select one or more:
783a. Once a port of the switch which is configured as edge port has been enabled, it will become designated port immediately and transit to forwarding state.
784b. If the designated port is connected with P2P link, it can make a handshake with the connected bridge and enter the forwarding state immediately after it receives the response.
785c. If the designated port is connected with P2MP link, it can make a handshake with the connected bridge and enter the forwarding state immediately after it receives the response.
786d. A new root port is elected on the non-root switch and the previous old root port is no longer in forwarding state. Moreover the designated port of the segment which connects with the new root port already starts to forward the data. In this case, the new root port can enter forwarding state immediately.
787Feedback
788The correct answers are: A new root port is elected on the non-root switch and the previous old root port is no longer in forwarding state. Moreover the designated port of the segment which connects with the new root port already starts to forward the data. In this case, the new root port can enter forwarding state immediately., Once a port of the switch which is configured as edge port has been enabled, it will become designated port immediately and transit to forwarding state., If the designated port is connected with P2P link, it can make a handshake with the connected bridge and enter the forwarding state immediately after it receives the response.
789Question 58
790Partially correct
791Mark 1 out of 1
792Not flagged
793Question text
794(Multiple Choice) Which of the following are disadvantages of “single” spanning tree?
795Select one or more:
796a. Hosts belong to the same VLAN connected to different switches may not be able to communicate each other
797b. Load balancing can not be implemented
798c. Convergence is slow
799d. Sub-optimal path may exist
800Feedback
801The correct answers are: Hosts belong to the same VLAN connected to different switches may not be able to communicate each other, Load balancing can not be implemented, Sub-optimal path may exist
802Question 59
803Correct
804Mark 1 out of 1
805Not flagged
806Question text
807(Single Choice) As specified by the RSTP protocol, when a designated port fails, which type of port will function as a new designated port and enters the forwarding state without any delay?
808Select one:
809a. Edge Port
810b. Forwarding Port
811c. Alternate Port
812d. Backup Port
813Feedback
814The correct answer is: Backup Port
815Question 60
816Incorrect
817Mark 0 out of 1
818Not flagged
819Question text
820(Single Choice) IGP is the protocol which is used in
821Select one:
822a. A LAN
823b. An area
824c. Within the range of classful address
825d. An Autonomous System
826Feedback
827The correct answer is: An Autonomous System
828Question 61
829Incorrect
830Mark 0 out of 1
831Not flagged
832Question text
833(Multiple Choice) According to the algorithms, routing protocols fall into two categories. They are
834Select one or more:
835a. IGP
836b. EGP
837c. Link-state
838d. Distance Vector
839Feedback
840The correct answers are: Distance Vector, Link-state
841Question 62
842Partially correct
843Mark 1 out of 1
844Not flagged
845Question text
846(Multiple Choice) Which of the following items are the contents of the routing table?
847Select one or more:
848a. Node
849b. Cost, Interface, and Next hop
850c. Destination
851d. Router
852Feedback
853The correct answers are: Destination, Cost, Interface, and Next hop
854Question 63
855Incorrect
856Mark 0 out of 1
857Not flagged
858Question text
859(Multiple Choice) A routing table can be formed by using different methods. Which of the following protocols are used to form a routing table?
860Select one or more:
861a. Transport-level protocol
862b. Application-level protocol
863c. Dynamic routing protocol
864d. Static routing protocol
865Feedback
866The correct answers are: Static routing protocol, Dynamic routing protocol
867Question 64
868Partially correct
869Mark 0 out of 1
870Not flagged
871Question text
872(Multiple Choice) What functions does a router mainly provide?
873Select one or more:
874a. Discover possible routes.
875b. Verify and maintain route information.
876c. Check the destination address in a datagram.
877d. Determine the information source.
878Feedback
879The correct answers are: Check the destination address in a datagram., Discover possible routes., Verify and maintain route information.
880Question 65
881Partially correct
882Mark 0 out of 1
883Not flagged
884Question text
885(Multiple Choice) When the value of the proto field of a route in a routing table is direct, it indicates that this route is a
886Select one or more:
887a. Direct route
888b. Port route
889c. Route discovered by the protocol at the link layer
890d. Default route
891Feedback
892The correct answers are: Route discovered by the protocol at the link layer, Port route, Default route
893Question 66
894Incorrect
895Mark 0 out of 1
896Not flagged
897Question text
898(Multiple Choice) Which of the following statements are true?
899Select one or more:
900a. A protocol at the link layer can discover only a route in a network segment connected directly to a port.
901b. A protocol at the link layer can discover only a route to a loopback address.
902c. A route discovered by a protocol at the link layer need not be maintained.
903d. A protocol at the link layer can discover only a route across different network segments.
904Feedback
905The correct answers are: A route discovered by a protocol at the link layer need not be maintained., A protocol at the link layer can discover only a route in a network segment connected directly to a port.
906Question 67
907Incorrect
908Mark 0 out of 1
909Not flagged
910Question text
911(Multiple Choice) Which of the following statements are correct?
912Select one or more:
913a. When several dynamic routing protocols have the best routes to the same destination, all these routes will be added to the routing table.
914b. The calculation of cost may be based on “single” link attribute or several link attributes such as delay, hop count, bandwidth and etc.
915c. The calculation method of the preference and cost in the routing table are same.
916d. Some of the dynamic routing protocols calculate the best path base on the cost value. However, Different routing protocol calculates the metric in different ways
917Feedback
918The correct answers are: The calculation of cost may be based on “single” link attribute or several link attributes such as delay, hop count, bandwidth and etc., Some of the dynamic routing protocols calculate the best path base on the cost value. However, Different routing protocol calculates the metric in different ways
919Question 68
920Incorrect
921Mark 0 out of 1
922Not flagged
923Question text
924(Multiple Choice) Which of the following statements are incorrect?
925Select one or more:
926a. For those routes to the same destination on VRP platform, the one with higher preference value is more preferred over the one with lower preference value.
927b. The preferences for each static routes entry can be different.
928c. The greater the cost, the better the route is.
929d. By default, OSPF is more preferred to RIP.
930Feedback
931The correct answers are: The greater the cost, the better the route is., For those routes to the same destination on VRP platform, the one with higher preference value is more preferred over the one with lower preference value.
932Question 69
933Correct
934Mark 1 out of 1
935Not flagged
936Question text
937(Multiple Choice) Which of the following factors may result in routing loops?
938Select one or more:
939a. Link-state routing protocol algorithms
940b. Temporary routing loops that occur during route convergence
941c. Configuration errors
942d. Loop avoidance information is lost when the routes are imported between two different routing domains
943Feedback
944The correct answers are: Temporary routing loops that occur during route convergence, Loop avoidance information is lost when the routes are imported between two different routing domains, Configuration errors
945Question 70
946Incorrect
947Mark 0 out of 1
948Not flagged
949Question text
950(Single Choice) Which of the following statements regarding routing protocol is correct?
951Select one:
952a. A protocol that allows the data packets transmitted between hosts.
953b. A protocol that defines the mode and time of the binding of MAC address and IP address
954c. A protocol that achieves route selection through an algorithm
955d. A method that defines the format and function of the fields for data packet
956Feedback
957The correct answer is: A protocol that achieves route selection through an algorithm
958Question 71
959Partially correct
960Mark 1 out of 1
961Not flagged
962Question text
963(Multiple Choice) Routing metric is a value that measures the cost of the route to the designated destination and it is used to calculate the best path. Which of the following factors can affect the metric of a route?
964Select one or more:
965a. Line occupation ratio
966b. Delay/bandwidth
967c. CPU of the router
968d. Hop count
969Feedback
970The correct answers are: Delay/bandwidth, CPU of the router, Hop count
971Question 72
972Incorrect
973Mark 0 out of 1
974Not flagged
975Question text
976(Single Choice) What does the distance vector routing protocol focus on according to the discovered routes and calculated routes?
977Select one:
978a. The address of the next hop specified manually
979b. Whether the egress port on the route belongs to a port aggregation group
980c. Link bandwidth resource information
981d. The number of hops on between the router and the destination
982Feedback
983The correct answer is: The number of hops on between the router and the destination
984Question 73
985Incorrect
986Mark 0 out of 1
987Not flagged
988Question text
989(Single Choice) Equal-cost routes are the routes that have the same
990Select one:
991a. Cost
992b. Egress port
993c. Next hop
994d. Priority
995Feedback
996The correct answer is: Cost
997Question 74
998Correct
999Mark 1 out of 1
1000Not flagged
1001Question text
1002(Single Choice) Each router only knows how to forward the packet to the next hop IP address. It doesn't know the end to end forwarding path. This type of forwarding is called
1003Select one:
1004a. Hop by hop forwarding
1005b. Router by router forwarding
1006c. Host by host forwarding
1007d. Network by network forwarding
1008Feedback
1009The correct answer is: Hop by hop forwarding
1010Question 75
1011Incorrect
1012Mark 0 out of 1
1013Not flagged
1014Question text
1015(Single Choice) Which of the following is used by routers to forward the packets on the network?
1016Select one:
1017a. DNS lookups
1018b. Routing tables
1019c. ARP tables
1020d. MAC address tables
1021Feedback
1022The correct answer is: Routing tables
1023Question 76
1024Incorrect
1025Mark 0 out of 1
1026Not flagged
1027Question text
1028(Single Choice) Which of the following statements regarding routing convergence is correct?
1029Select one:
1030a. Convergence is a process of establishing neighbor relationships between any two routers by sending hello packets.
1031b. Convergence is a process that occurs due to network topology changes.
1032c. Convergence is a process of combining the routing tables of two routers.
1033d. Convergence is a process of synchronizing all routing tables for all the routers in the network. It is the process for a router to reach the stable and consistence state after the network changes.
1034Feedback
1035The correct answer is: Convergence is a process of synchronizing all routing tables for all the routers in the network. It is the process for a router to reach the stable and consistence state after the network changes.
1036Question 77
1037Incorrect
1038Mark 0 out of 1
1039Not flagged
1040Question text
1041(Single Choice) The data link layer in a router receives a packet from upper layer and the length of the packet is greater than the MTU of the interface that will transmit this packet. What will the router do?
1042Select one:
1043a. Fragment the packet
1044b. Forward the packet directly
1045c. Discard the packet
1046d. requests the source router to reduce the length of the packet
1047Feedback
1048The correct answer is: Fragment the packet
1049Question 78
1050Incorrect
1051Mark 0 out of 1
1052Not flagged
1053Question text
1054(Single Choice) Characterized by simple configuration and poor scalability, which of the following protocols is based on the Bellman-Ford algorithm and sends a complete routing table to an adjacent router at a certain interval?
1055Select one:
1056a. Interior gateway protocol
1057b. Distance vector routing protocol
1058c. Exterior gateway protocol
1059d. Link-state routing protocol
1060Feedback
1061The correct answer is: Distance vector routing protocol
1062Question 79
1063Correct
1064Mark 1 out of 1
1065Not flagged
1066Question text
1067(Multiple Choice) Which of the following statements regarding routing loops are correct?
1068Select one or more:
1069a. Packets are routed circularly between two or more routers and will be discarded when the TTL becomes 0.
1070b. Routing loops cause the packets not able to reach the destination and this will result in network congestion.
1071c. Route loops are generated by dynamic routing protocols only.
1072d. Link state routing protocols will not cause the routing loops.
1073Feedback
1074The correct answers are: Routing loops cause the packets not able to reach the destination and this will result in network congestion., Packets are routed circularly between two or more routers and will be discarded when the TTL becomes 0.
1075Question 80
1076Partially correct
1077Mark 1 out of 1
1078Not flagged
1079Question text
1080(Multiple Choice) Which of the following statements regarding the function of a router are correct?
1081Select one or more:
1082a. Addressing
1083b. Segmenting the packet so that the forwarding is easier
1084c. Forwarding the packet from one network to another
1085d. Connecting same networks.
1086Feedback
1087The correct answers are: Segmenting the packet so that the forwarding is easier, Forwarding the packet from one network to another, Addressing
1088Question 81
1089Incorrect
1090Mark 0 out of 1
1091Not flagged
1092Question text
1093(Multiple Choice) Which of the following indicators are used to measure the performance of a dynamic routing protocol?
1094Select one or more:
1095a. Route priority
1096b. Zero routing loop
1097c. Low protocol cost
1098d. Number of subnets
1099Feedback
1100The correct answers are: Zero routing loop, Low protocol cost
1101Question 82
1102Incorrect
1103Mark 0 out of 1
1104Not flagged
1105Question text
1106(Multiple Choice) Which of the following statements regarding default route are correct
1107Select one or more:
1108a. Default route is used only when the destination route is not in the routing table
1109b. Default route is more preferred over the specific route
1110c. Default route is a special type of dynamic route.
1111d. Default route can be configured manually.
1112Feedback
1113The correct answers are: Default route is used only when the destination route is not in the routing table, Default route can be configured manually.
1114Question 83
1115Correct
1116Mark 1 out of 1
1117Not flagged
1118Question text
1119(Single Choice) Assume an internal network has only one route to the external networks, which of the following configurations is better?
1120Select one:
1121a. Direct route
1122b. Dynamic route
1123c. Default route
1124d. Host route
1125Feedback
1126The correct answer is: Default route
1127Question 84
1128Incorrect
1129Mark 0 out of 1
1130Not flagged
1131Question text
1132(Single Choice) Suppose a gateway is configured in a host running Windows system, which of the following is similar to the configuration on a router?
1133Select one:
1134a. Host route
1135b. Direct route
1136c. Default route
1137d. Dynamic route
1138Feedback
1139The correct answer is: Default route
1140Question 85
1141Incorrect
1142Mark 0 out of 1
1143Not flagged
1144Question text
1145(Multiple Choice) Which of the following statements regarding the routing table are correct?
1146Select one or more:
1147a. The next hop in the routing table is redundant because the outgoing interface can be used for packet forwarding.
1148b. The routes from generated by different protocols have different preferences.
1149c. The costs of different routing protocols are not comparable
1150d. The costs of different routing protocols are comparable.
1151Feedback
1152The correct answers are: The routes from generated by different protocols have different preferences., The costs of different routing protocols are not comparable
1153Question 86
1154Partially correct
1155Mark 1 out of 1
1156Not flagged
1157Question text
1158(Multiple Choice) Which of the following are the sources of the routes in the routing table?
1159Select one or more:
1160a. Some routes are configured manually by the administrator
1161b. Some routes are generated according to the data link layer protocol
1162c. Some routes are generated during the startup of the router.
1163d. Some routes are generated by dynamic routing protocols
1164Feedback
1165The correct answers are: Some routes are generated according to the data link layer protocol, Some routes are configured manually by the administrator, Some routes are generated by dynamic routing protocols
1166Question 87
1167Incorrect
1168Mark 0 out of 1
1169Not flagged
1170Question text
1171(Multiple Choice) Which of the following items are used to select the best route when a router has “multiple” routes to the same destination?
1172Select one or more:
1173a. Preference of the route
1174b. TTL of the route
1175c. Advertiser of the route
1176d. Cost of the route
1177Feedback
1178The correct answers are: Preference of the route, Cost of the route
1179Question 88
1180Incorrect
1181Mark 0 out of 1
1182Not flagged
1183Question text
1184(Multiple Choice) Which of the following protocols are routing protocols?
1185Select one or more:
1186a. IPX
1187b. OSPF
1188c. PPP
1189d. RIP
1190Feedback
1191The correct answers are: RIP, OSPF
1192Question 89
1193Partially correct
1194Mark 1 out of 1
1195Not flagged
1196Question text
1197(Multiple Choice) Which of the following statements regarding the route preference are correct?
1198Select one or more:
1199a. It is an important factor for route selection
1200b. The default preference value of direct route is 0
1201c. It is used by all routing protocols
1202d. It is used by RIP and OSPF only
1203Feedback
1204The correct answers are: It is used by all routing protocols, It is an important factor for route selection, The default preference value of direct route is 0
1205Question 90
1206Incorrect
1207Mark 0 out of 1
1208Not flagged
1209Question text
1210(Single Choice) What do we call the routes in the routing table that have the same cost to the same destination?
1211Select one:
1212a. Multipath routes
1213b. Default routes
1214c. Equivalent routes
1215d. Sub-optimal routes
1216Feedback
1217The correct answer is: Equivalent routes
1218Question 91
1219Incorrect
1220Mark 0 out of 1
1221Not flagged
1222Question text
1223(Multiple Choice) Which of the following statements regarding static route are correct?
1224Select one or more:
1225a. Default route is a special type of dynamic route
1226b. Some of the dynamic routing protocol such as OSPF can generate default routes.
1227c. Default route is used when the destination network is not in the routing table.
1228d. The network IP and mask of the default route is 0.0.0.0 and 0.0.0.0 respectively.
1229Feedback
1230The correct answers are: Some of the dynamic routing protocol such as OSPF can generate default routes., Default route is used when the destination network is not in the routing table., The network IP and mask of the default route is 0.0.0.0 and 0.0.0.0 respectively.
1231Question 92
1232Incorrect
1233Mark 0 out of 1
1234Not flagged
1235Question text
1236(Multiple Choice) Which of the following statements about default routes are true?
1237Select one or more:
1238a. A route that can be configured manually.
1239b. A default route can be generated by using a dynamic routing protocol.
1240c. A default route can be only configured manually by a network administrator.
1241d. A default route is a kind of special static route.
1242Feedback
1243The correct answers are: A route that can be configured manually., A default route can be generated by using a dynamic routing protocol.
1244Question 93
1245Incorrect
1246Mark 0 out of 1
1247Not flagged
1248Question text
1249(Single Choice) What does a router do after it receives a datagram containing a destination address that is not listed in the routing table?
1250Select one:
1251a. The router matches a BGP route with the destination address.
1252b. The router uses the default route.
1253c. The router matches an OSPF route with the destination address.
1254d. The router matches an RIP route with the destination address.
1255Feedback
1256The correct answer is: The router uses the default route.
1257Question 94
1258Incorrect
1259Mark 0 out of 1
1260Not flagged
1261Question text
1262(Single Choice) How is routing information about a default route expressed?
1263Select one:
1264a. The destination IP address is expressed in all 0s and the mask is expressed in all 1s.
1265b. The destination IP address is expressed in all 1s and the mask is expressed in all 0s.
1266c. Both the destination IP address and mask are expressed in all 1s.
1267d. Both the destination IP address and mask are expressed in all 0s.
1268Feedback
1269The correct answer is: Both the destination IP address and mask are expressed in all 0s.
1270Question 95
1271Incorrect
1272Mark 0 out of 1
1273Not flagged
1274Question text
1275(Single Choice) How many routes at most does a default route on Huawei router support load sharing?
1276Select one:
1277a. 16
1278b. 32
1279c. 0
1280d. 2
1281Feedback
1282The correct answer is: 32
1283Question 96
1284Incorrect
1285Mark 0 out of 1
1286Not flagged
1287Question text
1288(Single Choice) Which of the following values is the default preference value for static route on the VRP platform?
1289Select one:
1290a. 100
1291b. 0
1292c. 60
1293d. 20
1294Feedback
1295The correct answer is: 60
1296Question 97
1297Partially correct
1298Mark 1 out of 1
1299Not flagged
1300Question text
1301(Multiple Choice) A command for configuring a static route contains the destination IP address and mask. In which notations can the mask be expressed?
1302Select one or more:
1303a. Mask size (namely, the number of binary 1s in the mask)
1304b. Dotted decimal notation
1305c. Dotted hexadecimal notation
1306d. Dotted binary notation
1307Feedback
1308The correct answers are: Dotted decimal notation, Mask size (namely, the number of binary 1s in the mask)
1309Question 98
1310Incorrect
1311Mark 0 out of 1
1312Not flagged
1313Question text
1314(Multiple Choice) Compared to static routing protocol, which of the following are the advantages of dynamic routing protocol?
1315Select one or more:
1316a. The router running dynamic routing protocol can calculate the routes automatically.
1317b. Simple
1318c. The router running dynamic routing protocol can detect the changes of the network topology automatically.
1319d. Low bandwidth consumption
1320Feedback
1321The correct answers are: The router running dynamic routing protocol can detect the changes of the network topology automatically., The router running dynamic routing protocol can calculate the routes automatically.
1322Question 99
1323Incorrect
1324Mark 0 out of 1
1325Not flagged
1326Question text
1327(Multiple Choice) Which of the following are the advantages of static routing protocol
1328Select one or more:
1329a. Enhanced network security
1330b. Save the bandwidth
1331c. Simple configuration
1332d. Automatic routing updates
1333Feedback
1334The correct answers are: Simple configuration, Save the bandwidth
1335Question 100
1336Incorrect
1337Mark 0 out of 1
1338Not flagged
1339Question text
1340(Multiple Choice) Which of the following are the disadvantages of using static routing protocol in the network?
1341Select one or more:
1342a. Re-configurations are required after the topology changes
1343b. On the VRP platform, load balancing can not be implemented using static route
1344c. External routers can not learn the static route configuration which will result in network unreachability.
1345d. The configurations are complicated in a large network.
1346Feedback
1347The correct answers are: The configurations are complicated in a large network., Re-configurations are required after the topology changes
1348Question 101
1349Partially correct
1350Mark 1 out of 1
1351Not flagged
1352Question text
1353(Multiple Choice) Two static routes to the 10.1.1.1/32 network are configured on a router. One of the static routes is not assigned with a value for the preference_value parameter; the other static route is assigned with 100 for the preference_value parameter. In this case, which of the following statements are true?
1354Select one or more:
1355a. A static route supports route backup.
1356b. The route signed with 100 for the preference_value parameter functions as the working route.
1357c. The route not signed with a value for the preference_value parameter functions as the working route.
1358d. The two static routes work in load sharing mode.
1359Feedback
1360The correct answers are: The route not signed with a value for the preference_value parameter functions as the working route., A static route supports route backup.
1361Question 102
1362Incorrect
1363Mark 0 out of 1
1364Not flagged
1365Question text
1366(Single Choice) The information about static routes can be viewed through a router. A backup route is identified as
1367Select one:
1368a. Bypass
1369b. Inactive
1370c. Backup
1371d. Slave
1372Feedback
1373The correct answer is: Inactive
1374Question 103
1375Incorrect
1376Mark 0 out of 1
1377Not flagged
1378Question text
1379Which of the following routing protocols involves simple configuration and low-speed convergence and is generally used in medium- and small-sized networks?
1380Select one:
1381a. RIP
1382b. OSPF
1383c. BGP
1384d. ISIS
1385Feedback
1386The correct answer is: RIP
1387Question 104
1388Incorrect
1389Mark 0 out of 1
1390Not flagged
1391Question text
1392Routing Information Protocol (RIP) uses ( ) to exchange routing information and sends out updated packets at a certain interval.
1393
1394Select one:
1395a. RSVP
1396b. LDP
1397c. UDP
1398d. TCP
1399Feedback
1400The correct answer is: UDP
1401Question 105
1402Incorrect
1403Mark 0 out of 1
1404Not flagged
1405Question text
1406How many hops from a router to the directly connected network does the RIP protocol specify?
1407
1408Select one:
1409a. 0
1410b. Infinite
1411c. None of the above
1412d. 1
1413Feedback
1414The correct answer is: 0
1415Question 106
1416Incorrect
1417Mark 0 out of 1
1418Not flagged
1419Question text
1420By default, RIPv2 sends packet by means of ( ).
1421
1422Select one:
1423a. Unicast
1424b. Broadcast
1425c. Multicast
1426d. Multicast and broadcast
1427Feedback
1428The correct answer is: Multicast
1429Question 107
1430Partially correct
1431Mark 1 out of 1
1432Not flagged
1433Question text
1434What features does RIPv2 provide?
1435Select one or more:
1436a. Plain text authentication
1437b. MD5 encrypted text authentication
1438c. Extension of subnet mask(VLSM)
1439d. Large scale network
1440Feedback
1441The correct answers are: Extension of subnet mask(VLSM), Plain text authentication, MD5 encrypted text authentication
1442Question 108
1443Incorrect
1444Mark 0 out of 1
1445Not flagged
1446Question text
1447Which of the following methods are used by RIP to avoid routing loop?
1448Select one or more:
1449a. Holddown
1450b. Rebooting routers
1451c. Defining the maximum routing metric
1452d. Split-horizon
1453Feedback
1454The correct answers are: Split-horizon, Holddown, Defining the maximum routing metric
1455Question 109
1456Incorrect
1457Mark 0 out of 1
1458Not flagged
1459Question text
1460Which of the following statements regarding distance vector algorithm are incorrect?
1461Select one or more:
1462a. Distance vector algorithm does not generate routing loops.
1463b. Routers running distance vector protocols obtain routing information from its own neighbors only.
1464c. The routes are advertised as vectors of (destination, cost).
1465d. Distance vector routing protocol is implemented by exchanging routing information.
1466Feedback
1467The correct answers are: Distance vector algorithm does not generate routing loops., The routes are advertised as vectors of (destination, cost).
1468Question 110
1469Incorrect
1470Mark 0 out of 1
1471Not flagged
1472Question text
1473Which of the following are main functions of split horizon used by distance vector routing protocols?
1474Select one or more:
1475a. Replace the poison reverse algorithm
1476b. Prevent the routing loops between two adjacent routers.
1477c. Ensure the routing updates not being sent back to the direction from which it was received.
1478d. Work together with holddown mechanism to prevent the routing loops.
1479Feedback
1480The correct answers are: Prevent the routing loops between two adjacent routers., Ensure the routing updates not being sent back to the direction from which it was received., Work together with holddown mechanism to prevent the routing loops.
1481Question 111
1482Incorrect
1483Mark 0 out of 1
1484Not flagged
1485Question text
1486Which of the following statements regarding Bellman-Ford algorithm are correct?
1487Select one or more:
1488a. Bellman-Ford algorithm is a link-state algorithm.
1489b. RIP is based on Bellman-Ford algorithm.
1490c. Bellman-Ford is essentially a Dijkstra algorithm.
1491d. When Bellman-Ford algorithm is used to calculate the routes, it does not need to know the whole topology of network.
1492Feedback
1493The correct answers are: RIP is based on Bellman-Ford algorithm., When Bellman-Ford algorithm is used to calculate the routes, it does not need to know the whole topology of network.
1494Question 112
1495Incorrect
1496Mark 0 out of 1
1497Not flagged
1498Question text
1499Which of the following commands is used to disable automatic route aggregation for RIP?
1500
1501Select one:
1502a. Undo network 10.0.0.0
1503b. Undo summary
1504c. Undo rip
1505d. Summary
1506Feedback
1507The correct answer is: Undo summary
1508Question 113
1509Incorrect
1510Mark 0 out of 1
1511Not flagged
1512Question text
1513Router A runs RIP routing and its interface serial 0 with IP address 10.0.0.1/24 is enabled with RIP routing protocol as well. Which of the following commands must be configured?
1514Select one or more:
1515a. Network 10.0.0.0
1516b. Rip
1517c. Rip 10.0.0.0
1518d. Network 10.0.0.1
1519Feedback
1520The correct answers are: Rip, Network 10.0.0.0
1521Question 114
1522Incorrect
1523Mark 0 out of 1
1524Not flagged
1525Question text
1526Which of the following statements regarding RIP v1 and RIP v2 are correct?
1527Select one or more:
1528a. RIP v1 supports simple password authentication only, while RIP v2 supports MD5 authentication.
1529b. RIP v2 supports VLSM.
1530c. RIP v2 uses route aggregation by default.
1531d. RIP v1 supports VLSM.
1532Feedback
1533The correct answers are: RIP v2 supports VLSM., RIP v2 uses route aggregation by default.
1534Question 115
1535Correct
1536Mark 1 out of 1
1537Not flagged
1538Question text
1539Which of the following messages can be processed by the interface working in RIPv2 Broadcast mode?
1540Select one or more:
1541a. RIPv2 broadcast messages
1542b. RIPv1 multicast messages
1543c. RIPv2 multicast messages
1544d. RIPv1 broadcast messages
1545Feedback
1546The correct answers are: RIPv1 broadcast messages, RIPv2 broadcast messages
1547Question 116
1548Incorrect
1549Mark 0 out of 1
1550Not flagged
1551Question text
1552Which of the following statements regarding routing loops in RIP is correct?
1553
1554Select one:
1555a. Split horizon can prevent the routing loop between two neighboring routers only.
1556b. Maximum hop count mechanism can solve the problem caused by routing loop.
1557c. Distance Vector algorithm can calculate the shortest path to the destination according to the given topology.
1558d. Although Holddown mechanism results in slow convergence, it can completely prevent the routing loop.
1559Feedback
1560The correct answer is: Split horizon can prevent the routing loop between two neighboring routers only.
1561Question 117
1562Incorrect
1563Mark 0 out of 1
1564Not flagged
1565Question text
1566Which of the following statements regarding RIP v1 and RIP v2 are correct?
1567Select one or more:
1568a. RIPv1 can advertise information about subnet by disabling the automatic route aggregation.
1569b. RIP v1 does not support multicast. By default, it does not advertise the information about subnet.
1570c. RIPv2 broadcasts message by default. The command "rip version 2 multicast" must be configured to make RIPv2 send message with multicast address.
1571d. RIPv2 supports multicast. It can choose not to advertise the information about subnet.
1572Feedback
1573The correct answers are: RIP v1 does not support multicast. By default, it does not advertise the information about subnet., RIPv2 supports multicast. It can choose not to advertise the information about subnet.
1574Question 118
1575Incorrect
1576Mark 0 out of 1
1577Not flagged
1578Question text
1579Which of the following statements regarding RIP network scale are correct?
1580Select one or more:
1581a. It is recommended to use other routing protocols such as OSPF instead of RIP when the network topology is more complicated even though the hop count is less than 16.
1582b. Bellman-Ford algorithm used by RIP can accurately calculate the shortest path of a large scale network.
1583c. The maximum hop count of RIP is 16 and it can be used to prevent the packets from circulate infinitely in the network.
1584d. RIP is not suitable for large scale network because it advertises the whole routing table periodically and this consumes a lot bandwidth. So, RIP is suitable for small scale network only.
1585Feedback
1586The correct answers are: The maximum hop count of RIP is 16 and it can be used to prevent the packets from circulate infinitely in the network., It is recommended to use other routing protocols such as OSPF instead of RIP when the network topology is more complicated even though the hop count is less than 16., RIP is not suitable for large scale network because it advertises the whole routing table periodically and this consumes a lot bandwidth. So, RIP is suitable for small scale network only.
1587Question 119
1588Incorrect
1589Mark 0 out of 1
1590Not flagged
1591Question text
1592Which of the following statements regarding RIP routing information are correct?
1593Select one or more:
1594a. The route preference of RIP can not be configured manually.
1595b. User can specify the route preference value of RIP lower than that of direct routes.
1596c. If the route calculated by other routing protocol which is imported by RIP does not specify the cost value, the cost value will be set as 1 by default
1597d. User can specify the route preference of RIP higher than that of static routes.
1598Feedback
1599The correct answers are: User can specify the route preference of RIP higher than that of static routes., If the route calculated by other routing protocol which is imported by RIP does not specify the cost value, the cost value will be set as 1 by default
1600Question 120
1601Partially correct
1602Mark 0 out of 1
1603Not flagged
1604Question text
1605Which of the following statements regarding split horizon used by RIP are correct?
1606Select one or more:
1607a. Split horizon will not prevent the routing loop between 2 routers.
1608b. On the VRP platform, split horizon is enabled by default. It can be disabled when necessary.
1609c. Split horizon is used to avoid routing loop. The main idea of Split Horizon is that the information can not be sent back in the direction from which the data was received.
