· 6 years ago · Oct 16, 2019, 06:46 AM
1Started on Wednesday, 16 October 2019, 1:50 PM
2State Finished
3Completed on Wednesday, 16 October 2019, 2:35 PM
4Time taken 45 mins 20 secs
5Marks 169/637
6Grade 26 out of 100
7Question 1
8Incorrect
9Mark 0 out of 1
10 Not flaggedFlag question
11Question text
12(Multiple Choice) Which of the following network topologies are the widely used backbone network topologies?
13Select one or more:
14a. Full Mesh
15b. Plane and Space Hierarchical structure
16c. Plane Hierarchical structure
17d. Multi-homing structure
18Feedback
19The correct answers are: Plane Hierarchical structure, Plane and Space Hierarchical structure
20Question 2
21Partially correct
22Mark 0 out of 1
23 Not flaggedFlag question
24Question text
25(Multiple Choice) The metropolitan area network which is located between backbone network and access network consists of
26Select one or more:
27a. Access layer
28b. Convergence layer
29c. Carrier layer
30d. Core layer
31Feedback
32The correct answers are: Core layer, Convergence layer, Access layer
33Question 3
34Incorrect
35Mark 0 out of 1
36 Not flaggedFlag question
37Question text
38(Single Choice) In a complete IP network, which of the following networks does a Layer 2 network under the service access control point belong to?
39Select one:
40a. Backbone network
41b. Core network
42c. Metropolitan area network (MAN)
43d. Access network
44Feedback
45The correct answer is: Access network
46Question 4
47Incorrect
48Mark 0 out of 1
49 Not flaggedFlag question
50Question text
51(Multiple Choice) When a backbone network uses dual planes, which of the following statements are true?
52Select one or more:
53a. Compared with a dual-plane structure, a hierarchical plane is more reliable.
54b. The two planes generally carry different services.
55c. In normal situations, the services on the two planes do not affect each other.
56d. When a fault occurs on one plane, the other plane cannot function as the backup of the faulty plane.
57Feedback
58The correct answers are: The two planes generally carry different services., In normal situations, the services on the two planes do not affect each other.
59Question 5
60Incorrect
61Mark 0 out of 1
62 Not flaggedFlag question
63Question text
64(Multiple Choice) On Huawei VRP platform, which of the following can be used to invoke the history command saved by the command line interface?
65Select one or more:
66a. Ctrl+U
67b. Left cursor key < >
68c. Ctrl+P
69d. Up cursor key < >
70Feedback
71The correct answers are: Up cursor key < >, Ctrl+P
72Question 6
73Incorrect
74Mark 0 out of 1
75 Not flaggedFlag question
76Question text
77(Single Choice) Which of the following commands is used to enter the system-view from the user view on a Huawei router?
78Select one:
79a. enable
80b. system-view
81c. configure terminal
82d. interface system
83Feedback
84The correct answer is: system-view
85Question 7
86Incorrect
87Mark 0 out of 1
88 Not flaggedFlag question
89Question text
90(Single Choice) On VRP platform, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?
91Select one:
92a. Monitoring level
93b. Management level
94c. Visit level
95d. Configuration level
96Feedback
97The correct answer is: Configuration level
98Question 8
99Partially correct
100Mark 0 out of 1
101 Not flaggedFlag question
102Question text
103(Multiple Choice) Which of the following statements about the command view of VRP are true?
104Select one or more:
105a. A service command can switch a view from the system view to the corresponding service view.
106b. The System-view command can switch a view from the user view to the system view.
107c. Different views may have different commands.
108d. The Quit command can switch a view from the system view to the user view.
109Feedback
110The correct answers are: The System-view command can switch a view from the user view to the system view., A service command can switch a view from the system view to the corresponding service view., The Quit command can switch a view from the system view to the user view., Different views may have different commands.
111Question 9
112Incorrect
113Mark 0 out of 1
114 Not flaggedFlag question
115Question text
116(Single Choice) Which of the following must be used to establish the configuration environment when a router is powered on for the first time?
117Select one:
118a. SSL
119b. Console port
120c. Telnet
121d. SSH
122Feedback
123The correct answer is: Console port
124Question 10
125Incorrect
126Mark 0 out of 1
127 Not flaggedFlag question
128Question text
129(Single Choice) Which of the following parameter settings for terminal emulation are correct when configuring a Huawei router through the Console port?
130Select one:
131a. 4800bps, 8 data bits,1 stop bits, odd parity check, and no flow control
132b. 9600bps, 8 data bits, 1 stop bits, no parity check, and no flow control
133c. 9600bps, 8 data bits, 1 stop bits, even parity check, and hardware flow control
134d. 19200bps, 8 data bits, 1 stop bits, no parity check, and no flow control
135Feedback
136The correct answer is: 9600bps, 8 data bits, 1 stop bits, no parity check, and no flow control
137Question 11
138Incorrect
139Mark 0 out of 1
140 Not flaggedFlag question
141Question text
142(Single Choice) Which of the following commands can be used to view the current configurations on a Quidway router?
143Select one:
144a. show startup- configuration
145b. view saved-configuration
146c. display current-configuration
147d. display saved-configuration
148Feedback
149The correct answer is: display current-configuration
150Question 12
151Partially correct
152Mark 0 out of 1
153 Not flaggedFlag question
154Question text
155(Multiple Choice) Which of the following storage devices are supported by Huawei Quidway router?
156Select one or more:
157a. NVRAM
158b. SDRAM
159c. CF Card
160d. Hard Disk
161e. Flash
162Feedback
163The correct answers are: SDRAM, NVRAM, Flash, CF Card
164Question 13
165Incorrect
166Mark 0 out of 1
167 Not flaggedFlag question
168Question text
169(Single Choice) Which of the following storage devices is used to store the startup configuration files in a router?
170Select one:
171a. Flash
172b. NVRAM
173c. SDRAM
174d. BootROM
175Feedback
176The correct answer is: NVRAM
177Question 14
178Incorrect
179Mark 0 out of 1
180 Not flaggedFlag question
181Question text
182(Single Choice) On VRP platform, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?
183Select one:
184a. Management level
185b. Visit level
186c. Configuration level
187d. Monitoring level
188Feedback
189The correct answer is: Configuration level
190Question 15
191Correct
192Mark 1 out of 1
193 Not flaggedFlag question
194Question text
195(Single Choice) An adminstrator has been requested to replace the configuration file of a router in the network. The administrator has been instructed that after logging into the router, he must first permenantly erase the current configuration file config.zip from the system. Which command should he use to achieve this?
196Select one:
197a. delete /unreserved config.zip
198b. reset config.zip
199c. delete /force config.zip
200d. clear config.zip
201Feedback
202The correct answer is: delete /unreserved config.zip
203Question 16
204Incorrect
205Mark 0 out of 1
206 Not flaggedFlag question
207Question text
208(Multiple Choice) Which of the following products use the VRP platform as the core engine of their software?
209Select one or more:
210a. LTE
211b. Router
212c. Service gateway
213d. Ethernet switch
214Feedback
215The correct answers are: Router, Ethernet switch, Service gateway
216Question 17
217Partially correct
218Mark 0 out of 1
219 Not flaggedFlag question
220Question text
221(Multiple Choice) What functions does VRP provide?
222Select one or more:
223a. Provides a unified user interface and a unified management window.
224b. Blocks communication between a forwarding plane and the VRP control plane.
225c. Defines interfaces of a forwarding plane.
226d. Provides the functions of a control plane.
227Feedback
228The correct answers are: Provides a unified user interface and a unified management window., Provides the functions of a control plane., Defines interfaces of a forwarding plane.
229Question 18
230Correct
231Mark 1 out of 1
232 Not flaggedFlag question
233Question text
234(Single Choice) Which component of the VRP platform provides user authentication charging and user policy management?
235Select one:
236a. Service control plane
237b. None of the above
238c. Versatile control plane
239d. System management plane
240Feedback
241The correct answer is: Service control plane
242Question 19
243Incorrect
244Mark 0 out of 1
245 Not flaggedFlag question
246Question text
247(Single Choice) On VRP platform, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?
248Select one:
249a. Visit level
250b. Configuration level
251c. Monitoring level
252d. Management level
253Feedback
254The correct answer is: Configuration level
255Question 20
256Correct
257Mark 1 out of 1
258 Not flaggedFlag question
259Question text
260(Single Choice) <Huawei>display startup
261MainBoard:
262Startup system software: sd1:/ar2220-v200r003c00spc200.cc
263Next startup system software: sd1:/ar2220-v200r003c00spc200.cc
264Backup system software for next startup: null
265Startup saved-configuration file: null
266Next startup saved-configuration file: null
267Startup license file: null
268Next startup license file: null
269Startup patch package: null
270Next startup patch package: null
271Startup voice-files: null
272Next startup voice-files: null
273Refer to the display output. Which statement is false?
274Select one:
275a. The next startup system software cannot be changed.
276b. The current configuration file has not been saved.
277c. The next startup system software can be changed by using the “startup system software .cc
278d. The current startup system software is ar2220-v200r003c00spc200.cc
279Feedback
280The correct answer is: The next startup system software cannot be changed.
281Question 21
282Incorrect
283Mark 0 out of 1
284 Not flaggedFlag question
285Question text
286(Single Choice) Which of the following must be used to establish the configuration environment when a router is powered on for the first time?
287Select one:
288a. SSH
289b. Telnet
290c. SSL
291d. Console port
292Feedback
293The correct answer is: Console port
294Question 22
295Incorrect
296Mark 0 out of 1
297 Not flaggedFlag question
298Question text
299(Single Choice) Workstation A and workstation B are respectively connected to two ports of a switch. Assume the MAC table of the switch is empty now. Which of the following statements is true as soon as the switch receives the first packet sent by Workstation A to Workstation B?
300Select one:
301a. The switch will learn addresses of both A and B
302b. The switch will learn address of B
303c. The switch will not learn any address
304d. The switch will learn address of A
305Feedback
306The correct answer is: The switch will learn address of A
307Question 23
308Incorrect
309Mark 0 out of 1
310 Not flaggedFlag question
311Question text
312(Single Choice) <Quidway>display mac-address
313-------------------------------------------------------------------------------
314MAC Address VLAN/VSI Learned-From Type
315-------------------------------------------------------------------------------
3165489-98ec-f018 1/- GE0/0/13 dynamic
317-------------------------------------------------------------------------------
318Total items displayed = 1
319Select one:
320a. The switch will report that the destination is unreachable and report this to the source.
321b. The switch will send a request to obtain the MAC address of 5489-98ec-f011.
322c. The switch will flood the frame via all ports, with exception of the port on which the frame was received.
323d. The switch will drop the frame because it does not have an entry in its MAC address table
324Feedback
325The correct answer is: The switch will flood the frame via all ports, with exception of the port on which the frame was received.
326Question 24
327Incorrect
328Mark 0 out of 1
329 Not flaggedFlag question
330Question text
331(Single Choice) A server is linked to port interface G0/0/1 of a switch. The administrator wishes to allow only this server to be linked to this interface on the switch. Which method can be used to achieve this?
332Select one:
333a. Configure a static ARP entry using the server’s IP address and MAC address in the switch.
334b. It is not possible to enable a single device to be associated with an interface.
335c. Configure the default gateway of the switch to be the same as the server’s IP address.
336d. Configure a static MAC address binding entry of the server’s MAC address and the interface in the switch.
337Feedback
338The correct answer is: Configure a static MAC address binding entry of the server’s MAC address and the interface in the switch.
339Question 25
340Incorrect
341Mark 0 out of 1
342 Not flaggedFlag question
343Question text
344(Single Choice) An administrator connects two switches together in a local enterprise network. The ports of one switch support Fast Ethernet, while the ports of the other switch support Gigabit Ethernet. Hosts connected to one switch are able to communicate, however communication between the two switches fails. What is the possible reason for this?
345Select one:
346a. The port of one switch is operating using half duplex mode, while the port of the other switch is using full duplex mode.
347b. A Fast Ethernet port cannot communicate directly with a Gigabit Ethernet port.
348c. The ports have disabled auto-negoatition.
349d. One port is supporting auto-negotiation, while auto-negotiation is disabled on the port of the other switch.
350Feedback
351The correct answer is: The ports have disabled auto-negoatition.
352Question 26
353Incorrect
354Mark 0 out of 1
355 Not flaggedFlag question
356Question text
357(Single Choice) STP is short for ?
358Select one:
359a. Rapid spanning tree protocol
360b. Shortest path tree protocol
361c. Sharing tree protocol
362d. Spanning tree protocol
363Feedback
364The correct answer is: Spanning tree protocol
365Question 27
366Incorrect
367Mark 0 out of 1
368 Not flaggedFlag question
369Question text
370(Single Choice) Devices need to exchange information and parameters in order to calculate a spanning tree. Such information and parameters are encapsulated into a certain unit when they are exchanged between devices. Which type of unit are the information and parameters encapsulated into?
371Select one:
372a. TCP BPDU
373b. Configured STP
374c. Configured RSTP
375d. Configured BPDU
376Feedback
377The correct answer is: Configured BPDU
378Question 28
379Incorrect
380Mark 0 out of 1
381 Not flaggedFlag question
382Question text
383(Single Choice) How many root bridges does the STP protocol select from all the network bridges when calculating a spanning tree?
384Select one:
385a. 4
386b. 2
387c. 1
388d. 3
389Feedback
390The correct answer is: 1
391Question 29
392Incorrect
393Mark 0 out of 1
394 Not flaggedFlag question
395Question text
396(Single Choice) Which attribute is selection of a root bridge based on when the spanning tree is calculated by the STP?
397Select one:
398a. Port ID
399b. Port Cost
400c. Bridge ID
401d. Path Cost
402Feedback
403The correct answer is: Bridge ID
404Question 30
405Incorrect
406Mark 0 out of 1
407 Not flaggedFlag question
408Question text
409(Single Choice) STP calculates the overall cost of each path between a non-root bridge and a root bridge. What is a port on the non-root bridge called on the path that has the minimum overall cost?
410Select one:
411a. Common port
412b. Designated port
413c. Root port
414d. Queue port
415Feedback
416The correct answer is: Root port
417Question 31
418Incorrect
419Mark 0 out of 1
420 Not flaggedFlag question
421Question text
422(Single Choice) In STP calculation, a port identifier consists of two parts: one-byte ( ) and one-byte port number.
423Select one:
424a. Link priority
425b. Port MAC address
426c. Bridge MAC address
427d. Port priority
428Feedback
429The correct answer is: Port priority
430Question 32
431Partially correct
432Mark 1 out of 1
433 Not flaggedFlag question
434Question text
435(Multiple Choice) The existence of loop in switched network can lead to
436Select one or more:
437a. Broadcast storm
438b. Destination unreachable
439c. Unstable MAC address table
440d. Route self-loop
441Feedback
442The correct answers are: Broadcast storm, Unstable MAC address table
443Question 33
444Incorrect
445Mark 0 out of 1
446 Not flaggedFlag question
447Question text
448(Single Choice) Which of the following statements regarding layer-2 switch is incorrect?
449Select one:
450a. Layer-2 LAN switch operates at data link layer
451b. Layer-3 header is modified before the received packet is transmitted
452c. Learn MAC address automatically
453d. Layer-2 header is modified before the received packet is transmitted.
454Feedback
455The correct answer is: Layer-3 header is modified before the received packet is transmitted
456Question 34
457Partially correct
458Mark 0 out of 1
459 Not flaggedFlag question
460Question text
461(Multiple Choice) Which of the following are the functions of STP in switched network?
462Select one or more:
463a. Eliminate the possible loops by blocking the redundant paths
464b. Improve bridge network availability by providing logical path redundancy
465c. Activate the redundant backup path when the active path becomes faulty.
466d. Improve bridge network availability by providing physical path redundancy
467Feedback
468The correct answers are: Improve bridge network availability by providing physical path redundancy, Eliminate the possible loops by blocking the redundant paths, Activate the redundant backup path when the active path becomes faulty.
469Question 35
470Correct
471Mark 1 out of 1
472 Not flaggedFlag question
473Question text
474(Single Choice) The standard for STP defined by IEEE is
475Select one:
476a. 802.1D
477b. 802.3
478c. 802.11b
479d. 802.1Q
480Feedback
481The correct answer is: 802.1D
482Question 36
483Partially correct
484Mark 0 out of 1
485 Not flaggedFlag question
486Question text
487(Multiple Choice) Which of the following descriptions about STP are incorrect?
488Select one or more:
489a. The switch with the smallest priority value is elected as non-root switch
490b. All the ports of the root switch are designated port
491c. All the ports of the root switch are root port
492d. A layer-2 switching network can have only one designated switch
493Feedback
494The correct answers are: A layer-2 switching network can have only one designated switch, All the ports of the root switch are root port, The switch with the smallest priority value is elected as non-root switch
495Question 37
496Partially correct
497Mark 1 out of 1
498 Not flaggedFlag question
499Question text
500(Multiple Choice) In STP, the bridge ID consists of two parts. They are ( ) and ( ).
501Select one or more:
502a. Switch MAC address
503b. Switch IP address
504c. Switch Port ID
505d. Switch priority
506Feedback
507The correct answers are: Switch priority, Switch MAC address
508Question 38
509Incorrect
510Mark 0 out of 1
511 Not flaggedFlag question
512Question text
513(Single Choice) In STP, what is the length of bridge ID?
514Select one:
515a. 48 bits
516b. 64 bits
517c. 32 bits
518d. 8 bits
519Feedback
520The correct answer is: 64 bits
521Question 39
522Correct
523Mark 1 out of 1
524 Not flaggedFlag question
525Question text
526(Single Choice) Which of the following descriptions about STP is incorrect?
527Select one:
528a. STP can prevent from temporary loss of connectivity
529b. STP can make LAN switch operates normally in a switched network environment with loops
530c. STP can block redundant links to eliminate loops
531d. STP can manage the redundant links
532Feedback
533The correct answer is: STP can prevent from temporary loss of connectivity
534Question 40
535Incorrect
536Mark 0 out of 1
537 Not flaggedFlag question
538Question text
539(Single Choice) Which of the following descriptions about port state transition of STP are incorrect?
540Select one:
541a. Forwarding state can transit to Blocking state directly
542b. Learning state can transit to Blocking state directly
543c. Learning state can transit to Forwarding state directly
544d. Blocking state can transit to Forwarding state directly
545Feedback
546The correct answer is: Blocking state can transit to Forwarding state directly
547Question 41
548Incorrect
549Mark 0 out of 1
550 Not flaggedFlag question
551Question text
552(Single Choice) During STP calculation, STP selects a designated port and bridge for each network segment. In this selection process, STP first compares ( ) of the port connected to the network segment and selects the one with the lowest number.
553Select one:
554a. Link priority
555b. Port identifier
556c. Root path cost
557d. Port MAC address
558Feedback
559The correct answer is: Root path cost
560Question 42
561Partially correct
562Mark 0 out of 1
563 Not flaggedFlag question
564Question text
565(Multiple Choice) Which of the following ports are defined by STP and indicate that Physical Layer and Data Link Layer are working normally and STP is enabled at ports on a device?
566Select one or more:
567a. Alternate Port
568b. Root Port
569c. Designated Port
570d. Disable Port
571Feedback
572The correct answers are: Root Port, Designated Port, Alternate Port
573Question 43
574Correct
575Mark 1 out of 1
576 Not flaggedFlag question
577Question text
578(Single Choice) During STP calculation, when a port is in a certain state, it neither forwards any data frame nor learns MAC address tables. It takes part in only spanning tree calculation in addition to receiving and sending STP protocol packets. Which state does the abovementioned state refer to?
579Select one:
580a. Listening
581b. Blocking
582c. Forwarding
583d. Learning
584Feedback
585The correct answer is: Listening
586Question 44
587Correct
588Mark 1 out of 1
589 Not flaggedFlag question
590Question text
591(Single Choice) During STP calculation, when a port is in a certain state, it neither forwards any data frame nor learns MAC address tables. Instead, it only receives and processes STP protocol packets. Which state does the abovementioned state refer to?
592Select one:
593a. Blocking
594b. Listening
595c. Learning
596d. Forwarding
597Feedback
598The correct answer is: Blocking
599Question 45
600Incorrect
601Mark 0 out of 1
602 Not flaggedFlag question
603Question text
604(Single Choice) Workstation A and workstation B are connected to two different switch ports respectively. Assume that workstation B hasn't sent any packet yet. Which of the following statements is true when workstation A starts sending the first packet to workstation B?
605Select one:
606a. The switch learns the address of workstation B and sends the packet to the port that is connected with B
607b. The switch learns address of workstation A and broadcasts the packet out of all the ports
608c. The switch learns address of workstation A and broadcasts the packet out of all the ports except for the port that received the packet
609d. The destination port of workstation B is not found in switch's MAC table an the packet is discarded
610Feedback
611The correct answer is: The switch learns address of workstation A and broadcasts the packet out of all the ports except for the port that received the packet
612Question 46
613Incorrect
614Mark 0 out of 1
615 Not flaggedFlag question
616Question text
617(Single Choice) In OSI reference model, Layer 2 LAN switch operates at
618Select one:
619a. Network layer
620b. Data link layer
621c. Application layer
622d. Physical layer
623Feedback
624The correct answer is: Data link layer
625Question 47
626Incorrect
627Mark 0 out of 1
628 Not flaggedFlag question
629Question text
630(Multiple Choice) Which of the following descriptions about STP are correct?
631Select one or more:
632a. All the ports of the root switch are root port
633b. All the ports of the root switch are designated port
634c. The switch with the smallest priority value is elected as the root switch
635d. A network can have only one root switch
636Feedback
637The correct answers are: A network can have only one root switch, All the ports of the root switch are designated port, The switch with the smallest priority value is elected as the root switch
638Question 48
639Partially correct
640Mark 0 out of 1
641 Not flaggedFlag question
642Question text
643(Multiple Choice) In STP, the role of switch port includes ( )
644Select one or more:
645a. Root port
646b. Backup root port
647c. Optional port
648d. Alternate port
649e. Designated port
650Feedback
651The correct answers are: Root port, Alternate port, Designated port
652Question 49
653Incorrect
654Mark 0 out of 1
655 Not flaggedFlag question
656Question text
657(Single Choice) As specified by the RSTP protocol, when a root port fails, which type of port will function as a new root port and enters the forwarding state without any delay?
658Select one:
659a. Edge Port
660b. Forwarding Port
661c. Backup Port
662d. Alternate Port
663Feedback
664The correct answer is: Alternate Port
665Question 50
666Correct
667Mark 1 out of 1
668 Not flaggedFlag question
669Question text
670(Single Choice) The main idea of STP is to generate a loop-free tree by exchanging a special kind of message between bridges. This message is called
671Select one:
672a. Configuration BPDU
673b. Hello BPDU
674c. TCN BPDU
675d. Update BPDU
676Feedback
677The correct answer is: Configuration BPDU
678Question 51
679Correct
680Mark 1 out of 1
681 Not flaggedFlag question
682Question text
683(Single Choice) In the RSTP standard, a port is able to connect to a terminal directly and enter the forwarding state without delay. Which of the following ports represents such a port?
684Select one:
685a. Edge port
686b. Backup port
687c. Root port
688d. Fast port
689Feedback
690The correct answer is: Edge port
691Question 52
692Partially correct
693Mark 0 out of 1
694 Not flaggedFlag question
695Question text
696(Multiple Choice) Which of the following are the interface states of STP?
697Select one or more:
698a. Disabled
699b. Shut down
700c. Forwarding
701d. Blocking
702e. Learning
703Feedback
704The correct answers are: Disabled, Blocking, Learning, Forwarding
705Question 53
706Incorrect
707Mark 0 out of 1
708 Not flaggedFlag question
709Question text
710(Single Choice) Which of the following descriptions about learning state in STP is incorrect?
711Select one:
712a. The port in learning state can only learn the source MAC address but cannot transmit the data packet.
713b. The port in learning state can forward part of the data packet
714c. The port in learning state can learn the source MAC address of data packet
715d. The port in learning state can receive and send BPDU
716Feedback
717The correct answer is: The port in learning state can forward part of the data packet
718Question 54
719Incorrect
720Mark 0 out of 1
721 Not flaggedFlag question
722Question text
723(Single Choice) Which of the following descriptions about blocking state in STP is incorrect?
724Select one:
725a. The port in blocking state can receive BPDU
726b. The port in blocking state does not forward data packets
727c. The port in blocking state does not receive any data packets
728d. The port in blocking state does not learn source MAC address of data packet
729Feedback
730The correct answer is: The port in blocking state does not receive any data packets
731Question 55
732Incorrect
733Mark 0 out of 1
734 Not flaggedFlag question
735Question text
736(Single Choice) STP uses ( ) timer to prevent from temporary loop when the link is fault?
737Select one:
738a. Message Age
739b. Hello Time
740c. Forward Delay
741d. Max Age
742Feedback
743The correct answer is: Forward Delay
744Question 56
745Incorrect
746Mark 0 out of 1
747 Not flaggedFlag question
748Question text
749(Single Choice) On Huawei switches running STP,the default value of forward delay is ( ) seconds.
750Select one:
751a. 20
752b. 30
753c. 10
754d. 15
755Feedback
756The correct answer is: 15
757Question 57
758Partially correct
759Mark 0 out of 1
760 Not flaggedFlag question
761Question text
762(Multiple Choice) Which of the following are the advantages of RSTP compared with STP?
763Select one or more:
764a. A new root port is elected on the non-root switch and the previous old root port is no longer in forwarding state. Moreover the designated port of the segment which connects with the new root port already starts to forward the data. In this case, the new root port can enter forwarding state immediately.
765b. Once a port of the switch which is configured as edge port has been enabled, it will become designated port immediately and transit to forwarding state.
766c. If the designated port is connected with P2P link, it can make a handshake with the connected bridge and enter the forwarding state immediately after it receives the response.
767d. If the designated port is connected with P2MP link, it can make a handshake with the connected bridge and enter the forwarding state immediately after it receives the response.