1610d. Split horizon might cause some of the routers not able to obtain the accurate routing information.
1611Feedback
1612The correct answers are: Split horizon is used to avoid routing loop. The main idea of Split Horizon is that the information can not be sent back in the direction from which the data was received., Split horizon might cause some of the routers not able to obtain the accurate routing information., On the VRP platform, split horizon is enabled by default. It can be disabled when necessary.
1613Question 121
1614Partially correct
1615Mark 1 out of 1
1616Not flagged
1617Question text
1618Which of the following statements regarding RIP route aggregation are correct?
1619Select one or more:
1620a. RIPv1 does not support CIDR
1621b. RIP v1 supports route aggregation by default and it can be disabled when necessary.
1622c. RIPv2 supports CIDR.
1623d. We can disable the route aggregation on RIP V2.
1624Feedback
1625The correct answers are: We can disable the route aggregation on RIP V2., RIPv1 does not support CIDR, RIPv2 supports CIDR.
1626Question 122
1627Incorrect
1628Mark 0 out of 1
1629Not flagged
1630Question text
1631After a command for displaying RIP route information is entered on a router, peer 192.169.1.3 on ethernet1/0/1 is displayed in the returned result. What does ethernet1/0/1 stand for?
1632
1633Select one:
1634a. Port with the broadcast protocol enabled
1635b. Port connected to the RIP neighbor with the IP address of 192.169.1.3
1636c. Port corresponding to the RIP transmission address
1637d. Port with the multicast protocol enabled
1638Feedback
1639The correct answer is: Port connected to the RIP neighbor with the IP address of 192.169.1.3
1640Question 123
1641Incorrect
1642Mark 0 out of 1
1643Not flagged
1644Question text
1645What does the value 1 of cost in the RIP route information mean?
1646
1647Select one:
1648a. The route cost is 0.
1649b. The priority of the RIP protocol is 1.
1650c. Only one hop exists between the router and the destination network segment.
1651d. The route progress number is 1.
1652e. The route weight is 1.
1653Feedback
1654The correct answer is: Only one hop exists between the router and the destination network segment.
1655Question 124
1656Correct
1657Mark 1 out of 1
1658Not flagged
1659Question text
1660Which of the following parameters is used by RIP to calculate the value of cost?
1661Select one:
1662a. Hop count
1663b. MTU
1664c. Bandwidth
1665d. Delay
1666Feedback
1667The correct answer is: Hop count
1668Question 125
1669Partially correct
1670Mark 1 out of 1
1671Not flagged
1672Question text
1673Which of the following statements about RIP protocol priorities are true?
1674Select one or more:
1675a. By default, the RIP protocol priority of Huawei router is 100.
1676b. A greater value of the RIP routing protocol priority means a higher priority.
1677c. With routing protocol priorities, a route obtained by a certain routing protocol can be selected as the optimal route according to the specified routing policy.
1678d. The RIP protocol priority can be set manually on a router.
1679Feedback
1680The correct answers are: With routing protocol priorities, a route obtained by a certain routing protocol can be selected as the optimal route according to the specified routing policy., The RIP protocol priority can be set manually on a router., By default, the RIP protocol priority of Huawei router is 100.
1681Question 126
1682Incorrect
1683Mark 0 out of 1
1684Not flagged
1685Question text
1686What are the rip metricout value and rip metricin value commands used to set in the interface view?
1687Select one or more:
1688a. Metric contained in the received RIP route information on the interface
1689b. Metric increased by sending RIP route information on the interface
1690c. Metric increased by receiving RIP route information on the interface
1691d. Metric contained in the transmitted RIP route information on the interface
1692Feedback
1693The correct answers are: Metric increased by sending RIP route information on the interface, Metric increased by receiving RIP route information on the interface
1694Question 127
1695Incorrect
1696Mark 0 out of 1
1697Not flagged
1698Question text
1699The RIP packet version is set in the interface view. Which of the following statements are true in the case of version RIPv1?
1700Select one or more:
1701a. The interface does not receive RIPv2 multicast packets
1702b. The interface receives only RIPv1 and RIPv2 broadcast packets.
1703c. The interface receives only RIPv1 broadcast packets.
1704d. The interface does not receive RIPv2 broadcast packets.
1705Feedback
1706The correct answers are: The interface receives only RIPv1 and RIPv2 broadcast packets., The interface does not receive RIPv2 multicast packets
1707Question 128
1708Incorrect
1709Mark 0 out of 1
1710Not flagged
1711Question text
1712When an RIP route is unavailable, the router deletes this RIP route from the routing table if it fails to receive a packet updating this RIP route information after a period of ( ).
1713
1714Select one:
1715a. 120s
1716b. 300s
1717c. 240s
1718d. 180s
1719Feedback
1720The correct answer is: 120s
1721Question 129
1722Incorrect
1723Mark 0 out of 1
1724Not flagged
1725Question text
1726After receiving a Response packet from a neighbor, the RIP protocol calculates the routing metric. The calculated routing metric must be equal to or greater than ( ).
1727
1728Select one:
1729a. The metric contained in the packet
1730b. The cost of the destination network
1731c. The metric contained in the packet plus 1
1732d. The metric contained in the packet plus the cost of the destination network
1733Feedback
1734The correct answer is: The metric contained in the packet plus the cost of the destination network
1735Question 130
1736Incorrect
1737Mark 0 out of 1
1738Not flagged
1739Question text
1740Which of the following statements regarding RIP are correct?
1741Select one or more:
1742a. RIP is a distance vector routing protocol.
1743b. RIP is an EGP.
1744c. RIP is an IGP.
1745d. RIP is a link-state routing protocol.
1746Feedback
1747The correct answers are: RIP is an IGP., RIP is a distance vector routing protocol.
1748Question 131
1749Correct
1750Mark 1 out of 1
1751Not flagged
1752Question text
1753Which of the following protocol is used by RIP to encapsulate the messages?
1754Select one:
1755a. UDP
1756b. TCP
1757c. Raw IP
1758d. ICMP
1759Feedback
1760The correct answer is: UDP
1761Question 132
1762Incorrect
1763Mark 0 out of 1
1764Not flagged
1765Question text
1766Which of the following cost values indicates that the route learned from RIP is unreachable?
1767Select one:
1768a. 16
1769b. 10
1770c. 8
1771d. 15
1772Feedback
1773The correct answer is: 16
1774Question 133
1775Incorrect
1776Mark 0 out of 1
1777Not flagged
1778Question text
1779Which of the following statements regarding the function of holddown mechanism used by RIP is correct?
1780Select one:
1781a. Save the bandwidth
1782b. Advertise the local route information to the RIP's neighbor
1783c. Loop-avoidance
1784d. Propagate the unreachable routing information throughout the network.
1785Feedback
1786The correct answer is: Loop-avoidance
1787Question 134
1788Incorrect
1789Mark 0 out of 1
1790Not flagged
1791Question text
1792Which of the following numbers is the maximum hop count in RIP?
1793
1794Select one:
1795a. Infinity
1796b. 12
1797c. 16
1798d. 15
1799Feedback
1800The correct answer is: 15
1801Question 135
1802Incorrect
1803Mark 0 out of 1
1804Not flagged
1805Question text
1806Which of the following values is the update interval for RIP?
1807
1808Select one:
1809a. 5s
1810b. 30s
1811c. 60s
1812d. 180s
1813Feedback
1814The correct answer is: 30s
1815Question 136
1816Incorrect
1817Mark 0 out of 1
1818Not flagged
1819Question text
1820Which of the following routing protocols are the link state routing protocols?
1821
1822Select one:
1823a. RIP
1824b. BGP
1825c. IP
1826d. OSPF
1827Feedback
1828The correct answer is: OSPF
1829Question 137
1830Incorrect
1831Mark 0 out of 1
1832Not flagged
1833Question text
1834In an OSPF area, routers exchange information about ( ). This type of information forms an information library.
1835
1836Select one:
1837a. Distance vector
1838b. Link status
1839c. Route priority
1840d. Route cost
1841Feedback
1842The correct answer is: Link status
1843Question 138
1844Incorrect
1845Mark 0 out of 1
1846Not flagged
1847Question text
1848A router with OSPF enabled calculates the shortest route to the destination by using ( ) algorithm.
1849
1850Select one:
1851a. SPF
1852b. OPF
1853c. OSPF
1854d. SRC
1855Feedback
1856The correct answer is: SPF
1857Question 139
1858Incorrect
1859Mark 0 out of 1
1860Not flagged
1861Question text
1862OSPF runs over the IP protocol and the IP protocol No. used by OSPF is ( ).
1863
1864Select one:
1865a. 80
1866b. 89
1867c. 512
1868d. 2328
1869Feedback
1870The correct answer is: 89
1871Question 140
1872Incorrect
1873Mark 0 out of 1
1874Not flagged
1875Question text
1876OSPF has experienced several versions. Which of the following versions is experimental and has never been deployed?
1877Select one:
1878a. OSPFv4
1879b. OSPFv1
1880c. OSPFv3
1881d. OSPFv2
1882Feedback
1883The correct answer is: OSPFv1
1884Question 141
1885Incorrect
1886Mark 0 out of 1
1887Not flagged
1888Question text
1889Which of the following OSPF versions is specific to the IPv6 technology?
1890
1891Select one:
1892a. OSPFv2
1893b. OSPFv3
1894c. OSPFv4
1895d. OSPFv1
1896Feedback
1897The correct answer is: OSPFv3
1898Question 142
1899Partially correct
1900Mark 1 out of 1
1901Not flagged
1902Question text
1903Which of the following statements about the features of the OSPF protocol are true?
1904Select one or more:
1905a. The OSPF protocol supports “multiple” equal-cost routes.
1906b. The OSPF protocol supports encrypt protocol packets.
1907c. The OSPF protocol supports area division.
1908d. The OSPF protocol is quick in route convergence when routes change.
1909Feedback
1910The correct answers are: The OSPF protocol supports area division., The OSPF protocol is quick in route convergence when routes change., The OSPF protocol supports “multiple” equal-cost routes.
1911Question 143
1912Incorrect
1913Mark 0 out of 1
1914Not flagged
1915Question text
1916The link state database (LSDB) on an OSPF router is formed based on ( ).
1917Select one or more:
1918a. RSVP packet advertised to a neighboring router
1919b. local LSA
1920c. RSVP packet advertised by a neighboring router
1921d. LSA advertised by a neighboring router
1922Feedback
1923The correct answers are: local LSA, LSA advertised by a neighboring router
1924Question 144
1925Correct
1926Mark 1 out of 1
1927Not flagged
1928Question text
1929Each router calculates the shortest path tree based on the LSDB with itself as a ( ) node.
1930
1931Select one:
1932a. leaf
1933b. Root
1934c. Specified root
1935d. Backup
1936Feedback
1937The correct answer is: Root
1938Question 145
1939Incorrect
1940Mark 0 out of 1
1941Not flagged
1942Question text
1943The shortest path tree calculated by a router in an OSPF area provides ( ) on the path from this router to other nodes in the network.
1944
1945Select one:
1946a. All link states
1947b. ARP table
1948c. Routing table
1949d. MAC address table
1950Feedback
1951The correct answer is: Routing table
1952Question 146
1953Incorrect
1954Mark 0 out of 1
1955Not flagged
1956Question text
1957Which of the following statements regarding the comparison between OSPF and RIP are correct?
1958Select one or more:
1959a. In the same network, RIP will consume more bandwidth than OSPF.
1960b. OSPF is more appropriate for large networks than RIP.
1961c. RIP is more appropriate for flat network design while OSPF is more appropriate for hierarchical network design.
1962d. RIP is more appropriate for small networks than OSPF.
1963Feedback
1964The correct answers are: OSPF is more appropriate for large networks than RIP., RIP is more appropriate for flat network design while OSPF is more appropriate for hierarchical network design., In the same network, RIP will consume more bandwidth than OSPF.
1965Question 147
1966Incorrect
1967Mark 0 out of 1
1968Not flagged
1969Question text
1970Which of the following statements about an OSPF neighboring routers are true?
1971Select one or more:
1972a. After a router receives a Hello packet from the peer router, it becomes the neighbor of the peer router.
1973b. Neighbor discovery is equivalent to adjacency establishment.
1974c. An OSPF interface broadcasts Hello packets to discover a neighbor.
1975d. After an OSPF router receives a Hello packet from the peer OSPF router, it checks the parameters in the packet. If the parameters in the packet from the peer OSPF router are consistent with the parameters of this OSPF router, the two OSPF routers become neighbors of each other.
1976Feedback
1977The correct answers are: An OSPF interface broadcasts Hello packets to discover a neighbor., After an OSPF router receives a Hello packet from the peer OSPF router, it checks the parameters in the packet. If the parameters in the packet from the peer OSPF router are consistent with the parameters of this OSPF router, the two OSPF routers become neighbors of each other.
1978Question 148
1979Incorrect
1980Mark 0 out of 1
1981Not flagged
1982Question text
1983Two OSPF routers become neighbors only after they successfully exchange ( ) packets and LSAs.
1984
1985Select one:
1986a. DD
1987b. LSR
1988c. LSU
1989d. Hello
1990Feedback
1991The correct answer is: DD
1992Question 149
1993Correct
1994Mark 1 out of 1
1995Not flagged
1996Question text
1997When two routers synchronize their LSDBs, they use ( ) packets to describe their own LSDBs.
1998
1999Select one:
2000a. Hello
2001b. DD
2002c. LSU
2003d. LSR
2004Feedback
2005The correct answer is: DD
2006Question 150
2007Incorrect
2008Mark 0 out of 1
2009Not flagged
2010Question text
2011In a ( ) network, DRs and BDRs are used to prevent the problem with route convergence at a low speed.
2012Select one or more:
2013a. Point-to-multipoint
2014b. NBMA
2015c. Point-to-point
2016d. Broadcast
2017Feedback
2018The correct answers are: Broadcast, NBMA
2019Question 151
2020Partially correct
2021Mark 1 out of 1
2022Not flagged
2023Question text
2024Which of the following statements regarding Autonomous System Boundary Router are correct?
2025Select one or more:
2026a. ASBR is the router that imports the routes calculated by other protocols into OSPF.
2027b. ASBR is not always on the border of AS but it can be set anywhere in the AS except Stub area.
2028c. ASBR must belong to two OSPF areas.
2029d. ABR can not be ASBR at the same time.
2030Feedback
2031The correct answers are: ASBR is the router that imports the routes calculated by other protocols into OSPF., ASBR is not always on the border of AS but it can be set anywhere in the AS except Stub area.
2032Question 152
2033Incorrect
2034Mark 0 out of 1
2035Not flagged
2036Question text
2037Which of the following statements regarding the routing loop in OSPF is correct?
2038
2039Select one:
2040a. No routing loop exists outside the OSPF autonomous system.
2041b. Routing loop is eliminated within an OSPF area.
2042c. Routing loop is not eliminated within an OSPF Autonomous Systems.
2043d. Routing loop is not eliminated between two OSPF areas.
2044Feedback
2045The correct answer is: Routing loop is eliminated within an OSPF area.
2046Question 153
2047Incorrect
2048Mark 0 out of 1
2049Not flagged
2050Question text
2051Which of the following statements regarding OSPF area are incorrect?
2052Select one or more:
2053a. OSPF supports area division.
2054b. Area ID must be assigned by IANA and we can not simply assign it.
2055c. Every OSPF area is identified by a 32-bit Area ID number.
2056d. Without manual configuration, an OSPF area is a backbone area with area ID 0 by default.
2057Feedback
2058The correct answers are: Without manual configuration, an OSPF area is a backbone area with area ID 0 by default., Area ID must be assigned by IANA and we can not simply assign it.
2059Question 154
2060Partially correct
2061Mark 1 out of 1
2062Not flagged
2063Question text
2064Which of the following statements regarding adjacencies of OSPF routers are correct?
2065Select one or more:
2066a. After two routers have been received the Hello packets from each other, they will form the adjacency automatically.
2067b. IF two routers are fully adjacent, the network type between them may be Point-to-Point network.
2068c. IF two routers are fully adjacent, the network type between them may be Point-to-Multipoint network.
2069d. IF two routers are fully adjacent and the network type between them is broadcast network, then one of routers must be either DR or BDR.
2070e. Only two adjacent routers can exchange LSAs.
2071Feedback
2072The correct answers are: IF two routers are fully adjacent, the network type between them may be Point-to-Point network., IF two routers are fully adjacent, the network type between them may be Point-to-Multipoint network., IF two routers are fully adjacent and the network type between them is broadcast network, then one of routers must be either DR or BDR., Only two adjacent routers can exchange LSAs.
2073Question 155
2074Correct
2075Mark 1 out of 1
2076Not flagged
2077Question text
2078OSPF is an application layer protocol and it runs on ( )
2079
2080Select one:
2081a. IP, Protocol Number 89
2082b. Data Link layer
2083c. TCP, port number 179
2084d. UDP, port number 520
2085Feedback
2086The correct answer is: IP, Protocol Number 89
2087Question 156
2088Incorrect
2089Mark 0 out of 1
2090Not flagged
2091Question text
2092Which of the following statements regarding OSPF are correct?
2093Select one or more:
2094a. Support CIDR (Classless Inter-Domain Routing)
2095b. Use the reserved multicast addresses to transmit protocol packets.
2096c. Use the triggered updates to immediately notify the neighbors about the topology changes so that the changes are synchronized in the AS.
2097d. Use the distance vector algorithm
2098Feedback
2099The correct answers are: Support CIDR (Classless Inter-Domain Routing), Use the triggered updates to immediately notify the neighbors about the topology changes so that the changes are synchronized in the AS., Use the reserved multicast addresses to transmit protocol packets.
2100Question 157
2101Incorrect
2102Mark 0 out of 1
2103Not flagged
2104Question text
2105OSPF takes the precedence to select ( ) as a router ID unless you specify a router ID manually.
2106Select one:
2107a. the IP address of a port connected to an OSPF neighbor
2108b. 127.0.0.1
2109c. the biggest IP address of the physical port IP addresses
2110d. the biggest IP address of all the loopback port addresses
2111Feedback
2112The correct answer is: the biggest IP address of all the loopback port addresses
2113Question 158
2114Correct
2115Mark 1 out of 1
2116Not flagged
2117Question text
2118After OSPF divides an AS into different areas, what is communicated between these areas?
2119Select one:
2120a. Topology information for each area
2121b. Abstract route information for each area
2122c. Link bandwidth information for each area
2123d. Link state information for each area
2124Feedback
2125The correct answer is: Abstract route information for each area
2126Question 159
2127Incorrect
2128Mark 0 out of 1
2129Not flagged
2130Question text
2131A backbone OSPF area is responsible for releasing the information collected by each border router to non-backbone OSPF areas. Which of the following represents the ID of a backbone OSPF area?
2132
2133Select one:
2134a. area 0.0.0.1
2135b. area 0
2136c. area 0.0.0.2
2137d. area 1
2138Feedback
2139The correct answer is: area 0
2140Question 160
2141Incorrect
2142Mark 0 out of 1
2143Not flagged
2144Question text
2145Which of the following statements regarding the backbone area in OSPF protocol are correct?
2146Select one or more:
2147a. ABR connects to different areas and at least one of the connected area is backbone area.
2148b. Each area must be connected to the backbone area.
2149c. The area ID of the backbone area is 0.0.0.1.
2150d. Backbone area is responsible for advertising the aggregated routing information generated by ABR between non-backbone areas.
2151Feedback
2152The correct answers are: Each area must be connected to the backbone area., Backbone area is responsible for advertising the aggregated routing information generated by ABR between non-backbone areas., ABR connects to different areas and at least one of the connected area is backbone area.
2153Question 161
2154Incorrect
2155Mark 0 out of 1
2156Not flagged
2157Question text
2158Assume that a non-backbone area and backbone area can not be directly connected. Which of the following ways can be used to solve this problem?
2159
2160Select one:
2161a. Configuring Stub area
2162b. Configuring ASBR
2163c. Configuring ABR
2164d. Configuring Virtual-link
2165Feedback
2166The correct answer is: Configuring Virtual-link
2167Question 162
2168Incorrect
2169Mark 0 out of 1
2170Not flagged
2171Question text
2172presentation [A router runs OSPF and its interface Serial 0 with IP address 10.0.0.1/30 belongs to the backbone area, which of the following commands is used to enable OSPF at this interface?
2173
2174Select one:
2175a. [Quidway-ospf -1-area-0.0.0.0]network 10.0.0.0 0.0.0.3
2176b. [Quidway-ospf -1]network 10.0.0.0 255.255.255.252
2177c. [Quidway-ospf -1-area-0.0.0.0]network 10.0.0.0
2178d. [Quidway-serial0]ospf area 0 enable
2179Feedback
2180The correct answer is: [Quidway-ospf -1-area-0.0.0.0]network 10.0.0.0 0.0.0.3
2181Question 163
2182Partially correct
2183Mark 0 out of 1
2184Not flagged
2185Question text
2186In an OSPF network, an ASBR router advertises the information about the routes outside an AS to the AS. Which of the following routers can function as an ASBR?
2187Select one or more:
2188a. A router that belongs to the backbone OSPF area
2189b. ABR
2190c. IR
2191d. A router that does not belong to the backbone OSPF area
2192Feedback
2193The correct answers are: ABR, A router that belongs to the backbone OSPF area, A router that does not belong to the backbone OSPF area
2194Question 164
2195Incorrect
2196Mark 0 out of 1
2197Not flagged
2198Question text
2199Which of the following statements about the configuration of OSPF areas are true?
2200Select one or more:
2201a. All non-backbone OSPF areas must be connected to a backbone OSPF area, either physically or logically.
2202b. An ABR generates a uniform LSDB for all OSPF areas.
2203c. The same network segment on an ABR must be enabled in both backbone OSPF areas and non-backbone OSPF areas.
2204d. An ABR generates LSDBs separately for backbone OSPF areas and non-backbone OSPF areas.
2205Feedback
2206The correct answers are: All non-backbone OSPF areas must be connected to a backbone OSPF area, either physically or logically., An ABR generates LSDBs separately for backbone OSPF areas and non-backbone OSPF areas.
2207Question 165
2208Partially correct
2209Mark 1 out of 1
2210Not flagged
2211Question text
2212What advantages does hierarchical routing defined by OSPF have?
2213Select one or more:
2214a. Reduce the number of link state update packets.
2215b. Decrease the size of a routing table.
2216c. Reduce the number of network layers.
2217d. Extend the interval of SPF calculation.
2218Feedback
2219The correct answers are: Extend the interval of SPF calculation., Decrease the size of a routing table., Reduce the number of link state update packets.
2220Question 166
2221Incorrect
2222Mark 0 out of 1
2223Not flagged
2224Question text
2225OSPF routers are classified into four types. Which of the following statements about interior routers (IRs) are true?
2226Select one or more:
2227a. Only one port on an IR connects to a backbone area.
2228b. An IR is located in the center of a physical area.
2229c. If all the ports on an IR belong to area 0, this IR functions as a backbone router.
2230d. The ports on an IR belong to a same area.
2231Feedback
2232The correct answers are: The ports on an IR belong to a same area., If all the ports on an IR belong to area 0, this IR functions as a backbone router.
2233Question 167
2234Incorrect
2235Mark 0 out of 1
2236Not flagged
2237Question text
2238Which of the following statements regarding OSPF are correct?
2239Select one or more:
2240a. Supporting authentication of the messages and this enhanced the security
2241b. Supporting ECMP (Equal Cost Multi-Path)
2242c. OSPF is an EGP.
2243d. OSPF calculates the shortest path tree based on the link sate information and OSPF itself will not generate the routing loop
2244Feedback
2245The correct answers are: OSPF calculates the shortest path tree based on the link sate information and OSPF itself will not generate the routing loop, Supporting authentication of the messages and this enhanced the security, Supporting ECMP (Equal Cost Multi-Path)
2246Question 168
2247Incorrect
2248Mark 0 out of 1
2249Not flagged
2250Question text
2251Which of the following areas fall into the OSPF area group?
2252Select one or more:
2253a. Stub area
2254b. Totally stubby area
2255c. Standard area
2256d. Boundary area
2257Feedback
2258The correct answers are: Standard area, Stub area, Totally stubby area
2259Question 169
2260Incorrect
2261Mark 0 out of 1
2262Not flagged
2263Question text
2264Which of the following statements about the functions of an ABR are true?
2265Select one or more:
2266a. An ABR collects the topology information about an area that is connected to the ABR and sends the information to the backbone area.
2267b. An ABR provides at least two port for connecting to a backbone area.
2268c. An ABR maintains one LSDB for every area connected to the ABR.
2269d. An ABR is a gateway in the case of communication between different areas.
2270Feedback
2271The correct answers are: An ABR is a gateway in the case of communication between different areas., An ABR collects the topology information about an area that is connected to the ABR and sends the information to the backbone area., An ABR maintains one LSDB for every area connected to the ABR.
2272Question 170
2273Incorrect
2274Mark 0 out of 1
2275Not flagged
2276Question text
2277Which of the following is the metric of OSPF?
2278
2279Select one:
2280a. LSA
2281b. COST
2282c. Priority
2283d. Number of hops
2284Feedback
2285The correct answer is: COST
2286Question 171
2287Partially correct
2288Mark 0 out of 1
2289Not flagged
2290Question text
2291Each OSPF router floods LSAs to advertise link status information, including ( ).
2292Select one or more:
2293a. Information about adjacent network segments
2294b. Ports
2295c. Available neighbors
2296d. Local link status information
2297Feedback
2298The correct answers are: Available neighbors, Information about adjacent network segments, Local link status information
2299Question 172
2300Incorrect
2301Mark 0 out of 1
2302Not flagged
2303Question text
2304According to the OSPF protocol, a router floods LSAs. In this context, what does "flood" mean?
2305
2306Select one:
2307a. An action deleting a link state database from a port
2308b. An action sending a link state database
2309c. An action sending and synchronizing a link state database
2310d. An action synchronizing a link state database
2311Feedback
2312The correct answer is: An action sending and synchronizing a link state database
2313Question 173
2314Partially correct
2315Mark 1 out of 1
2316Not flagged
2317Question text
2318Which of the following statements about the information contained in a DD packet are true?
2319Select one or more:
2320a. The header of an LSA is the unique identifier of the LSA.
2321b. A DD packet contains all information about each LSA.
2322c. A DD packet contains only the header of an LSA.
2323d. The header of an LSA is only a small portion of all the data of the LSA.
2324Feedback
2325The correct answers are: A DD packet contains only the header of an LSA., The header of an LSA is the unique identifier of the LSA., The header of an LSA is only a small portion of all the data of the LSA.
2326Question 174
2327Partially correct
2328Mark 1 out of 1
2329Not flagged
2330Question text
2331Which of the following statements regarding the OSPF router types are incorrect?
2332Select one or more:
2333a. ABR is the router connecting any two OSPF areas and it can be used to transmit the routing information between them.
2334b. The router inside an OSPF area can not be ASBR.
2335c. An OSPF router can belong to two or more areas but can be the ABR for a “single” area only.
2336d. ABR can be ASBR at the same time.
2337Feedback
2338The correct answers are: ABR is the router connecting any two OSPF areas and it can be used to transmit the routing information between them., The router inside an OSPF area can not be ASBR., An OSPF router can belong to two or more areas but can be the ABR for a “single” area only.
2339Question 175
2340Incorrect
2341Mark 0 out of 1
2342Not flagged
2343Question text
2344On VRP platform, which of the following is the default route preference value for OSPF routing protocol?
2345
2346Select one:
2347a. 100
2348b. 120
2349c. 1
2350d. 10
2351Feedback
2352The correct answer is: 10
2353Question 176
2354Partially correct
2355Mark 1 out of 1
2356Not flagged
2357Question text
2358Which of the following network types are supported by OSPF?
2359Select one or more:
2360a. Bus Topolopy
2361b. Broadcast
2362c. Point-to-Point
2363d. Point-to-Multipoint
2364Feedback
2365The correct answers are: Point-to-Point, Point-to-Multipoint, Broadcast
2366Question 177
2367Incorrect
2368Mark 0 out of 1
2369Not flagged
2370Question text
2371In OSPF protocol, an ABR can also function as ( )
2372Select one or more:
2373a. IR (Internal Router)
2374b. ASBR
2375c. Stub Router
2376d. BR (Backbone Router)
2377Feedback
2378The correct answers are: BR (Backbone Router), ASBR
2379Question 178
2380Incorrect
2381Mark 0 out of 1
2382Not flagged
2383Question text
2384(Single Choice) Keyboard is used to input data only. Which of the following is the transmission mode of the keyboard?
2385
2386Select one:
2387a. Half-duplex mode
2388b. Full-duplex mode
2389c. Auto negotiation
2390d. Simplex mode
2391Feedback
2392The correct answer is: Simplex mode
2393Question 179
2394Incorrect
2395Mark 0 out of 1
2396Not flagged
2397Question text
2398(Single Choice) To improve a twisted pair cable's capability to withstand magnetic interference, which of the following layers can be added as a shield layer of the twisted pair cable?
2399Select one:
2400a. BTP
2401b. UTP
2402c. STP
2403d. RPR
2404Feedback
2405The correct answer is: STP
2406Question 180
2407Incorrect
2408Mark 0 out of 1
2409Not flagged
2410Question text
2411(Single Choice) Both analog transmission and digital transmission can use twisted pair cables. Which of the following statement is true?
2412Select one:
2413a. The communication distance is independent of the diameter of the conductor.
2414b. The communication distance increases with the diameter of the conductor when the communication distance exceeds 50 km.
2415c. The communication distance increases with the diameter of the conductor.
2416d. The communication distance decreases with the diameter of the conductor.
2417Feedback
2418The correct answer is: The communication distance increases with the diameter of the conductor.
2419Question 181
2420Correct
2421Mark 1 out of 1
2422Not flagged
2423Question text
2424(Single Choice) In Ethernet standard, which of the following mechanisms is used to avoid collision when different nodes transmit packets simultaneously?
2425Select one:
2426a. CSMA/CD
2427b. CSMA/AC
2428c. CSMA/DA
2429d. CSMA/CA
2430Feedback
2431The correct answer is: CSMA/CD
2432Question 182
2433Correct
2434Mark 1 out of 1
2435Not flagged
2436Question text
2437(Single Choice) The distance limit of category 5 UTP wiring is
2438Select one:
2439a. 185 meters
2440b. 100 meters
2441c. 200 meters
2442d. 50 meters
2443Feedback
2444The correct answer is: 100 meters
2445Question 183
2446Incorrect
2447Mark 0 out of 1
2448Not flagged
2449Question text
2450(Single Choice) Two computers are connected to each other by using twisted pair cable. The correct wiring sequence is
2451Select one:
2452a. Computers can not be directly connected with twisted pair cable
2453b. 1--2, 2--1, 3--6, 4--4, 5--5, 6--3, 7--7, 8-8
2454c. 1--1, 2--2, 3--3, 4--4, 5--5, 6--6, 7--7, 8--8
2455d. 1--3, 2--6, 3--1, 4--4, 5--5, 6--2, 7--7, 8--8
2456Feedback
2457The correct answer is: 1--3, 2--6, 3--1, 4--4, 5--5, 6--2, 7--7, 8--8
2458Question 184
2459Incorrect
2460Mark 0 out of 1
2461Not flagged
2462Question text
2463(Single Choice) A PC is connected to router's Ethernet port through its network interface card. What type of cable should be used to connect these two interfaces?