768Feedback
769The correct answers are: A new root port is elected on the non-root switch and the previous old root port is no longer in forwarding state. Moreover the designated port of the segment which connects with the new root port already starts to forward the data. In this case, the new root port can enter forwarding state immediately., Once a port of the switch which is configured as edge port has been enabled, it will become designated port immediately and transit to forwarding state., If the designated port is connected with P2P link, it can make a handshake with the connected bridge and enter the forwarding state immediately after it receives the response.
770Question 58
771Partially correct
772Mark 0 out of 1
773 Not flaggedFlag question
774Question text
775(Multiple Choice) Which of the following are disadvantages of “single” spanning tree?
776Select one or more:
777a. Hosts belong to the same VLAN connected to different switches may not be able to communicate each other
778b. Convergence is slow
779c. Sub-optimal path may exist
780d. Load balancing can not be implemented
781Feedback
782The correct answers are: Hosts belong to the same VLAN connected to different switches may not be able to communicate each other, Load balancing can not be implemented, Sub-optimal path may exist
783Question 59
784Incorrect
785Mark 0 out of 1
786 Not flaggedFlag question
787Question text
788(Single Choice) As specified by the RSTP protocol, when a designated port fails, which type of port will function as a new designated port and enters the forwarding state without any delay?
789Select one:
790a. Forwarding Port
791b. Backup Port
792c. Alternate Port
793d. Edge Port
794Feedback
795The correct answer is: Backup Port
796Question 60
797Correct
798Mark 1 out of 1
799 Not flaggedFlag question
800Question text
801(Single Choice) IGP is the protocol which is used in
802Select one:
803a. An Autonomous System
804b. Within the range of classful address
805c. A LAN
806d. An area
807Feedback
808The correct answer is: An Autonomous System
809Question 61
810Partially correct
811Mark 1 out of 1
812 Not flaggedFlag question
813Question text
814(Multiple Choice) According to the algorithms, routing protocols fall into two categories. They are
815Select one or more:
816a. Link-state
817b. IGP
818c. Distance Vector
819d. EGP
820Feedback
821The correct answers are: Distance Vector, Link-state
822Question 62
823Partially correct
824Mark 1 out of 1
825 Not flaggedFlag question
826Question text
827(Multiple Choice) Which of the following items are the contents of the routing table?
828Select one or more:
829a. Cost, Interface, and Next hop
830b. Destination
831c. Node
832d. Router
833Feedback
834The correct answers are: Destination, Cost, Interface, and Next hop
835Question 63
836Incorrect
837Mark 0 out of 1
838 Not flaggedFlag question
839Question text
840(Multiple Choice) A routing table can be formed by using different methods. Which of the following protocols are used to form a routing table?
841Select one or more:
842a. Transport-level protocol
843b. Dynamic routing protocol
844c. Application-level protocol
845d. Static routing protocol
846Feedback
847The correct answers are: Static routing protocol, Dynamic routing protocol
848Question 64
849Incorrect
850Mark 0 out of 1
851 Not flaggedFlag question
852Question text
853(Multiple Choice) What functions does a router mainly provide?
854Select one or more:
855a. Determine the information source.
856b. Check the destination address in a datagram.
857c. Verify and maintain route information.
858d. Discover possible routes.
859Feedback
860The correct answers are: Check the destination address in a datagram., Discover possible routes., Verify and maintain route information.
861Question 65
862Partially correct
863Mark 0 out of 1
864 Not flaggedFlag question
865Question text
866(Multiple Choice) When the value of the proto field of a route in a routing table is direct, it indicates that this route is a
867Select one or more:
868a. Port route
869b. Route discovered by the protocol at the link layer
870c. Direct route
871d. Default route
872Feedback
873The correct answers are: Route discovered by the protocol at the link layer, Port route, Default route
874Question 66
875Partially correct
876Mark 1 out of 1
877 Not flaggedFlag question
878Question text
879(Multiple Choice) Which of the following statements are true?
880Select one or more:
881a. A protocol at the link layer can discover only a route in a network segment connected directly to a port.
882b. A route discovered by a protocol at the link layer need not be maintained.
883c. A protocol at the link layer can discover only a route across different network segments.
884d. A protocol at the link layer can discover only a route to a loopback address.
885Feedback
886The correct answers are: A route discovered by a protocol at the link layer need not be maintained., A protocol at the link layer can discover only a route in a network segment connected directly to a port.
887Question 67
888Partially correct
889Mark 1 out of 1
890 Not flaggedFlag question
891Question text
892(Multiple Choice) Which of the following statements are correct?
893Select one or more:
894a. The calculation of cost may be based on “single” link attribute or several link attributes such as delay, hop count, bandwidth and etc.
895b. When several dynamic routing protocols have the best routes to the same destination, all these routes will be added to the routing table.
896c. The calculation method of the preference and cost in the routing table are same.
897d. Some of the dynamic routing protocols calculate the best path base on the cost value. However, Different routing protocol calculates the metric in different ways
898Feedback
899The correct answers are: The calculation of cost may be based on “single” link attribute or several link attributes such as delay, hop count, bandwidth and etc., Some of the dynamic routing protocols calculate the best path base on the cost value. However, Different routing protocol calculates the metric in different ways
900Question 68
901Incorrect
902Mark 0 out of 1
903 Not flaggedFlag question
904Question text
905(Multiple Choice) Which of the following statements are incorrect?
906Select one or more:
907a. By default, OSPF is more preferred to RIP.
908b. For those routes to the same destination on VRP platform, the one with higher preference value is more preferred over the one with lower preference value.
909c. The preferences for each static routes entry can be different.
910d. The greater the cost, the better the route is.
911Feedback
912The correct answers are: The greater the cost, the better the route is., For those routes to the same destination on VRP platform, the one with higher preference value is more preferred over the one with lower preference value.
913Question 69
914Partially correct
915Mark 0 out of 1
916 Not flaggedFlag question
917Question text
918(Multiple Choice) Which of the following factors may result in routing loops?
919Select one or more:
920a. Temporary routing loops that occur during route convergence
921b. Loop avoidance information is lost when the routes are imported between two different routing domains
922c. Link-state routing protocol algorithms
923d. Configuration errors
924Feedback
925The correct answers are: Temporary routing loops that occur during route convergence, Loop avoidance information is lost when the routes are imported between two different routing domains, Configuration errors
926Question 70
927Incorrect
928Mark 0 out of 1
929 Not flaggedFlag question
930Question text
931(Single Choice) Which of the following statements regarding routing protocol is correct?
932Select one:
933a. A method that defines the format and function of the fields for data packet
934b. A protocol that defines the mode and time of the binding of MAC address and IP address
935c. A protocol that achieves route selection through an algorithm
936d. A protocol that allows the data packets transmitted between hosts.
937Feedback
938The correct answer is: A protocol that achieves route selection through an algorithm
939Question 71
940Partially correct
941Mark 0 out of 1
942 Not flaggedFlag question
943Question text
944(Multiple Choice) Routing metric is a value that measures the cost of the route to the designated destination and it is used to calculate the best path. Which of the following factors can affect the metric of a route?
945Select one or more:
946a. Hop count
947b. CPU of the router
948c. Delay/bandwidth
949d. Line occupation ratio
950Feedback
951The correct answers are: Delay/bandwidth, CPU of the router, Hop count
952Question 72
953Incorrect
954Mark 0 out of 1
955 Not flaggedFlag question
956Question text
957(Single Choice) What does the distance vector routing protocol focus on according to the discovered routes and calculated routes?
958Select one:
959a. Link bandwidth resource information
960b. The number of hops on between the router and the destination
961c. The address of the next hop specified manually
962d. Whether the egress port on the route belongs to a port aggregation group
963Feedback
964The correct answer is: The number of hops on between the router and the destination
965Question 73
966Correct
967Mark 1 out of 1
968 Not flaggedFlag question
969Question text
970(Single Choice) Equal-cost routes are the routes that have the same
971Select one:
972a. Cost
973b. Priority
974c. Next hop
975d. Egress port
976Feedback
977The correct answer is: Cost
978Question 74
979Correct
980Mark 1 out of 1
981 Not flaggedFlag question
982Question text
983(Single Choice) Each router only knows how to forward the packet to the next hop IP address. It doesn't know the end to end forwarding path. This type of forwarding is called
984Select one:
985a. Hop by hop forwarding
986b. Network by network forwarding
987c. Host by host forwarding
988d. Router by router forwarding
989Feedback
990The correct answer is: Hop by hop forwarding
991Question 75
992Incorrect
993Mark 0 out of 1
994 Not flaggedFlag question
995Question text
996(Single Choice) Which of the following is used by routers to forward the packets on the network?
997Select one:
998a. DNS lookups
999b. Routing tables
1000c. MAC address tables
1001d. ARP tables
1002Feedback
1003The correct answer is: Routing tables
1004Question 76
1005Incorrect
1006Mark 0 out of 1
1007 Not flaggedFlag question
1008Question text
1009(Single Choice) Which of the following statements regarding routing convergence is correct?
1010Select one:
1011a. Convergence is a process of combining the routing tables of two routers.
1012b. Convergence is a process of establishing neighbor relationships between any two routers by sending hello packets.
1013c. Convergence is a process that occurs due to network topology changes.
1014d. Convergence is a process of synchronizing all routing tables for all the routers in the network. It is the process for a router to reach the stable and consistence state after the network changes.
1015Feedback
1016The correct answer is: Convergence is a process of synchronizing all routing tables for all the routers in the network. It is the process for a router to reach the stable and consistence state after the network changes.
1017Question 77
1018Incorrect
1019Mark 0 out of 1
1020 Not flaggedFlag question
1021Question text
1022(Single Choice) The data link layer in a router receives a packet from upper layer and the length of the packet is greater than the MTU of the interface that will transmit this packet. What will the router do?
1023Select one:
1024a. requests the source router to reduce the length of the packet
1025b. Fragment the packet
1026c. Forward the packet directly
1027d. Discard the packet
1028Feedback
1029The correct answer is: Fragment the packet
1030Question 78
1031Incorrect
1032Mark 0 out of 1
1033 Not flaggedFlag question
1034Question text
1035(Single Choice) Characterized by simple configuration and poor scalability, which of the following protocols is based on the Bellman-Ford algorithm and sends a complete routing table to an adjacent router at a certain interval?
1036Select one:
1037a. Link-state routing protocol
1038b. Exterior gateway protocol
1039c. Distance vector routing protocol
1040d. Interior gateway protocol
1041Feedback
1042The correct answer is: Distance vector routing protocol
1043Question 79
1044Incorrect
1045Mark 0 out of 1
1046 Not flaggedFlag question
1047Question text
1048(Multiple Choice) Which of the following statements regarding routing loops are correct?
1049Select one or more:
1050a. Route loops are generated by dynamic routing protocols only.
1051b. Routing loops cause the packets not able to reach the destination and this will result in network congestion.
1052c. Link state routing protocols will not cause the routing loops.
1053d. Packets are routed circularly between two or more routers and will be discarded when the TTL becomes 0.
1054Feedback
1055The correct answers are: Routing loops cause the packets not able to reach the destination and this will result in network congestion., Packets are routed circularly between two or more routers and will be discarded when the TTL becomes 0.
1056Question 80
1057Partially correct
1058Mark 0 out of 1
1059 Not flaggedFlag question
1060Question text
1061(Multiple Choice) Which of the following statements regarding the function of a router are correct?
1062Select one or more:
1063a. Segmenting the packet so that the forwarding is easier
1064b. Addressing
1065c. Connecting same networks.
1066d. Forwarding the packet from one network to another
1067Feedback
1068The correct answers are: Segmenting the packet so that the forwarding is easier, Forwarding the packet from one network to another, Addressing
1069Question 81
1070Incorrect
1071Mark 0 out of 1
1072 Not flaggedFlag question
1073Question text
1074(Multiple Choice) Which of the following indicators are used to measure the performance of a dynamic routing protocol?
1075Select one or more:
1076a. Route priority
1077b. Number of subnets
1078c. Low protocol cost
1079d. Zero routing loop
1080Feedback
1081The correct answers are: Zero routing loop, Low protocol cost
1082Question 82
1083Incorrect
1084Mark 0 out of 1
1085 Not flaggedFlag question
1086Question text
1087(Multiple Choice) Which of the following statements regarding default route are correct
1088Select one or more:
1089a. Default route is more preferred over the specific route
1090b. Default route is a special type of dynamic route.
1091c. Default route is used only when the destination route is not in the routing table
1092d. Default route can be configured manually.
1093Feedback
1094The correct answers are: Default route is used only when the destination route is not in the routing table, Default route can be configured manually.
1095Question 83
1096Incorrect
1097Mark 0 out of 1
1098 Not flaggedFlag question
1099Question text
1100(Single Choice) Assume an internal network has only one route to the external networks, which of the following configurations is better?
1101Select one:
1102a. Dynamic route
1103b. Default route
1104c. Direct route
1105d. Host route
1106Feedback
1107The correct answer is: Default route
1108Question 84
1109Correct
1110Mark 1 out of 1
1111 Not flaggedFlag question
1112Question text
1113(Single Choice) Suppose a gateway is configured in a host running Windows system, which of the following is similar to the configuration on a router?
1114Select one:
1115a. Default route
1116b. Dynamic route
1117c. Direct route
1118d. Host route
1119Feedback
1120The correct answer is: Default route
1121Question 85
1122Partially correct
1123Mark 1 out of 1
1124 Not flaggedFlag question
1125Question text
1126(Multiple Choice) Which of the following statements regarding the routing table are correct?
1127Select one or more:
1128a. The routes from generated by different protocols have different preferences.
1129b. The costs of different routing protocols are not comparable
1130c. The costs of different routing protocols are comparable.
1131d. The next hop in the routing table is redundant because the outgoing interface can be used for packet forwarding.
1132Feedback
1133The correct answers are: The routes from generated by different protocols have different preferences., The costs of different routing protocols are not comparable
1134Question 86
1135Incorrect
1136Mark 0 out of 1
1137 Not flaggedFlag question
1138Question text
1139(Multiple Choice) Which of the following are the sources of the routes in the routing table?
1140Select one or more:
1141a. Some routes are generated during the startup of the router.
1142b. Some routes are configured manually by the administrator
1143c. Some routes are generated according to the data link layer protocol
1144d. Some routes are generated by dynamic routing protocols
1145Feedback
1146The correct answers are: Some routes are generated according to the data link layer protocol, Some routes are configured manually by the administrator, Some routes are generated by dynamic routing protocols
1147Question 87
1148Incorrect
1149Mark 0 out of 1
1150 Not flaggedFlag question
1151Question text
1152(Multiple Choice) Which of the following items are used to select the best route when a router has “multiple” routes to the same destination?
1153Select one or more:
1154a. TTL of the route
1155b. Preference of the route
1156c. Advertiser of the route
1157d. Cost of the route
1158Feedback
1159The correct answers are: Preference of the route, Cost of the route
1160Question 88
1161Incorrect
1162Mark 0 out of 1
1163 Not flaggedFlag question
1164Question text
1165(Multiple Choice) Which of the following protocols are routing protocols?
1166Select one or more:
1167a. PPP
1168b. RIP
1169c. IPX
1170d. OSPF
1171Feedback
1172The correct answers are: RIP, OSPF
1173Question 89
1174Partially correct
1175Mark 0 out of 1
1176 Not flaggedFlag question
1177Question text
1178(Multiple Choice) Which of the following statements regarding the route preference are correct?
1179Select one or more:
1180a. It is an important factor for route selection
1181b. The default preference value of direct route is 0
1182c. It is used by all routing protocols
1183d. It is used by RIP and OSPF only
1184Feedback
1185The correct answers are: It is used by all routing protocols, It is an important factor for route selection, The default preference value of direct route is 0
1186Question 90
1187Incorrect
1188Mark 0 out of 1
1189 Not flaggedFlag question
1190Question text
1191(Single Choice) What do we call the routes in the routing table that have the same cost to the same destination?
1192Select one:
1193a. Sub-optimal routes
1194b. Multipath routes
1195c. Equivalent routes
1196d. Default routes
1197Feedback
1198The correct answer is: Equivalent routes
1199Question 91
1200Partially correct
1201Mark 0 out of 1
1202 Not flaggedFlag question
1203Question text
1204(Multiple Choice) Which of the following statements regarding static route are correct?
1205Select one or more:
1206a. Some of the dynamic routing protocol such as OSPF can generate default routes.
1207b. Default route is used when the destination network is not in the routing table.
1208c. Default route is a special type of dynamic route
1209d. The network IP and mask of the default route is 0.0.0.0 and 0.0.0.0 respectively.
1210Feedback
1211The correct answers are: Some of the dynamic routing protocol such as OSPF can generate default routes., Default route is used when the destination network is not in the routing table., The network IP and mask of the default route is 0.0.0.0 and 0.0.0.0 respectively.
1212Question 92
1213Partially correct
1214Mark 1 out of 1
1215 Not flaggedFlag question
1216Question text
1217(Multiple Choice) Which of the following statements about default routes are true?
1218Select one or more:
1219a. A default route can be generated by using a dynamic routing protocol.
1220b. A default route can be only configured manually by a network administrator.
1221c. A route that can be configured manually.
1222d. A default route is a kind of special static route.
1223Feedback
1224The correct answers are: A route that can be configured manually., A default route can be generated by using a dynamic routing protocol.
1225Question 93
1226Correct
1227Mark 1 out of 1
1228 Not flaggedFlag question
1229Question text
1230(Single Choice) What does a router do after it receives a datagram containing a destination address that is not listed in the routing table?
1231Select one:
1232a. The router uses the default route.
1233b. The router matches an OSPF route with the destination address.
1234c. The router matches an RIP route with the destination address.
1235d. The router matches a BGP route with the destination address.
1236Feedback
1237The correct answer is: The router uses the default route.
1238Question 94
1239Incorrect
1240Mark 0 out of 1
1241 Not flaggedFlag question
1242Question text
1243(Single Choice) How is routing information about a default route expressed?
1244Select one:
1245a. The destination IP address is expressed in all 1s and the mask is expressed in all 0s.
1246b. The destination IP address is expressed in all 0s and the mask is expressed in all 1s.
1247c. Both the destination IP address and mask are expressed in all 1s.
1248d. Both the destination IP address and mask are expressed in all 0s.
1249Feedback
1250The correct answer is: Both the destination IP address and mask are expressed in all 0s.
1251Question 95
1252Incorrect
1253Mark 0 out of 1
1254 Not flaggedFlag question
1255Question text
1256(Single Choice) How many routes at most does a default route on Huawei router support load sharing?
1257Select one:
1258a. 16
1259b. 2
1260c. 0
1261d. 32
1262Feedback
1263The correct answer is: 32
1264Question 96
1265Incorrect
1266Mark 0 out of 1
1267 Not flaggedFlag question
1268Question text
1269(Single Choice) Which of the following values is the default preference value for static route on the VRP platform?
1270Select one:
1271a. 20
1272b. 0
1273c. 60
1274d. 100
1275Feedback
1276The correct answer is: 60
1277Question 97
1278Incorrect
1279Mark 0 out of 1
1280 Not flaggedFlag question
1281Question text
1282(Multiple Choice) A command for configuring a static route contains the destination IP address and mask. In which notations can the mask be expressed?
1283Select one or more:
1284a. Dotted hexadecimal notation
1285b. Dotted decimal notation
1286c. Mask size (namely, the number of binary 1s in the mask)
1287d. Dotted binary notation
1288Feedback
1289The correct answers are: Dotted decimal notation, Mask size (namely, the number of binary 1s in the mask)
1290Question 98
1291Incorrect
1292Mark 0 out of 1
1293 Not flaggedFlag question
1294Question text
1295(Multiple Choice) Compared to static routing protocol, which of the following are the advantages of dynamic routing protocol?
1296Select one or more:
1297a. Simple
1298b. The router running dynamic routing protocol can detect the changes of the network topology automatically.
1299c. The router running dynamic routing protocol can calculate the routes automatically.
1300d. Low bandwidth consumption
1301Feedback
1302The correct answers are: The router running dynamic routing protocol can detect the changes of the network topology automatically., The router running dynamic routing protocol can calculate the routes automatically.
1303Question 99
1304Partially correct
1305Mark 1 out of 1
1306 Not flaggedFlag question
1307Question text
1308(Multiple Choice) Which of the following are the advantages of static routing protocol
1309Select one or more:
1310a. Simple configuration
1311b. Automatic routing updates
1312c. Save the bandwidth
1313d. Enhanced network security
1314Feedback
1315The correct answers are: Simple configuration, Save the bandwidth
1316Question 100
1317Incorrect
1318Mark 0 out of 1
1319 Not flaggedFlag question
1320Question text
1321(Multiple Choice) Which of the following are the disadvantages of using static routing protocol in the network?
1322Select one or more:
1323a. On the VRP platform, load balancing can not be implemented using static route
1324b. External routers can not learn the static route configuration which will result in network unreachability.
1325c. Re-configurations are required after the topology changes
1326d. The configurations are complicated in a large network.
1327Feedback
1328The correct answers are: The configurations are complicated in a large network., Re-configurations are required after the topology changes
1329Question 101
1330Partially correct
1331Mark 1 out of 1
1332 Not flaggedFlag question
1333Question text
1334(Multiple Choice) Two static routes to the 10.1.1.1/32 network are configured on a router. One of the static routes is not assigned with a value for the preference_value parameter; the other static route is assigned with 100 for the preference_value parameter. In this case, which of the following statements are true?
1335Select one or more:
1336a. The route not signed with a value for the preference_value parameter functions as the working route.
1337b. A static route supports route backup.
1338c. The two static routes work in load sharing mode.
1339d. The route signed with 100 for the preference_value parameter functions as the working route.
1340Feedback
1341The correct answers are: The route not signed with a value for the preference_value parameter functions as the working route., A static route supports route backup.
1342Question 102
1343Incorrect
1344Mark 0 out of 1
1345 Not flaggedFlag question
1346Question text
1347(Single Choice) The information about static routes can be viewed through a router. A backup route is identified as
1348Select one:
1349a. Backup
1350b. Bypass
1351c. Inactive
1352d. Slave
1353Feedback
1354The correct answer is: Inactive
1355Question 103
1356Incorrect
1357Mark 0 out of 1
1358 Not flaggedFlag question
1359Question text
1360Which of the following routing protocols involves simple configuration and low-speed convergence and is generally used in medium- and small-sized networks?
1361Select one:
1362a. OSPF
1363b. ISIS
1364c. RIP
1365d. BGP
1366Feedback
1367The correct answer is: RIP
1368Question 104
1369Incorrect
1370Mark 0 out of 1
1371 Not flaggedFlag question
1372Question text
1373Routing Information Protocol (RIP) uses ( ) to exchange routing information and sends out updated packets at a certain interval.
1374Select one:
1375a. TCP
1376b. UDP
1377c. RSVP
1378d. LDP
1379Feedback
1380The correct answer is: UDP
1381Question 105
1382Incorrect
1383Mark 0 out of 1
1384 Not flaggedFlag question
1385Question text
1386How many hops from a router to the directly connected network does the RIP protocol specify?
1387Select one:
1388a. 1
1389b. 0
1390c. Infinite
1391d. None of the above
1392Feedback
1393The correct answer is: 0
1394Question 106
1395Correct
1396Mark 1 out of 1
1397 Not flaggedFlag question
1398Question text
1399By default, RIPv2 sends packet by means of ( ).
1400Select one:
1401a. Multicast
1402b. Broadcast
1403c. Unicast
1404d. Multicast and broadcast
1405Feedback
1406The correct answer is: Multicast
1407Question 107
1408Incorrect
1409Mark 0 out of 1
1410 Not flaggedFlag question
1411Question text
1412What features does RIPv2 provide?
1413Select one or more:
1414a. Large scale network
1415b. Plain text authentication
1416c. Extension of subnet mask(VLSM)
1417d. MD5 encrypted text authentication
1418Feedback
1419The correct answers are: Extension of subnet mask(VLSM), Plain text authentication, MD5 encrypted text authentication
1420Question 108
1421Partially correct
1422Mark 0 out of 1
1423 Not flaggedFlag question
1424Question text
1425Which of the following methods are used by RIP to avoid routing loop?
1426Select one or more:
1427a. Defining the maximum routing metric
1428b. Holddown
1429c. Rebooting routers
1430d. Split-horizon
1431Feedback
1432The correct answers are: Split-horizon, Holddown, Defining the maximum routing metric
1433Question 109
1434Partially correct
1435Mark 1 out of 1
1436 Not flaggedFlag question
1437Question text
1438Which of the following statements regarding distance vector algorithm are incorrect?
1439Select one or more:
1440a. Distance vector algorithm does not generate routing loops.
1441b. The routes are advertised as vectors of (destination, cost).
1442c. Distance vector routing protocol is implemented by exchanging routing information.
1443d. Routers running distance vector protocols obtain routing information from its own neighbors only.
1444Feedback
1445The correct answers are: Distance vector algorithm does not generate routing loops., The routes are advertised as vectors of (destination, cost).
1446Question 110
1447Incorrect
1448Mark 0 out of 1
1449 Not flaggedFlag question
1450Question text
1451Which of the following are main functions of split horizon used by distance vector routing protocols?
1452Select one or more:
1453a. Replace the poison reverse algorithm
1454b. Work together with holddown mechanism to prevent the routing loops.
1455c. Prevent the routing loops between two adjacent routers.
1456d. Ensure the routing updates not being sent back to the direction from which it was received.
1457Feedback
1458The correct answers are: Prevent the routing loops between two adjacent routers., Ensure the routing updates not being sent back to the direction from which it was received., Work together with holddown mechanism to prevent the routing loops.
1459Question 111
1460Incorrect
1461Mark 0 out of 1
1462 Not flaggedFlag question
1463Question text
1464Which of the following statements regarding Bellman-Ford algorithm are correct?
1465Select one or more:
1466a. Bellman-Ford is essentially a Dijkstra algorithm.