2464Select one:
2465a. Console cable
2466b. Backup cable
2467c. Straight cable
2468d. Cross cable
2469Feedback
2470The correct answer is: Cross cable
2471Question 185
2472Incorrect
2473Mark 0 out of 1
2474Not flagged
2475Question text
2476(Single Choice) How long can a fast Ethernet cable 100BaseTX or 100BaseT4 transmit a signal?
2477Select one:
2478a. 2000m
2479b. 100m
2480c. 550m
2481d. 1000m
2482Feedback
2483The correct answer is: 100m
2484Question 186
2485Correct
2486Mark 1 out of 1
2487Not flagged
2488Question text
2489(Single Choice) How long can a Gigabit Ethernet cable 1000BaseT transmit a signal?
2490Select one:
2491a. 1000m
2492b. 100m
2493c. 2000m
2494d. 550m
2495Feedback
2496The correct answer is: 100m
2497Question 187
2498Partially correct
2499Mark 0 out of 1
2500Not flagged
2501Question text
2502(Multiple Choice) Which transmission rates does an Ethernet allow for?
2503Select one or more:
2504a. 155M
2505b. 1000M
2506c. 10M
2507d. 100M
2508Feedback
2509The correct answers are: 10M, 100M, 1000M
2510Question 188
2511Incorrect
2512Mark 0 out of 1
2513Not flagged
2514Question text
2515(Multiple Choice) Which of the following communication types are defined based on information interaction between the transmitter and the receiver?
2516Select one or more:
2517a. Half-duplex
2518b. Simplex
2519c. Auto-negotiation
2520d. Duplex
2521Feedback
2522The correct answers are: Simplex, Half-duplex, Duplex
2523Question 189
2524Correct
2525Mark 1 out of 1
2526Not flagged
2527Question text
2528(Single Choice) Which communication mode does a hub work in?
2529Select one:
2530a. Auto-negotiation
2531b. Full-duplex mode
2532c. Half-duplex
2533d. Simplex
2534Feedback
2535The correct answer is: Half-duplex
2536Question 190
2537Incorrect
2538Mark 0 out of 1
2539Not flagged
2540Question text
2541(Single Choice) Which type of Ethernet uses hubs?
2542Select one:
2543a. Star Ethernet
2544b. Shared Ethernet
2545c. Switched Ethernet
2546d. Token ring Ethernet
2547Feedback
2548The correct answer is: Shared Ethernet
2549Question 191
2550Correct
2551Mark 1 out of 1
2552Not flagged
2553Question text
2554(Multiple Choice) The physical medium used by Ethernet include.
2555Select one or more:
2556a. Optical fiber
2557b. Twisted pair cable
2558c. V.35 cable
2559d. Coaxial cable
2560Feedback
2561The correct answers are: Coaxial cable, Twisted pair cable, Optical fiber
2562Question 192
2563Incorrect
2564Mark 0 out of 1
2565Not flagged
2566Question text
2567(Single Choice) multiple PCs are connected to the same hub through twisted pair cables. What's its logical topology structure?
2568Select one:
2569a. Mesh
2570b. Ring
2571c. Bus
2572d. Tree
2573e. Star
2574Feedback
2575The correct answer is: Bus
2576Question 193
2577Incorrect
2578Mark 0 out of 1
2579Not flagged
2580Question text
2581(Single Choice) Under Which of the following circumstances, “multiple” work stations belong to the same collision domain?
2582Select one:
2583a. “multiple” workstations are connected to a bridge through twisted pair cables
2584b. “multiple” workstations are connected to a router through twisted pair cables
2585c. “multiple” workstations are connected to a hub through twisted pair cables
2586d. “multiple” workstations are connected to a LAN switch through twisted pair cables
2587Feedback
2588The correct answer is: “multiple” workstations are connected to a hub through twisted pair cables
2589Question 194
2590Incorrect
2591Mark 0 out of 1
2592Not flagged
2593Question text
2594(Multiple Choice) In late 1980s, UTP appeared and was widely used. Which of the following are advantages of UTP?
2595Select one or more:
2596a. Easy to manufacture
2597b. Receive and transmit using different wires
2598c. Low price
2599d. Both of the physical and logical topology is bus type
2600Feedback
2601The correct answers are: Low price, Easy to manufacture, Receive and transmit using different wires
2602Question 195
2603Incorrect
2604Mark 0 out of 1
2605Not flagged
2606Question text
2607(Single Choice) How to eliminate the collision in Ethernet?
2608Select one:
2609a. Increase the length of cable
2610b. Decrease the number of transmitted packets
2611c. Decrease the number of users on each network segment
2612d. Replace the hub and repeater with switch or bridge
2613Feedback
2614The correct answer is: Replace the hub and repeater with switch or bridge
2615Question 196
2616Incorrect
2617Mark 0 out of 1
2618Not flagged
2619Question text
2620(Single Choice) Which of the following statements regarding collision is incorrect?
2621Select one:
2622a. The collision that happens in the network connected with one port of a switch will affect another network connected with another port of the switch.
2623b. The number of the collision domains will be increased if the hub in the network is replaced with the bridge.
2624c. Reduce the number of hosts in a network can decrease probability of collision.
2625d. Each ports of switch is an independent collision domain.
2626Feedback
2627The correct answer is: The collision that happens in the network connected with one port of a switch will affect another network connected with another port of the switch.
2628Question 197
2629Correct
2630Mark 1 out of 1
2631Not flagged
2632Question text
2633(Multiple Choice) What kind of wirings does 100BaseT4 Fast Ethernet specification use?
2634Select one or more:
2635a. Category 3 UTP
2636b. Category 6 UTP
2637c. Category 5 UTP
2638d. Category 4 UTP
2639Feedback
2640The correct answers are: Category 3 UTP, Category 4 UTP, Category 5 UTP
2641Question 198
2642Correct
2643Mark 1 out of 1
2644Not flagged
2645Question text
2646(Single Choice) An Ethernet electrical port can work in three types of duplex modes, whereas an Ethernet optical port can work in only one mode. Which of the following represents this mode?
2647Select one:
2648a. Simplex
2649b. Auto-negotiation
2650c. Full-duplex
2651d. Half-duplex
2652Feedback
2653The correct answer is: Full-duplex
2654Question 199
2655Incorrect
2656Mark 0 out of 1
2657Not flagged
2658Question text
2659(Single Choice) Coaxial cables can be classified into different types by diameter. One of these types of the coaxial cables is suitable for relatively large LAN because it supports long distance and provides high reliability. Which of the following coaxial cables belongs to this type?
2660Select one:
2661a. 10-core coaxial cable
2662b. Coaxial cable with a small diameter
2663c. Coaxial cable with a large diameter
2664d. 16-core coaxial cable
2665Feedback
2666The correct answer is: Coaxial cable with a large diameter
2667Question 200
2668Incorrect
2669Mark 0 out of 1
2670Not flagged
2671Question text
2672(Single Choice) Which layer implements auto-negotiation in an Ethernet without using private datagrams?
2673Select one:
2674a. Application Layer
2675b. Network Layer
2676c. Data Link Layer
2677d. Chips at Physical Layer
2678Feedback
2679The correct answer is: Chips at Physical Layer
2680Question 201
2681Incorrect
2682Mark 0 out of 1
2683Not flagged
2684Question text
2685(Single Choice) A transmission medium consists of glass fibers and a shield layer. It is free from interference of magnetic signals and provides high-speed and long-distance transmission. But such a matter is very expensive. What is this matter?
2686Select one:
2687a. Optical fiber
2688b. Waveguide fiber
2689c. Coaxial cable
2690d. Twisted pair cable
2691Feedback
2692The correct answer is: Optical fiber
2693Question 202
2694Incorrect
2695Mark 0 out of 1
2696Not flagged
2697Question text
2698(Single Choice) Which device operates at physical layer?
2699Select one:
2700a. Hub
2701b. Firewall
2702c. Router
2703d. Switch
2704Feedback
2705The correct answer is: Hub
2706Question 203
2707Partially correct
2708Mark 1 out of 1
2709Not flagged
2710Question text
2711(Multiple Choice) What are transmission media of physical layer?
2712Select one or more:
2713a. Radio wave
2714b. Twisted pair cable
2715c. Fiber
2716d. Ethernet
2717Feedback
2718The correct answers are: Fiber, Twisted pair cable, Radio wave
2719Question 204
2720Incorrect
2721Mark 0 out of 1
2722Not flagged
2723Question text
2724(Multiple Choice) What are wiring standards for physical layer related to LAN?
2725Select one or more:
2726a. 100Base-T
2727b. 100Base-FX
2728c. HDLC
2729d. 1000Base-SX/LX
2730Feedback
2731The correct answers are: 100Base-T, 100Base-FX, 1000Base-SX/LX
2732Question 205
2733Incorrect
2734Mark 0 out of 1
2735Not flagged
2736Question text
2737(Multiple Choice) Which of the following are physical interfaces?
2738Select one or more:
2739a. Voice interface
2740b. CE1/PRI interface
2741c. Dialer interface
2742d. Serial interface
2743e. Virtual interface template
2744f. Sub interface
2745g. ISDN BRI interface
2746Feedback
2747The correct answers are: Voice interface, Serial interface, CE1/PRI interface, ISDN BRI interface
2748Question 206
2749Incorrect
2750Mark 0 out of 1
2751Not flagged
2752Question text
2753(Single Choice) Which of the following fibers allows for multiangular incidence of “multiple” beams of light for transmission?
2754Select one:
2755a. “Single”-mode fiber
2756b. Multimode fiber
2757c. 4-core fiber
2758d. Active fiber
2759Feedback
2760The correct answer is: Multimode fiber
2761Question 207
2762Correct
2763Mark 1 out of 1
2764Not flagged
2765Question text
2766Which of the following is the abbreviation for DHCP?
2767
2768Select one:
2769a. Dynamic Host Connection Protocol
2770b. Dynamic Host Configuration Protocol
2771c. Denial Host Configuration Protocol
2772d. Dynamic Hot Connection Protocol
2773Feedback
2774The correct answer is: Dynamic Host Configuration Protocol
2775Question 208
2776Incorrect
2777Mark 0 out of 1
2778Not flagged
2779Question text
2780Which layer of OSI reference model does DHCP belong to?
2781
2782Select one:
2783a. Physical layer
2784b. Network layer
2785c. Data-link layer
2786d. Application layer
2787Feedback
2788The correct answer is: Application layer
2789Question 209
2790Incorrect
2791Mark 0 out of 1
2792Not flagged
2793Question text
2794What is the main function of DNS?
2795
2796Select one:
2797a. Message
2798b. Protocol
2799c. Receiver
2800d. Harddisk
2801e. Sender
2802Feedback
2803The correct answer is: Sender
2804Question 210
2805Incorrect
2806Mark 0 out of 1
2807Not flagged
2808Question text
2809What is the underlying protocol used by DHCP to send messages?
2810
2811Select one:
2812a. TCP
2813b. SIP
2814c. RTP
2815d. UDP
2816Feedback
2817The correct answer is: UDP
2818Question 211
2819Correct
2820Mark 1 out of 1
2821Not flagged
2822Question text
2823In Window XP system, which of the following commands is used to release the IP address assigned by the DHCP Server?
2824
2825Select one:
2826a. ipconfig
2827b. ipconfig /all
2828c. ipconfig /release
2829d. ipconfig /renew
2830Feedback
2831The correct answer is: ipconfig /release
2832Question 212
2833Partially correct
2834Mark 1 out of 1
2835Not flagged
2836Question text
2837Which of the following protocols can be used for file transfer?
2838Select one or more:
2839a. FTP
2840b. TFTP
2841c. Icmp
2842d. Telnet
2843Feedback
2844The correct answers are: FTP, TFTP
2845Question 213
2846Incorrect
2847Mark 0 out of 1
2848Not flagged
2849Question text
2850Which of the following protocols or applications are based on UDP?
2851Select one or more:
2852a. SNMP
2853b. FTP
2854c. Telnet
2855d. TFTP
2856Feedback
2857The correct answers are: TFTP, SNMP
2858Question 214
2859Incorrect
2860Mark 0 out of 1
2861Not flagged
2862Question text
2863Which of the following protocols is transport layer protocol of TFTP?
2864
2865Select one:
2866a. RTP
2867b. TCP
2868c. SIP
2869d. UDP
2870Feedback
2871The correct answer is: UDP
2872Question 215
2873Incorrect
2874Mark 0 out of 1
2875Not flagged
2876Question text
2877Which of the following is an attribute of file transferred by using FTP?
2878
2879Select one:
2880a. High throughput
2881b. Read-only memory
2882c. Simple
2883d. Low speed
2884Feedback
2885The correct answer is: High throughput
2886Question 216
2887Incorrect
2888Mark 0 out of 1
2889Not flagged
2890Question text
2891By default, which port is used by the FTP server to establish the data connection?
2892Select one:
2893a. 23
2894b. 20
2895c. 21
2896d. 25
2897Feedback
2898The correct answer is: 20
2899Question 217
2900Partially correct
2901Mark 1 out of 1
2902Not flagged
2903Question text
2904FTP session consists of two types of connections, they are( )
2905Select one or more:
2906a. Control connection
2907b. Output connection
2908c. Data connection
2909d. Input connection
2910Feedback
2911The correct answers are: Control connection, Data connection
2912Question 218
2913Incorrect
2914Mark 0 out of 1
2915Not flagged
2916Question text
2917Which of the following applications are based on the TCP protocol?
2918Select one or more:
2919a. OSPF
2920b. TELNET
2921c. FTP
2922d. PING
2923Feedback
2924The correct answers are: FTP, TELNET
2925Question 219
2926Incorrect
2927Mark 0 out of 1
2928Not flagged
2929Question text
2930Which of the following statements about FTP are true?
2931Select one or more:
2932a. TFTP can control an FTP user according to the login name and password.
2933b. A router can work as either an FTP Client or an FTP Server.
2934c. FTP is based on the UDP protocol.
2935d. FTP is used to provide low-speed file transfer.
2936Feedback
2937The correct answers are: TFTP can control an FTP user according to the login name and password., A router can work as either an FTP Client or an FTP Server.
2938Question 220
2939Correct
2940Mark 1 out of 1
2941Not flagged
2942Question text
2943Which of the following statements about TFTP are true?
2944Select one or more:
2945a. TFTP is a simple file transfer protocol and applicable to read-only memory.
2946b. TFTP can control a TFTP user according to the login name and password.
2947c. TFTP is based on the UDP protocol.
2948d. TFTP supports only the Client mode.
2949Feedback
2950The correct answers are: TFTP is based on the UDP protocol., TFTP is a simple file transfer protocol and applicable to read-only memory., TFTP supports only the Client mode.
2951Question 221
2952Incorrect
2953Mark 0 out of 1
2954Not flagged
2955Question text
2956Which port number does Telnet uses for protocol transmission?
2957
2958Select one:
2959a. 23
2960b. 8080
2961c. 24
2962d. 48
2963Feedback
2964The correct answer is: 23
2965Question 222
2966Incorrect
2967Mark 0 out of 1
2968Not flagged
2969Question text
2970Which transport-level protocol does Telnet use?
2971
2972Select one:
2973a. ECMP
2974b. TCP
2975c. UDP
2976d. UCMP
2977Feedback
2978The correct answer is: TCP
2979Question 223
2980Incorrect
2981Mark 0 out of 1
2982Not flagged
2983Question text
2984Which of the following port numbers is used by Telnet?
2985
2986Select one:
2987a. 27
2988b. 23
2989c. 29
2990d. 25
2991Feedback
2992The correct answer is: 23
2993Question 224
2994Correct
2995Mark 1 out of 1
2996Not flagged
2997Question text
2998What is the underlying protocol used by Telnet to transmit data?
2999
3000Select one:
3001a. SIP
3002b. UDP
3003c. TCP
3004d. RTP
3005Feedback
3006The correct answer is: TCP
3007Question 225
3008Partially correct
3009Mark 1 out of 1
3010Not flagged
3011Question text
3012Compared with telnet, which of the following advantages does SSH support?
3013Select one or more:
3014a. Encrypt the transmitted data to guarantee its security and reliability
3015b. Scalable application based on UDP connection
3016c. Accelerate the data transmission speed by compressing the data
3017d. Prevent DNS and IP spoofing
3018Feedback
3019The correct answers are: Encrypt the transmitted data to guarantee its security and reliability, Prevent DNS and IP spoofing, Accelerate the data transmission speed by compressing the data
3020Question 226
3021Partially correct
3022Mark 1 out of 1
3023Not flagged
3024Question text
3025Which of the following protocols or applications are based on TCP?
3026Select one or more:
3027a. DNS
3028b. FTP
3029c. SNMP
3030d. Telnet
3031Feedback
3032The correct answers are: FTP, DNS, Telnet
3033Question 227
3034Incorrect
3035Mark 0 out of 1
3036Not flagged
3037Question text
3038Which of the following commands is used to check whether an application-level protocol works normally?
3039
3040Select one:
3041a. TELNET
3042b. Extended ping
3043c. PING
3044d. TRACE
3045Feedback
3046The correct answer is: TELNET
3047Question 228
3048Incorrect
3049Mark 0 out of 1
3050Not flagged
3051Question text
3052An administrator connects two switches together in a local enterprise network. The ports of one switch support Fast Ethernet, while the ports of the other switch support Gigabit Ethernet. Hosts connected to one switch are able to communicate, however communication between the two switches fails. What is the possible reason for this?
3053
3054Select one:
3055a. The port of one switch is operating using half duplex mode, while the port of the other switch is using full duplex mode.
3056b. The ports have disabled auto-negoatition.
3057c. A Fast Ethernet port cannot communicate directly with a Gigabit Ethernet port.
3058d. One port is supporting auto-negotiation, while auto-negotiation is disabled on the port of the other switch.
3059Feedback
3060The correct answer is: The ports have disabled auto-negoatition.
3061Question 229
3062Incorrect
3063Mark 0 out of 1
3064Not flagged
3065Question text
3066( ) combines “multiple” ports to form an aggregation group. It can be used to balance the traffic among member ports and improve the connection reliability.
3067
3068Select one:
3069a. Port binding
3070b. Port group
3071c. Port Aggregation
3072d. Port load balance
3073Feedback
3074The correct answer is: Port binding
3075Question 230
3076Partially correct
3077Mark 1 out of 1
3078Not flagged
3079Question text
3080What benefits does port aggregation yield?
3081Select one or more:
3082a. Improves link bandwidth
3083b. Facilitates data copy for analysis
3084c. Improves network reliability
3085d. Implements load sharing
3086Feedback
3087The correct answers are: Improves link bandwidth, Implements load sharing, Improves network reliability
3088Question 231
3089Incorrect
3090Mark 0 out of 1
3091Not flagged
3092Question text
3093( ) What is the maximum number of member interfaces supported by a single Eth-Trunk?
3094
3095Select one:
3096a. 10
3097b. 8
3098c. 12
3099d. 6
3100Feedback
3101The correct answer is: 8
3102Question 232
3103Correct
3104Mark 1 out of 1
3105Not flagged
3106Question text
3107The Eth-Trunk frame forwarding mechanism used to prevent changes in the data sequence forwards frames based on which of the following parameters?
3108
3109Select one or more:
3110a. The same source or destination MAC address.
3111b. The same source or destination port number.
3112c. The same source or destination IP address
3113d. The same protocol type.
3114Feedback
3115The correct answers are: The same source or destination IP address, The same source or destination MAC address.
3116Question 233
3117Incorrect
3118Mark 0 out of 1
3119Not flagged
3120Question text
3121( ) In Layer 2 mode, the transmission rate of an Eth-Trunk interface is determined by which of the following?
3122
3123Select one or more:
3124a. Minimum number of Up member links
3125b. Maximum number of Up member links
3126c. Number of Up member interfaces
3127d. Number of interfaces.
3128Feedback
3129The correct answers are: Maximum number of Up member links, Number of Up member interfaces
3130Question 234
3131Incorrect
3132Mark 0 out of 1
3133Not flagged
3134Question text
3135( ) The network administrator wishes to forward data over an Eth-trunk, however associated member interfaces operate at different rates. In terms of the resulting behavior, which of the following is true?
3136
3137Select one:
3138a. The Eth-Trunk will work normally.
3139b. The lower rate member interfaces may incur packet loss.
3140c. The two switches will not be able to communicate.
3141d. The higher rate member interfaces may incur packet loss.
3142Feedback
3143The correct answer is: The lower rate member interfaces may incur packet loss.
3144Question 235
3145Partially correct
3146Mark 1 out of 1
3147Not flagged
3148Question text
3149( ) The network administrator attempts to add interface G0/0/1 on Switch A to Eth-trunk 1, however the command fails. Which of the following may cause this?
3150
3151Select one or more:
3152a. The interface is already associated with another Eth-trunk.
3153b. The interface has been shutdown.
3154c. The interface is an access port.
3155d. The interface is operating in half-duplex mode.
3156Feedback
3157The correct answers are: The interface is already associated with another Eth-trunk., The interface is an access port.
3158Question 236
3159Correct
3160Mark 1 out of 1
3161Not flagged
3162Question text
3163According to IEEE802.1Q, where is VLAN ID in the tagged Ethernet frame?
3164
3165Select one:
3166a. In front of the source MAC address and destination MAC address
3167b. Behind the source MAC address and destination MAC address
3168c. Not fixed
3169d. Between the source MAC address and destination MAC address
3170Feedback
3171The correct answer is: Behind the source MAC address and destination MAC address
3172Question 237
3173Incorrect
3174Mark 0 out of 1
3175Not flagged
3176Question text
3177On VRP platform, what is the function for command "interface vlan-interface vlan-id"?
3178
3179Select one:
3180a. Create or enter VLAN interface
3181b. No such command
3182c. Configure VLAN for an interface
3183d. Create a VLAN
3184Feedback
3185The correct answer is: Create or enter VLAN interface
3186Question 238
3187Correct
3188Mark 1 out of 1
3189Not flagged
3190Question text
3191How many bytes does a VLAN tag consist of?
3192
3193Select one:
3194a. 2
3195b. 4
3196c. 5
3197d. 3
3198Feedback
3199The correct answer is: 4
3200Question 239
3201Partially correct
3202Mark 1 out of 1
3203Not flagged
3204Question text
3205After the VLAN function is introduced to the Ethernet, the ports on a switch can be classified into ( ).
3206Select one or more:
3207a. Trunk port
3208b. None port
3209c. Access port
3210d. Hybrid port
3211Feedback
3212The correct answers are: Access port, Trunk port, Hybrid port
3213Question 240
3214Incorrect
3215Mark 0 out of 1
3216Not flagged
3217Question text
3218A VLAN in the Ethernet is used to separate ( ).
3219
3220Select one:
3221a. Layer 2 unicast domain
3222b. Layer 2 MAC address
3223c. Layer 2 broadcast domain
3224d. Layer 2 multicast domain
3225Feedback
3226The correct answer is: Layer 2 broadcast domain
3227Question 241
3228Correct
3229Mark 1 out of 1
3230Not flagged
3231Question text
3232During frame forwarding, a switch checks the VLAN tag carried in an Ethernet frame and then determines whether to forward the Ethernet frame through a port if the VLAN tag is a ( ) of this port.
3233
3234Select one:
3235a. Default PVID
3236b. Permitted tag
3237c. STP disable state
3238d. MAC address equivalence
3239Feedback
3240The correct answer is: Permitted tag
3241Question 242
3242Incorrect
3243Mark 0 out of 1
3244Not flagged
3245Question text
3246After an Ethernet frame uses a VLAN tag, the Ethernet frame can be expressed in two formats, namely, ( ) and ( ) in a switched network.
3247Select one or more:
3248a. Tagged frame
3249b. Untagged frame
3250c. Row frame
3251d. Column frame
3252Feedback
3253The correct answers are: Untagged frame, Tagged frame
3254Question 243
3255Incorrect
3256Mark 0 out of 1
3257Not flagged
3258Question text
3259VLAN tagged frame has extra ( ) bytes compared with standard Ethernet frame?
3260
3261Select one:
3262a. 4
3263b. 8
3264c. 32
3265d. 12
3266Feedback
3267The correct answer is: 4
3268Question 244
3269Incorrect
3270Mark 0 out of 1
3271Not flagged
3272Question text
3273How many bits are used to identify the VLAN id of the data frame?
3274
3275Select one:
3276a. 8
3277b. 4
3278c. 12
3279d. 32
3280Feedback
3281The correct answer is: 12
3282Question 245
3283Incorrect
3284Mark 0 out of 1
3285Not flagged
3286Question text
3287The fixed value of the TPID field in VLAN tag is ( ).
3288
3289Select one:
3290a. 0x8100
3291b. 0x0806
3292c. 0x0800
3293d. 0x9100
3294Feedback
3295The correct answer is: 0x8100
3296Question 246
3297Correct
3298Mark 1 out of 1
3299Not flagged
3300Question text
3301A VLAN can be considered as a ( ).
3302
3303Select one:
3304a. Blocking domain
3305b. Management domain
3306c. Broadcast domain
3307d. Collision domain
3308Feedback
3309The correct answer is: Broadcast domain
3310Question 247
3311Incorrect
3312Mark 0 out of 1
3313Not flagged
3314Question text
3315Which of the following are the advantages of VLAN compared with traditional LAN technology?
3316Select one or more:
3317a. Improve the network security
3318b. Enhance the network high available
3319c. Lower cost for relocation and changes
3320d. Isolate broadcast domain and control the broadcast packets
3321Feedback
3322The correct answers are: Lower cost for relocation and changes, Isolate broadcast domain and control the broadcast packets, Improve the network security
3323Question 248
3324Incorrect
3325Mark 0 out of 1
3326Not flagged
3327Question text
3328A port of the switch belongs to VLAN 5. If VLAN 5 is removed by using command "undo vlan 5", then which VLAN does this port belong?
3329
3330Select one:
3331a. 1
3332b. 0
3333c. 1023
3334d. 1024
3335Feedback
3336The correct answer is: 1
3337Question 249
3338Partially correct
3339Mark 1 out of 1
3340Not flagged
3341Question text
3342Which of the following methods can realize communication between VLANs at network layer?
3343Select one or more:
3344a. GVRP
3345b. L2 Switch+Router
3346c. STP
3347d. L3 Switch
3348Feedback
3349The correct answers are: L2 Switch+Router, L3 Switch
3350Question 250
3351Incorrect
3352Mark 0 out of 1
3353Not flagged
3354Question text
3355Workstation A and workstation B are respectively connected to two ports of a switch. Assume the MAC table of the switch is empty now. Which of the following statements is true as soon as the switch receives the first packet sent by Workstation A to Workstation B?
3356
3357Select one:
3358a. The switch will not learn any address
3359b. The switch will learn address of B
3360c. The switch will learn address of A
3361d. The switch will learn addresses of both A and B
3362Feedback
3363The correct answer is: The switch will learn address of A
3364Question 251
3365Incorrect
3366Mark 0 out of 1
3367Not flagged
3368Question text
3369Which of the following descriptions are correct about VLAN interface?
3370Select one or more:
3371a. A virtual interface is required to be created for the VLAN if we want to assign an IP address for that VLAN,
3372b. The VLAN interface can be configured for the non-existed VLAN
3373c. The VLAN interface number must be the same with VLAN ID
3374d. Two VLAN interfaces on the same switch can be assigned with the same IP address
3375Feedback
3376The correct answers are: A virtual interface is required to be created for the VLAN if we want to assign an IP address for that VLAN,, The VLAN interface number must be the same with VLAN ID
3377Question 252
3378Incorrect
3379Mark 0 out of 1
3380Not flagged
3381Question text
3382An access port on a switch generally connects to a port on a computer. Which of the following statements are true?
3383Select one or more:
3384a. An access port can belong to only one VLAN.
3385b. After receiving a tag packet, the switch forwards it directly.
3386c. The default VLAN of an access port is the VLAN where the port is located. You do not need to manually configure a default VLAN for an access port.
3387d. After receiving an untag packet, the access port attaches its PVID information to the packet.
3388Feedback
3389The correct answers are: The default VLAN of an access port is the VLAN where the port is located. You do not need to manually configure a default VLAN for an access port., An access port can belong to only one VLAN., After receiving an untag packet, the access port attaches its PVID information to the packet.
3390Question 253
3391Correct
3392Mark 1 out of 1
3393Not flagged
3394Question text
3395What action does a Trunk port take after it receives an untag packet?
3396
3397Select one:
3398a. Discards the packet directly.
3399b. Attaches its PVID information to the packet and then sends out the packet.
3400c. Sends out the packet directly without adding the tag information to the packet.
3401d. Attaches its trunk VLAN ID to the packet and then sends out the packet.
3402Feedback
3403The correct answer is: Attaches its PVID information to the packet and then sends out the packet.
3404Question 254
3405Incorrect
3406Mark 0 out of 1
3407Not flagged
3408Question text
3409Which of the following statements are true after a Trunk port receives a tag packet?
3410Select one or more:
3411a. Attaches its PVID information to the packet and then sends out the packet.
3412b. Discards the tag packet directly if the Trunk port does not allow the tag packet to pass through.
3413c. Transparently transmits the tag packet.
3414d. Checks whether the Trunk port allows the tag packet to pass through.
3415Feedback
3416The correct answers are: Checks whether the Trunk port allows the tag packet to pass through., Discards the tag packet directly if the Trunk port does not allow the tag packet to pass through.
3417Question 255
3418Incorrect
3419Mark 0 out of 1
3420Not flagged
3421Question text
3422Which of the following statements about VLAN communication are true?
3423Select one or more:
3424a. One-arm routing can be configured for a Layer 2 switch only by using a router to implement VLAN communication.
3425b. One-arm routing can be configured for a Layer 3 switch only by using a router to implement VLAN communication.
3426c. Layer 3 VLAN interfaces can be configured on a Layer 3 switch to implement VLAN communication.
3427d. Layer 3 VLAN interfaces can be configured on a Layer 2 switch to implement VLAN communication.
3428Feedback
3429The correct answers are: One-arm routing can be configured for a Layer 2 switch only by using a router to implement VLAN communication., Layer 3 VLAN interfaces can be configured on a Layer 3 switch to implement VLAN communication.
3430Question 256
3431Incorrect
3432Mark 0 out of 1
3433Not flagged
3434Question text
3435Which of the following statements about the advantages of the VLAN function are true?
3436Select one or more:
3437a. The VLAN function improves network performance by implementing flow control and using the window advertisement mechanism.
3438b. The VLAN function divides a network into several small logical networks, reducing the impact of a broadcast storm on a network.
3439c. The VLAN function improves network security by identifying users that are allowed to access sensitive data and applications.
3440d. The VLAN function reduces network costs by reducing the number of physical ports on switches.
3441Feedback
3442The correct answers are: The VLAN function improves network security by identifying users that are allowed to access sensitive data and applications., The VLAN function improves network performance by implementing flow control and using the window advertisement mechanism.
3443Question 257
3444Incorrect
3445Mark 0 out of 1
3446Not flagged
3447Question text
3448Which of the following standards is defined by IEEE to regulate the implementation of VLAN between switches?
3449
3450Select one:
3451a. 802.1x
3452b. 802.1d
3453c. 802.3
3454d. 802.1q
3455Feedback
3456The correct answer is: 802.1q
3457Question 258
3458Incorrect
3459Mark 0 out of 1
3460Not flagged
3461Question text
3462A frame tag adds ( ) to each frame so that the frame can be transmitted through Trunk ports on switches.
3463
3464Select one:
3465a. Source MAC address of a switch
3466b. VLAN ID
3467c. Bridge ID of a switch
3468d. Destination MAC address
3469Feedback
3470The correct answer is: VLAN ID
3471Question 259
3472Correct
3473Mark 1 out of 1
3474Not flagged
3475Question text
3476Which of the following are the features of the default VLAN setting in a switch configuration?
3477Select one or more:
3478a. The IP address configured for a switch is applied only to a member port in the default VLAN.
3479b. By default, the ports on all switches are member ports of a default VLAN.
3480c. The default VLAN cannot be deleted manually.
3481d. A default VLAN must be created before a port is allocated to a VLAN.
3482Feedback
3483The correct answers are: The default VLAN cannot be deleted manually., By default, the ports on all switches are member ports of a default VLAN.
3484Question 260
3485Incorrect
3486Mark 0 out of 1
3487Not flagged
3488Question text
3489Which of the following statements about VLAN are true?
3490Select one or more:
3491a. “Multiple” VLANs can pass through a “single” trunk.
3492b. In the switch configuration, if the default VLAN is VLAN 1, it cannot be deleted or renamed.
3493c. A switch supports a maximum number of 255 VLANs.
3494d. A “single” access port can pass through “multiple” VLANs.
3495Feedback
3496The correct answers are: In the switch configuration, if the default VLAN is VLAN 1, it cannot be deleted or renamed., “Multiple” VLANs can pass through a “single” trunk.
3497Question 261
3498Incorrect
3499Mark 0 out of 1
3500Not flagged
3501Question text
3502Switch-A and Switch-B are configured with ports in VLANs for R&D Department, Sales Department, Product Department, Financial Department, and HR Department. Each VLAN contains 20 users. In this case, how many subnets at least are required to provide routes between all VLANs?
3503
3504Select one:
3505a. 50
3506b. 20
3507c. 5
3508d. 100
3509Feedback
3510The correct answer is: 5
3511Question 262
3512Incorrect
3513Mark 0 out of 1
3514Not flagged
3515Question text
3516Of all the VLAN grouping methods, the grouping method by IP address is called ( ) VLAN.
3517
3518Select one:
3519a. Policy-based
3520b. Port-based
3521c. MAC address-based
3522d. Route-based
3523Feedback
3524The correct answer is: Route-based
3525Question 263
3526Correct
3527Mark 1 out of 1
3528Not flagged
3529Question text
3530Which VLAN does an access port of a switch belong to?
3531
3532Select one:
3533a. The VLAN with the greatest No.
3534b. All VLANs
3535c. The only defined VLAN
3536d. The VLAN with the smallest No.
3537Feedback
3538The correct answer is: The only defined VLAN
3539Question 264
3540Incorrect
3541Mark 0 out of 1
3542Not flagged
3543Question text
3544A network administrator wants to divide the hosts in building A into VLAN 3 and VLAN 5. Which of the following statements about VLAN configuration is true?
3545
3546Select one:
3547a. After VLAN 3 and VLAN 5 are created manually, the default VLAN is removed automatically.
3548b. The two VLANs can be named BUILDING_A to differentiate them from the VLANs in other geographical areas.
3549c. The network administrator can create a VLAN either in the global view or in the VLAN view.
3550d. VLAN information is saved automatically in the starting configuration.
3551Feedback
3552The correct answer is: The network administrator can create a VLAN either in the global view or in the VLAN view.
3553Question 265
3554Incorrect
3555Mark 0 out of 1
3556Not flagged
3557Question text
3558Which of the following statements are true in the process of deleting a VLAN?
3559Select one or more:
3560a. The member port of a VLAN becomes inactive after the VLAN is deleted.
3561b. A network administrator can delete a VLAN either in the global view or in the VLAN view.
3562c. When a routing-based interface (Vlanif) is available for a VLAN, the Vlanif interface must be deleted before the VLAN is deleted.
3563d. A VLAN can be deleted only after its member port is allocated to another VLAN.
3564Feedback
3565The correct answers are: When a routing-based interface (Vlanif) is available for a VLAN, the Vlanif interface must be deleted before the VLAN is deleted., A network administrator can delete a VLAN either in the global view or in the VLAN view.
3566Question 266
3567Incorrect
3568Mark 0 out of 1
3569Not flagged
3570Question text
3571Which of the following statements about the process of creating a VLAN are true?
3572Select one or more:
3573a. A network administrator can create a VLAN either in the global view or in the VLAN view.
3574b. A routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created.
3575c. A VLAN can be created only after its member port is allocated to another VLAN
3576d. The member port of this VLAN enters the active state immediately.
3577Feedback
3578The correct answers are: A routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created., A network administrator can create a VLAN either in the global view or in the VLAN view.
3579Question 267
3580Incorrect
3581Mark 0 out of 1
3582Not flagged
3583Question text
3584Which of the following steps are necessary to configure a port to the specified vlan in SYSTEM view?
3585Select one or more:
3586a. Enter the VLAN view
3587b. Specify description for VLAN or VLAN interface
3588c. Specify proportion of broadcast storm for VLAN
3589d. Assign VLAN for the Ethernet port
3590Feedback
3591The correct answers are: Enter the VLAN view, Assign VLAN for the Ethernet port
3592Question 268
3593Correct
3594Mark 1 out of 1
3595Not flagged
3596Question text
3597Which of the following technologies can reduce the scope of broadcast domain?
3598
3599Select one:
3600a. STP
3601b. VLAN
3602c. RARP
3603d. Trunk
3604Feedback
3605The correct answer is: VLAN
3606Question 269
3607Incorrect
3608Mark 0 out of 1
3609Not flagged
3610Question text
3611Information below shows the partial interface configuration on a Huawei switch. According to this configuration, PVID of this interface is ( ).
3612
3613[Quidway\]display interface Ethernet 1/0/1
3614
3615---
3616
3617Mdi type: auto
3618
3619Port link-type: access
3620
3621Tagged VLAN ID: none
3622
3623Untagged VLAN ID: 5
3624
3625Select one:
3626a. 0
3627b. 1
3628c. Not able to interpret the PVID from the information given
3629d. 5
3630Feedback
3631The correct answer is: 5
3632Question 270
3633Incorrect
3634Mark 0 out of 1
3635Not flagged
3636Question text
3637Which of the following ports can be configured to permit VLAN to pass?
3638Select one or more:
3639a. Access
3640b. Hybrid
3641c. Normal
3642d. Trunk
3643Feedback
3644The correct answers are: Trunk, Hybrid
3645Question 271
3646Incorrect
3647Mark 0 out of 1
3648Not flagged
3649Question text
3650A trunk port is configured to permit vlan 3, vlan4 and vlan 5 to pass. The frames of vlan 3 and vlan 4 are tagged but the frames of VLAN 5 are untagged. Which of the following may cause the problem?
3651
3652Select one:
3653a. Port PVID is 5
3654b. GVRP is enabled on this port
3655c. Only the command "port trunk permit vlan 3 4 "was configured for the trunk port.
3656d. Port PVID is 3 and 4
3657Feedback
3658The correct answer is: Port PVID is 5
3659Question 272
3660Incorrect
3661Mark 0 out of 1
3662Not flagged
3663Question text
3664Which of the following descriptions about access-link are correct?
3665Select one or more:
3666a. When access port sends a frame, 802.1Q tag header is kept and a tagged frame is sent
3667b. When access port receives a frame with VLAN ID in 802.1Q tag header different from the default PVID, VLAN ID in 802.1Q tag header is changed to the default PVID.
3668c. When access port receives a frame without 802.1Q tag header, the default PVID will be added to the frame.
3669d. When access port sends a frame, 802.1Q tag header is removed and standard Ethernet frame is sent.
3670Feedback
3671The correct answers are: When access port receives a frame without 802.1Q tag header, the default PVID will be added to the frame., When access port sends a frame, 802.1Q tag header is removed and standard Ethernet frame is sent.
3672Question 273
3673Incorrect
3674Mark 0 out of 1
3675Not flagged
3676Question text
3677Which of the following descriptions about trunk link are correct?
3678Select one or more:
3679a. When trunk port sends a frame whose VLAN ID is same as the default PVID, no modification is done on the tag.
3680b. When trunk port receives a frame without 802.1Q tag header, the default PVID will be added to the frame.
3681c. When trunk port receives a frame with 802.1Q tag header, no changes is done on the frame.
3682d. When trunk port sends a frame whose VLAN ID is not same as default PVID, the frame is sent directly.
3683Feedback
3684The correct answers are: When trunk port receives a frame without 802.1Q tag header, the default PVID will be added to the frame., When trunk port receives a frame with 802.1Q tag header, no changes is done on the frame., When trunk port sends a frame whose VLAN ID is not same as default PVID, the frame is sent directly.
3685Question 274
3686Incorrect
3687Mark 0 out of 1
3688Not flagged
3689Question text
3690To make sure all hosts belonging to the same VLAN can receive the broadcast packets sent to this VLAN, which of the following operations are needed on the switch?
3691Select one or more:
3692a. Send the packets out of all ports of the switch.
3693b. Send the packets out of other ports that belong to the same VLAN.
3694c. Send the packets to all trunk links.
3695d. Send the packets to all trunk links that allow this VLAN to pass.
3696Feedback
3697The correct answers are: Send the packets out of other ports that belong to the same VLAN., Send the packets to all trunk links that allow this VLAN to pass.
3698Question 275
3699Correct
3700Mark 1 out of 1
3701Not flagged
3702Question text
3703When the value of the two-byte TPID field in an Ethernet frame header is 0x8100, it indicates that this frame carries an ( ) tag.
3704
3705Select one:
3706a. 802.1D
3707b. 802.1Q
3708c. 802.1P
3709d. 802.1S
3710Feedback
3711The correct answer is: 802.1Q
3712Question 276
3713Correct
3714Mark 1 out of 1
3715Not flagged
3716Question text
3717All Ethernet frames in a switch flow in the form of ( ).
3718
3719Select one:
3720a. BPDU
3721b. Tagged frame
3722c. PVID
3723d. Untagged frame
3724Feedback
3725The correct answer is: Tagged frame
3726Question 277
3727Incorrect
3728Mark 0 out of 1
3729Not flagged
3730Question text
3731A switch is based on port-based VLAN IDs. When the switch receives untagged frames, the VLAN ID is determined by ( ).
3732
3733Select one:
3734a. IP Address
3735b. PVID
3736c. BPDU
3737d. MAC mapping table
3738Feedback
3739The correct answer is: PVID
3740Question 278
3741Incorrect
3742Mark 0 out of 1
3743Not flagged
3744Question text
3745For VLAN link type,the link between a switch and a PC is ( ).
3746
3747Select one:
3748a. Hybrid link
3749b. Access link
3750c. ISL link
3751d. Trunk link
3752Feedback
3753The correct answer is: Access link
3754Question 279
3755Incorrect
3756Mark 0 out of 1
3757Not flagged
3758Question text
3759A switch supports 802.1Q protocol, what is the maximum number of VLAN it can support?
3760Select one:
3761a. 4096
3762b. 2048
3763c. 1024
3764d. 512
3765Feedback
3766The correct answer is: 4096
3767Question 280
3768Incorrect
3769Mark 0 out of 1
3770Not flagged
3771Question text
3772VLAN is short for?
3773
3774Select one:
3775a. Virtual long area network
3776b. Virtual long area networking
3777c. Virtual local area networking
3778d. Virtual local area network
3779Feedback
3780The correct answer is: Virtual local area network
3781Question 281
3782Incorrect
3783Mark 0 out of 1
3784Not flagged
3785Question text
3786Which of the following are the formats of Ethernet frame in the switching network?
3787Select one or more:
3788a. Token frame
3789b. Tagged frame
3790c. FDDI frame
3791d. Untagged frame
3792Feedback
3793The correct answers are: Untagged frame, Tagged frame
3794Question 282
3795Incorrect
3796Mark 0 out of 1
3797Not flagged
3798Question text
3799To implement network layer capability on the VLAN interface, we need to configure ( ) on VLAN interface.
3800Select one or more:
3801a. Subnet mask
3802b. MAC address
3803c. IP prefix
3804d. IP address
3805Feedback
3806The correct answers are: IP address, Subnet mask
3807Question 283
3808Correct
3809Mark 1 out of 1
3810Not flagged
3811Question text
3812A switch is configured with VLAN 3, VLAN 4 and VLAN 5. GVRP is not enabled for the trunk port. The trunk port then receives a frame with VLAN ID 6. This frame will be ( ).
3813
3814Select one:
3815a. Discarded
3816b. Flooded to all VLANs
3817c. Flooded to VLAN 1 only
3818d. Flooded to all trunk ports
3819Feedback
3820The correct answer is: Discarded
3821Question 284
3822Incorrect
3823Mark 0 out of 1
3824Not flagged
3825Question text
3826Which of the following protocols can dynamically register VLAN information?
3827
3828Select one:
3829a. GMRP
3830b. GVRP
3831c. STP
3832d. VRRP
3833Feedback
3834The correct answer is: GVRP
3835Question 285
3836Correct
3837Mark 1 out of 1
3838Not flagged
3839Question text
3840GVRP represents Generic VLAN registration protocol, it is an application of ( ).
3841
3842Select one:
3843a. GMTP
3844b. GARP
3845c. GMRP
3846d. IGMP
3847Feedback
3848The correct answer is: GARP
3849Question 286
3850Correct
3851Mark 1 out of 1
3852Not flagged
3853Question text
3854GVRP is short for ?
3855
3856Select one:
3857a. GARP VLAN Remark Protocol
3858b. GARP VLAN Rewrite Protocol
3859c. GARP VLAN Record Protocol
3860d. GARP VLAN Registration Protocol
3861Feedback
3862The correct answer is: GARP VLAN Registration Protocol
3863Question 287
3864Incorrect
3865Mark 0 out of 1
3866Not flagged
3867Question text
3868A gvrp command is used to enable GVRP, and an undo gvrp command is used to disable GVRP. By default, GVRP is ( ).
3869
3870Select one:
3871a. in enable state
3872b. in an arbitrary state
3873c. in disable state
3874d. subject to the last VLAN operation
3875Feedback
3876The correct answer is: in disable state
3877Question 288
3878Partially correct
3879Mark 1 out of 1
3880Not flagged
3881Question text
3882Which of the following statements about the gvrp command are true?
3883
3884Select one or more:
3885a. If global GVRP is in disable state, port GVRP is also in disable state.
3886b. Enabling or disabling global GVRP is performed in the system view by running a gvrp command.
3887c. Before port GVRP is enabled by running this command, global GVRP must be enabled.
3888d. If global GVRP is in disable state, this command can enable port GVRP.
3889Feedback
3890The correct answers are: Before port GVRP is enabled by running this command, global GVRP must be enabled., If global GVRP is in disable state, port GVRP is also in disable state., Enabling or disabling global GVRP is performed in the system view by running a gvrp command.
3891Question 289
3892Incorrect
3893Mark 0 out of 1
3894Not flagged
3895Question text
3896GVRP protocol can operate at ( ) port.
3897
3898Select one:
3899a. Trunk
3900b. hybrid
3901c. Access
3902d. Normal
3903Feedback
3904The correct answer is: Trunk
3905Question 290
3906Correct
3907Mark 1 out of 1
3908Not flagged
3909Question text
3910Which of the following descriptions about GARP is incorrect?
3911
3912Select one:
3913a. In GARP working mechanism, the attribute is spread to the whole network by the process "declaration-registration-declaration"
3914b. GARP has only one application: GVRP
3915c. GARP is called generic attribute registration protocol
3916d. GARP provides a mechanism by which the members in a switched network can implement distribution, propagation and registration of certain information.
3917Feedback
3918The correct answer is: GARP has only one application: GVRP
3919Question 291
3920Correct
3921Mark 1 out of 1
3922Not flagged
3923Question text
3924Direct interconnection of traffic with different VLANs is not allowed. Such traffic must be transmitted based on ( ).
3925
3926Select one:
3927a. MAC addresses
3928b. VLAN routing
3929c. VLAN switching
3930d. Port isolation
3931Feedback
3932The correct answer is: VLAN routing
3933Question 292
3934Incorrect
3935Mark 0 out of 1
3936Not flagged
3937Question text
3938On huawei router,Before you configure the IP address of an Ethernet sub-port, you need to configure ( ).
3939Select one:
3940a. Port GVRP
3941b. VLAN encapsulation
3942c. Global GVRP
3943d. MAC address
3944Feedback
3945The correct answer is: VLAN encapsulation
3946Question 293
3947Incorrect
3948Mark 0 out of 1
3949Not flagged
3950Question text
3951Which of the following methods can realize communication between VLANs at network layer?
3952
3953Select one or more:
3954a. GVRP
3955b. STP
3956c. L2 Switch+Router
3957d. L3 Switch
3958Feedback
3959The correct answers are: L2 Switch+Router, L3 Switch
3960Question 294
3961Incorrect
3962Mark 0 out of 1
3963Not flagged
3964Question text
3965Which of the following descriptions are correct about VLAN interface?
3966
3967Select one or more:
3968a. A virtual interface is required to be created for the VLAN if we want to assign an IP address for that VLAN,
3969b. Two VLAN interfaces on the same switch can be assigned with the same IP address
3970c. The VLAN interface can be configured for the non-existed VLAN
3971d. The VLAN interface number must be the same with VLAN ID
3972Feedback
3973The correct answers are: A virtual interface is required to be created for the VLAN if we want to assign an IP address for that VLAN,, The VLAN interface number must be the same with VLAN ID
3974Question 295
3975Incorrect
3976Mark 0 out of 1
3977Not flagged
3978Question text
3979Which of the following statements about VLAN communication are true?
3980
3981Select one or more:
3982a. One-arm routing can be configured for a Layer 3 switch only by using a router to implement VLAN communication.
3983b. Layer 3 VLAN interfaces can be configured on a Layer 3 switch to implement VLAN communication.
3984c. One-arm routing can be configured for a Layer 2 switch only by using a router to implement VLAN communication.
3985d. Layer 3 VLAN interfaces can be configured on a Layer 2 switch to implement VLAN communication.
3986Feedback
3987The correct answers are: Layer 3 VLAN interfaces can be configured on a Layer 3 switch to implement VLAN communication., Layer 3 VLAN interfaces can be configured on a Layer 2 switch to implement VLAN communication.
3988Question 296
3989Incorrect
3990Mark 0 out of 1
3991Not flagged
3992Question text
3993Of all the VLAN grouping methods, the grouping method by IP address is called ( ) VLAN.
3994Select one:
3995a. policy-based
3996b. port-based
3997c. MAC address-based
3998d. route-based
3999Feedback
4000The correct answer is: route-based
4001Question 297
4002Incorrect
4003Mark 0 out of 1
4004Not flagged
4005Question text
4006Of all the VLAN grouping methods, the grouping method by IP address is called ( ) VLAN.
4007Select one or more:
4008a. A network administrator can delete a VLAN either in the global view or in the VLAN view.
4009b. A VLAN can be deleted only after its member port is allocated to another VLAN.
4010c. The member port of a VLAN becomes inactive after the VLAN is deleted.
4011d. When a routing-based interface (Vlanif) is available for a VLAN, the Vlanif interface must be deleted before the VLAN is deleted.
4012Feedback
4013The correct answers are: When a routing-based interface (Vlanif) is available for a VLAN, the Vlanif interface must be deleted before the VLAN is deleted., A network administrator can delete a VLAN either in the global view or in the VLAN view.
4014Question 298
4015Incorrect
4016Mark 0 out of 1
4017Not flagged
4018Question text
4019Which of the following statements about the process of creating a VLAN are true?
4020
4021Select one or more:
4022a. A VLAN can be created only after its member port is allocated to another VLAN.
4023b. A routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created.
4024c. A network administrator can create a VLAN either in the global view or in the VLAN view.
4025d. The member port of this VLAN enters the active state immediately.
4026Feedback
4027The correct answers are: A routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created., A network administrator can create a VLAN either in the global view or in the VLAN view.
4028Question 299
4029Incorrect
4030Mark 0 out of 1
4031Not flagged
4032Question text
4033Which of the following WLAN standards support operation in the 5GHz range?
4034Select one or more:
4035a. 802.11b
4036b. 802.11a
4037c. 802.11g
4038d. 802.11n
4039Feedback
4040The correct answers are: 802.11a, 802.11n
4041Question 300
4042Incorrect
4043Mark 0 out of 1
4044Not flagged
4045Question text
4046which of the following standards provide a transmission rate of more than 1Gbps ?
4047
4048Select one:
4049a. 802.11b
4050b. 802.11n
4051c. 802.11g
4052d. 802.11ac
4053Feedback
4054The correct answer is: 802.11ac
4055Question 301
4056Partially correct
4057Mark 1 out of 1
4058Not flagged
4059Question text
4060Which of the following PPP protocols are classified into the NCP protocol?
4061Select one or more:
4062a. IPv6CP
4063b. TCP
4064c. IPCP
4065d. ICMP
4066Feedback
4067The correct answers are: IPv6CP, IPCP
4068Question 302
4069Incorrect
4070Mark 0 out of 1
4071Not flagged
4072Question text
4073After a PPP connection is established, the VRP platform sends Echo-Request packets at the interval of ( ) seconds by default.
4074
4075Select one:
4076a. 5
4077b. 60
4078c. 1
4079d. 10
4080Feedback
4081The correct answer is: 10
4082Question 303
4083Incorrect
4084Mark 0 out of 1
4085Not flagged
4086Question text
4087What function does the NCP protocol can provide for a PPP connection?
4088
4089Select one:
4090a. Congestion control
4091b. User identifier authentication
4092c. Error detection
4093d. Carrying of “multiple” Layer 3 protocols
4094Feedback
4095The correct answer is: Carrying of “multiple” Layer 3 protocols
4096Question 304
4097Partially correct
4098Mark 1 out of 1
4099Not flagged
4100Question text
4101Which of the following components are defined by PPP protocol?
4102Select one or more:
4103a. Network Control Protocol(NCP)
4104b. Data encapsulation
4105c. Link Control Protocol(LCP)
4106d. Data encryption
4107Feedback
4108The correct answers are: Data encapsulation, Link Control Protocol(LCP), Network Control Protocol(NCP)
4109Question 305
4110Correct
4111Mark 1 out of 1
4112Not flagged
4113Question text
4114PPP protocol consists of three types of protocols, they are ( ).
4115Select one or more:
4116a. PPPOE
4117b. PPP extension protocol
4118c. LCP(Link Control Protocol)
4119d. NCP(Network Control Protocol)
4120Feedback
4121The correct answers are: LCP(Link Control Protocol), NCP(Network Control Protocol), PPP extension protocol
4122Question 306
4123Incorrect
4124Mark 0 out of 1
4125Not flagged
4126Question text
4127Which of the following statements are true?
4128Select one or more:
4129a. IPCP can be used to negotiate on IP addresses and compress information.
4130b. LCP negotiates on authentication information.
4131c. CHAP performs authentication by exchanging packets twice.
4132d. PAP is used for user authentication
4133Feedback
4134The correct answers are: IPCP can be used to negotiate on IP addresses and compress information., PAP is used for user authentication
4135Question 307
4136Incorrect
4137Mark 0 out of 1
4138Not flagged
4139Question text
4140Which of the following functions does LCP provide?
4141Select one or more:
4142a. Tests a link to check the link quality and thus to determine whether a link can be established.
4143b. Negotiates to establish links.
4144c. Disconnects a link when the idle timer of the link expires.
4145d. Negotiates to use which Layer 3 protocols.
4146Feedback
4147The correct answers are: Negotiates to establish links., Disconnects a link when the idle timer of the link expires., Tests a link to check the link quality and thus to determine whether a link can be established.
4148Question 308
4149Partially correct
4150Mark 1 out of 1
4151Not flagged
4152Question text
4153Which of the following packets belong to CHAP authentication protocol?
4154Select one or more:
4155a. Failure
4156b. Success
4157c. Challenge
4158d. Request
4159e. Response
4160Feedback
4161The correct answers are: Challenge, Response, Success, Failure
4162Question 309
4163Incorrect
4164Mark 0 out of 1
4165Not flagged
4166Question text
4167When you configure PPP authentication method as PAP, which of the following operations are necessary?
4168Select one or more:
4169a. On the authenticated party end, configure the user name and password that are sent to authenticator
4170b. Configure PPP authentication method as CHAP
4171c. Add the user name and password of the authenticated party to local user list
4172d. Configure the encapsulation type of the interface connected to the peer as PPP.
4173Feedback
4174The correct answers are: Add the user name and password of the authenticated party to local user list, Configure the encapsulation type of the interface connected to the peer as PPP., On the authenticated party end, configure the user name and password that are sent to authenticator
4175Question 310
4176Incorrect
4177Mark 0 out of 1
4178Not flagged
4179Question text
4180How many bytes does the Maximum Receive Unit (MRU) of PPP consist of by default?
4181
4182Select one:
4183a. 1518
4184b. 8096
4185c. 1500
4186d. 1024
4187Feedback
4188The correct answer is: 1500
4189Question 311
4190Incorrect
4191Mark 0 out of 1
4192Not flagged
4193Question text
4194Which of the following protocol is required in negotiation to compress the TCP/IP packet header for a PPP link?
4195
4196Select one:
4197a. IPCP
4198b. PAP
4199c. CHAP
4200d. LCP
4201Feedback
4202The correct answer is: IPCP
4203Question 312
4204Partially correct
4205Mark 1 out of 1
4206Not flagged
4207Question text
4208In network switching technology, circuit switching technology is based on the PSTN switching technology. Which of the following statements about circuit switching are correct?
4209Select one or more:
4210a. Low delay
4211b. Ensure the Quality of service
4212c. Fixed bandwidth, utilization rate for the network resource is high
4213d. Transparent transmission, which means no modification on user data
4214Feedback
4215The correct answers are: Low delay, Transparent transmission, which means no modification on user data, Ensure the Quality of service
4216Question 313
4217Incorrect
4218Mark 0 out of 1
4219Not flagged
4220Question text
4221According to OSI reference model, which layer does PPP reside at?
4222
4223Select one:
4224a. Transport layer
4225b. Physical layer
4226c. Data link layer
4227d. Network layer
4228Feedback
4229The correct answer is: Data link layer
4230Question 314
4231Incorrect
4232Mark 0 out of 1
4233Not flagged
4234Question text
4235PAP requires ( )-way hand-shake.
4236
4237Select one:
4238a. Four
4239b. Two
4240c. Three
4241d. One
4242Feedback
4243The correct answer is: Two
4244Question 315
4245Correct
4246Mark 1 out of 1
4247Not flagged
4248Question text
4249Which of the following protocols requires three-way handshake and allows only username to be transmitted through network while keeping the password secret?
4250
4251Select one:
4252a. MD5
4253b. TCP
4254c. CHAP
4255d. PAP
4256Feedback
4257The correct answer is: CHAP
4258Question 316
4259Incorrect
4260Mark 0 out of 1
4261Not flagged
4262Question text
4263Which of the following descriptions about PAP and CHAP is correct?
4264
4265Select one:
4266a. PAP authentication requires three-way handshake
4267b. CHAP authentication uses plain text to send authentication message
4268c. CHAP authentication requires two-way handshake
4269d. PAP authentication uses plain text to send authentication message
4270Feedback
4271The correct answer is: PAP authentication uses plain text to send authentication message
4272Question 317
4273Correct
4274Mark 1 out of 1
4275Not flagged
4276Question text
4277On VRP platform, which of the following commands is used to configure PPP authentication method as PAP?
4278
4279Select one:
4280a. ppp authentication-mode chap
4281b. ppp authentication-mode pap
4282c. ppp pap
4283d. ppp chap
4284Feedback
4285The correct answer is: ppp authentication-mode pap
4286Question 318
4287Incorrect
4288Mark 0 out of 1
4289Not flagged
4290Question text
4291Which layer is the PPP protocol located in the TCP/IP protocol stack?
4292
4293Select one:
4294a. Physical Layer
4295b. Data Link Layer
4296c. Transport Layer
4297d. Network Layer
4298Feedback
4299The correct answer is: Data Link Layer
4300Question 319
4301Incorrect
4302Mark 0 out of 1
4303Not flagged
4304Question text
4305(Multiple Choice) A complete data communication system includes
4306Select one or more:
4307a. Message
4308b. Protocol
4309c. Receiver
4310d. Sender
4311e. Harddisk
4312Feedback
4313The correct answers are: Sender, Receiver, Message, Protocol
4314Question 320
4315Correct
4316Mark 1 out of 1
4317Not flagged
4318Question text
4319(Multiple Choice) The most significant feature of a local area network (LAN) is that the LAN is intended for only one organization and is geographically limited, allowing interconnections of a limited number of stations. Which of the following transmission media are most common to a LAN?
4320Select one or more:
4321a. Coaxial cable
4322b. ADSL
4323c. Twisted pair cable
4324d. Fiber
4325Feedback
4326The correct answers are: Fiber, Coaxial cable, Twisted pair cable
4327Question 321
4328Incorrect
4329Mark 0 out of 1
4330Not flagged
4331Question text
4332(Single Choice) The OSI reference model defines a simple hierarchical network model for a computer network. Which of the following standardization organizations develops the OSI reference model?
4333Select one:
4334a. IETF
4335b. IEEE
4336c. ITU
4337d. ISO
4338Feedback
4339The correct answer is: ISO
4340Question 322
4341Incorrect
4342Mark 0 out of 1
4343Not flagged
4344Question text
4345What kind of LMI protocols does VRP support?
4346Select one or more:
4347a. Nonstandard
4348b. Cisco
4349c. Ansi
4350d. Q933a
4351Feedback
4352The correct answers are: Q933a, Ansi, Nonstandard
4353Question 323
4354Incorrect
4355Mark 0 out of 1
4356Not flagged
4357Question text
4358(Single Choice) A network provides data communication services for a relatively large geographical area and is mainly used to interconnect LANs. Which network type does this network belong to?
4359Select one:
4360a. Metropolitan area network (MAN)
4361b. Wide area network (WAN)
4362c. Backbone network
4363d. Large LAN
4364Feedback
4365The correct answer is: Wide area network (WAN)
4366Question 324
4367Incorrect
4368Mark 0 out of 1
4369Not flagged
4370Question text
4371(Single Choice) When a node transmits data over a network medium, the data is transmitted to all the nodes on the network. Which topology does this network use?
4372Select one:
4373a. Tree
4374b. Ring
4375c. Bus
4376d. Star
4377Feedback
4378The correct answer is: Bus
4379Question 325
4380Incorrect
4381Mark 0 out of 1
4382Not flagged
4383Question text
4384(Single Choice) A topological structure has a central control point to enable easy network design and equipment installation. The network media connect to the area where workstations reside through the hub or switch at the central control point. The disadvantage of such a structure is that a fault on the hub or switch results in a “single”-point fault. Which topology does this type of LAN usually use?
4385Select one:
4386a. Ring
4387b. Bus
4388c. Tree
4389d. Star
4390Feedback
4391The correct answer is: Star
4392Question 326
4393Incorrect
4394Mark 0 out of 1
4395Not flagged
4396Question text
4397(Multiple Choice) As a device for converting signals between an edge system and a communications system, a modem is essential in a WAN. A modem is connected to a serial port on a router. Which two of the following transmission modes does the serial port work in?
4398Select one or more:
4399a. Routing
4400b. Asynchronous
4401c. Synchronous
4402d. Switching
4403Feedback
4404The correct answers are: Synchronous, Asynchronous
4405Question 327
4406Incorrect
4407Mark 0 out of 1
4408Not flagged
4409Question text
4410(Single Choice) Which of the following statements is incorrect regarding LAN features?