1467b. Bellman-Ford algorithm is a link-state algorithm.
1468c. When Bellman-Ford algorithm is used to calculate the routes, it does not need to know the whole topology of network.
1469d. RIP is based on Bellman-Ford algorithm.
1470Feedback
1471The correct answers are: RIP is based on Bellman-Ford algorithm., When Bellman-Ford algorithm is used to calculate the routes, it does not need to know the whole topology of network.
1472Question 112
1473Incorrect
1474Mark 0 out of 1
1475 Not flaggedFlag question
1476Question text
1477Which of the following commands is used to disable automatic route aggregation for RIP?
1478Select one:
1479a. Undo network 10.0.0.0
1480b. Undo rip
1481c. Undo summary
1482d. Summary
1483Feedback
1484The correct answer is: Undo summary
1485Question 113
1486Partially correct
1487Mark 1 out of 1
1488 Not flaggedFlag question
1489Question text
1490Router A runs RIP routing and its interface serial 0 with IP address 10.0.0.1/24 is enabled with RIP routing protocol as well. Which of the following commands must be configured?
1491Select one or more:
1492a. Network 10.0.0.0
1493b. Network 10.0.0.1
1494c. Rip 10.0.0.0
1495d. Rip
1496Feedback
1497The correct answers are: Rip, Network 10.0.0.0
1498Question 114
1499Partially correct
1500Mark 1 out of 1
1501 Not flaggedFlag question
1502Question text
1503Which of the following statements regarding RIP v1 and RIP v2 are correct?
1504Select one or more:
1505a. RIP v2 supports VLSM.
1506b. RIP v1 supports VLSM.
1507c. RIP v1 supports simple password authentication only, while RIP v2 supports MD5 authentication.
1508d. RIP v2 uses route aggregation by default.
1509Feedback
1510The correct answers are: RIP v2 supports VLSM., RIP v2 uses route aggregation by default.
1511Question 115
1512Incorrect
1513Mark 0 out of 1
1514 Not flaggedFlag question
1515Question text
1516Which of the following messages can be processed by the interface working in RIPv2 Broadcast mode?
1517Select one or more:
1518a. RIPv2 multicast messages
1519b. RIPv1 multicast messages
1520c. RIPv2 broadcast messages
1521d. RIPv1 broadcast messages
1522Feedback
1523The correct answers are: RIPv1 broadcast messages, RIPv2 broadcast messages
1524Question 116
1525Correct
1526Mark 1 out of 1
1527 Not flaggedFlag question
1528Question text
1529Which of the following statements regarding routing loops in RIP is correct?
1530Select one:
1531a. Split horizon can prevent the routing loop between two neighboring routers only.
1532b. Distance Vector algorithm can calculate the shortest path to the destination according to the given topology.
1533c. Maximum hop count mechanism can solve the problem caused by routing loop.
1534d. Although Holddown mechanism results in slow convergence, it can completely prevent the routing loop.
1535Feedback
1536The correct answer is: Split horizon can prevent the routing loop between two neighboring routers only.
1537Question 117
1538Incorrect
1539Mark 0 out of 1
1540 Not flaggedFlag question
1541Question text
1542Which of the following statements regarding RIP v1 and RIP v2 are correct?
1543Select one or more:
1544a. RIPv1 can advertise information about subnet by disabling the automatic route aggregation.
1545b. RIPv2 broadcasts message by default. The command "rip version 2 multicast" must be configured to make RIPv2 send message with multicast address.
1546c. RIP v1 does not support multicast. By default, it does not advertise the information about subnet.
1547d. RIPv2 supports multicast. It can choose not to advertise the information about subnet.
1548Feedback
1549The correct answers are: RIP v1 does not support multicast. By default, it does not advertise the information about subnet., RIPv2 supports multicast. It can choose not to advertise the information about subnet.
1550Question 118
1551Incorrect
1552Mark 0 out of 1
1553 Not flaggedFlag question
1554Question text
1555Which of the following statements regarding RIP network scale are correct?
1556Select one or more:
1557a. Bellman-Ford algorithm used by RIP can accurately calculate the shortest path of a large scale network.
1558b. The maximum hop count of RIP is 16 and it can be used to prevent the packets from circulate infinitely in the network.
1559c. It is recommended to use other routing protocols such as OSPF instead of RIP when the network topology is more complicated even though the hop count is less than 16.
1560d. RIP is not suitable for large scale network because it advertises the whole routing table periodically and this consumes a lot bandwidth. So, RIP is suitable for small scale network only.
1561Feedback
1562The correct answers are: The maximum hop count of RIP is 16 and it can be used to prevent the packets from circulate infinitely in the network., It is recommended to use other routing protocols such as OSPF instead of RIP when the network topology is more complicated even though the hop count is less than 16., RIP is not suitable for large scale network because it advertises the whole routing table periodically and this consumes a lot bandwidth. So, RIP is suitable for small scale network only.
1563Question 119
1564Partially correct
1565Mark 1 out of 1
1566 Not flaggedFlag question
1567Question text
1568Which of the following statements regarding RIP routing information are correct?
1569Select one or more:
1570a. User can specify the route preference of RIP higher than that of static routes.
1571b. If the route calculated by other routing protocol which is imported by RIP does not specify the cost value, the cost value will be set as 1 by default
1572c. The route preference of RIP can not be configured manually.
1573d. User can specify the route preference value of RIP lower than that of direct routes.
1574Feedback
1575The correct answers are: User can specify the route preference of RIP higher than that of static routes., If the route calculated by other routing protocol which is imported by RIP does not specify the cost value, the cost value will be set as 1 by default
1576Question 120
1577Partially correct
1578Mark 0 out of 1
1579 Not flaggedFlag question
1580Question text
1581Which of the following statements regarding split horizon used by RIP are correct?
1582Select one or more:
1583a. Split horizon is used to avoid routing loop. The main idea of Split Horizon is that the information can not be sent back in the direction from which the data was received.
1584b. Split horizon will not prevent the routing loop between 2 routers.
1585c. Split horizon might cause some of the routers not able to obtain the accurate routing information.
1586d. On the VRP platform, split horizon is enabled by default. It can be disabled when necessary.
1587Feedback
1588The correct answers are: Split horizon is used to avoid routing loop. The main idea of Split Horizon is that the information can not be sent back in the direction from which the data was received., Split horizon might cause some of the routers not able to obtain the accurate routing information., On the VRP platform, split horizon is enabled by default. It can be disabled when necessary.
1589Question 121
1590Incorrect
1591Mark 0 out of 1
1592 Not flaggedFlag question
1593Question text
1594Which of the following statements regarding RIP route aggregation are correct?
1595Select one or more:
1596a. RIP v1 supports route aggregation by default and it can be disabled when necessary.
1597b. RIPv2 supports CIDR.
1598c. We can disable the route aggregation on RIP V2.
1599d. RIPv1 does not support CIDR
1600Feedback
1601The correct answers are: We can disable the route aggregation on RIP V2., RIPv1 does not support CIDR, RIPv2 supports CIDR.
1602Question 122
1603Correct
1604Mark 1 out of 1
1605 Not flaggedFlag question
1606Question text
1607After a command for displaying RIP route information is entered on a router, peer 192.169.1.3 on ethernet1/0/1 is displayed in the returned result. What does ethernet1/0/1 stand for?
1608Select one:
1609a. Port connected to the RIP neighbor with the IP address of 192.169.1.3
1610b. Port with the multicast protocol enabled
1611c. Port with the broadcast protocol enabled
1612d. Port corresponding to the RIP transmission address
1613Feedback
1614The correct answer is: Port connected to the RIP neighbor with the IP address of 192.169.1.3
1615Question 123
1616Incorrect
1617Mark 0 out of 1
1618 Not flaggedFlag question
1619Question text
1620What does the value 1 of cost in the RIP route information mean?
1621Select one:
1622a. The route cost is 0.
1623b. The route weight is 1.
1624c. Only one hop exists between the router and the destination network segment.
1625d. The route progress number is 1.
1626e. The priority of the RIP protocol is 1.
1627Feedback
1628The correct answer is: Only one hop exists between the router and the destination network segment.
1629Question 124
1630Incorrect
1631Mark 0 out of 1
1632 Not flaggedFlag question
1633Question text
1634Which of the following parameters is used by RIP to calculate the value of cost?
1635Select one:
1636a. MTU
1637b. Hop count
1638c. Bandwidth
1639d. Delay
1640Feedback
1641The correct answer is: Hop count
1642Question 125
1643Partially correct
1644Mark 0 out of 1
1645 Not flaggedFlag question
1646Question text
1647Which of the following statements about RIP protocol priorities are true?
1648Select one or more:
1649a. The RIP protocol priority can be set manually on a router.
1650b. With routing protocol priorities, a route obtained by a certain routing protocol can be selected as the optimal route according to the specified routing policy.
1651c. By default, the RIP protocol priority of Huawei router is 100.
1652d. A greater value of the RIP routing protocol priority means a higher priority.
1653Feedback
1654The correct answers are: With routing protocol priorities, a route obtained by a certain routing protocol can be selected as the optimal route according to the specified routing policy., The RIP protocol priority can be set manually on a router., By default, the RIP protocol priority of Huawei router is 100.
1655Question 126
1656Partially correct
1657Mark 1 out of 1
1658 Not flaggedFlag question
1659Question text
1660What are the rip metricout value and rip metricin value commands used to set in the interface view?
1661Select one or more:
1662a. Metric increased by sending RIP route information on the interface
1663b. Metric contained in the received RIP route information on the interface
1664c. Metric contained in the transmitted RIP route information on the interface
1665d. Metric increased by receiving RIP route information on the interface
1666Feedback
1667The correct answers are: Metric increased by sending RIP route information on the interface, Metric increased by receiving RIP route information on the interface
1668Question 127
1669Partially correct
1670Mark 1 out of 1
1671 Not flaggedFlag question
1672Question text
1673The RIP packet version is set in the interface view. Which of the following statements are true in the case of version RIPv1?
1674Select one or more:
1675a. The interface does not receive RIPv2 multicast packets
1676b. The interface receives only RIPv1 broadcast packets.
1677c. The interface does not receive RIPv2 broadcast packets.
1678d. The interface receives only RIPv1 and RIPv2 broadcast packets.
1679Feedback
1680The correct answers are: The interface receives only RIPv1 and RIPv2 broadcast packets., The interface does not receive RIPv2 multicast packets
1681Question 128
1682Incorrect
1683Mark 0 out of 1
1684 Not flaggedFlag question
1685Question text
1686When an RIP route is unavailable, the router deletes this RIP route from the routing table if it fails to receive a packet updating this RIP route information after a period of ( ).
1687Select one:
1688a. 300s
1689b. 180s
1690c. 120s
1691d. 240s
1692Feedback
1693The correct answer is: 120s
1694Question 129
1695Correct
1696Mark 1 out of 1
1697 Not flaggedFlag question
1698Question text
1699After receiving a Response packet from a neighbor, the RIP protocol calculates the routing metric. The calculated routing metric must be equal to or greater than ( ).
1700Select one:
1701a. The metric contained in the packet plus the cost of the destination network
1702b. The cost of the destination network
1703c. The metric contained in the packet plus 1
1704d. The metric contained in the packet
1705Feedback
1706The correct answer is: The metric contained in the packet plus the cost of the destination network
1707Question 130
1708Incorrect
1709Mark 0 out of 1
1710 Not flaggedFlag question
1711Question text
1712Which of the following statements regarding RIP are correct?
1713Select one or more:
1714a. RIP is an EGP.
1715b. RIP is a distance vector routing protocol.
1716c. RIP is an IGP.
1717d. RIP is a link-state routing protocol.
1718Feedback
1719The correct answers are: RIP is an IGP., RIP is a distance vector routing protocol.
1720Question 131
1721Incorrect
1722Mark 0 out of 1
1723 Not flaggedFlag question
1724Question text
1725Which of the following protocol is used by RIP to encapsulate the messages?
1726Select one:
1727a. Raw IP
1728b. UDP
1729c. TCP
1730d. ICMP
1731Feedback
1732The correct answer is: UDP
1733Question 132
1734Incorrect
1735Mark 0 out of 1
1736 Not flaggedFlag question
1737Question text
1738Which of the following cost values indicates that the route learned from RIP is unreachable?
1739Select one:
1740a. 15
1741b. 8
1742c. 16
1743d. 10
1744Feedback
1745The correct answer is: 16
1746Question 133
1747Incorrect
1748Mark 0 out of 1
1749 Not flaggedFlag question
1750Question text
1751Which of the following statements regarding the function of holddown mechanism used by RIP is correct?
1752Select one:
1753a. Propagate the unreachable routing information throughout the network.
1754b. Loop-avoidance
1755c. Save the bandwidth
1756d. Advertise the local route information to the RIP's neighbor
1757Feedback
1758The correct answer is: Loop-avoidance
1759Question 134
1760Correct
1761Mark 1 out of 1
1762 Not flaggedFlag question
1763Question text
1764Which of the following numbers is the maximum hop count in RIP?
1765Select one:
1766a. 15
1767b. 12
1768c. Infinity
1769d. 16
1770Feedback
1771The correct answer is: 15
1772Question 135
1773Incorrect
1774Mark 0 out of 1
1775 Not flaggedFlag question
1776Question text
1777Which of the following values is the update interval for RIP?
1778Select one:
1779a. 180s
1780b. 30s
1781c. 60s
1782d. 5s
1783Feedback
1784The correct answer is: 30s
1785Question 136
1786Incorrect
1787Mark 0 out of 1
1788 Not flaggedFlag question
1789Question text
1790Which of the following routing protocols are the link state routing protocols?
1791Select one:
1792a. IP
1793b. OSPF
1794c. BGP
1795d. RIP
1796Feedback
1797The correct answer is: OSPF
1798Question 137
1799Incorrect
1800Mark 0 out of 1
1801 Not flaggedFlag question
1802Question text
1803In an OSPF area, routers exchange information about ( ). This type of information forms an information library.
1804Select one:
1805a. Distance vector
1806b. Route priority
1807c. Route cost
1808d. Link status
1809Feedback
1810The correct answer is: Link status
1811Question 138
1812Incorrect
1813Mark 0 out of 1
1814 Not flaggedFlag question
1815Question text
1816A router with OSPF enabled calculates the shortest route to the destination by using ( ) algorithm.
1817Select one:
1818a. SRC
1819b. OSPF
1820c. OPF
1821d. SPF
1822Feedback
1823The correct answer is: SPF
1824Question 139
1825Correct
1826Mark 1 out of 1
1827 Not flaggedFlag question
1828Question text
1829OSPF runs over the IP protocol and the IP protocol No. used by OSPF is ( ).
1830Select one:
1831a. 89
1832b. 512
1833c. 2328
1834d. 80
1835Feedback
1836The correct answer is: 89
1837Question 140
1838Incorrect
1839Mark 0 out of 1
1840 Not flaggedFlag question
1841Question text
1842OSPF has experienced several versions. Which of the following versions is experimental and has never been deployed?
1843Select one:
1844a. OSPFv3
1845b. OSPFv1
1846c. OSPFv4
1847d. OSPFv2
1848Feedback
1849The correct answer is: OSPFv1
1850Question 141
1851Incorrect
1852Mark 0 out of 1
1853 Not flaggedFlag question
1854Question text
1855Which of the following OSPF versions is specific to the IPv6 technology?
1856Select one:
1857a. OSPFv2
1858b. OSPFv1
1859c. OSPFv3
1860d. OSPFv4
1861Feedback
1862The correct answer is: OSPFv3
1863Question 142
1864Partially correct
1865Mark 0 out of 1
1866 Not flaggedFlag question
1867Question text
1868Which of the following statements about the features of the OSPF protocol are true?
1869Select one or more:
1870a. The OSPF protocol supports “multiple” equal-cost routes.
1871b. The OSPF protocol is quick in route convergence when routes change.
1872c. The OSPF protocol supports encrypt protocol packets.
1873d. The OSPF protocol supports area division.
1874Feedback
1875The correct answers are: The OSPF protocol supports area division., The OSPF protocol is quick in route convergence when routes change., The OSPF protocol supports “multiple” equal-cost routes.
1876Question 143
1877Incorrect
1878Mark 0 out of 1
1879 Not flaggedFlag question
1880Question text
1881The link state database (LSDB) on an OSPF router is formed based on ( ).
1882Select one or more:
1883a. RSVP packet advertised by a neighboring router
1884b. LSA advertised by a neighboring router
1885c. RSVP packet advertised to a neighboring router
1886d. local LSA
1887Feedback
1888The correct answers are: local LSA, LSA advertised by a neighboring router
1889Question 144
1890Incorrect
1891Mark 0 out of 1
1892 Not flaggedFlag question
1893Question text
1894Each router calculates the shortest path tree based on the LSDB with itself as a ( ) node.
1895Select one:
1896a. Specified root
1897b. Backup
1898c. leaf
1899d. Root
1900Feedback
1901The correct answer is: Root
1902Question 145
1903Correct
1904Mark 1 out of 1
1905 Not flaggedFlag question
1906Question text
1907The shortest path tree calculated by a router in an OSPF area provides ( ) on the path from this router to other nodes in the network.
1908Select one:
1909a. Routing table
1910b. MAC address table
1911c. All link states
1912d. ARP table
1913Feedback
1914The correct answer is: Routing table
1915Question 146
1916Partially correct
1917Mark 0 out of 1
1918 Not flaggedFlag question
1919Question text
1920Which of the following statements regarding the comparison between OSPF and RIP are correct?
1921Select one or more:
1922a. OSPF is more appropriate for large networks than RIP.
1923b. RIP is more appropriate for small networks than OSPF.
1924c. In the same network, RIP will consume more bandwidth than OSPF.
1925d. RIP is more appropriate for flat network design while OSPF is more appropriate for hierarchical network design.
1926Feedback
1927The correct answers are: OSPF is more appropriate for large networks than RIP., RIP is more appropriate for flat network design while OSPF is more appropriate for hierarchical network design., In the same network, RIP will consume more bandwidth than OSPF.
1928Question 147
1929Incorrect
1930Mark 0 out of 1
1931 Not flaggedFlag question
1932Question text
1933Which of the following statements about an OSPF neighboring routers are true?
1934Select one or more:
1935a. After a router receives a Hello packet from the peer router, it becomes the neighbor of the peer router.
1936b. Neighbor discovery is equivalent to adjacency establishment.
1937c. An OSPF interface broadcasts Hello packets to discover a neighbor.
1938d. After an OSPF router receives a Hello packet from the peer OSPF router, it checks the parameters in the packet. If the parameters in the packet from the peer OSPF router are consistent with the parameters of this OSPF router, the two OSPF routers become neighbors of each other.
1939Feedback
1940The correct answers are: An OSPF interface broadcasts Hello packets to discover a neighbor., After an OSPF router receives a Hello packet from the peer OSPF router, it checks the parameters in the packet. If the parameters in the packet from the peer OSPF router are consistent with the parameters of this OSPF router, the two OSPF routers become neighbors of each other.
1941Question 148
1942Incorrect
1943Mark 0 out of 1
1944 Not flaggedFlag question
1945Question text
1946Two OSPF routers become neighbors only after they successfully exchange ( ) packets and LSAs.
1947Select one:
1948a. LSU
1949b. DD
1950c. LSR
1951d. Hello
1952Feedback
1953The correct answer is: DD
1954Question 149
1955Incorrect
1956Mark 0 out of 1
1957 Not flaggedFlag question
1958Question text
1959When two routers synchronize their LSDBs, they use ( ) packets to describe their own LSDBs.
1960Select one:
1961a. LSU
1962b. LSR
1963c. DD
1964d. Hello
1965Feedback
1966The correct answer is: DD
1967Question 150
1968Incorrect
1969Mark 0 out of 1
1970 Not flaggedFlag question
1971Question text
1972In a ( ) network, DRs and BDRs are used to prevent the problem with route convergence at a low speed.
1973Select one or more:
1974a. Point-to-point
1975b. Broadcast
1976c. Point-to-multipoint
1977d. NBMA
1978Feedback
1979The correct answers are: Broadcast, NBMA
1980Question 151
1981Partially correct
1982Mark 1 out of 1
1983 Not flaggedFlag question
1984Question text
1985Which of the following statements regarding Autonomous System Boundary Router are correct?
1986Select one or more:
1987a. ASBR is not always on the border of AS but it can be set anywhere in the AS except Stub area.
1988b. ASBR must belong to two OSPF areas.
1989c. ASBR is the router that imports the routes calculated by other protocols into OSPF.
1990d. ABR can not be ASBR at the same time.
1991Feedback
1992The correct answers are: ASBR is the router that imports the routes calculated by other protocols into OSPF., ASBR is not always on the border of AS but it can be set anywhere in the AS except Stub area.
1993Question 152
1994Incorrect
1995Mark 0 out of 1
1996 Not flaggedFlag question
1997Question text
1998Which of the following statements regarding the routing loop in OSPF is correct?
1999Select one:
2000a. No routing loop exists outside the OSPF autonomous system.
2001b. Routing loop is eliminated within an OSPF area.
2002c. Routing loop is not eliminated within an OSPF Autonomous Systems.
2003d. Routing loop is not eliminated between two OSPF areas.
2004Feedback
2005The correct answer is: Routing loop is eliminated within an OSPF area.
2006Question 153
2007Partially correct
2008Mark 1 out of 1
2009 Not flaggedFlag question
2010Question text
2011Which of the following statements regarding OSPF area are incorrect?
2012Select one or more:
2013a. Without manual configuration, an OSPF area is a backbone area with area ID 0 by default.
2014b. OSPF supports area division.
2015c. Area ID must be assigned by IANA and we can not simply assign it.
2016d. Every OSPF area is identified by a 32-bit Area ID number.
2017Feedback
2018The correct answers are: Without manual configuration, an OSPF area is a backbone area with area ID 0 by default., Area ID must be assigned by IANA and we can not simply assign it.
2019Question 154
2020Partially correct
2021Mark 0 out of 1
2022 Not flaggedFlag question
2023Question text
2024Which of the following statements regarding adjacencies of OSPF routers are correct?
2025Select one or more:
2026a. IF two routers are fully adjacent and the network type between them is broadcast network, then one of routers must be either DR or BDR.
2027b. IF two routers are fully adjacent, the network type between them may be Point-to-Point network.
2028c. Only two adjacent routers can exchange LSAs.
2029d. IF two routers are fully adjacent, the network type between them may be Point-to-Multipoint network.
2030e. After two routers have been received the Hello packets from each other, they will form the adjacency automatically.
2031Feedback
2032The correct answers are: IF two routers are fully adjacent, the network type between them may be Point-to-Point network., IF two routers are fully adjacent, the network type between them may be Point-to-Multipoint network., IF two routers are fully adjacent and the network type between them is broadcast network, then one of routers must be either DR or BDR., Only two adjacent routers can exchange LSAs.
2033Question 155
2034Incorrect
2035Mark 0 out of 1
2036 Not flaggedFlag question
2037Question text
2038OSPF is an application layer protocol and it runs on ( )
2039Select one:
2040a. TCP, port number 179
2041b. UDP, port number 520
2042c. IP, Protocol Number 89
2043d. Data Link layer
2044Feedback
2045The correct answer is: IP, Protocol Number 89
2046Question 156
2047Partially correct
2048Mark 0 out of 1
2049 Not flaggedFlag question
2050Question text
2051Which of the following statements regarding OSPF are correct?
2052Select one or more:
2053a. Use the triggered updates to immediately notify the neighbors about the topology changes so that the changes are synchronized in the AS.
2054b. Use the distance vector algorithm
2055c. Support CIDR (Classless Inter-Domain Routing)
2056d. Use the reserved multicast addresses to transmit protocol packets.
2057Feedback
2058The correct answers are: Support CIDR (Classless Inter-Domain Routing), Use the triggered updates to immediately notify the neighbors about the topology changes so that the changes are synchronized in the AS., Use the reserved multicast addresses to transmit protocol packets.
2059Question 157
2060Incorrect
2061Mark 0 out of 1
2062 Not flaggedFlag question
2063Question text
2064OSPF takes the precedence to select ( ) as a router ID unless you specify a router ID manually.
2065Select one:
2066a. the biggest IP address of the physical port IP addresses
2067b. 127.0.0.1
2068c. the IP address of a port connected to an OSPF neighbor
2069d. the biggest IP address of all the loopback port addresses
2070Feedback
2071The correct answer is: the biggest IP address of all the loopback port addresses
2072Question 158
2073Incorrect
2074Mark 0 out of 1
2075 Not flaggedFlag question
2076Question text
2077After OSPF divides an AS into different areas, what is communicated between these areas?
2078Select one:
2079a. Topology information for each area
2080b. Abstract route information for each area
2081c. Link bandwidth information for each area
2082d. Link state information for each area
2083Feedback
2084The correct answer is: Abstract route information for each area
2085Question 159
2086Incorrect
2087Mark 0 out of 1
2088 Not flaggedFlag question
2089Question text
2090A backbone OSPF area is responsible for releasing the information collected by each border router to non-backbone OSPF areas. Which of the following represents the ID of a backbone OSPF area?
2091Select one:
2092a. area 0.0.0.2
2093b. area 0.0.0.1
2094c. area 1
2095d. area 0
2096Feedback
2097The correct answer is: area 0
2098Question 160
2099Incorrect
2100Mark 0 out of 1
2101 Not flaggedFlag question
2102Question text
2103Which of the following statements regarding the backbone area in OSPF protocol are correct?
2104Select one or more:
2105a. The area ID of the backbone area is 0.0.0.1.
2106b. ABR connects to different areas and at least one of the connected area is backbone area.
2107c. Backbone area is responsible for advertising the aggregated routing information generated by ABR between non-backbone areas.
2108d. Each area must be connected to the backbone area.
2109Feedback
2110The correct answers are: Each area must be connected to the backbone area., Backbone area is responsible for advertising the aggregated routing information generated by ABR between non-backbone areas., ABR connects to different areas and at least one of the connected area is backbone area.