4411Select one:
4412a. High transmission efficiency and high reliability
4413b. Large coverage scale
4414c. Extensive coverage
4415d. The structure is simple and easy to be constructed.
4416Feedback
4417The correct answer is: Large coverage scale
4418Question 328
4419Correct
4420Mark 1 out of 1
4421Not flagged
4422Question text
4423(Single Choice) In OSI reference model, OSI stands for
4424Select one:
4425a. Organization Standard Institute
4426b. Organization Standard Interconnection
4427c. Open System Internet
4428d. Open System Interconnection
4429Feedback
4430The correct answer is: Open System Interconnection
4431Question 329
4432Incorrect
4433Mark 0 out of 1
4434Not flagged
4435Question text
4436(Single Choice) The ( ) is the physical path along which a message passes.
4437Select one:
4438a. Message
4439b. Receiver
4440c. Protocol
4441d. Harddisk
4442e. Sender
4443Feedback
4444The correct answer is: Harddisk
4445Question 330
4446Correct
4447Mark 1 out of 1
4448Not flagged
4449Question text
4450(Single Choice) How many layers are included in OSI reference model?
4451Select one:
4452a. 7
4453b. 5
4454c. 6
4455d. 3
4456Feedback
4457The correct answer is: 7
4458Question 331
4459Incorrect
4460Mark 0 out of 1
4461Not flagged
4462Question text
4463(Single Choice) According to OSI reference model, when a packet is transmitted from upper layer to lower layer, the header will be
4464Select one:
4465a. Rearranged
4466b. Modified
4467c. Added
4468d. Removed
4469Feedback
4470The correct answer is: Added
4471Question 332
4472Incorrect
4473Mark 0 out of 1
4474Not flagged
4475Question text
4476(Single Choice) In OSI reference model, Transport Layer is located at layer
4477Select one:
4478a. 4
4479b. 6
4480c. 3
4481d. 7
4482Feedback
4483The correct answer is: 4
4484Question 333
4485Correct
4486Mark 1 out of 1
4487Not flagged
4488Question text
4489(Single Choice) In OSI reference model, which layer resides at the bottom?
4490Select one:
4491a. Physical layer
4492b. Data link layer
4493c. Application layer
4494d. Network layer
4495Feedback
4496The correct answer is: Physical layer
4497Question 334
4498Correct
4499Mark 1 out of 1
4500Not flagged
4501Question text
4502(Single Choice) According to OSI reference model, which layer defines mechanical, electrical, functional and procedural functions to realize data transmission?
4503Select one:
4504a. Data link layer
4505b. Physical layer
4506c. Network layer
4507d. Transport layer
4508Feedback
4509The correct answer is: Physical layer
4510Question 335
4511Correct
4512Mark 1 out of 1
4513Not flagged
4514Question text
4515(Single Choice) The PDU (Protocol Data Unit) that resides at physical layer is called
4516Select one:
4517a. Frame
4518b. Segment
4519c. Binary bit flow
4520d. Packet
4521Feedback
4522The correct answer is: Binary bit flow
4523Question 336
4524Correct
4525Mark 1 out of 1
4526Not flagged
4527Question text
4528(Single Choice) The PDU (Protocol Data Unit) that resides at data link layer is called
4529Select one:
4530a. Packet
4531b. Segment
4532c. Frame
4533d. Binary bit flow
4534Feedback
4535The correct answer is: Frame
4536Question 337
4537Partially correct
4538Mark 1 out of 1
4539Not flagged
4540Question text
4541(Multiple Choice) Which of the following protocols reside at data link layer?
4542Select one or more:
4543a. IP
4544b. IEEE 802.3
4545c. PPP
4546d. HDLC
4547Feedback
4548The correct answers are: PPP, HDLC, IEEE 802.3
4549Question 338
4550Incorrect
4551Mark 0 out of 1
4552Not flagged
4553Question text
4554(Multiple Choice) Data link layer has two sub-layers, they are
4555Select one or more:
4556a. PVC sub-layer
4557b. MAC sub-layer
4558c. VC sub-layer
4559d. LLC sub-layer
4560Feedback
4561The correct answers are: MAC sub-layer, LLC sub-layer
4562Question 339
4563Incorrect
4564Mark 0 out of 1
4565Not flagged
4566Question text
4567(Multiple Choice) Which of the following devices operate at data link layer?
4568Select one or more:
4569a. Bridge
4570b. Switch
4571c. Firewall
4572d. Hub
4573e. Router
4574Feedback
4575The correct answers are: Bridge, Switch
4576Question 340
4577Incorrect
4578Mark 0 out of 1
4579Not flagged
4580Question text
4581(Multiple Choice) Network topology type includes:
4582Select one or more:
4583a. Star
4584b. Bus
4585c. Mesh
4586d. Peer-to-peer
4587e. Tree
4588Feedback
4589The correct answers are: Bus, Star, Tree, Mesh
4590Question 341
4591Incorrect
4592Mark 0 out of 1
4593Not flagged
4594Question text
4595(Single Choice) Which of the following is the broadcast MAC address?
4596
4597Select one:
4598a. 00-00-00-00-00-00
4599b. 00-00-00-FF-FF-FF
4600c. FF-FF-FF-FF
4601d. FF-FF-FF-FF-FF-FF
4602Feedback
4603The correct answer is: FF-FF-FF-FF-FF-FF
4604Question 342
4605Incorrect
4606Mark 0 out of 1
4607Not flagged
4608Question text
4609(Multiple Choice) Which of the following protocols are related to WAN?
4610Select one or more:
4611a. PPP
4612b. UDP
4613c. Ethernet
4614d. HDLC
4615Feedback
4616The correct answers are: PPP, HDLC
4617Question 343
4618Incorrect
4619Mark 0 out of 1
4620Not flagged
4621Question text
4622(Single Choice) According to OSI reference model, router operates at
4623Select one:
4624a. Data link layer
4625b. Application layer
4626c. Physical layer
4627d. Network layer
4628Feedback
4629The correct answer is: Network layer
4630Question 344
4631Correct
4632Mark 1 out of 1
4633Not flagged
4634Question text
4635(Single Choice) The protocol data unit that resides at network layer is called
4636Select one:
4637a. Bit
4638b. Packet
4639c. Frame
4640d. Segment
4641Feedback
4642The correct answer is: Packet
4643Question 345
4644Correct
4645Mark 1 out of 1
4646Not flagged
4647Question text
4648(Single Choice) According to OSI reference model, which of the following statements about the function of network layer is correct?
4649Select one:
4650a. Control the forwarding and routing of data packet
4651b. Control transmission of bit flow
4652c. Error correction and flow control
4653d. Ensure the correctness of data transmission
4654Feedback
4655The correct answer is: Control the forwarding and routing of data packet
4656Question 346
4657Incorrect
4658Mark 0 out of 1
4659Not flagged
4660Question text
4661(Single Choice) The OSI reference model contains seven layers in two groups, namely, upper layer and lower layer. The upper layer starts from ( ) to Layer 7 and is also called host layer.
4662Select one:
4663a. Layer 2
4664b. Layer 4
4665c. Layer 5
4666d. Layer 3
4667Feedback
4668The correct answer is: Layer 5
4669Question 347
4670Incorrect
4671Mark 0 out of 1
4672Not flagged
4673Question text
4674(Single Choice) The upper layer of the OSI reference model ensures that data is transmitted properly. Which of the following at the upper layer is used to ensure this?
4675Select one:
4676a. Hardware
4677b. Software
4678c. Either software or hardware
4679d. Both hardware and software
4680Feedback
4681The correct answer is: Software
4682Question 348
4683Correct
4684Mark 1 out of 1
4685Not flagged
4686Question text
4687(Single Choice) In the OSI reference model, one layer is used to establish end-to-end connections between hosts and checks for bit errors before data is transmitted or retransmitted. Which of the following layers stands for this layer?
4688Select one:
4689a. Transport Layer
4690b. Data Link Layer
4691c. Physical Layer
4692d. Network Layer
4693Feedback
4694The correct answer is: Transport Layer
4695Question 349
4696Incorrect
4697Mark 0 out of 1
4698Not flagged
4699Question text
4700(Single Choice) In the OSI reference model, one layer defines the format of data to be sent to the Application Layer in addition to providing data encryption, data encoding, and data conversion. Which of the following layers stands for this layer?
4701Select one:
4702a. Network Layer
4703b. Session Layer
4704c. Presentation Layer
4705d. Application Layer
4706Feedback
4707The correct answer is: Presentation Layer
4708Question 350
4709Incorrect
4710Mark 0 out of 1
4711Not flagged
4712Question text
4713(Single Choice) In the OSI reference model, one layer converts bits into bytes and then into frames in addition to providing medium access. Which of the following layers stands for this layer?
4714Select one:
4715a. Network Layer
4716b. Application Layer
4717c. Session Layer
4718d. Data Link Layer
4719Feedback
4720The correct answer is: Data Link Layer
4721Question 351
4722Correct
4723Mark 1 out of 1
4724Not flagged
4725Question text
4726(Single Choice) Which of the following network topologies has the highest reliability?
4727Select one:
4728a. Bus
4729b. Ring
4730c. Star
4731d. Mesh
4732Feedback
4733The correct answer is: Mesh
4734Question 352
4735Incorrect
4736Mark 0 out of 1
4737Not flagged
4738Question text
4739(Single Choice) In the OSI reference model, one layer transmits bit streams between devices. Which of the following layers stands for this layer?
4740Select one:
4741a. Data Link Layer
4742b. Network Layer
4743c. Application Layer
4744d. Physical Layer
4745Feedback
4746The correct answer is: Physical Layer
4747Question 353
4748Partially correct
4749Mark 1 out of 1
4750Not flagged
4751Question text
4752(Multiple Choice) Which of the protocols are commonly used at the Data Link Layer of a WAN?
4753Select one or more:
4754a. 802.4
4755b. PPP
4756c. 802.2
4757d. HDLC
4758Feedback
4759The correct answers are: HDLC, PPP
4760Question 354
4761Partially correct
4762Mark 0 out of 1
4763Not flagged
4764Question text
4765(Multiple Choice) Which layers in OSI reference model belong to upper layer, also called as host layer and are responsible for data transmission and providing interface for user?
4766Select one or more:
4767a. Presentation layer
4768b. Session layer
4769c. Transport layer
4770d. Network layer
4771e. Application layer
4772f. Data link layer
4773Feedback
4774The correct answers are: Session layer, Presentation layer, Application layer
4775Question 355
4776Incorrect
4777Mark 0 out of 1
4778Not flagged
4779Question text
4780(Single Choice) According to OSI reference model, which of the following presents the correct layer sequence if packet goes from the bottom of the protocol stack to the top?
4781Select one:
4782a. Physical, Data link, Transport, Presentation, Network, Session, Application
4783b. Physical, Data link, Network, Transport, Presentation, Session, Application
4784c. Physical, Transport, Data link, Network, Presentation, Session, Application
4785d. Physical, Data link, Network, Transport, Session, Presentation, Application
4786Feedback
4787The correct answer is: Physical, Data link, Network, Transport, Session, Presentation, Application
4788Question 356
4789Partially correct
4790Mark 1 out of 1
4791Not flagged
4792Question text
4793(Multiple Choice) Which of the following are functions of data link layer?
4794Select one or more:
4795a. Network topology discovery
4796b. Routing
4797c. Physical medium access
4798d. Physical address definition
4799e. Error checking
4800Feedback
4801The correct answers are: Physical address definition, Network topology discovery, Physical medium access, Error checking
4802Question 357
4803Incorrect
4804Mark 0 out of 1
4805Not flagged
4806Question text
4807(Multiple Choice) Which of the following are the advantages of OSI reference model?
4808Select one or more:
4809a. Divide the complex network into simple components
4810b. Define standard interface to realize compatibility for different manufacturers
4811c. Make it impossible for network engineers to concentrate on design and development of module functions
4812d. Divide complicated network problem into simple problems to make it easier for learning and operation
4813Feedback
4814The correct answers are: Divide the complex network into simple components, Define standard interface to realize compatibility for different manufacturers, Divide complicated network problem into simple problems to make it easier for learning and operation
4815Question 358
4816Incorrect
4817Mark 0 out of 1
4818Not flagged
4819Question text
4820(Multiple Choice) Which of the following devices have functions of all seven layers of OSI reference model?
4821Select one or more:
4822a. Router
4823b. Network management server
4824c. Layer three switch
4825d. Email Server
4826Feedback
4827The correct answers are: Email Server, Network management server
4828Question 359
4829Correct
4830Mark 1 out of 1
4831Not flagged
4832Question text
4833(Multiple Choice) According to TCP/IP reference model, which of the following application layer protocols are based on TCP?
4834Select one or more:
4835a. SNMP
4836b. HTTP
4837c. TFTP
4838d. SMTP
4839e. FTP
4840Feedback
4841The correct answers are: HTTP, FTP, SMTP
4842Question 360
4843Incorrect
4844Mark 0 out of 1
4845Not flagged
4846Question text
4847(Single Choice) A MAC address has ( ) bits.
4848Select one:
4849a. 6
4850b. 12
4851c. 24
4852d. 48
4853Feedback
4854The correct answer is: 48
4855Question 361
4856Incorrect
4857Mark 0 out of 1
4858Not flagged
4859Question text
4860(Single Choice) MAC address consists of two parts: provider number and serial number. The first 24 bits of MAC address represents provider number, which of the following is the provider number of Huawei?
4861Select one:
4862a. 00e0fc
4863b. 0010fe
4864c. 000001
4865d. 0003cf
4866Feedback
4867The correct answer is: 00e0fc
4868Question 362
4869Incorrect
4870Mark 0 out of 1
4871Not flagged
4872Question text
4873(Multiple Choice) According to the scope of the geographical area,network type includes?
4874Select one or more:
4875a. WAN
4876b. LAN
4877c. Campus network
4878d. Enterprise network
4879Feedback
4880The correct answers are: LAN, WAN
4881Question 363
4882Incorrect
4883Mark 0 out of 1
4884Not flagged
4885Question text
4886(Single Choice) Hub work at ( ) layer.
4887Select one:
4888a. Network
4889b. Data link
4890c. Application
4891d. Physical
4892Feedback
4893The correct answer is: Physical
4894Question 364
4895Incorrect
4896Mark 0 out of 1
4897Not flagged
4898Question text
4899(Single Choice) According to OSI reference model, switch operates at ( ) layer.
4900Select one:
4901a. Application
4902b. Data link
4903c. Transport
4904d. Physical
4905Feedback
4906The correct answer is: Data link
4907Question 365
4908Correct
4909Mark 1 out of 1
4910Not flagged
4911Question text
4912(Single Choice) A switch receives entire data frame and then perform CRC checking,the frame is forwarded unless CRC checking fails. The switch mode for this switch is ?
4913Select one:
4914a. Fragment-free
4915b. Store-and-Forward
4916c. Cut-Through
4917d. Store-free
4918Feedback
4919The correct answer is: Store-and-Forward
4920Question 366
4921Partially correct
4922Mark 1 out of 1
4923Not flagged
4924Question text
4925(Multiple Choice) Which of the following are advantages of layer 2 switch compared with hub?
4926Select one or more:
4927a. Higher throughput
4928b. Higher port density
4929c. Increase the collision
4930d. Isolate collision domains
4931Feedback
4932The correct answers are: Higher throughput, Higher port density, Isolate collision domains
4933Question 367
4934Incorrect
4935Mark 0 out of 1
4936Not flagged
4937Question text
4938(Single Choice) ( ) combines “multiple” ports to form an aggregation group. It can be used to balance the traffic among member ports and improve the connection reliability.
4939Select one:
4940a. Port Aggregation
4941b. Port binding
4942c. Port load balance
4943d. Port group
4944Feedback
4945The correct answer is: Port Aggregation
4946Question 368
4947Incorrect
4948Mark 0 out of 1
4949Not flagged
4950Question text
4951(Single Choice) The data forwarding of the switch is based on
4952Select one:
4953a. Source MAC address
4954b. Destination IP address
4955c. Source IP address
4956d. Destination MAC address
4957Feedback
4958The correct answer is: Destination MAC address
4959Question 369
4960Partially correct
4961Mark 1 out of 1
4962Not flagged
4963Question text
4964(Multiple Choice) What describe the working principles of Ethernet Switches?
4965Select one or more:
4966a. Maintain MAC address table with aging mechanism
4967b. Layer 3 packet forwarding
4968c. Generate MAC address table according to the source MAC address of the received frame
4969d. Receive all the data frames in the network segment
4970Feedback
4971The correct answers are: Receive all the data frames in the network segment, Generate MAC address table according to the source MAC address of the received frame, Maintain MAC address table with aging mechanism
4972Question 370
4973Incorrect
4974Mark 0 out of 1
4975Not flagged
4976Question text
4977(Single Choice) IEEE 802.3 frame contains ( ) bits of DSAP field. It is used to indicate the upper layer protocols that are used.
4978Select one:
4979a. 16
4980b. 8
4981c. 4
4982d. 24
4983Feedback
4984The correct answer is: 8
4985Question 371
4986Correct
4987Mark 1 out of 1
4988Not flagged
4989Question text
4990(Single Choice) The last field of Ethernet frame is FCS (Frame Check Sequence). Its length is ( ) bytes.
4991Select one:
4992a. 2
4993b. 4
4994c. 8
4995d. 32
4996Feedback
4997The correct answer is: 4
4998Question 372
4999Incorrect
5000Mark 0 out of 1
5001Not flagged
5002Question text
5003(Multiple Choice) Which of the following statements about switching modes of LAN switch are true?
5004Select one or more:
5005a. Store-and-forward switching mode does not check for error frames
5006b. Fragment-free switching mode can check for error frames in the first 64 octets of the frame.
5007c. Store-and-forward switching mode discards the frame with length less than 64 octets.
5008d. Cut-through switching mode forwards a frame after it received the first 64 octets of the frame.
5009Feedback
5010The correct answers are: Fragment-free switching mode can check for error frames in the first 64 octets of the frame., Store-and-forward switching mode discards the frame with length less than 64 octets.
5011Question 373
5012Incorrect
5013Mark 0 out of 1
5014Not flagged
5015Question text
5016(Single Choice) Which organizations drafts RFC (Request for Comments)?
5017
5018Select one:
5019a. ITU-T
5020b. IETF
5021c. IEEE
5022d. ISO
5023Feedback
5024The correct answer is: IETF
5025Question 374
5026Incorrect
5027Mark 0 out of 1
5028Not flagged
5029Question text
5030(Multiple Choice) Port mirroring means to get a copy of the data and then send it to the monitoring device for data analysis and diagnosis. Port mirroring can be divided into
5031Select one or more:
5032a. Upper layer protocol based mirroring
5033b. Application based mirroring
5034c. Port based mirroring
5035d. Flow based mirroring
5036Feedback
5037The correct answers are: Port based mirroring, Flow based mirroring
5038Question 375
5039Incorrect
5040Mark 0 out of 1
5041Not flagged
5042Question text
5043(Single Choice) A MAC address consists of 48 bits and is generally expressed in 12-bit dotted decimal notation. What kind of address does a MAC address consisting of all 1s stand for?
5044Select one:
5045a. Multicast address
5046b. Virtual address
5047c. Broadcast address
5048d. Unicast address
5049Feedback
5050The correct answer is: Broadcast address
5051Question 376
5052Incorrect
5053Mark 0 out of 1
5054Not flagged
5055Question text
5056(Single Choice) Which of the following together with the MAC address of a general L2 switch determines the MAC address table of the L2 switch?
5057Select one:
5058a. RARP table
5059b. ARP table
5060c. Transmission medium
5061d. Port
5062Feedback
5063The correct answer is: Port
5064Question 377
5065Incorrect
5066Mark 0 out of 1
5067Not flagged
5068Question text
5069(Single Choice) An L2 switch checks the MAC address forwarding table before it forwards a packet. How does the L2 switch forward a packet that contains an address not listed in the MAC address forwarding table?
5070Select one:
5071a. Unicast
5072b. Searching for routes
5073c. Multicast
5074d. Broadcast
5075Feedback
5076The correct answer is: Broadcast
5077Question 378
5078Incorrect
5079Mark 0 out of 1
5080Not flagged
5081Question text
5082(Single Choice) The data field of standard Ethernet frame is ( ) bytes.
5083Select one:
5084a. 64-1518
5085b. 46-1500
5086c. 40-1500
5087d. 64-1500
5088Feedback
5089The correct answer is: 46-1500
5090Question 379
5091Incorrect
5092Mark 0 out of 1
5093Not flagged
5094Question text
5095(Single Choice) Which of the following commands can be used to set Ethernet port so that buffer will not overflow when congestion occurs?
5096Select one:
5097a. Flow-control
5098b. Flow control
5099c. Enable flow-control
5100d. Flow on
5101Feedback
5102The correct answer is: Flow-control
5103Question 380
5104Incorrect
5105Mark 0 out of 1
5106Not flagged
5107Question text
5108(Multiple Choice) When congestion occurs on port working in full duplex mode, switch will send "PAUSE" frame to the source to notify the source temporarily stop sending message for a short while. Which of the following circumstances can use the "PAUSE" method for flow control?
5109Select one or more:
5110a. The link between two switches
5111b. Congestion that occurs on a stable network
5112c. A pair of terminals
5113d. End to end flow control
5114e. A switch and a terminal
5115Feedback
5116The correct answers are: A pair of terminals, A switch and a terminal, The link between two switches
5117Question 381
5118Incorrect
5119Mark 0 out of 1
5120Not flagged
5121Question text
5122(Single Choice) In a destination MAC address, which bit of the address determines whether a frame is sent to a “single” station or a group of stations?
5123Select one:
5124a. 9
5125b. 7
5126c. 10
5127d. 8
5128Feedback
5129The correct answer is: 8
5130Question 382
5131Incorrect
5132Mark 0 out of 1
5133Not flagged
5134Question text
5135(Single Choice) Which of the following standard organizations has defined the protocol for LAN such as 802 series protocols?
5136Select one:
5137a. ETSI
5138b. ITU-T
5139c. IETF
5140d. IEEE
5141Feedback
5142The correct answer is: IEEE
5143Question 383
5144Incorrect
5145Mark 0 out of 1
5146Not flagged
5147Question text
5148(Single Choice) Which network topology has risk of whole network failure when a link is broken?
5149Select one:
5150a. Bus
5151b. Mesh
5152c. Star
5153d. Tree
5154Feedback
5155The correct answer is: Bus
5156Question 384
5157Incorrect
5158Mark 0 out of 1
5159Not flagged
5160Question text
5161(Multiple Choice) Which of the following network topologies consist of redundant links between any two nodes?
5162Select one or more:
5163a. Ring
5164b. Tree
5165c. Bus
5166d. Star
5167e. Mesh
5168Feedback
5169The correct answers are: Mesh, Ring
5170Question 385
5171Correct
5172Mark 1 out of 1
5173Not flagged
5174Question text
5175Frame Relay operates at data link layer, which of the following are the functions of Frame Relay?
5176Select one or more:
5177a. Transparent transmission of the frame
5178b. Retransmission
5179c. Statistical time division multiplexing
5180d. Error detection
5181Feedback
5182The correct answers are: Statistical time division multiplexing, Transparent transmission of the frame, Error detection
5183Question 386
5184Incorrect
5185Mark 0 out of 1
5186Not flagged
5187Question text
5188Which port on a UNI-side host or terminal is used to connect to frame relay network?
5189Select one:
5190a. DCE
5191b. NNI
5192c. DTE
5193d. None of the above
5194Feedback
5195The correct answer is: DTE
5196Question 387
5197Partially correct
5198Mark 0 out of 1
5199Not flagged
5200Question text
5201Which of the following parameters are defined in Frame Relay?
5202Select one or more:
5203a. BC (Committed Burst Size)
5204b. BE (Excess Burst Size)
5205c. CIR (Committed Information Rate)
5206d. TTL (Time to Live)
5207Feedback
5208The correct answers are: CIR (Committed Information Rate), BE (Excess Burst Size), BC (Committed Burst Size)
5209Question 388
5210Correct
5211Mark 1 out of 1
5212Not flagged
5213Question text
5214Which of the following commands is used to enable dynamic address mapping protocol in the interface encapsulated with Frame Relay?
5215Select one:
5216a. Reverse-arp
5217b. Fr inarp
5218c. Fr reverse-arp
5219d. Inverse-arp
5220Feedback
5221The correct answer is: Fr inarp
5222Question 389
5223Incorrect
5224Mark 0 out of 1
5225Not flagged
5226Question text
5227What does the number "30" in the following frame relay configuration command stand for?
5228
5229[RTB-Serial0\]fr map ip 10.1.1.2 30
5230
5231Select one:
5232a. Cost
5233b. DLCI
5234c. Weight
5235d. Subnet mask
5236Feedback
5237The correct answer is: DLCI
5238Question 390
5239Incorrect
5240Mark 0 out of 1
5241Not flagged
5242Question text
5243Which of the following parameters must be specified when configure static mapping for Frame Relay network?
5244Select one or more:
5245a. Local DLCI
5246b. Remote DLCI
5247c. Local network layer protocol address
5248d. Remote network layer protocol address
5249Feedback
5250The correct answers are: Local DLCI, Remote network layer protocol address
5251Question 391
5252Incorrect
5253Mark 0 out of 1
5254Not flagged
5255Question text
5256Which of the following DLCI numbers are used by Frame Relay LMI ?
5257Select one or more:
5258a. 1007
5259b. 16
5260c. 0
5261d. 1023
5262Feedback
5263The correct answers are: 0, 1023
5264Question 392
5265Incorrect
5266Mark 0 out of 1
5267Not flagged
5268Question text
5269The standards for Frame Relay encapsulation that Huawei router supports include ( ).
5270Select one or more:
5271a. ANSI
5272b. Q.933a
5273c. Nonstandard
5274d. IETF
5275Feedback
5276The correct answers are: IETF, Nonstandard
5277Question 393
5278Partially correct
5279Mark 1 out of 1
5280Not flagged
5281Question text
5282The distance vector routing protocol uses a split horizon mechanism. This makes a frame relay node connecting “multiple” peer devices together fail to transmit the route information to all peer devices. Which of the following methods can solve this problem?
5283Select one or more:
5284a. Disable the split horizon function and take into account the risk resulting from a loop.
5285b. Use “multiple” physical ports to connect “multiple” adjacent nodes together.
5286c. Use “multiple” logical sub-ports of a physical port.
5287d. Ignore the risk resulting from a routing loop because no routing loop occurs in any case.
5288Feedback
5289The correct answers are: Use “multiple” physical ports to connect “multiple” adjacent nodes together., Use “multiple” logical sub-ports of a physical port., Disable the split horizon function and take into account the risk resulting from a loop.
5290Question 394
5291Incorrect
5292Mark 0 out of 1
5293Not flagged
5294Question text
5295Which of the following statements about Frame Relay are true?
5296Select one or more:
5297a. In Frame Relay, flow control and error correction are implemented by higher-layer protocol and application services. This simplifies the protocols operation between devices.
5298b. Frame Relay is a kind of fast packet switching technology that uses the simplified method to transmit and switch the data unit on data link layer.
5299c. Frame Relay implements the functions of physical layer and network layer.
5300d. Frame Relay adopts virtual circuit technology thus network resources are fully utilized
5301e. High throughput, low delay, and suitable for burst data
5302Feedback
5303The correct answers are: Frame Relay is a kind of fast packet switching technology that uses the simplified method to transmit and switch the data unit on data link layer., In Frame Relay, flow control and error correction are implemented by higher-layer protocol and application services. This simplifies the protocols operation between devices., Frame Relay adopts virtual circuit technology thus network resources are fully utilized, High throughput, low delay, and suitable for burst data
5304Question 395
5305Incorrect
5306Mark 0 out of 1
5307Not flagged
5308Question text
5309On Frame Relay, VC (Virtual Circuit) is a logical circuit between two network devices. It can be divided into ( )
5310Select one or more:
5311a. SVC(Static Virtual Circuit)
5312b. TVC(temporary Virtual Circuit)
5313c. PVC(Permanent Virtual Circuit)
5314d. SVC(Switching Virtual Circuit)
5315Feedback
5316The correct answers are: PVC(Permanent Virtual Circuit), SVC(Switching Virtual Circuit)
5317Question 396
5318Incorrect
5319Mark 0 out of 1
5320Not flagged
5321Question text
5322A Frame Relay network consists of 12 routers, how many PVCs are built in a full mesh network?
5323
5324Select one:
5325a. 12
5326b. 6
5327c. 132
5328d. 66
5329Feedback
5330The correct answer is: 66
5331Question 397
5332Incorrect
5333Mark 0 out of 1
5334Not flagged
5335Question text
5336Frame Relay has congestion avoidance mechanism, which of the following fields are used for congestion avoidance?
5337Select one or more:
5338a. FECN
5339b. C/R
5340c. DE
5341d. BECN
5342e. DLCI
5343Feedback
5344The correct answers are: BECN, FECN, DE
5345Question 398
5346Incorrect
5347Mark 0 out of 1
5348Not flagged
5349Question text
5350When configure Frame Relay sub-interface on VRP platform, which of the following sub interfaces type are available?
5351Select one or more:
5352a. Broadcast
5353b. P2P
5354c. P2MP
5355d. NBMA
5356Feedback
5357The correct answers are: P2P, P2MP
5358Question 399
5359Incorrect
5360Mark 0 out of 1
5361Not flagged
5362Question text
5363What are functions of Inverse ARP?
5364Select one or more:
5365a. Find the hardware address of the device according to its IP address
5366b. Find the IP address of the remote device based on virtual circuit in Frame Relay network
5367c. Establish the mapping relationship between IP address of remote device and DLCI
5368d. Find the DLCI number of the connection
5369Feedback
5370The correct answers are: Find the IP address of the remote device based on virtual circuit in Frame Relay network, Establish the mapping relationship between IP address of remote device and DLCI
5371Question 400
5372Incorrect
5373Mark 0 out of 1
5374Not flagged
5375Question text
5376Frame Relay implements the function of ( )only.
5377
5378Select one:
5379a. Transport Layer and Session Layer
5380b. Data Link Layer and Network layer
5381c. Network layer and Transport Layer
5382d. Physical Layer and Data Link layer
5383Feedback
5384The correct answer is: Physical Layer and Data Link layer
5385Question 401
5386Incorrect
5387Mark 0 out of 1
5388Not flagged
5389Question text
5390What function does the NCP protocol can provide for a PPP connection?
5391
5392Select one:
5393a. Carrying of “multiple” Layer 3 protocols
5394b. Congestion control
5395c. User identifier authentication
5396d. Error detection
5397Feedback
5398The correct answer is: Carrying of “multiple” Layer 3 protocols
5399Question 402
5400Incorrect
5401Mark 0 out of 1
5402Not flagged
5403Question text
5404How many bytes does the Maximum Receive Unit (MRU) of PPP consist of by default?
5405
5406Select one:
5407a. 1500
5408b. 1518
5409c. 8096
5410d. 1024
5411Feedback
5412The correct answer is: 1500
5413Question 403
5414Incorrect
5415Mark 0 out of 1
5416Not flagged
5417Question text
5418Which of the following protocol is required in negotiation to compress the TCP/IP packet header for a PPP link?
5419
5420Select one:
5421a. LCP
5422b. CHAP
5423c. IPCP
5424d. PAP
5425Feedback
5426The correct answer is: IPCP
5427Question 404
5428Correct
5429Mark 1 out of 1
5430Not flagged
5431Question text
5432In the Internet, two technologies are widely used to access services and support both dial-up connections and connections through private lines. One of them is ADSL. What is the other technology?