2111Question 161
2112Incorrect
2113Mark 0 out of 1
2114 Not flaggedFlag question
2115Question text
2116Assume that a non-backbone area and backbone area can not be directly connected. Which of the following ways can be used to solve this problem?
2117Select one:
2118a. Configuring ABR
2119b. Configuring ASBR
2120c. Configuring Stub area
2121d. Configuring Virtual-link
2122Feedback
2123The correct answer is: Configuring Virtual-link
2124Question 162
2125Incorrect
2126Mark 0 out of 1
2127 Not flaggedFlag question
2128Question text
2129presentation [A router runs OSPF and its interface Serial 0 with IP address 10.0.0.1/30 belongs to the backbone area, which of the following commands is used to enable OSPF at this interface?
2130Select one:
2131a. [Quidway-ospf -1-area-0.0.0.0]network 10.0.0.0
2132b. [Quidway-serial0]ospf area 0 enable
2133c. [Quidway-ospf -1]network 10.0.0.0 255.255.255.252
2134d. [Quidway-ospf -1-area-0.0.0.0]network 10.0.0.0 0.0.0.3
2135Feedback
2136The correct answer is: [Quidway-ospf -1-area-0.0.0.0]network 10.0.0.0 0.0.0.3
2137Question 163
2138Partially correct
2139Mark 0 out of 1
2140 Not flaggedFlag question
2141Question text
2142In an OSPF network, an ASBR router advertises the information about the routes outside an AS to the AS. Which of the following routers can function as an ASBR?
2143Select one or more:
2144a. ABR
2145b. IR
2146c. A router that belongs to the backbone OSPF area
2147d. A router that does not belong to the backbone OSPF area
2148Feedback
2149The correct answers are: ABR, A router that belongs to the backbone OSPF area, A router that does not belong to the backbone OSPF area
2150Question 164
2151Partially correct
2152Mark 1 out of 1
2153 Not flaggedFlag question
2154Question text
2155Which of the following statements about the configuration of OSPF areas are true?
2156Select one or more:
2157a. An ABR generates LSDBs separately for backbone OSPF areas and non-backbone OSPF areas.
2158b. All non-backbone OSPF areas must be connected to a backbone OSPF area, either physically or logically.
2159c. An ABR generates a uniform LSDB for all OSPF areas.
2160d. The same network segment on an ABR must be enabled in both backbone OSPF areas and non-backbone OSPF areas.
2161Feedback
2162The correct answers are: All non-backbone OSPF areas must be connected to a backbone OSPF area, either physically or logically., An ABR generates LSDBs separately for backbone OSPF areas and non-backbone OSPF areas.
2163Question 165
2164Partially correct
2165Mark 0 out of 1
2166 Not flaggedFlag question
2167Question text
2168What advantages does hierarchical routing defined by OSPF have?
2169Select one or more:
2170a. Extend the interval of SPF calculation.
2171b. Reduce the number of link state update packets.
2172c. Decrease the size of a routing table.
2173d. Reduce the number of network layers.
2174Feedback
2175The correct answers are: Extend the interval of SPF calculation., Decrease the size of a routing table., Reduce the number of link state update packets.
2176Question 166
2177Partially correct
2178Mark 1 out of 1
2179 Not flaggedFlag question
2180Question text
2181OSPF routers are classified into four types. Which of the following statements about interior routers (IRs) are true?
2182Select one or more:
2183a. If all the ports on an IR belong to area 0, this IR functions as a backbone router.
2184b. The ports on an IR belong to a same area.
2185c. An IR is located in the center of a physical area.
2186d. Only one port on an IR connects to a backbone area.
2187Feedback
2188The correct answers are: The ports on an IR belong to a same area., If all the ports on an IR belong to area 0, this IR functions as a backbone router.
2189Question 167
2190Partially correct
2191Mark 0 out of 1
2192 Not flaggedFlag question
2193Question text
2194Which of the following statements regarding OSPF are correct?
2195Select one or more:
2196a. Supporting ECMP (Equal Cost Multi-Path)
2197b. Supporting authentication of the messages and this enhanced the security
2198c. OSPF is an EGP.
2199d. OSPF calculates the shortest path tree based on the link sate information and OSPF itself will not generate the routing loop
2200Feedback
2201The correct answers are: OSPF calculates the shortest path tree based on the link sate information and OSPF itself will not generate the routing loop, Supporting authentication of the messages and this enhanced the security, Supporting ECMP (Equal Cost Multi-Path)
2202Question 168
2203Partially correct
2204Mark 0 out of 1
2205 Not flaggedFlag question
2206Question text
2207Which of the following areas fall into the OSPF area group?
2208Select one or more:
2209a. Totally stubby area
2210b. Boundary area
2211c. Standard area
2212d. Stub area
2213Feedback
2214The correct answers are: Standard area, Stub area, Totally stubby area
2215Question 169
2216Partially correct
2217Mark 0 out of 1
2218 Not flaggedFlag question
2219Question text
2220Which of the following statements about the functions of an ABR are true?
2221Select one or more:
2222a. An ABR is a gateway in the case of communication between different areas.
2223b. An ABR provides at least two port for connecting to a backbone area.
2224c. An ABR collects the topology information about an area that is connected to the ABR and sends the information to the backbone area.
2225d. An ABR maintains one LSDB for every area connected to the ABR.
2226Feedback
2227The correct answers are: An ABR is a gateway in the case of communication between different areas., An ABR collects the topology information about an area that is connected to the ABR and sends the information to the backbone area., An ABR maintains one LSDB for every area connected to the ABR.
2228Question 170
2229Correct
2230Mark 1 out of 1
2231 Not flaggedFlag question
2232Question text
2233Which of the following is the metric of OSPF?
2234Select one:
2235a. COST
2236b. LSA
2237c. Number of hops
2238d. Priority
2239Feedback
2240The correct answer is: COST
2241Question 171
2242Partially correct
2243Mark 0 out of 1
2244 Not flaggedFlag question
2245Question text
2246Each OSPF router floods LSAs to advertise link status information, including ( ).
2247Select one or more:
2248a. Information about adjacent network segments
2249b. Local link status information
2250c. Available neighbors
2251d. Ports
2252Feedback
2253The correct answers are: Available neighbors, Information about adjacent network segments, Local link status information
2254Question 172
2255Correct
2256Mark 1 out of 1
2257 Not flaggedFlag question
2258Question text
2259According to the OSPF protocol, a router floods LSAs. In this context, what does "flood" mean?
2260Select one:
2261a. An action sending and synchronizing a link state database
2262b. An action sending a link state database
2263c. An action deleting a link state database from a port
2264d. An action synchronizing a link state database
2265Feedback
2266The correct answer is: An action sending and synchronizing a link state database
2267Question 173
2268Incorrect
2269Mark 0 out of 1
2270 Not flaggedFlag question
2271Question text
2272Which of the following statements about the information contained in a DD packet are true?
2273Select one or more:
2274a. A DD packet contains all information about each LSA.
2275b. The header of an LSA is only a small portion of all the data of the LSA.
2276c. The header of an LSA is the unique identifier of the LSA.
2277d. A DD packet contains only the header of an LSA.
2278Feedback
2279The correct answers are: A DD packet contains only the header of an LSA., The header of an LSA is the unique identifier of the LSA., The header of an LSA is only a small portion of all the data of the LSA.
2280Question 174
2281Partially correct
2282Mark 0 out of 1
2283 Not flaggedFlag question
2284Question text
2285Which of the following statements regarding the OSPF router types are incorrect?
2286Select one or more:
2287a. The router inside an OSPF area can not be ASBR.
2288b. ABR is the router connecting any two OSPF areas and it can be used to transmit the routing information between them.
2289c. ABR can be ASBR at the same time.
2290d. An OSPF router can belong to two or more areas but can be the ABR for a “single” area only.
2291Feedback
2292The correct answers are: ABR is the router connecting any two OSPF areas and it can be used to transmit the routing information between them., The router inside an OSPF area can not be ASBR., An OSPF router can belong to two or more areas but can be the ABR for a “single” area only.
2293Question 175
2294Correct
2295Mark 1 out of 1
2296 Not flaggedFlag question
2297Question text
2298On VRP platform, which of the following is the default route preference value for OSPF routing protocol?
2299Select one:
2300a. 10
2301b. 120
2302c. 1
2303d. 100
2304Feedback
2305The correct answer is: 10
2306Question 176
2307Partially correct
2308Mark 0 out of 1
2309 Not flaggedFlag question
2310Question text
2311Which of the following network types are supported by OSPF?
2312Select one or more:
2313a. Point-to-Multipoint
2314b. Point-to-Point
2315c. Bus Topolopy
2316d. Broadcast
2317Feedback
2318The correct answers are: Point-to-Point, Point-to-Multipoint, Broadcast
2319Question 177
2320Partially correct
2321Mark 1 out of 1
2322 Not flaggedFlag question
2323Question text
2324In OSPF protocol, an ABR can also function as ( )
2325Select one or more:
2326a. ASBR
2327b. BR (Backbone Router)
2328c. IR (Internal Router)
2329d. Stub Router
2330Feedback
2331The correct answers are: BR (Backbone Router), ASBR
2332Question 178
2333Incorrect
2334Mark 0 out of 1
2335 Not flaggedFlag question
2336Question text
2337(Single Choice) Keyboard is used to input data only. Which of the following is the transmission mode of the keyboard?
2338Select one:
2339a. Auto negotiation
2340b. Half-duplex mode
2341c. Full-duplex mode
2342d. Simplex mode
2343Feedback
2344The correct answer is: Simplex mode
2345Question 179
2346Incorrect
2347Mark 0 out of 1
2348 Not flaggedFlag question
2349Question text
2350(Single Choice) To improve a twisted pair cable's capability to withstand magnetic interference, which of the following layers can be added as a shield layer of the twisted pair cable?
2351Select one:
2352a. UTP
2353b. RPR
2354c. BTP
2355d. STP
2356Feedback
2357The correct answer is: STP
2358Question 180
2359Incorrect
2360Mark 0 out of 1
2361 Not flaggedFlag question
2362Question text
2363(Single Choice) Both analog transmission and digital transmission can use twisted pair cables. Which of the following statement is true?
2364Select one:
2365a. The communication distance is independent of the diameter of the conductor.
2366b. The communication distance increases with the diameter of the conductor when the communication distance exceeds 50 km.
2367c. The communication distance increases with the diameter of the conductor.
2368d. The communication distance decreases with the diameter of the conductor.
2369Feedback
2370The correct answer is: The communication distance increases with the diameter of the conductor.
2371Question 181
2372Incorrect
2373Mark 0 out of 1
2374 Not flaggedFlag question
2375Question text
2376(Single Choice) In Ethernet standard, which of the following mechanisms is used to avoid collision when different nodes transmit packets simultaneously?
2377Select one:
2378a. CSMA/AC
2379b. CSMA/CA
2380c. CSMA/CD
2381d. CSMA/DA
2382Feedback
2383The correct answer is: CSMA/CD
2384Question 182
2385Correct
2386Mark 1 out of 1
2387 Not flaggedFlag question
2388Question text
2389(Single Choice) The distance limit of category 5 UTP wiring is
2390Select one:
2391a. 100 meters
2392b. 200 meters
2393c. 185 meters
2394d. 50 meters
2395Feedback
2396The correct answer is: 100 meters
2397Question 183
2398Correct
2399Mark 1 out of 1
2400 Not flaggedFlag question
2401Question text
2402(Single Choice) Two computers are connected to each other by using twisted pair cable. The correct wiring sequence is
2403Select one:
2404a. 1--3, 2--6, 3--1, 4--4, 5--5, 6--2, 7--7, 8--8
2405b. 1--2, 2--1, 3--6, 4--4, 5--5, 6--3, 7--7, 8-8
2406c. 1--1, 2--2, 3--3, 4--4, 5--5, 6--6, 7--7, 8--8
2407d. Computers can not be directly connected with twisted pair cable
2408Feedback
2409The correct answer is: 1--3, 2--6, 3--1, 4--4, 5--5, 6--2, 7--7, 8--8
2410Question 184
2411Incorrect
2412Mark 0 out of 1
2413 Not flaggedFlag question
2414Question text
2415(Single Choice) A PC is connected to router's Ethernet port through its network interface card. What type of cable should be used to connect these two interfaces?
2416Select one:
2417a. Console cable
2418b. Straight cable
2419c. Backup cable
2420d. Cross cable
2421Feedback
2422The correct answer is: Cross cable
2423Question 185
2424Incorrect
2425Mark 0 out of 1
2426 Not flaggedFlag question
2427Question text
2428(Single Choice) How long can a fast Ethernet cable 100BaseTX or 100BaseT4 transmit a signal?
2429Select one:
2430a. 550m
2431b. 1000m
2432c. 100m
2433d. 2000m
2434Feedback
2435The correct answer is: 100m
2436Question 186
2437Incorrect
2438Mark 0 out of 1
2439 Not flaggedFlag question
2440Question text
2441(Single Choice) How long can a Gigabit Ethernet cable 1000BaseT transmit a signal?