5433
5434Select one:
5435a. WAN
5436b. LAN
5437c. MSTP
5438d. Metro
5439Feedback
5440The correct answer is: LAN
5441Question 405
5442Incorrect
5443Mark 0 out of 1
5444Not flagged
5445Question text
5446Which of the following components are defined by PPP protocol?
5447
5448Select one or more:
5449a. Link Control Protocol(LCP)
5450b. Data encryption
5451c. Network Control Protocol(NCP)
5452d. Data encapsulation
5453Feedback
5454The correct answers are: Data encapsulation, Link Control Protocol(LCP), Network Control Protocol(NCP)
5455Question 406
5456Incorrect
5457Mark 0 out of 1
5458Not flagged
5459Question text
5460PPP protocol consists of three types of protocols, they are ( ).
5461
5462Select one or more:
5463a. LCP(Link Control Protocol)
5464b. NCP(Network Control Protocol)
5465c. PPP extension protocol
5466d. PPPOE
5467Feedback
5468The correct answers are: LCP(Link Control Protocol), NCP(Network Control Protocol), PPP extension protocol
5469Question 407
5470Correct
5471Mark 1 out of 1
5472Not flagged
5473Question text
5474In the PPP protocol, which of the following encryption algorithms is used by CHAP?
5475
5476Select one:
5477a. AES
5478b. MD5
5479c. DES
5480d. None
5481Feedback
5482The correct answer is: MD5
5483Question 408
5484Incorrect
5485Mark 0 out of 1
5486Not flagged
5487Question text
5488Which of the following packets belong to CHAP authentication protocol?
5489
5490Select one or more:
5491a. Failure
5492b. Success
5493c. Challenge
5494d. Request
5495e. Response
5496Feedback
5497The correct answers are: Challenge, Response, Success, Failure
5498Question 409
5499Incorrect
5500Mark 0 out of 1
5501Not flagged
5502Question text
5503When you configure PPP authentication method as PAP, which of the following operations are necessary?
5504
5505Select one or more:
5506a. Configure PPP authentication method as CHAP
5507b. Add the user name and password of the authenticated party to local user list
5508c. Configure the encapsulation type of the interface connected to the peer as PPP.
5509d. On the authenticated party end, configure the user name and password that are sent to authenticator
5510Feedback
5511The correct answers are: Add the user name and password of the authenticated party to local user list, Configure the encapsulation type of the interface connected to the peer as PPP., On the authenticated party end, configure the user name and password that are sent to authenticator
5512Question 410
5513Partially correct
5514Mark 1 out of 1
5515Not flagged
5516Question text
5517Which of the following statements are correct about NAT?
5518
5519Select one or more:
5520a. NAT is used for translation between private network address and public network address.
5521b. NAT provides an effective way to solve the problem of insufficient IP address.
5522c. NAT is the abbreviation for "Network Address Translation"
5523d. When hosts inside a private network access the outside network, NAT is not needed at all.
5524Feedback
5525The correct answers are: NAT is the abbreviation for "Network Address Translation", NAT is used for translation between private network address and public network address., NAT provides an effective way to solve the problem of insufficient IP address.
5526Question 411
5527Incorrect
5528Mark 0 out of 1
5529Not flagged
5530Question text
5531Which of the following technologies can allow a host with IP address 10.0.0.1 to access the internet?
5532
5533Select one:
5534a. Dynamic route
5535b. Static route
5536c. Route import
5537d. NAT
5538Feedback
5539The correct answer is: NAT
5540Question 412
5541Incorrect
5542Mark 0 out of 1
5543Not flagged
5544Question text
5545Which of the following problems can be solved by NAT?
5546
5547Select one:
5548a. Protecting computers from viruses attacks
5549b. Saving Internet public address
5550c. Enhancing the security of data transmission
5551d. Improving the forwarding performance of routers
5552Feedback
5553The correct answer is: Saving Internet public address
5554Question 413
5555Correct
5556Mark 1 out of 1
5557Not flagged
5558Question text
5559What type of network addresses can be translated by NAT?
5560
5561Select one:
5562a. AppleTalk
5563b. IPX
5564c. DECNET
5565d. IP
5566Feedback
5567The correct answer is: IP
5568Question 414
5569Incorrect
5570Mark 0 out of 1
5571Not flagged
5572Question text
5573Which of the following problems can be solved by NAT?
5574
5575Select one:
5576a. Saving Internet public address
5577b. Enhancing the security of data transmission
5578c. Protecting computers from viruses attacks
5579d. Improving the forwarding performance of routers
5580Feedback
5581The correct answer is: Saving Internet public address
5582Question 415
5583Incorrect
5584Mark 0 out of 1
5585Not flagged
5586Question text
5587What type of network addresses can be translated by NAT?
5588
5589Select one:
5590a. DECNET
5591b. IPX
5592c. IP
5593d. AppleTalk
5594Feedback
5595The correct answer is: IP
5596Question 416
5597Correct
5598Mark 1 out of 1
5599Not flagged
5600Question text
5601Which of the following is a typical WWAN?
5602
5603Select one:
5604a. 4G network
5605b. All of the above
5606c. 2G network
5607d. 3G network
5608Feedback
5609The correct answer is: All of the above
5610Question 417
5611Incorrect
5612Mark 0 out of 1
5613Not flagged
5614Question text
5615Which of the following are the disadvantages of packet filtering firewall?
5616
5617Select one or more:
5618a. Simple configuration
5619b. As the complexity and length of ACL increase, its performance will degrade greatly
5620c. Low overhead, high processing speed
5621d. Complicated configuration and can result in a lot of problems due to mis-configuration
5622Feedback
5623The correct answers are: Complicated configuration and can result in a lot of problems due to mis-configuration, As the complexity and length of ACL increase, its performance will degrade greatly
5624Question 418
5625Incorrect
5626Mark 0 out of 1
5627Not flagged
5628Question text
5629Packet filtering firewall filters packet based on quintuplet. Which of the following are the components of quintuplet?
5630
5631Select one or more:
5632a. MAC address
5633b. Port number
5634c. Application program
5635d. Protocol number
5636e. IP address
5637Feedback
5638The correct answers are: IP address, Protocol number, Port number
5639Question 419
5640Incorrect
5641Mark 0 out of 1
5642Not flagged
5643Question text
5644What of the following statements is correct regarding access control list types and ranges?
5645
5646Select one:
5647a. An interface ACL value ranges 1000-2000
5648b. A layer 2 ACL value ranges from 4000-4999
5649c. A basic ACL value ranges from 1000-2999
5650d. An advanced ACL value ranges from 3000-4000
5651Feedback
5652The correct answer is: A layer 2 ACL value ranges from 4000-4999
5653Question 420
5654Incorrect
5655Mark 0 out of 1
5656Not flagged
5657Question text
5658Which of the following parameters is not used by Advanced ACL?
5659
5660Select one:
5661a. destination port number
5662b. time-range
5663c. protocol number
5664d. source interface
5665Feedback
5666The correct answer is: source interface
5667Question 421
5668Incorrect
5669Mark 0 out of 1
5670Not flagged
5671Question text
5672[RTA]acl 2002
5673
5674[RTA-acl-basic-2002]rule permit source 20.1.1.1 0
5675
5676[RTA-acl-basic-2002]rule permit source 30.1.1.1 0
5677
5678
5679Refer to the configuration output. A network administrator configured the ACL on router RTA, as shown. Which of the following statements regarding the rule order are correct?
5680
5681Select one or more:
5682a. The rule-number of the first rule is 1
5683b. The rule-number of the first rule is 5
5684c. The rule-number of the second rule is 2
5685d. The rule-number of the second rule is 10
5686Feedback
5687The correct answers are: The rule-number of the first rule is 5, The rule-number of the second rule is 10
5688Question 422
5689Incorrect
5690Mark 0 out of 1
5691Not flagged
5692Question text
5693Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed. What actions can be taken by the administrator to prevent further changes?
5694Select one or more:
5695a. The administrator should configure an ACL to allow only the administrator to manage the router.
5696b. The administrator should configure AAA to manage user authorization on the router.
5697c. The administrator should limit access by setting the login privilege of users to 0.
5698d. The administrator should configure port-security on the router
5699Feedback
5700The correct answers are: The administrator should limit access by setting the login privilege of users to 0., The administrator should configure AAA to manage user authorization on the router., The administrator should configure an ACL to allow only the administrator to manage the router.
5701Question 423
5702Partially correct
5703Mark 1 out of 1
5704Not flagged
5705Question text
5706Assume that a user is Telneting a router. In this case, which of the following statements are true?
5707Select one or more:
5708a. The router authenticates the user password.
5709b. The router does not authenticate the user.
5710c. The router may perform remote authentication based on AAA.
5711d. The router may perform local authentication based on AAA.
5712Feedback
5713The correct answers are: The router authenticates the user password., The router may perform local authentication based on AAA., The router may perform remote authentication based on AAA., The router does not authenticate the user.
5714Question 424
5715Incorrect
5716Mark 0 out of 1
5717Not flagged
5718Question text
5719An administrator currently manages AR2200 devices in the network through a single password, however the company wishes to introduce another two administrators and provide unique user credentials and privilege levels for telnet access to the network devices. What action can be taken?
5720Select one or more:
5721a. A public IP address must be assigned to each user for telnet access.
5722b. Each administrator must be assigned a privilege level.
5723c. Configure three users under the AAA-view, and assign each a different password.
5724d. The authentication mode must be changed to AAA.
5725Feedback
5726The correct answers are: Configure three users under the AAA-view, and assign each a different password., The authentication mode must be changed to AAA., Each administrator must be assigned a privilege level.
5727Question 425
5728Incorrect
5729Mark 0 out of 1
5730Not flagged
5731Question text
5732Which of the following authentication methods are supported for Telnet users?
5733Select one or more:
5734a. No authentication
5735b. AAA local authentication
5736c. MD5 authentication
5737d. Password authentication
5738Feedback
5739The correct answers are: Password authentication, AAA local authentication, No authentication
5740Question 426
5741Incorrect
5742Mark 0 out of 1
5743Not flagged
5744Question text
5745The users who log on the router through Telnet are not permitted to configure IP address. What is the possible reason?
5746Select one:
5747a. Communication failures occur between the user and the router.
5748b. Privilege level of Telnet is set incorrectly.
5749c. SNMP parameters are set incorrectly.
5750d. The authentication mode of Telnet is set incorrectly.
5751Feedback
5752The correct answer is: Privilege level of Telnet is set incorrectly.
5753Question 427
5754Partially correct
5755Mark 1 out of 1
5756Not flagged
5757Question text
5758A virtual private network (VPN) can be divided into different parts by layer. What are these parts?
5759
5760Select one or more:
5761a. L2VPN
5762b. GRE VPN
5763c. VPDN
5764d. L3VPN
5765Feedback
5766The correct answers are: L2VPN, L3VPN, VPDN
5767Question 428
5768Correct
5769Mark 1 out of 1
5770Not flagged
5771Question text
5772If AH and ESP are both required to protect data streams between IPsec peers, how many Security Associations (SA) are required in total?
5773Select one:
5774a. 3
5775b. 4
5776c. 1
5777d. 2
5778Feedback
5779The correct answer is: 4
5780Question 429
5781Incorrect
5782Mark 0 out of 1
5783Not flagged
5784Question text
5785Two routers establish an IPsec tunnel, which of the following does not need to be the same on both peering devices?
5786Select one:
5787a. Transform mode
5788b. Encapsulation mode
5789c. authentication algorithm
5790d. Proposal name
5791Feedback
5792The correct answer is: Proposal name
5793Question 430
5794Incorrect
5795Mark 0 out of 1
5796Not flagged
5797Question text
5798The data is transmitted using IPsec tunnel mode. The fields of which headers will be authenticated?
5799Select one:
5800a. AH, Origin IP, TCP and Data
5801b. Origin IP, TCP and Data
5802c. TCP and Data
5803d. The fields of all headers
5804Feedback
5805The correct answer is: AH, Origin IP, TCP and Data
5806Question 431
5807Correct
5808Mark 1 out of 1
5809Not flagged
5810Question text
5811IPsec VPN uses ESP to encrypt which fields ?
5812
5813Select one:
5814a. ESP, TCP, Data, ESP Trailer and ESP Auth
5815b. ESP, TCP and Data
5816c. TCP, Data and ESP Trailer
5817d. ESP, TCP, Data and ESP Trailer
5818Feedback
5819The correct answer is: TCP, Data and ESP Trailer
5820Question 432
5821Incorrect
5822Mark 0 out of 1
5823Not flagged
5824Question text
5825RTA and RTB have established a GRE tunnel, but only RTA has enabled the keepalive function. When RTB receive a keepalive message from RTA, how will RTB respond?
5826
5827Select one:
5828a. RTB willl record receipt of the keepalive message but won’t reply
5829b. RTB will discard the keepalive message.
5830c. RTB will send a keepalive reply and begin to actively send keepalive messages.
5831d. RTB will send a keepalive in response.
5832Feedback
5833The correct answer is: RTB will send a keepalive in response.
5834Question 433
5835Incorrect
5836Mark 0 out of 1
5837Not flagged
5838Question text
5839Two hosts communicate through a GRE tunnel. When the GRE tunnel is up, the network administrator configures a static route on RTA to route packets to Host B. Which of the following commands will achieve this?
5840
5841Select one:
5842a. ip route-static 10.1.2.0 24 GigabitEthernet0/0/1
5843b. ip route-static 10.1.2.0 24 200.2.2.1
5844c. ip route-static 10.1.2.0 24 200.1.1.1
5845d. ip route-static 10.1.2.0 24 tunnel 0/0/1
5846Feedback
5847The correct answer is: ip route-static 10.1.2.0 24 tunnel 0/0/1
5848Question 434
5849Correct
5850Mark 1 out of 1
5851Not flagged
5852Question text
5853which version of SNMP supports data encryption?
5854
5855Select one:
5856a. SNMPv2c
5857b. SNMPv1
5858c. SNMPv3
5859d. SNMPv2
5860Feedback
5861The correct answer is: SNMPv3
5862Question 435
5863Correct
5864Mark 1 out of 1
5865Not flagged
5866Question text
5867Which of the following statements regarding traps in SNMP is correct?
5868
5869Select one:
5870a. Traps are transmitted using TCP to destination port number 161.
5871b. Traps are transmitted using UDP to destination port number 161.
5872c. Traps are transmitted using UDP to destination port number 162.
5873d. Traps are transmitted using TCP to destination port number 162.
5874Feedback
5875The correct answer is: Traps are transmitted using UDP to destination port number 162.
5876Question 436
5877Incorrect
5878Mark 0 out of 1
5879Not flagged
5880Question text
5881The Network Management Station uses SNMP to manage devices, which SNMP message is sent when an SNMP registered abnormal event occurs?
5882
5883Select one:
5884a. trap
5885b. set-request
5886c. get-response
5887d. get-request
5888Feedback
5889The correct answer is: trap
5890Question 437
5891Incorrect
5892Mark 0 out of 1
5893Not flagged
5894Question text
5895eSight supports which of the following SNMP versions in order to manage devices?
5896Select one or more:
5897a. SNPMv2
5898b. SNPMv2c
5899c. SNPMv1
5900d. SNPMv3
5901Feedback
5902The correct answers are: SNPMv1, SNPMv2c, SNPMv3
5903Question 438
5904Correct
5905Mark 1 out of 1
5906Not flagged
5907Question text
5908Which of the following descriptions regarding eSight is not correct?
5909
5910Select one:
5911a. eSight supports the backup of configuration files and network traffic analysis.
5912b. eSight supports only Huawei devices
5913c. eSight is used to monitor and manage enterprise networks.
5914d. eSight supports WLAN management and monitoring of hotspot coverage.
5915Feedback
5916The correct answer is: eSight supports only Huawei devices
5917Question 439
5918Partially correct
5919Mark 1 out of 1
5920Not flagged
5921Question text
5922(Multiple Choice) A typical IP Telecommunication Network include
5923Select one or more:
5924a. Convergence Network
5925b. Metropolitan Area Network
5926c. Access Network
5927d. Backbone Network
5928Feedback
5929The correct answers are: Backbone Network, Metropolitan Area Network, Access Network
5930Question 440
5931Correct
5932Mark 1 out of 1
5933Not flagged
5934Question text
5935(Single Choice) The default mask of class B address is
5936Select one:
5937a. 255.255.0.0
5938b. 255.0.0.0
5939c. 255.225.255.255
5940d. 255.255.255.0
5941Feedback
5942The correct answer is: 255.255.0.0
5943Question 441
5944Incorrect
5945Mark 0 out of 1
5946Not flagged
5947Question text
5948(Single Choice) How many hosts are available for a class B IP address?
5949Select one:
5950a. 16K
5951b. 2M
5952c. 64K
5953d. 254
5954Feedback
5955The correct answer is: 64K
5956Question 442
5957Incorrect
5958Mark 0 out of 1
5959Not flagged
5960Question text
5961(Single Choice) The network address of 125.3.54.56 with default subnet mask is
5962Select one:
5963a. 125.3.54.32
5964b. 125.3.54.0
5965c. 125.3.0.0
5966d. 125.0.0.0
5967Feedback
5968The correct answer is: 125.0.0.0
5969Question 443
5970Correct
5971Mark 1 out of 1
5972Not flagged
5973Question text
5974(Single Choice) Which of the following class has the first octet beginning with "1110"?
5975Select one:
5976a. Class C
5977b. Class D
5978c. Class B
5979d. Class A
5980Feedback
5981The correct answer is: Class D
5982Question 444
5983Incorrect
5984Mark 0 out of 1
5985Not flagged
5986Question text
5987(Single Choice) Which of the following is reserved for loopback address?
5988Select one:
5989a. 130.0.0.0
5990b. 164.0.0.0
5991c. 200.0.0.0
5992d. 127.0.0.0
5993Feedback
5994The correct answer is: 127.0.0.0
5995Question 445
5996Incorrect
5997Mark 0 out of 1
5998Not flagged
5999Question text
6000(Single Choice) In TCP/IP protocol, what is the decimal range of the first octet of class A address?
6001Select one:
6002a. 0---127
6003b. 1---127
6004c. 0---126
6005d. 1---126
6006Feedback
6007The correct answer is: 1---126
6008Question 446
6009Correct
6010Mark 1 out of 1
6011Not flagged
6012Question text
6013(Single Choice) For a traditional class C network without sub-netting, how many hosts are available at most?
6014Select one:
6015a. 1024
6016b. 65025
6017c. 254
6018d. 48
6019Feedback
6020The correct answer is: 254
6021Question 447
6022Correct
6023Mark 1 out of 1
6024Not flagged
6025Question text
6026(Single Choice) The function of network number in IP address is
6027Select one:
6028a. Specify the network by which devices can communicate with each other
6029b. Specify the network to which hosts belong
6030c. Identify the host in the network
6031d. Specify the network node which belongs to subnet address
6032Feedback
6033The correct answer is: Specify the network to which hosts belong
6034Question 448
6035Correct
6036Mark 1 out of 1
6037Not flagged
6038Question text
6039(Single Choice) Which of the following multicast address represents all routers and hosts of the subnet?
6040Select one:
6041a. 224.0.0.2
6042b. 224.0.0.1
6043c. 224.0.0.9
6044d. 224.0.0.3
6045Feedback
6046The correct answer is: 224.0.0.1
6047Question 449
6048Incorrect
6049Mark 0 out of 1
6050Not flagged
6051Question text
6052(Single Choice) Which of the following multicast address represents all routers of the subnet?
6053Select one:
6054a. 224.0.0.2
6055b. 224.0.0.1
6056c. 224.0.0.3
6057d. 224.0.0.9
6058Feedback
6059The correct answer is: 224.0.0.2
6060Question 450
6061Incorrect
6062Mark 0 out of 1
6063Not flagged
6064Question text
6065(Multiple Choice) Which of the following networks are parts of a complete IP network?
6066Select one or more:
6067a. Backbone network
6068b. Metropolitan area network (MAN)
6069c. Access network
6070d. Mobile network
6071Feedback
6072The correct answers are: Backbone network, Metropolitan area network (MAN), Access network
6073Question 451
6074Correct
6075Mark 1 out of 1
6076Not flagged
6077Question text
6078(Single Choice) An IP address whose network portion and host portion are all zero represents
6079Select one:
6080a. Broadcast address of all the network nodes
6081b. Broadcast address of the specified network segment
6082c. All networks
6083d. Network address
6084Feedback
6085The correct answer is: All networks
6086Question 452
6087Incorrect
6088Mark 0 out of 1
6089Not flagged
6090Question text
6091(Single Choice) Which class does IP address 190.233.27.13 belong to?
6092Select one:
6093a. C
6094b. A
6095c. B
6096d. D
6097Feedback
6098The correct answer is: B
6099Question 453
6100Incorrect
6101Mark 0 out of 1
6102Not flagged
6103Question text
6104(Single Choice) The network address of the IP 190.233.27.13/16 is
6105Select one:
6106a. 190.233.27.0
6107b. 190.233.27.1
6108c. 190.233.0.0
6109d. 190.0.0.0
6110Feedback
6111The correct answer is: 190.233.0.0
6112Question 454
6113Incorrect
6114Mark 0 out of 1
6115Not flagged
6116Question text
6117(Single Choice) Which of the following class address are multicast address ?
6118Select one:
6119a. Class A
6120b. Class D
6121c. Class E
6122d. Class B
6123Feedback
6124The correct answer is: Class D
6125Question 455
6126Incorrect
6127Mark 0 out of 1
6128Not flagged
6129Question text
6130(Single Choice) The default mask length of the IP address 219.25.23.56 is
6131Select one:
6132a. 8
6133b. 32
6134c. 24
6135d. 16
6136Feedback
6137The correct answer is: 24
6138Question 456
6139Incorrect
6140Mark 0 out of 1
6141Not flagged
6142Question text
6143(Single Choice) Which part of the IP address is used for sub-netting?
6144Select one:
6145a. Default subnet mask
6146b. Network address
6147c. Subnet network segment
6148d. Host address
6149Feedback
6150The correct answer is: Host address
6151Question 457
6152Incorrect
6153Mark 0 out of 1
6154Not flagged
6155Question text
6156(Single Choice) For a class B address, how many bits at most can be used for sub-netting?
6157Select one:
6158a. 16
6159b. 22
6160c. 8
6161d. 14
6162Feedback
6163The correct answer is: 14
6164Question 458
6165Correct
6166Mark 1 out of 1
6167Not flagged
6168Question text
6169(Single Choice) The subnet mask of a class A address is 255.255.240.0. How many bits are used for sub-netting?
6170Select one:
6171a. 12
6172b. 9
6173c. 4
6174d. 5
6175Feedback
6176The correct answer is: 12
6177Question 459
6178Incorrect
6179Mark 0 out of 1
6180Not flagged
6181Question text
6182(Single Choice) For a class C IP address, how many bits at most can be used for sub-netting?
6183Select one:
6184a. 12
6185b. 8
6186c. 14
6187d. 6
6188Feedback
6189The correct answer is: 6
6190Question 460
6191Incorrect
6192Mark 0 out of 1
6193Not flagged
6194Question text
6195(Single Choice) How many hosts are available in the network 154.27.0.0 without sub-netting?
6196Select one:
6197a. 254
6198b. 1024
6199c. 65,534
6200d. 16,777,206
6201Feedback
6202The correct answer is: 65,534
6203Question 461
6204Incorrect
6205Mark 0 out of 1
6206Not flagged
6207Question text
6208Routers are a type of computer equipment for network interconnections. Which layer of the OSI reference model does a router work at?
6209Select one:
6210a. Session Layer
6211b. Network Layer
6212c. Application Layer
6213d. Data Link Layer
6214Feedback
6215The correct answer is: Network Layer
6216Question 462
6217Incorrect
6218Mark 0 out of 1
6219Not flagged
6220Question text
6221(Single Choice) What is the abbreviation of VLSM?
6222Select one:
6223a. Very Long/Shortest Masking
6224b. Variable Length Shortest Masking
6225c. Variable Length Subnet Masking
6226d. Variable Long Subnet Masking
6227Feedback
6228The correct answer is: Variable Length Subnet Masking
6229Question 463
6230Incorrect
6231Mark 0 out of 1
6232Not flagged
6233Question text
6234(Single Choice) How many hosts are available for the network segment 192.168.2.16/28?
6235Select one:
6236a. 16
6237b. 14
6238c. 8
6239d. 7
6240e. 15
6241Feedback
6242The correct answer is: 14
6243Question 464
6244Incorrect
6245Mark 0 out of 1
6246Not flagged
6247Question text
6248(Single Choice) What is the binary format for subnet mask 255.255.192.0?
6249Select one:
6250a. 11111111 11110000 00000000 00000000
6251b. 11111111 11111111 00001111 00000000
6252c. 11111111 11111111 11111111 00000000
6253d. 11111111 11111111 11000000 00000000
6254Feedback
6255The correct answer is: 11111111 11111111 11000000 00000000
6256Question 465
6257Incorrect
6258Mark 0 out of 1
6259Not flagged
6260Question text
6261(Single Choice) What is the decimal value for binary 11001011?
6262Select one:
6263a. 171
6264b. 193
6265c. 207
6266d. 203
6267Feedback
6268The correct answer is: 203
6269Question 466
6270Partially correct
6271Mark 1 out of 1
6272Not flagged
6273Question text
6274(Multiple Choice) Which of the following route entries can be aggregate into 10.0.0.24/29?
6275Select one or more:
6276a. 10.0.0.26/30
6277b. 10.0.0.25/30
6278c. 10.0.0.22/30
6279d. 10.0.0.23/30
6280Feedback
6281The correct answers are: 10.0.0.25/30, 10.0.0.26/30
6282Question 467
6283Incorrect
6284Mark 0 out of 1
6285Not flagged
6286Question text
6287(Multiple Choice) An IPv4 address consists of 32 bits and is generally expressed in dotted decimal notation, for example, 11.110.96.132. Such an IP address can also be expressed in other notations. Which are they?
6288Select one or more:
6289a. 0b.6e.60.84
6290b. 0.b.6.e.6.0.8.4
6291c. 00001011.01101110.01100000.10000100
6292d. 0.1011.0110.1110.0110.0.1000.0100
6293Feedback
6294The correct answers are: 00001011.01101110.01100000.10000100, 0b.6e.60.84
6295Question 468
6296Incorrect
6297Mark 0 out of 1
6298Not flagged
6299Question text
6300(Single Choice) In one IP address, the network part is constant and the host part consists of all 1s. What does this IP address stand for?
6301Select one:
6302a. Network address
6303b. Broadcast address of a specific network segment
6304c. All the networks
6305d. Broadcast addresses of all the nodes in the specified network
6306Feedback
6307The correct answer is: Broadcast address of a specific network segment
6308Question 469
6309Incorrect
6310Mark 0 out of 1
6311Not flagged
6312Question text
6313(Single Choice) When the host field of an IP address contains n bits, how many host addresses are available in this network?
6314Select one:
6315a. 2n-1
6316b. 2n
6317c. 2n-1
6318d. 2n-2
6319Feedback
6320The correct answer is: 2n-2
6321Question 470
6322Incorrect
6323Mark 0 out of 1
6324Not flagged
6325Question text
6326(Single Choice) The first three octets of a Class C IP address represent a network. Which of the following binary numbers does the first byte of the three octets start with?
6327Select one:
6328a. 100
6329b. 101
6330c. 110
6331d. 10
6332Feedback
6333The correct answer is: 110
6334Question 471
6335Correct
6336Mark 1 out of 1
6337Not flagged
6338Question text
6339(Single Choice) Which of the following is the feature of IP protocol?
6340Select one:
6341a. Unreliable and connection oriented
6342b. Unreliable and connectionless oriented
6343c. Reliable and connectionless oriented
6344d. Reliable and connection oriented
6345Feedback
6346The correct answer is: Unreliable and connectionless oriented
6347Question 472
6348Incorrect
6349Mark 0 out of 1
6350Not flagged
6351Question text
6352(Single Choice) Which of the following represents the subnet mask of the 192.168.1.7/28 IP address?
6353Select one:
6354a. 255.255.255.252
6355b. 255.255.255.224
6356c. 255.255.255.240
6357d. 255.255.255.248
6358Feedback
6359The correct answer is: 255.255.255.240
6360Question 473
6361Correct
6362Mark 1 out of 1
6363Not flagged
6364Question text
6365(Single Choice) Which of the following represents the network IP address corresponding to the 192.168.1.7/28 IP address?
6366Select one:
6367a. 192.168.1.7
6368b. 192.168.1.4
6369c. 192.168.1.0
6370d. 192.168.1.6
6371Feedback
6372The correct answer is: 192.168.1.0
6373Question 474
6374Incorrect
6375Mark 0 out of 1
6376Not flagged
6377Question text
6378(Multiple Choice) Which of the following statements regarding the address space of IP sub-network are true?
6379Select one or more:
6380a. Since IP address borrowing method can be used to preserve IP address, the size of the sub-network required may be smaller than actual requirement.
6381b. The size of the sub-network should be integral power of two make it easier for the implementation of various policies.
6382c. All of the statements above are correct but none of them can be used in actual network implementation.
6383d. Address space of sub-network must meet the practical requirements. At the same time, redundancy is needed to ensure the extensibility
6384Feedback
6385The correct answers are: Address space of sub-network must meet the practical requirements. At the same time, redundancy is needed to ensure the extensibility, The size of the sub-network should be integral power of two make it easier for the implementation of various policies.
6386Question 475
6387Correct
6388Mark 1 out of 1
6389Not flagged
6390Question text
6391(Single Choice) What's the broadcast address for host address 101.11.100.100/22?
6392Select one:
6393a. 101.11.103.255
6394b. 101.255.255.255
6395c. 101.11.101.255
6396d. 101.11.100.255
6397Feedback
6398The correct answer is: 101.11.103.255
6399Question 476
6400Correct
6401Mark 1 out of 1
6402Not flagged
6403Question text
6404(Single Choice) Which of the following is a valid IP host address?
6405Select one:
6406a. 225.23.200.9
6407b. 192.240.150.255/24
6408c. 1.255.255.2/24
6409d. 127.2.3.5
6410Feedback
6411The correct answer is: 1.255.255.2/24
6412Question 477
6413Incorrect
6414Mark 0 out of 1
6415Not flagged
6416Question text
6417(Single Choice) According to the OSI reference model, network layer address consistes of ?
6418Select one:
6419a. Network address and network mask
6420b. Network address and host address
6421c. Host address and network mask
6422d. Host address and host number
6423Feedback
6424The correct answer is: Network address and host address
6425Question 478
6426Correct
6427Mark 1 out of 1
6428Not flagged
6429Question text
6430(Single Choice) Which of the following statements about IP host address is true?
6431Select one:
6432a. IP host address can be either all one or all zero
6433b. Network portion can be neither all one nor all zero
6434c. Network portion can be either all one or all zero
6435d. Host portion can be either all one or all zero
6436Feedback
6437The correct answer is: Network portion can be neither all one nor all zero
6438Question 479
6439Incorrect
6440Mark 0 out of 1
6441Not flagged
6442Question text
6443(Single Choice) Which of the following is the correct host IP address?
6444Select one:
6445a. 224.0.0.5/24
6446b. 202.112.5.0/24
6447c. 127.32.5.62/8
6448d. 162.111.111.111/16
6449Feedback
6450The correct answer is: 162.111.111.111/16
6451Question 480
6452Incorrect
6453Mark 0 out of 1
6454Not flagged
6455Question text
6456(Single Choice) Which of the following situations would employ dedicated host address as the source IP and destination IP for the data packets?
6457Select one:
6458a. Multicast
6459b. Directcast
6460c. Broadcast
6461d. Unicast
6462Feedback
6463The correct answer is: Unicast
6464Question 481
6465Incorrect
6466Mark 0 out of 1
6467Not flagged
6468Question text
6469(Single Choice) The subnet mask of the network segment 175.25.8.0/19 is
6470Select one:
6471a. 255.255.0.0
6472b. 255.255.224.0
6473c. The subnet mask varies according to the class of IP address
6474d. 255.255.24.0
6475Feedback
6476The correct answer is: 255.255.224.0
6477Question 482
6478Correct
6479Mark 1 out of 1
6480Not flagged
6481Question text
6482(Single Choice) The default subnet mask of the class D IP address is ( ) bits.
6483Select one:
6484a. 16
6485b. Class D address does not have the subnet mask
6486c. 24
6487d. 8
6488Feedback
6489The correct answer is: Class D address does not have the subnet mask
6490Question 483
6491Incorrect
6492Mark 0 out of 1
6493Not flagged
6494Question text
6495(Multiple Choice) In general, IP address consists of
6496Select one or more:
6497a. Network address
6498b. Link address
6499c. Logic address
6500d. Host address
6501Feedback
6502The correct answers are: Network address, Host address
6503Question 484
6504Correct
6505Mark 1 out of 1
6506Not flagged
6507Question text
6508(Single Choice) 172.16.10.32/24 is
6509Select one:
6510a. Broadcast address
6511b. Network address
6512c. Host address
6513d. Multicast address
6514Feedback
6515The correct answer is: Host address
6516Question 485
6517Correct
6518Mark 1 out of 1
6519Not flagged
6520Question text
6521(Single Choice) The mask of a class C subnet is 255.255.255.224. How many bits are available for sub-netting? How many subnets are available? How many hosts are available for each subnet?
6522Select one:
6523a. 3, 8, 30
6524b. 2, 2, 62
6525c. 4, 14, 14
6526d. 5, 30, 6
6527Feedback
6528The correct answer is: 3, 8, 30
6529Question 486
6530Incorrect
6531Mark 0 out of 1
6532Not flagged
6533Question text
6534(Single Choice) What's the broadcast address for host address 101.11.100.100/22?
6535Select one:
6536a. 10.1.63.255
6537b. 10.1.128.255
6538c. 10.1.126.255
6539d. 10.1.127.255
6540Feedback
6541The correct answer is: 10.1.127.255
6542Question 487
6543Correct
6544Mark 1 out of 1
6545Not flagged
6546Question text
6547(Single Choice) What's the broadcast address for network segment 201.1.0.0/21?
6548Select one:
6549a. 201.0.0.255
6550b. 201.1.0.255
6551c. 201.1.7.255
6552d. 201.1.1.255
6553Feedback
6554The correct answer is: 201.1.7.255
6555Question 488
6556Correct
6557Mark 1 out of 1
6558Not flagged
6559Question text
6560(Single Choice) Which of the following is the most appropriate aggregation for network segments 172.128.12.0, 172.128.17.0, 172.128.18.0, and 172.128.19.0?
6561Select one:
6562a. 172.128.20.0/20
6563b. 172.128.0.0/19
6564c. 172.128.0.0/21
6565d. 172.128.12.0/22
6566Feedback
6567The correct answer is: 172.128.0.0/19
6568Question 489
6569Incorrect
6570Mark 0 out of 1
6571Not flagged
6572Question text
6573(Single Choice) Which of the following aggregation by CIDR technology is correct?
6574Select one:
6575a. 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/22
6576b. 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/20
6577c. 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/21
6578d. 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/19
6579Feedback
6580The correct answer is: 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/20
6581Question 490
6582Incorrect
6583Mark 0 out of 1
6584Not flagged
6585Question text
6586(Single Choice) Which of the following is the most appropriate aggregation for network segments 172.168.16.0, 172.168.17.0, 172.168.18.0, and 172.168.19.0?
6587Select one:
6588a. 172.168.17.0/21
6589b. 172.168.16.0/22
6590c. 172.168.16.0/21
6591d. 172.168.20.0/20
6592Feedback
6593The correct answer is: 172.168.16.0/22
6594Question 491
6595Incorrect
6596Mark 0 out of 1
6597Not flagged
6598Question text
6599(Multiple Choice) Which address categories does the 220.32.59.31/27 IP address belong to?
6600Select one or more:
6601a. Invalid address
6602b. Private address
6603c. Broadcast address in a specific network segment
6604d. Class C address
6605Feedback
6606The correct answers are: Class C address, Broadcast address in a specific network segment
6607Question 492
6608Incorrect
6609Mark 0 out of 1
6610Not flagged
6611Question text
6612(Single Choice) When the subnet mask of a network is 255.240.0.0, which of the following is a valid Class A host address?
6613Select one:
6614a. 12.32.59.160
6615b. 129.32.59.17
6616c. 220.32.59.128
6617d. 158.32.59.64
6618Feedback
6619The correct answer is: 12.32.59.160
6620Question 493
6621Incorrect
6622Mark 0 out of 1
6623Not flagged
6624Question text
6625(Single Choice) Interconnected devices of a network are a combination of hardware and software. Which layer are these devices generally located at?
6626Select one:
6627a. Layer 4
6628b. Layer 3
6629c. Layer 5
6630d. Layer 2
6631Feedback
6632The correct answer is: Layer 3
6633Question 494
6634Incorrect
6635Mark 0 out of 1
6636Not flagged
6637Question text
6638(Single Choice) When a Class C subnet mask is 255.255.255.192, how many subnets does this network consist of and how many hosts does each subnet consist of?
6639Select one:
6640a. 16, 14
6641b. 8, 62
6642c. 32, 14
6643d. 4, 62
6644Feedback
6645The correct answer is: 4, 62
6646Question 495
6647Incorrect
6648Mark 0 out of 1
6649Not flagged
6650Question text
6651(Single Choice) For a class B network, if 5 bits are used for sub-netting, how many hosts are available in a “single” subnet?
6652Select one:
6653a. 512
6654b. 510
6655c. 1022
6656d. 2046
6657Feedback
6658The correct answer is: 2046
6659Question 496
6660Incorrect
6661Mark 0 out of 1
6662Not flagged
6663Question text
6664(Single Choice) A class C network is divided into 9 subnets in which 16 hosts at most are available for each subnet. Which of the following is an appropriate subnet mask?
6665Select one:
6666a. 255.255.255.240
6667b. 255.255.224.0
6668c. 255.255.255.224
6669d. No appropriate subnet mask is available
6670Feedback
6671The correct answer is: No appropriate subnet mask is available
6672Question 497
6673Incorrect
6674Mark 0 out of 1
6675Not flagged
6676Question text
6677(Single Choice) What is the numerically nearest subnet for the network 172.168.16.0 with mask 255.255.252.0?
6678Select one:
6679a. 172.168.20.0
6680b. 172.168.24.0
6681c. 172.168.48.0
6682d. 172.168.32.0
6683Feedback
6684The correct answer is: 172.168.20.0
6685Question 498
6686Incorrect
6687Mark 0 out of 1
6688Not flagged
6689Question text
6690(Single Choice) For an IP address 192.168.12.43, its mask is 255.255.255.128, its network address is ( ), and its broadcast address is ( )
6691Select one:
6692a. 192.169.12.128 255.255.255.128
6693b. 192.168.0.0 255.255.255.255
6694c. 192.168.12.43 255.255.255.128
6695d. 192.168.12.32 192.168.12.127
6696e. 192.168.12.0 192.168.12.127
6697Feedback
6698The correct answer is: 192.168.12.0 192.168.12.127
6699Question 499
6700Correct
6701Mark 1 out of 1
6702Not flagged
6703Question text
6704(Single Choice) For a class B IP network 172.16.0.0, its mask is 255.255.255.192. How many subnets are available and how many hosts are available for each subnet?
6705Select one:
6706a. 1022, 62
6707b. 512, 126
6708c. 1024, 62
6709d. 256, 254
6710e. 192, 254
6711Feedback
6712The correct answer is: 1024, 62
6713Question 500
6714Incorrect
6715Mark 0 out of 1
6716Not flagged
6717Question text
6718(Single Choice) What are the network address and the broadcast address for the network segment that the IP address 190.5.4.2/22 belongs to?
6719Select one:
6720a. 190.5.4.0, 190.5.4.255
6721b. 190.5.4.0, 190.5.7.255
6722c. 190.5.0.0, 190.5.4.255
6723d. 190.5.4.0, 255.255.255.255
6724Feedback
6725The correct answer is: 190.5.4.0, 190.5.4.255
6726Question 501
6727Incorrect
6728Mark 0 out of 1
6729Not flagged
6730Question text
6731(Single Choice) Which of the following is valid host IP address?
6732Select one:
6733a. 10.0.2.128/26
6734b. 224.0.4.5
6735c. 192.168.2.15/28
6736d. 12.3.4.6/24
6737e. 122.245.264.13/26
6738Feedback
6739The correct answer is: 12.3.4.6/24
6740Question 502
6741Incorrect
6742Mark 0 out of 1
6743Not flagged
6744Question text
6745(Single Choice) What's the network address and broadcast address for IP 190.5.6.1/22?
6746Select one:
6747a. 190.5.4.0, 190.5.4.254
6748b. 190.5.1.0, 190.5.1.255
6749c. 190.5.4.0, 190.5.7.255
6750d. 190.5.4.0, 190.5.4.255
6751Feedback
6752The correct answer is: 190.5.4.0, 190.5.7.255
6753Question 503
6754Correct
6755Mark 1 out of 1
6756Not flagged
6757Question text
6758(Multiple Choice) For an IP address 10.110.53.233, if its mask length is the same with that of the following items, which items are in the same network segment with 10.110.53.233?
6759Select one or more:
6760a. 10.110.48.10 mask 255.255.252.0
6761b. 10.110.48.10 mask 255.255.248.0
6762c. 10.110.43.10 mask 255.255.248.0
6763d. 10.110.43.10 mask 255.255.0.0
6764Feedback
6765The correct answers are: 10.110.48.10 mask 255.255.248.0, 10.110.43.10 mask 255.255.0.0
6766Question 504
6767Partially correct
6768Mark 1 out of 1
6769Not flagged
6770Question text
6771(Multiple Choice) Which of the following are routed protocols?
6772Select one or more:
6773a. BGP
6774b. IP
6775c. OSPF
6776d. IPX
6777Feedback
6778The correct answers are: IP, IPX
6779Question 505
6780Correct
6781Mark 1 out of 1
6782Not flagged
6783Question text
6784(Single Choice) Which of the following host IP address is within the same network segment with 10.110.12.29 /27?
6785Select one:
6786a. 10.110.12.31
6787b. 10.110.12.30
6788c. 10.110.12.32
6789d. 10.110.12.0
6790Feedback
6791The correct answer is: 10.110.12.30
6792Question 506
6793Incorrect
6794Mark 0 out of 1
6795Not flagged
6796Question text
6797(Multiple Choice) Which of the following statements regarding the IP address 192.168.16.255/20 are correct?
6798Select one or more:
6799a. It belongs to the network segment 192.168.19.0
6800b. It's a network address
6801c. It's a private address
6802d. It's a broadcast address
6803e. It belongs to the network segment 192.168.16.0
6804f. It's a public address
6805Feedback
6806The correct answers are: It's a private address, It belongs to the network segment 192.168.16.0
6807Question 507
6808Incorrect
6809Mark 0 out of 1
6810Not flagged
6811Question text
6812(Single Choice) In a Class C network, after you add three digits in the default subnet mask to divide the network into different subnets, how many hosts does each subnet allow for?
6813Select one:
6814a. 62
6815b. 14
6816c. 6
6817d. 30
6818Feedback
6819The correct answer is: 30
6820Question 508
6821Incorrect
6822Mark 0 out of 1
6823Not flagged
6824Question text
6825(Single Choice) When the IP address is 199.32.59.64 and the subnet mask is 255.255.255.224, which of the following represents the IP address of the network segment?
6826Select one:
6827a. 199.32.59.192
6828b. 199.32.59.65
6829c. 199.32.59.224
6830d. 199.32.59.64
6831Feedback
6832The correct answer is: 199.32.59.64
6833Question 509
6834Correct
6835Mark 1 out of 1
6836Not flagged
6837Question text
6838(Single Choice) The IP address of a network is 12.28.75.160. After the network is divided into different subnets, the subnet mask is 255.255.252.0. In this case, which of the following represents the subnet broadcast address?
6839Select one:
6840a. 12.28.69.255
6841b. 12.28.75.255
6842c. 12.255.255.255
6843d. 12.28.255.255
6844Feedback
6845The correct answer is: 12.28.75.255
6846Question 510
6847Correct
6848Mark 1 out of 1
6849Not flagged
6850Question text
6851(Single Choice) The IP address of a network is 129.32.59.17. After the network is divided into different subnets, the subnet mask is 255.255.254.0. In this case, how many subnets are available?
6852Select one:
6853a. 128
6854b. 64
6855c. 32
6856d. 256
6857Feedback
6858The correct answer is: 128
6859Question 511
6860Correct
6861Mark 1 out of 1
6862Not flagged
6863Question text
6864(Single Choice) When an IP address is 220.32.59.128/25, which of the following represents the network address?
6865Select one:
6866a. 220.32.59.192
6867b. 220.32.59.128
6868c. 220.32.59.254
6869d. 220.32.59.0
6870Feedback
6871The correct answer is: 220.32.59.128
6872Question 512
6873Incorrect
6874Mark 0 out of 1
6875Not flagged
6876Question text
6877(Single Choice) Which layer is used to implement internal communication of a same IP network segment in an IP network?
6878
6879Select one:
6880a. Layer 2
6881b. Physical Layer
6882c. Layer 3
6883d. Application Layer
6884Feedback
6885The correct answer is: Layer 2
6886Question 513
6887Incorrect
6888Mark 0 out of 1
6889Not flagged
6890Question text
6891(Single Choice) Which address of an Ethernet frame is used by a Layer 3 switch to determine whether to perform Layer 2 forwarding or Layer 3 forwarding?
6892Select one:
6893a. Destination MAC address
6894b. Source IP address
6895c. Destination IP address
6896d. Source MAC address
6897Feedback
6898The correct answer is: Destination MAC address
6899Question 514
6900Correct
6901Mark 1 out of 1
6902Not flagged
6903Question text
6904(Multiple Choice) Which of the following statements about the key features of a Layer 3 switch are true?
6905Select one or more:
6906a. Many Layer 3 switches provide exact search and perform Layer 3 forwarding based on Layer 3 functions.
6907b. A Layer 3 switch provides Layer 3 functions while providing Layer 2 functions.
6908c. Some high-end Layer 3 switches provide high-speed POS ports to improve the upstream link efficiency.
6909d. All Layer 3 switches provide only ATM port.
6910Feedback
6911The correct answers are: A Layer 3 switch provides Layer 3 functions while providing Layer 2 functions., Many Layer 3 switches provide exact search and perform Layer 3 forwarding based on Layer 3 functions., Some high-end Layer 3 switches provide high-speed POS ports to improve the upstream link efficiency.
6912Question 515
6913Incorrect
6914Mark 0 out of 1
6915Not flagged
6916Question text
6917(Single Choice) In a TCP/IP protocol stack, the headers of packets at each layer are removed in the decapsulation process in a specified manner. Which of the following is the right manner?
6918Select one:
6919a. From lower to upper
6920b. From upper to lower
6921c. From Transport Layer to the lower layers
6922d. From Network Layer to the upper layers
6923Feedback
6924The correct answer is: From lower to upper
6925Question 516
6926Incorrect
6927Mark 0 out of 1
6928Not flagged
6929Question text
6930(Single Choice) The common address in an IP address is globally unique. Which of the following addresses can be used repeated in a LAN?
6931Select one:
6932a. Subnet address
6933b. Host address
6934c. Network address
6935d. Private address
6936Feedback
6937The correct answer is: Private address
6938Question 517
6939Correct
6940Mark 1 out of 1
6941Not flagged
6942Question text
6943Which of the following formats represent an accurate condensing of the IPv6 address 2031:0000:720C:0000:0000:09E0:839A:130B?
6944Select one or more:
6945a. 2031:0:720C::9E0:839A:130B
6946b. 2031:0:720C:0:0:9E:839A:130B
6947c. 2031::720C::9E0:839A:130B
6948d. 2031:0:720C:0:0:9E0:839A:130B
6949Feedback
6950The correct answers are: 2031:0:720C:0:0:9E0:839A:130B, 2031:0:720C::9E0:839A:130B
6951Question 518
6952Correct
6953Mark 1 out of 1
6954Not flagged
6955Question text
6956Which of the following IPv6 addresses can be configured on a router’s interface?
6957Select one or more:
6958a. 2001:12e3:1b02::21/64
6959b. ff00:8a3c::9b/64
6960c. fe80:13dc::1/64
6961d. ::1/128
6962Feedback
6963The correct answers are: fe80:13dc::1/64, 2001:12e3:1b02::21/64
6964Question 519
6965Correct
6966Mark 1 out of 1
6967Not flagged
6968Question text
6969The IPv6 address achitecture does not include which of the following address types?
6970
6971Select one:
6972a. multicast
6973b. broadcast
6974c. unicast
6975d. anycast
6976Feedback
6977The correct answer is: broadcast
6978Question 520
6979Incorrect
6980Mark 0 out of 1
6981Not flagged
6982Question text
6983Which of the following descriptions regarding IPv6 addresses are correct?
6984Select one or more:
6985a. IPv6 extension headers are processed randomly.
6986b. IPv6 addresses are 128 bits in length.
6987c. IPv6 addresses are 64 bits in length.
6988d. IPv6 extension headers are processed in order.
6989Feedback
6990The correct answers are: IPv6 addresses are 128 bits in length., IPv6 extension headers are processed in order.
6991Question 521
6992Incorrect
6993Mark 0 out of 1
6994Not flagged
6995Question text
6996Interface G0/0/1 on RTA contains a MAC address of 00e0-fc03-aa73 and is configured with the IPv6 address 2001::2E0:FCFF:FE03:AA73. Which method is most likely to have been used to configure the interface IPv6 address?
6997
6998Select one:
6999a. ARP
7000b. Auto-link
7001c. DHCPv6
7002d. EUI-64
7003Feedback
7004The correct answer is: EUI-64
7005Question 522
7006Incorrect
7007Mark 0 out of 1
7008Not flagged
7009Question text
7010In a small network suppporting IPv6, a network administrator wishes implement RIPng. Which of the following commands should be used to enable this protocol?
7011Select one:
7012a. ripng 1 enable
7013b. [RTA-ripng-1]ripng 1 enable
7014c. [RTA]ripng 1 enable
7015d. [RTA-GigabitEthernet0/0/0]ripng 1 enable
7016Feedback
7017The correct answer is: [RTA-GigabitEthernet0/0/0]ripng 1 enable
7018Question 523
7019Correct
7020Mark 1 out of 1
7021Not flagged
7022Question text
7023Interface G0/0/1 on RTA contains a MAC address of 00e0-fc03-aa73 and is configured with the IPv6 address 2001::2E0:FCFF:FE03:AA73. Which method is most likely to have been used to configure the interface IPv6 address?
7024Select one:
7025a. DHCPv6
7026b. EUI-64
7027c. ARP
7028d. Auto-link
7029Feedback
7030The correct answer is: EUI-64
7031Question 524
7032Correct
7033Mark 1 out of 1
7034Not flagged
7035Question text
7036In a small network suppporting IPv6, a network administrator wishes implement RIPng. Which of the following commands should be used to enable this protocol?
7037
7038Select one:
7039a. [RTA]ripng 1 enable
7040b. [RTA-GigabitEthernet0/0/0]ripng 1 enable
7041c. ripng 1 enable
7042d. [RTA-ripng-1]ripng 1 enable
7043Feedback
7044The correct answer is: [RTA-GigabitEthernet0/0/0]ripng 1 enable
7045Question 525
7046Correct
7047Mark 1 out of 1
7048Not flagged
7049Question text
7050In a network supporting IPv6, OSPF no longer supports which feature?
7051
7052Select one:
7053a. authentication
7054b. multiple areas
7055c. Router-ID
7056d. multicast updates
7057Feedback
7058The correct answer is: authentication
7059Question 526
7060Incorrect
7061Mark 0 out of 1
7062Not flagged
7063Question text
7064Two routers are configured with OSPFv3. OSPFv3 is enabled on all interfaces of each router. Which of the following is true in the event that the network administrator does not configure a Router-ID?
7065Select one:
7066a. No router ID will be assigned to the router.
7067b. The IP address of the loopback 1 interface will be used as the router ID
7068c. The IP address of the loopback 0 interface will be used as the router ID
7069d. The IP address of interface G0/0/0 will be used as the router ID
7070Feedback
7071The correct answer is: No router ID will be assigned to the router.
7072Question 527
7073Incorrect
7074Mark 0 out of 1
7075Not flagged
7076Question text
7077A DHCP Unique Identifier (DUID) in DHCPv6 can be configured in VRP using which formats?
7078Select one or more:
7079a. DUID-LL
7080b. DUID-LLC
7081c. DUID-EN
7082d. DUID-LLT
7083Feedback
7084The correct answers are: DUID-LL, DUID-LLT
7085Question 528
7086Correct
7087Mark 1 out of 1
7088Not flagged
7089Question text
7090This type of firewall directly obtains the information such as source IP address, destination IP address, source TCP/UDP port, destination TCP/UDP port and protocol number in the packet header and filters the packets based on the defined policy. Which of the following is the firewall described above
7091
7092Select one:
7093a. Packet filtering firewall
7094b. Link-layer firewall
7095c. Proxy firewall
7096d. Stateful firewall
7097Feedback
7098The correct answer is: Packet filtering firewall
7099Question 529
7100Incorrect
7101Mark 0 out of 1
7102Not flagged
7103Question text
7104(Single Choice) Which of the following protocols provides error report and send information about the IP datagram processing status back to the source?
7105Select one:
7106a. TCP
7107b. ICMP
7108c. UDP
7109d. IGMP
7110Feedback
7111The correct answer is: ICMP
7112Question 530
7113Incorrect
7114Mark 0 out of 1
7115Not flagged
7116Question text
7117(Single Choice) In which type of packet is an ICMP packet generally advertised during IP packet processing?
7118Select one:
7119a. Delay
7120b. Jitter
7121c. Source IP address
7122d. Error
7123Feedback
7124The correct answer is: Error
7125Question 531
7126Incorrect
7127Mark 0 out of 1
7128Not flagged
7129Question text
7130(Single Choice) Which of the following fields is used to check an ICMP packet?
7131Select one:
7132a. Checksum field in the ICMP packet
7133b. Code field in the ICMP packet
7134c. Header checksum field in an IP datagram
7135d. Type field in the ICMP packet
7136Feedback
7137The correct answer is: Checksum field in the ICMP packet
7138Question 532
7139Incorrect
7140Mark 0 out of 1
7141Not flagged
7142Question text
7143(Single Choice) The IP protocol is a kind of unreliable protocol and offers no error detection. To provide error detection, which of the following must the IP protocol work with?
7144Select one:
7145a. UDP
7146b. ICMP
7147c. ARP
7148d. TCP
7149Feedback
7150The correct answer is: TCP
7151Question 533
7152Incorrect
7153Mark 0 out of 1
7154Not flagged
7155Question text
7156(Multiple Choice) Which of the following applications use ICMP protocol?
7157Select one or more:
7158a. Tracert
7159b. Igmp
7160c. Ping
7161d. Arp
7162Feedback
7163The correct answers are: Ping, Tracert, Arp
7164Question 534
7165Correct
7166Mark 1 out of 1
7167Not flagged
7168Question text
7169(Single Choice) When certain fields in the header of a received datagram have incorrect values, this datagram is discarded and a certain ICMP packet is sent to the source. Which type of ICMP packet is sent to the source?
7170Select one:
7171a. Parameter Problem packet
7172b. Destination Unreachable packet
7173c. Source Quench packet
7174d. Redirect packet
7175Feedback
7176The correct answer is: Parameter Problem packet
7177Question 535
7178Correct
7179Mark 1 out of 1
7180Not flagged
7181Question text
7182(Single Choice) When certain fields in the header of a received datagram have incorrect values, this datagram is discarded and a certain ICMP packet is sent to the source. Which type of ICMP packet is sent to the source?
7183Select one:
7184a. Destination Unreachable packet
7185b. Parameter Problem packet
7186c. Source Quench packet
7187d. Redirect packet
7188Feedback
7189The correct answer is: Parameter Problem packet
7190Question 536
7191Incorrect
7192Mark 0 out of 1
7193Not flagged
7194Question text
7195(Single Choice) When a router or host discards data because of data congestion, which type of ICMP packet does the router or host send to the source?
7196
7197Select one:
7198a. Parameter Problem packet
7199b. Redirect packet
7200c. Destination Unreachable packet
7201d. Source Quench packet
7202Feedback
7203The correct answer is: Source Quench packet
7204Question 537
7205Incorrect
7206Mark 0 out of 1
7207Not flagged
7208Question text
7209(Single Choice) Which of the following is the most common method used to check the connectivity between an IP network and a host, for example, the connectivity between routers and the connectivity between a router and a host?
7210
7211Select one:
7212a. PING
7213b. DNS
7214c. TFTP
7215d. FTP
7216Feedback
7217The correct answer is: PING
7218Question 538
7219Incorrect
7220Mark 0 out of 1
7221Not flagged
7222Question text
7223(Single Choice) A series of packets are used in a Ping test to determine whether delay and packet loss occur in communication. Which of the following represents the packet used in a Ping test?
7224Select one:
7225a. FTP
7226b. Telnet
7227c. Tracert
7228d. ICMP
7229Feedback
7230The correct answer is: ICMP
7231Question 539
7232Incorrect
7233Mark 0 out of 1
7234Not flagged
7235Question text
7236(Multiple Choice) Which of the following protocols are not used in a Tracert process?
7237Select one or more:
7238a. TCP
7239b. UDP
7240c. ARP
7241d. ICMP
7242Feedback
7243The correct answers are: TCP, ARP
7244Question 540
7245Incorrect
7246Mark 0 out of 1
7247Not flagged
7248Question text
7249(Multiple Choice) Which of the following statements about Ping and Tracert are true?
7250Select one or more:
7251a. Tracert can be used to determine a faulty point.
7252b. Ping is often used to obtain the path for forwarding a datagram.
7253c. Both Ping and Tracert can be used to test network connectivity.
7254d. Ping can be used to specify the source IP address of a packet.
7255Feedback
7256The correct answers are: Both Ping and Tracert can be used to test network connectivity., Ping can be used to specify the source IP address of a packet., Tracert can be used to determine a faulty point.
7257Question 541
7258Incorrect
7259Mark 0 out of 1
7260Not flagged
7261Question text
7262(Single Choice) Which of the following protocols is a management protocol used at Network Layer to provide IP information service by embedding the protocol information in IP packets?
7263Select one:
7264a. 802.2
7265b. ICMP
7266c. IP
7267d. ARP
7268Feedback
7269The correct answer is: ICMP
7270Question 542
7271Incorrect
7272Mark 0 out of 1
7273Not flagged
7274Question text
7275(Single Choice) Which type of packet does a Ping application send?
7276Select one:
7277a. TCP Request packet
7278b. TCP Reply packet
7279c. ICMP Reply packet
7280d. ICMP Request packet
7281Feedback
7282The correct answer is: ICMP Request packet
7283Question 543
7284Incorrect
7285Mark 0 out of 1
7286Not flagged
7287Question text
7288(Single Choice) The Tracert application is usually used in data network commissioning. In this case, how many types of ICMP packets are involved in a Tracert application?
7289Select one:
7290a. 4
7291b. 3
7292c. 6
7293d. 2
7294Feedback
7295The correct answer is: 2
7296Question 544
7297Incorrect
7298Mark 0 out of 1
7299Not flagged
7300Question text
7301(Single Choice) Which of the following is the abbreviation for ICMP?
7302Select one:
7303a. internet connection Message Protocol
7304b. Internal Control Mail Protocol
7305c. Intranet Control Message Protocol
7306d. Internet Control Message Protocol
7307Feedback
7308The correct answer is: Internet Control Message Protocol
7309Question 545
7310Incorrect
7311Mark 0 out of 1
7312Not flagged
7313Question text
7314(Single Choice) The protocol number of ICMP is
7315Select one:
7316a. 22
7317b. 1
7318c. 17
7319d. 6
7320Feedback
7321The correct answer is: 1
7322Question 546
7323Correct
7324Mark 1 out of 1
7325Not flagged
7326Question text
7327(Single Choice) An RARP request packet is sent by means of broadcast. How is an RARP Reply packet sent to save network resources?
7328
7329Select one:
7330a. Unicast
7331b. Anycast
7332c. Multicast
7333d. Broadcast
7334Feedback
7335The correct answer is: Unicast
7336Question 547
7337Incorrect
7338Mark 0 out of 1
7339Not flagged
7340Question text
7341(Single Choice) Which of the following operations can be used to verify the failure of installation or running of TCP/IP protocol?
7342Select one:
7343a. Ping 192.168.1.1
7344b. Ping 10.1.1.1
7345c. Ping 169.254.1.1
7346d. Ping 127.0.0.1
7347Feedback
7348The correct answer is: Ping 127.0.0.1
7349Question 548
7350Incorrect
7351Mark 0 out of 1
7352Not flagged
7353Question text
7354(Single Choice) Which of the following applications can be used to detect the path along which the data packets are transmitted from the source to the destination?
7355Select one:
7356a. Route
7357b. Tracert
7358c. Nestat
7359d. Send
7360Feedback
7361The correct answer is: Tracert
7362Question 549
7363Correct
7364Mark 1 out of 1
7365Not flagged
7366Question text
7367(Single Choice) Which bytes in an ICMP packet use a unified format and consist of the Type, Code, and Checksum fields?
7368Select one:
7369a. First 5 bytes
7370b. First 3 bytes
7371c. First 8 bytes
7372d. First 4 bytes
7373Feedback
7374The correct answer is: First 4 bytes
7375Question 550
7376Correct
7377Mark 1 out of 1
7378Not flagged
7379Question text
7380(Single Choice) Which of the following statements about the ICMP protocol is true?
7381Select one:
7382a. The ICMP protocol searches for IP addresses based on MAC addresses.
7383b. The ICMP protocol monitors errors generated in datagram transmission.
7384c. The ICMP protocol translates the IP address of a public network into the IP address of a private network.
7385d. The ICMP protocol allocates and manages IP addresses in a network in a uniform manner.
7386Feedback
7387The correct answer is: The ICMP protocol monitors errors generated in datagram transmission.
7388Question 551
7389Correct
7390Mark 1 out of 1
7391Not flagged
7392Question text
7393(Single Choice) The Advanced Research Projects Agency Network (ARPANET) network is created by United States Department of Defense and is the predecessor of the contemporary global. Which of the following is the basis of an ARPANET network?
7394Select one:
7395a. Packet switching
7396b. MPLS forwarding
7397c. Low-speed serial connection
7398d. Circuit switching
7399Feedback
7400The correct answer is: Packet switching
7401Question 552
7402Incorrect
7403Mark 0 out of 1
7404Not flagged
7405Question text
7406(Single Choice) What is the function of ARP?
7407Select one:
7408a. Map MAC address to IP address
7409b. Map port number to IP address
7410c. Broadcast IP address
7411d. Map IP address to Mac address
7412Feedback
7413The correct answer is: Map IP address to Mac address
7414Question 553
7415Incorrect
7416Mark 0 out of 1
7417Not flagged
7418Question text
7419(Single Choice) What is the function of RARP?
7420Select one:
7421a. Map destination MAC address to IP address
7422b. Map destination IP address to MAC address
7423c. Map source IP address to MAC address
7424d. Map source MAC address to IP address
7425Feedback
7426The correct answer is: Map source MAC address to IP address
7427Question 554
7428Incorrect
7429Mark 0 out of 1
7430Not flagged
7431Question text
7432(Single Choice) Which category does the ARP protocol belong to?
7433Select one:
7434a. Anycast
7435b. Broadcast
7436c. Unicast
7437d. Multicast
7438Feedback
7439The correct answer is: Broadcast
7440Question 555
7441Incorrect
7442Mark 0 out of 1
7443Not flagged
7444Question text
7445(Single Choice) Which of the following protocols provides connection oriented transmission service?
7446Select one:
7447a. UDP
7448b. IPv6
7449c. IP
7450d. TCP
7451Feedback
7452The correct answer is: TCP
7453Question 556
7454Correct
7455Mark 1 out of 1
7456Not flagged
7457Question text
7458(Single Choice) In the OSI reference model, one layer provides network services through applications in addition to communications between different applications. Which of the following layers
7459Select one:
7460a. Network Layer
7461b. Session Layer
7462c. Application Layer
7463d. Data Link Layer
7464Feedback
7465The correct answer is: Application Layer
7466Question 557
7467Incorrect
7468Mark 0 out of 1
7469Not flagged
7470Question text
7471(Single Choice) Similar to the OSI reference model, the TCP/IP model also contains several layers. How many layers does the TCP/IP model contain?
7472Select one:
7473a. Six
7474b. Seven
7475c. Four
7476d. Five
7477Feedback
7478The correct answer is: Four
7479Question 558
7480Incorrect
7481Mark 0 out of 1
7482Not flagged
7483Question text
7484(Multiple Choice) Which of the following are the functions of transport layer?
7485Select one or more:
7486a. Segment upper layer data
7487b. addressing
7488c. Ensure ordered, reliable, and correct transmission
7489d. Transmit data from one host to another host
7490e. Establish end to end connection
7491Feedback
7492The correct answers are: Segment upper layer data, Establish end to end connection, Transmit data from one host to another host, Ensure ordered, reliable, and correct transmission
7493Question 559
7494Incorrect
7495Mark 0 out of 1
7496Not flagged
7497Question text
7498(Single Choice) According to OSI reference model, when receiver can not process more data, which layer is responsible for sending stop message to the transmitter?
7499
7500Select one:
7501a. Transport layer
7502b. Physical layer
7503c. Presentation layer
7504d. Session layer
7505Feedback
7506The correct answer is: Transport layer
7507Question 560
7508Incorrect
7509Mark 0 out of 1
7510Not flagged
7511Question text
7512(Single Choice) Which protocol does an application (such as SNMP or RADIUS) that focuses on transmission efficiency use at Transport Layer?
7513Select one:
7514a. UDP
7515b. HDLC
7516c. ICMP
7517d. TCP
7518Feedback
7519The correct answer is: UDP
7520Question 561
7521Incorrect
7522Mark 0 out of 1
7523Not flagged
7524Question text
7525(Single Choice) After a change occurs in a network topology, which of the following routes does not change automatically but changes only after the network administrator updates the change?
7526Select one:
7527a. BGP route
7528b. RIP route
7529c. OSPF route
7530d. Static route
7531Feedback
7532The correct answer is: Static route
7533Question 562
7534Incorrect
7535Mark 0 out of 1
7536Not flagged
7537Question text
7538(Single Choice) Which of the following protocols provides a reliability mechanism and can be used as a transport-level protocol?
7539
7540Select one:
7541a. HDLC
7542b. ICMP
7543c. TCP
7544d. UDP
7545Feedback
7546The correct answer is: TCP
7547Question 563
7548Incorrect
7549Mark 0 out of 1
7550Not flagged
7551Question text
7552(Single Choice) Which of the following protocols is a transport-level protocol based on TCP, translates a domain name into an IP address, and manages domain names in a distributed manner?
7553Select one:
7554a. DNS
7555b. UDP
7556c. HTTP
7557d. TCP
7558Feedback
7559The correct answer is: DNS
7560Question 564
7561Incorrect
7562Mark 0 out of 1
7563Not flagged
7564Question text
7565(Single Choice) Which of the following protocols is used to transfer Web pages in the Internet?
7566Select one:
7567a. TCP
7568b. UDP
7569c. DNS
7570d. HTTP
7571Feedback
7572The correct answer is: HTTP
7573Question 565
7574Incorrect
7575Mark 0 out of 1
7576Not flagged
7577Question text
7578(Multiple Choice) Which protocols are defined by the TCP/IP model to transmit and receive mails?
7579Select one or more:
7580a. SMTP
7581b. DNS
7582c. HTTP
7583d. POP3
7584Feedback
7585The correct answers are: SMTP, POP3
7586Question 566
7587Incorrect
7588Mark 0 out of 1
7589Not flagged
7590Question text
7591(Single Choice) Which of the following protocols authenticates a user remotely, authorizes the user access, and performs charging?
7592Select one:
7593a. HTTP
7594b. SMTP
7595c. DNS
7596d. RADIUS
7597Feedback
7598The correct answer is: RADIUS
7599Question 567
7600Incorrect
7601Mark 0 out of 1
7602Not flagged
7603Question text
7604(Multiple Choice) Which of the following protocols reside at transport layer?
7605Select one or more:
7606a. IP
7607b. TCP
7608c. UDP
7609d. SNMP
7610Feedback
7611The correct answers are: TCP, UDP
7612Question 568
7613Incorrect
7614Mark 0 out of 1
7615Not flagged
7616Question text
7617(Multiple Choice) TCP is a connection oriented and reliable transport layer protocol. Which of the following are used to ensure the transmission reliability?
7618Select one or more:
7619a. Buffering
7620b. Retransmit
7621c. Source quench messages
7622d. Acknowledgement
7623Feedback
7624The correct answers are: Acknowledgement, Retransmit
7625Question 569
7626Correct
7627Mark 1 out of 1
7628Not flagged
7629Question text
7630(Single Choice) A TCP packet consists of a maximum of 60 bytes. How many bytes does a TCP packet header consist of after the Option field is deducted?
7631Select one:
7632a. 20
7633b. 8
7634c. 30
7635d. 40
7636Feedback
7637The correct answer is: 20
7638Question 570
7639Incorrect
7640Mark 0 out of 1
7641Not flagged
7642Question text
7643(Single Choice) The TCP protocol assigns a source port No. to each application. How many bytes does the source port No. in the TCP packet header consist of?
7644Select one:
7645a. 8
7646b. 4
7647c. 1
7648d. 2
7649Feedback
7650The correct answer is: 2
7651Question 571
7652Partially correct
7653Mark 1 out of 1
7654Not flagged
7655Question text
7656(Multiple Choice) Which of the following fields are contained in a TCP packet header?
7657Select one or more:
7658a. CRC32
7659b. Sequence Number
7660c. Destination Port
7661d. Source Port
7662Feedback
7663The correct answers are: Source Port, Destination Port, Sequence Number
7664Question 572
7665Incorrect
7666Mark 0 out of 1
7667Not flagged
7668Question text
7669(Single Choice) Which of the following ranges represents the size of a maximum transfer unit (MTU) packet?
7670Select one:
7671a. 60–1480
7672b. 64–1518
7673c. 64–1480
7674d. 60–1518
7675Feedback
7676The correct answer is: 64–1518
7677Question 573
7678Incorrect
7679Mark 0 out of 1
7680Not flagged
7681Question text
7682(Single Choice) The TTL field in an IP header specifies the number of routers that a datagram is allowed to traverse. After the datagram traverses a router, the TTL value is deducted by 1. When the TTL reaches a certain value, the datagram is discarded. Which of the following represents this value?
7683Select one:
7684a. Message
7685b. Sender
7686c. Protocol
7687d. Harddisk
7688e. Receiver
7689Feedback
7690The correct answer is: Sender
7691Question 574
7692Incorrect
7693Mark 0 out of 1
7694Not flagged
7695Question text
7696(Single Choice) Defragmentation can occur at either the original transmitter or an intermediate router. Where is an IP datagram is reassembled after it is defragmented?
7697Select one:
7698a. At the destination of the packet
7699b. On the next router
7700c. On an intermediate router
7701d. In the process in which the packet is looped back
7702Feedback
7703The correct answer is: At the destination of the packet
7704Question 575
7705Incorrect
7706Mark 0 out of 1
7707Not flagged
7708Question text
7709(Multiple Choice) Which of the following statements about TCP connection establishment are true?
7710Select one or more:
7711a. A TCP connection is established after three-way handshake is done.
7712b. The three-way handshake helps guarantee the reliability of data switching.
7713c. Three-way handshake can resolve the delay problem with packet data transmission.
7714d. The three-way handshake cannot guarantee the security of data switching.
7715Feedback
7716The correct answers are: A TCP connection is established after three-way handshake is done., The three-way handshake helps guarantee the reliability of data switching.
7717Question 576
7718Incorrect
7719Mark 0 out of 1
7720Not flagged
7721Question text
7722(Single Choice) Tracert is an application based on application layer, which transport layer protocol is used by Tracert?
7723Select one:
7724a. TCP
7725b. ARP
7726c. UDP
7727d. ICMP
7728Feedback
7729The correct answer is: UDP
7730Question 577
7731Incorrect
7732Mark 0 out of 1
7733Not flagged
7734Question text
7735(Single Choice) What is the main function of DNS?
7736Select one:
7737a. Remote Access
7738b. Domain Name Resolution
7739c. File Transfer
7740d. Mail Transfer
7741Feedback
7742The correct answer is: Domain Name Resolution
7743Question 578
7744Correct
7745Mark 1 out of 1
7746Not flagged
7747Question text
7748(Single Choice) What is the port number of DNS?
7749
7750Select one:
7751a. 23
7752b. 53
7753c. 21
7754d. 80
7755Feedback
7756The correct answer is: 53
7757Question 579
7758Incorrect
7759Mark 0 out of 1
7760Not flagged
7761Question text
7762(Single Choice) Which of the following is the default TCP port number used by HTTP?
7763Select one:
7764a. 25
7765b. 8080
7766c. 80
7767d. 110
7768Feedback
7769The correct answer is: 80
7770Question 580
7771Incorrect
7772Mark 0 out of 1
7773Not flagged
7774Question text
7775(Single Choice) Which protocol does FTP use to provide reliable data transmission?
7776
7777Select one:
7778a. UDP
7779b. SIP
7780c. RTP
7781d. TCP
7782Feedback
7783The correct answer is: TCP
7784Question 581
7785Incorrect
7786Mark 0 out of 1
7787Not flagged
7788Question text
7789(Single Choice) Which of the following protocols is used to send email on the internet?
7790
7791Select one:
7792a. FTP
7793b. MSTP
7794c. SMTP
7795d. TFTP
7796Feedback
7797The correct answer is: SMTP
7798Question 582
7799Incorrect
7800Mark 0 out of 1
7801Not flagged
7802Question text
7803(Single Choice) Which TCP port number is used by SMTP by default to send e-mail message?
7804Select one:
7805a. 53
7806b. 23
7807c. 25
7808d. 21
7809Feedback
7810The correct answer is: 25
7811Question 583
7812Incorrect
7813Mark 0 out of 1
7814Not flagged
7815Question text
7816(Single Choice) POP (Post Office Protocol) is used for receiving E-mail. Which TCP port numbers does it use by default?
7817Select one:
7818a. 23
7819b. 110
7820c. 53
7821d. 21
7822Feedback
7823The correct answer is: 110
7824Question 584
7825Incorrect
7826Mark 0 out of 1
7827Not flagged
7828Question text
7829(Single Choice) Which of the following is the correct sequence about the data encapsulation process?
7830Select one:
7831a. Segment->Packet->Frame->Bit->Data
7832b. Bit ->Segment ->Packet->Frame->Data
7833c. Data->Packet->Segment ->Frame->Bit
7834d. Data->Segment->Packet->Frame->Bit
7835Feedback
7836The correct answer is: Data->Segment->Packet->Frame->Bit
7837Question 585
7838Incorrect
7839Mark 0 out of 1
7840Not flagged
7841Question text
7842(Single Choice) Which of the following is the function of session layer?
7843Select one:
7844a. Establish maintain and terminate session
7845b. Provide data transformation and data format
7846c. Provide encryption and decryption
7847d. Establish connection between hosts
7848Feedback
7849The correct answer is: Establish maintain and terminate session
7850Question 586
7851Incorrect
7852Mark 0 out of 1
7853Not flagged
7854Question text
7855(Single Choice) Compared with OSI reference model, which of the following is not defined in TCP/IP protocol stack?
7856Select one:
7857a. Data link layer and network layer
7858b. Transport layer and session layer
7859c. Session layer and presentation layer
7860d. Network layer and transport layer
7861Feedback
7862The correct answer is: Session layer and presentation layer
7863Question 587
7864Incorrect
7865Mark 0 out of 1
7866Not flagged
7867Question text
7868(Single Choice) RPC, NFS and SQL protocols reside at the ( ) of the OSI reference model.
7869Select one:
7870a. Transport layer
7871b. Network layer
7872c. Presentation layer
7873d. Session layer
7874Feedback
7875The correct answer is: Session layer
7876Question 588
7877Incorrect
7878Mark 0 out of 1
7879Not flagged
7880Question text
7881(Multiple Choice) According to OSI reference model, which of the following functions belong to presentation layer?
7882Select one or more:
7883a. Data compression
7884b. Data format transformation
7885c. Session control
7886d. Data encryption
7887Feedback
7888The correct answers are: Data encryption, Data compression, Data format transformation
7889Question 589
7890Incorrect
7891Mark 0 out of 1
7892Not flagged
7893Question text
7894(Single Choice) In the OSI reference model, one layer processes requests and responses initiated by applications of different devices. Which of the following layers stands for this layer?
7895Select one:
7896a. Data Link Layer
7897b. Network Layer
7898c. Session Layer
7899d. Application Layer
7900Feedback
7901The correct answer is: Session Layer
7902Question 590
7903Incorrect
7904Mark 0 out of 1
7905Not flagged
7906Question text
7907(Multiple Choice) Which of the following products use the VRP platform as the core engine of their software?
7908Select one or more:
7909a. LTE
7910b. Ethernet switch
7911c. Router
7912d. Service gateway
7913Feedback
7914The correct answers are: Router, Ethernet switch, Service gateway
7915Question 591
7916Correct
7917Mark 1 out of 1
7918Not flagged
7919Question text
7920(Multiple Choice) What functions does VRP provide?
7921Select one or more:
7922a. Provides a unified user interface and a unified management window.
7923b. Provides the functions of a control plane.
7924c. Blocks communication between a forwarding plane and the VRP control plane.
7925d. Defines interfaces of a forwarding plane.
7926Feedback
7927The correct answers are: Provides a unified user interface and a unified management window., Provides the functions of a control plane., Defines interfaces of a forwarding plane.
7928Question 592
7929Incorrect
7930Mark 0 out of 1
7931Not flagged
7932Question text
7933(Single Choice) Which component of the VRP platform provides user authentication charging and user policy management?
7934Select one:
7935a. System management plane
7936b. Service control plane
7937c. Versatile control plane
7938d. None of the choices
7939Feedback
7940The correct answer is: Service control plane
7941Question 593
7942Incorrect
7943Mark 0 out of 1
7944Not flagged
7945Question text
7946(Multiple Choice) Which of the following methods can be used to upgrade the VRP software?
7947Select one or more:
7948a. TFTP
7949b. FTP
7950c. WEB
7951d. X-modem
7952Feedback
7953The correct answers are: FTP, TFTP, X-modem
7954Question 594
7955Incorrect
7956Mark 0 out of 1
7957Not flagged
7958Question text
7959(Multiple Choice) Which of the following protocols can be used to upgrade VRP?
7960Select one or more:
7961a. TFTP
7962b. XMODEM
7963c. TELNET
7964d. FTP
7965Feedback
7966The correct answers are: FTP, TFTP, XMODEM
7967Question 595
7968Incorrect
7969Mark 0 out of 1
7970Not flagged
7971Question text
7972(Single Choice) Which of the following is abbreviation of VRP?
7973Select one:
7974a. Virtual Routing Plane
7975b. Virtual Routing Platform
7976c. Versatile Routing Platform
7977d. Versatile Routine Platform
7978Feedback
7979The correct answer is: Versatile Routing Platform
7980Question 596
7981Correct
7982Mark 1 out of 1
7983Not flagged
7984Question text
7985The operation deleting the configuration files saved in the storage devices will become effective after rebooting the router.
7986Select one:
7987True
7988False
7989Feedback
7990The correct answer is 'True'.
7991Question 597
7992Correct
7993Mark 1 out of 1
7994Not flagged
7995Question text
7996VRP uses a component-based system architecture. It provides various functions and features in addition to application-based scalability and customization.
7997Select one:
7998True
7999False
8000Feedback
8001The correct answer is 'True'.
8002Question 598
8003Incorrect
8004Mark 0 out of 1
8005Not flagged
8006Question text
8007Root bridges provide root ports and designated ports.
8008Select one:
8009True
8010False
8011Feedback
8012The correct answer is 'False'.
8013Question 599
8014Correct
8015Mark 1 out of 1
8016Not flagged
8017Question text
8018There may be “multiple” paths between a non-root bridge and a root bridge. Each of the paths has its own total cost, which is the sum of the port costs of all egress ports on the path.
8019Select one:
8020True
8021False
8022Feedback
8023The correct answer is 'True'.
8024Question 600
8025Correct
8026Mark 1 out of 1
8027Not flagged
8028Question text
8029Each router forwards only the packets received by the local station through the optimal path. The packet is forwarded by different routers on the path in a relay mode.
8030Select one:
8031True
8032False
8033Feedback
8034The correct answer is 'True'.
8035Question 601
8036Correct
8037Mark 1 out of 1
8038Not flagged
8039Question text
8040If the optimal path to the destination IP address is unavailable after a change occurs in a network topology, the dynamic routing protocol can make adaptation to this change and determine another optimal path to the destination IP address.
8041Select one:
8042True
8043False
8044Feedback
8045The correct answer is 'True'.
8046Question 602
8047Incorrect
8048Mark 0 out of 1
8049Not flagged
8050Question text
8051After a fault occurs in a network, a static route can be rectified automatically and the network administrator does not need to reconfigure it.
8052Select one:
8053True
8054False
8055Feedback
8056The correct answer is 'False'.
8057Question 603
8058Correct
8059Mark 1 out of 1
8060Not flagged
8061Question text
8062A static route can be either configured manually by a network administrator or generated automatically.
8063Select one:
8064True
8065False
8066Feedback
8067The correct answer is 'False'.
8068Question 604
8069Correct
8070Mark 1 out of 1
8071Not flagged
8072Question text
8073Routing Information Protocol (RIP) is available in the RIPv1, RIPv2, and RIPv3 versions.
8074
8075Select one:
8076True
8077False
8078Feedback
8079The correct answer is 'False'.
8080Question 605
8081Incorrect
8082Mark 0 out of 1
8083Not flagged
8084Question text
8085OSPF can generate a loop-free shortest route tree by using a routing protocol algorithm. Thus, the OSPF routing protocol has no loop problem.
8086
8087Select one:
8088True
8089False
8090Feedback
8091The correct answer is 'True'.
8092Question 606
8093Incorrect
8094Mark 0 out of 1
8095Not flagged
8096Question text
8097In broadcast network of OSPF protocol, any two DR Others will neither exchange routing information nor send Hello packet to each other due to the existence of DR.
8098
8099Select one:
8100True
8101False
8102Feedback
8103The correct answer is 'False'.
8104Question 607
8105Incorrect
8106Mark 0 out of 1
8107Not flagged
8108Question text
8109An OSPF router can belong to two or more areas but can be the ABR for a “single” area only.
8110Select one:
8111True
8112False
8113Feedback
8114The correct answer is 'True'.
8115Question 608
8116Correct
8117Mark 1 out of 1
8118Not flagged
8119Question text
8120After receiving a data frame from any port, a hub forwards it to any other port.
8121
8122Select one:
8123True
8124False
8125Feedback
8126The correct answer is 'True'.
8127Question 609
8128Incorrect
8129Mark 0 out of 1
8130Not flagged
8131Question text
8132TFTP can control a TFTP user according to the user name and password.
8133
8134Select one:
8135True
8136False
8137Feedback
8138The correct answer is 'True'.
8139Question 610
8140Correct
8141Mark 1 out of 1
8142Not flagged
8143Question text
8144A Trunk port always sends tagged frames to the peer equipment.
8145
8146Select one:
8147True
8148False
8149Feedback
8150The correct answer is 'False'.
8151Question 611
8152Incorrect
8153Mark 0 out of 1
8154Not flagged
8155Question text
8156HDLC is ISO standard link layer protocol and it is used to encapsulate data transmitted on asynchronous link.
8157
8158Select one:
8159True
8160False
8161Feedback
8162The correct answer is 'False'.
8163Question 612
8164Correct
8165Mark 1 out of 1
8166Not flagged
8167Question text
8168In the PPP protocol, CHAP authentication involves exchange of three types of packets at different times, namely, Challenge, Response, and Success/Failure packets.
8169Select one:
8170True
8171False
8172Feedback
8173The correct answer is 'True'.
8174Question 613
8175Correct
8176Mark 1 out of 1
8177Not flagged
8178Question text
8179In the PPP protocol, CHAP authentication involves exchange of three types of packets at different times, namely, Challenge, Response, and Success/Failure packets.
8180Select one:
8181True
8182False
8183Feedback
8184The correct answer is 'True'.
8185Question 614
8186Correct
8187Mark 1 out of 1
8188Not flagged
8189Question text
8190The PPP protocol provides a standard method of transmitting datagrams of different protocols on a point-to-point link. It is a point-to-point communication protocol widely used at the present time.
8191
8192Select one:
8193True
8194False
8195Feedback
8196The correct answer is 'True'.
8197Question 615
8198Correct
8199Mark 1 out of 1
8200Not flagged
8201Question text
8202In the PPP protocol, CHAP authentication involves exchange of three types of packets at different times. To match the Request packet with a Reply packet, each packet contains an Identifier field. In each authentication process, all the packets use the same Identifier information.
8203
8204Select one:
8205True
8206False
8207Feedback
8208The correct answer is 'True'.
8209Question 616
8210Correct
8211Mark 1 out of 1
8212Not flagged
8213Question text
8214RTA connects with RTB through interface Serial0. The configuration on RTA is as follow:
8215
8216[RTA]aaa
8217
8218[RTA-aaa]local-user huawei password simple quidway
8219
8220[RTA-aaa]local-user huawei service-type ppp
8221
8222[RTA]interface Serial 0
8223
8224[RTA-Serial0]link-protocol ppp
8225
8226[RTA-Serial0]ppp authentication-mode pap
8227
8228[RTA-Serial0]ip address 10.1.1.1 30
8229
8230The configuration on RTB is as follow:
8231
8232[RTB]interface Serial 0
8233
8234[RTB-Serial0]link-protocol ppp
8235
8236[RTB-Serial0]ppp pap local-user huawei password simple hello
8237
8238[RTB-Serial0]ip address 10.1.1.2 30
8239
8240With the configuration above, RTA and RTB are able to communicate with each other.
8241
8242Select one:
8243True
8244False
8245Feedback
8246The correct answer is 'False'.
8247Question 617
8248Correct
8249Mark 1 out of 1
8250Not flagged
8251Question text
8252One of the significant features of the PPP protocol is the authentication function. With this function, the two ends of a link can negotiate with each other to use which authentication protocol and then perform authentication. A PPP connection is established only when the authentication is successful.
8253
8254Select one:
8255True
8256False
8257Feedback
8258The correct answer is 'True'.
8259Question 618
8260Incorrect
8261Mark 0 out of 1
8262Not flagged
8263Question text
8264HDLC is a type of bit stream-oriented protocol used at Data Link Layer and it can transparently transmit data consisting of different collections of characters.
8265
8266Select one:
8267True
8268False
8269Feedback
8270The correct answer is 'True'.
8271Question 619
8272Correct
8273Mark 1 out of 1
8274Not flagged
8275Question text
8276RTA connects with RTB through interface Serial0. The configuration on RTA is as follow:
8277
8278[RTA]aaa
8279
8280[RTA-aaa]local-user huawei password cipher hello
8281
8282[RTA-aaa]local-user huawei service-type ppp
8283
8284[RTA]interface Serial 0
8285
8286[RTA-Serial0]link-protocol ppp
8287
8288[RTA-Serial0]ppp authentication-mode chap
8289
8290[RTA-Serial0]ip address 10.1.1.1 30
8291
8292The configuration on RTB is as follow:
8293
8294[RTB]interface Serial 0
8295
8296[RTB-Serial0]link-protocol ppp
8297
8298[RTB-Serial0]ppp chap user huawei
8299
8300[RTB-Serial0]ppp chap password cipher hello
8301
8302[RTB-Serial0]ip address 10.1.1.2 30
8303
8304With the configuration above, RTA and RTB are able to communicate with each other.
8305
8306Select one:
8307True
8308False
8309Feedback
8310The correct answer is 'True'.
8311Question 620
8312Incorrect
8313Mark 0 out of 1
8314Not flagged
8315Question text
8316In the PPP protocol, the dynamic negotiation is the same as the static negotiation in the IPCP flow. That is, in either dynamic or static negotiation, allocation of IP addresses is completed after one Config-Request dialog.
8317Select one:
8318True
8319False
8320Feedback
8321The correct answer is 'False'.
8322Question 621
8323Correct
8324Mark 1 out of 1
8325Not flagged
8326Question text
8327All the protocols in the standard HDLC protocol suite run on synchronous serial line.
8328
8329Select one:
8330True
8331False
8332Feedback
8333The correct answer is 'True'.
8334Question 622
8335Incorrect
8336Mark 0 out of 1
8337Not flagged
8338Question text
8339In data communications, the data format must be determined and agreed by the information creator and the information receiver before the data is transmitted.
8340Select one:
8341True
8342False
8343Feedback
8344The correct answer is 'True'.
8345Question 623
8346Correct
8347Mark 1 out of 1
8348Not flagged
8349Question text
8350The bus and star topologies, which are frequently used in a LAN, refer to the physical connection types rather than the logical structure of the network.
8351Select one:
8352True
8353False
8354Feedback
8355The correct answer is 'False'.
8356Question 624
8357Incorrect
8358Mark 0 out of 1
8359Not flagged
8360Question text
8361Regardless of multicast or unicast, an L2 switch establishes its MAC address table entries by means of MAC address learning.
8362Select one:
8363True
8364False
8365Feedback
8366The correct answer is 'False'.
8367Question 625
8368Correct
8369Mark 1 out of 1
8370Not flagged
8371Question text
8372On a port running frame relay, an MAP table corresponds to a logical port. Different logical ports have different MAP tables.
8373
8374Select one:
8375True
8376False
8377Feedback
8378The correct answer is 'True'.
8379Question 626
8380Correct
8381Mark 1 out of 1
8382Not flagged
8383Question text
8384The default format for encapsulating a frame relay protocol is IETF.
8385
8386Select one:
8387True
8388False
8389Feedback
8390The correct answer is 'True'.
8391Question 627
8392Correct
8393Mark 1 out of 1
8394Not flagged
8395Question text
8396When you configure Frame Relay on Quidway routers, you can configure Inverse ARP instead of static address mapping because the function of Inverse ARP is to provide dynamic address mapping.
8397
8398Select one:
8399True
8400False
8401Feedback
8402The correct answer is 'True'.
8403Question 628
8404Correct
8405Mark 1 out of 1
8406Not flagged
8407Question text
8408Frame relay point-to-multipoint sub-port can connect “multiple” remote nodes together through a PVC.
8409
8410Select one:
8411True
8412False
8413Feedback
8414The correct answer is 'False'.
8415Question 629
8416Incorrect
8417Mark 0 out of 1
8418Not flagged
8419Question text
8420The 10.1.1.2 IP address in the returned result of the frame relay command represents the IP address of the local device.
8421
8422[RTA\]dis fr map-info
8423
8424Map Statistics for interface Serial0 (DTE)
8425
8426DLCI = 100, IP INARP 10.1.1.2, Serial0
8427
8428create time = 2007/06/04 17:34:59, status = ACTIVE
8429
8430encapsulation = ietf, vlink = 20, broadcast
8431
8432Select one:
8433True
8434False
8435Feedback
8436The correct answer is 'False'.
8437Question 630
8438Correct
8439Mark 1 out of 1
8440Not flagged
8441Question text
8442In the PPP protocol, CHAP authentication involves exchange of three types of packets at different times. To match the Request packet with a Reply packet, each packet contains an Identifier field. In each authentication process, all the packets use the same Identifier information.
8443
8444Select one:
8445True
8446False
8447Feedback
8448The correct answer is 'True'.
8449Question 631
8450Incorrect
8451Mark 0 out of 1
8452Not flagged
8453Question text
8454One of the significant features of the PPP protocol is the authentication function. With this function, the two ends of a link can negotiate with each other to use which authentication protocol and then perform authentication. A PPP connection is established only when the authentication is successful.
8455
8456Select one:
8457True
8458False
8459Feedback
8460The correct answer is 'True'.
8461Question 632
8462Incorrect
8463Mark 0 out of 1
8464Not flagged
8465Question text
8466In the PPP protocol, the dynamic negotiation is the same as the static negotiation in the IPCP flow. That is, in either dynamic or static negotiation, allocation of IP addresses is completed after one Config-Request dialog.
8467Select one:
8468True
8469False
8470Feedback
8471The correct answer is 'False'.
8472Question 633
8473Incorrect
8474Mark 0 out of 1
8475Not flagged
8476Question text
8477IP addresses are layer-specific. A Layer 3 network device does not necessarily store the IP address of every host; instead, it stores the IP address of each network segment. This reduces the entries in a routing table to a great extent while improving routing flexibility.
8478Select one:
8479True
8480False
8481Feedback
8482The correct answer is 'True'.
8483Question 634
8484Incorrect
8485Mark 0 out of 1
8486Not flagged
8487Question text
8488The ICMP protocol (RFC792) is not applied to Application Layer but Network Layer.
8489Select one:
8490True
8491False
8492Feedback
8493The correct answer is 'True'.
8494Question 635
8495Correct
8496Mark 1 out of 1
8497Not flagged
8498Question text
8499In data communications, the data format must be determined and agreed by the information creator and the information receiver before the data is transmitted.
8500Select one:
8501True
8502False
8503Feedback
8504The correct answer is 'True'.
8505Question 636
8506Correct
8507Mark 1 out of 1
8508Not flagged
8509Question text
8510VRP uses a component-based system architecture. It provides various functions and features in addition to application-based scalability and customization.
8511Select one:
8512True
8513False
8514Feedback
8515The correct answer is 'True'.
8516Question 637
8517Incorrect
8518Mark 0 out of 1
8519Not flagged
8520Question text
8521When VRP platform is configured as TFTP client, it can transmit files in binary mode and ASCII mode.
8522Select one:
8523True
8524False
8525Feedback
8526The correct answer is 'False'.
8527Finish review