2442Select one:
2443a. 1000m
2444b. 550m
2445c. 2000m
2446d. 100m
2447Feedback
2448The correct answer is: 100m
2449Question 187
2450Partially correct
2451Mark 0 out of 1
2452 Not flaggedFlag question
2453Question text
2454(Multiple Choice) Which transmission rates does an Ethernet allow for?
2455Select one or more:
2456a. 10M
2457b. 155M
2458c. 100M
2459d. 1000M
2460Feedback
2461The correct answers are: 10M, 100M, 1000M
2462Question 188
2463Partially correct
2464Mark 0 out of 1
2465 Not flaggedFlag question
2466Question text
2467(Multiple Choice) Which of the following communication types are defined based on information interaction between the transmitter and the receiver?
2468Select one or more:
2469a. Simplex
2470b. Duplex
2471c. Auto-negotiation
2472d. Half-duplex
2473Feedback
2474The correct answers are: Simplex, Half-duplex, Duplex
2475Question 189
2476Correct
2477Mark 1 out of 1
2478 Not flaggedFlag question
2479Question text
2480(Single Choice) Which communication mode does a hub work in?
2481Select one:
2482a. Half-duplex
2483b. Simplex
2484c. Auto-negotiation
2485d. Full-duplex mode
2486Feedback
2487The correct answer is: Half-duplex
2488Question 190
2489Incorrect
2490Mark 0 out of 1
2491 Not flaggedFlag question
2492Question text
2493(Single Choice) Which type of Ethernet uses hubs?
2494Select one:
2495a. Token ring Ethernet
2496b. Switched Ethernet
2497c. Star Ethernet
2498d. Shared Ethernet
2499Feedback
2500The correct answer is: Shared Ethernet
2501Question 191
2502Partially correct
2503Mark 0 out of 1
2504 Not flaggedFlag question
2505Question text
2506(Multiple Choice) The physical medium used by Ethernet include.
2507Select one or more:
2508a. Optical fiber
2509b. Coaxial cable
2510c. Twisted pair cable
2511d. V.35 cable
2512Feedback
2513The correct answers are: Coaxial cable, Twisted pair cable, Optical fiber
2514Question 192
2515Incorrect
2516Mark 0 out of 1
2517 Not flaggedFlag question
2518Question text
2519(Single Choice) multiple PCs are connected to the same hub through twisted pair cables. What's its logical topology structure?
2520Select one:
2521a. Ring
2522b. Mesh
2523c. Bus
2524d. Star
2525e. Tree
2526Feedback
2527The correct answer is: Bus
2528Question 193
2529Incorrect
2530Mark 0 out of 1
2531 Not flaggedFlag question
2532Question text
2533(Single Choice) Under Which of the following circumstances, “multiple” work stations belong to the same collision domain?
2534Select one:
2535a. “multiple” workstations are connected to a LAN switch through twisted pair cables
2536b. “multiple” workstations are connected to a hub through twisted pair cables
2537c. “multiple” workstations are connected to a bridge through twisted pair cables
2538d. “multiple” workstations are connected to a router through twisted pair cables
2539Feedback
2540The correct answer is: “multiple” workstations are connected to a hub through twisted pair cables
2541Question 194
2542Partially correct
2543Mark 0 out of 1
2544 Not flaggedFlag question
2545Question text
2546(Multiple Choice) In late 1980s, UTP appeared and was widely used. Which of the following are advantages of UTP?
2547Select one or more:
2548a. Receive and transmit using different wires
2549b. Low price
2550c. Both of the physical and logical topology is bus type
2551d. Easy to manufacture
2552Feedback
2553The correct answers are: Low price, Easy to manufacture, Receive and transmit using different wires
2554Question 195
2555Incorrect
2556Mark 0 out of 1
2557 Not flaggedFlag question
2558Question text
2559(Single Choice) How to eliminate the collision in Ethernet?
2560Select one:
2561a. Decrease the number of transmitted packets
2562b. Replace the hub and repeater with switch or bridge
2563c. Decrease the number of users on each network segment
2564d. Increase the length of cable
2565Feedback
2566The correct answer is: Replace the hub and repeater with switch or bridge
2567Question 196
2568Incorrect
2569Mark 0 out of 1
2570 Not flaggedFlag question
2571Question text
2572(Single Choice) Which of the following statements regarding collision is incorrect?
2573Select one:
2574a. Reduce the number of hosts in a network can decrease probability of collision.
2575b. Each ports of switch is an independent collision domain.
2576c. The number of the collision domains will be increased if the hub in the network is replaced with the bridge.
2577d. The collision that happens in the network connected with one port of a switch will affect another network connected with another port of the switch.
2578Feedback
2579The correct answer is: The collision that happens in the network connected with one port of a switch will affect another network connected with another port of the switch.
2580Question 197
2581Partially correct
2582Mark 0 out of 1
2583 Not flaggedFlag question
2584Question text
2585(Multiple Choice) What kind of wirings does 100BaseT4 Fast Ethernet specification use?
2586Select one or more:
2587a. Category 5 UTP
2588b. Category 3 UTP
2589c. Category 6 UTP
2590d. Category 4 UTP
2591Feedback
2592The correct answers are: Category 3 UTP, Category 4 UTP, Category 5 UTP
2593Question 198
2594Incorrect
2595Mark 0 out of 1
2596 Not flaggedFlag question
2597Question text
2598(Single Choice) An Ethernet electrical port can work in three types of duplex modes, whereas an Ethernet optical port can work in only one mode. Which of the following represents this mode?
2599Select one:
2600a. Auto-negotiation
2601b. Full-duplex
2602c. Simplex
2603d. Half-duplex
2604Feedback
2605The correct answer is: Full-duplex
2606Question 199
2607Incorrect
2608Mark 0 out of 1
2609 Not flaggedFlag question
2610Question text
2611(Single Choice) Coaxial cables can be classified into different types by diameter. One of these types of the coaxial cables is suitable for relatively large LAN because it supports long distance and provides high reliability. Which of the following coaxial cables belongs to this type?
2612Select one:
2613a. 10-core coaxial cable
2614b. 16-core coaxial cable
2615c. Coaxial cable with a small diameter
2616d. Coaxial cable with a large diameter
2617Feedback
2618The correct answer is: Coaxial cable with a large diameter
2619Question 200
2620Incorrect
2621Mark 0 out of 1
2622 Not flaggedFlag question
2623Question text
2624(Single Choice) Which layer implements auto-negotiation in an Ethernet without using private datagrams?
2625Select one:
2626a. Data Link Layer
2627b. Network Layer
2628c. Chips at Physical Layer
2629d. Application Layer
2630Feedback
2631The correct answer is: Chips at Physical Layer
2632Question 201
2633Incorrect
2634Mark 0 out of 1
2635 Not flaggedFlag question
2636Question text
2637(Single Choice) A transmission medium consists of glass fibers and a shield layer. It is free from interference of magnetic signals and provides high-speed and long-distance transmission. But such a matter is very expensive. What is this matter?
2638Select one:
2639a. Coaxial cable
2640b. Twisted pair cable
2641c. Waveguide fiber
2642d. Optical fiber
2643Feedback
2644The correct answer is: Optical fiber
2645Question 202
2646Incorrect
2647Mark 0 out of 1
2648 Not flaggedFlag question
2649Question text
2650(Single Choice) Which device operates at physical layer?
2651Select one:
2652a. Switch
2653b. Firewall
2654c. Router
2655d. Hub
2656Feedback
2657The correct answer is: Hub
2658Question 203
2659Incorrect
2660Mark 0 out of 1
2661 Not flaggedFlag question
2662Question text
2663(Multiple Choice) What are transmission media of physical layer?
2664Select one or more:
2665a. Ethernet
2666b. Radio wave
2667c. Twisted pair cable
2668d. Fiber
2669Feedback
2670The correct answers are: Fiber, Twisted pair cable, Radio wave
2671Question 204
2672Incorrect
2673Mark 0 out of 1
2674 Not flaggedFlag question
2675Question text
2676(Multiple Choice) What are wiring standards for physical layer related to LAN?
2677Select one or more:
2678a. HDLC
2679b. 100Base-FX
2680c. 100Base-T
2681d. 1000Base-SX/LX
2682Feedback
2683The correct answers are: 100Base-T, 100Base-FX, 1000Base-SX/LX
2684Question 205
2685Incorrect
2686Mark 0 out of 1
2687 Not flaggedFlag question
2688Question text
2689(Multiple Choice) Which of the following are physical interfaces?
2690Select one or more:
2691a. Dialer interface
2692b. Virtual interface template
2693c. Voice interface
2694d. CE1/PRI interface
2695e. Serial interface
2696f. ISDN BRI interface
2697g. Sub interface
2698Feedback
2699The correct answers are: Voice interface, Serial interface, CE1/PRI interface, ISDN BRI interface
2700Question 206
2701Incorrect
2702Mark 0 out of 1
2703 Not flaggedFlag question
2704Question text
2705(Single Choice) Which of the following fibers allows for multiangular incidence of “multiple” beams of light for transmission?
2706Select one:
2707a. Active fiber
2708b. “Single”-mode fiber
2709c. Multimode fiber
2710d. 4-core fiber
2711Feedback
2712The correct answer is: Multimode fiber
2713Question 207
2714Incorrect
2715Mark 0 out of 1
2716 Not flaggedFlag question
2717Question text
2718Which of the following is the abbreviation for DHCP?
2719Select one:
2720a. Dynamic Host Connection Protocol
2721b. Denial Host Configuration Protocol
2722c. Dynamic Host Configuration Protocol
2723d. Dynamic Hot Connection Protocol
2724Feedback
2725The correct answer is: Dynamic Host Configuration Protocol
2726Question 208
2727Incorrect
2728Mark 0 out of 1
2729 Not flaggedFlag question
2730Question text
2731Which layer of OSI reference model does DHCP belong to?
2732Select one:
2733a. Data-link layer
2734b. Application layer
2735c. Physical layer
2736d. Network layer
2737Feedback
2738The correct answer is: Application layer
2739Question 209
2740Incorrect
2741Mark 0 out of 1
2742 Not flaggedFlag question
2743Question text
2744What is the main function of DNS?
2745Select one:
2746a. Protocol
2747b. Sender
2748c. Message
2749d. Receiver
2750e. Harddisk
2751Feedback
2752The correct answer is: Sender
2753Question 210
2754Incorrect
2755Mark 0 out of 1
2756 Not flaggedFlag question
2757Question text
2758What is the underlying protocol used by DHCP to send messages?
2759Select one:
2760a. SIP
2761b. RTP
2762c. UDP
2763d. TCP
2764Feedback
2765The correct answer is: UDP
2766Question 211
2767Correct
2768Mark 1 out of 1
2769 Not flaggedFlag question
2770Question text
2771In Window XP system, which of the following commands is used to release the IP address assigned by the DHCP Server?
2772Select one:
2773a. ipconfig /release
2774b. ipconfig /all
2775c. ipconfig /renew
2776d. ipconfig
2777Feedback
2778The correct answer is: ipconfig /release
2779Question 212
2780Incorrect
2781Mark 0 out of 1
2782 Not flaggedFlag question
2783Question text
2784Which of the following protocols can be used for file transfer?
2785Select one or more:
2786a. Telnet
2787b. FTP
2788c. Icmp
2789d. TFTP
2790Feedback
2791The correct answers are: FTP, TFTP
2792Question 213
2793Partially correct
2794Mark 1 out of 1
2795 Not flaggedFlag question
2796Question text
2797Which of the following protocols or applications are based on UDP?
2798Select one or more:
2799a. TFTP
2800b. FTP
2801c. SNMP
2802d. Telnet
2803Feedback
2804The correct answers are: TFTP, SNMP
2805Question 214
2806Incorrect
2807Mark 0 out of 1
2808 Not flaggedFlag question
2809Question text
2810Which of the following protocols is transport layer protocol of TFTP?
2811Select one:
2812a. SIP
2813b. RTP
2814c. UDP
2815d. TCP
2816Feedback
2817The correct answer is: UDP
2818Question 215
2819Incorrect
2820Mark 0 out of 1
2821 Not flaggedFlag question
2822Question text
2823Which of the following is an attribute of file transferred by using FTP?
2824Select one:
2825a. Low speed
2826b. Simple
2827c. Read-only memory
2828d. High throughput
2829Feedback
2830The correct answer is: High throughput
2831Question 216
2832Incorrect
2833Mark 0 out of 1
2834 Not flaggedFlag question
2835Question text
2836By default, which port is used by the FTP server to establish the data connection?
2837Select one:
2838a. 21
2839b. 25
2840c. 23
2841d. 20
2842Feedback
2843The correct answer is: 20
2844Question 217
2845Partially correct
2846Mark 1 out of 1
2847 Not flaggedFlag question
2848Question text
2849FTP session consists of two types of connections, they are( )
2850Select one or more:
2851a. Data connection
2852b. Control connection
2853c. Output connection
2854d. Input connection
2855Feedback
2856The correct answers are: Control connection, Data connection
2857Question 218
2858Incorrect
2859Mark 0 out of 1
2860 Not flaggedFlag question
2861Question text
2862Which of the following applications are based on the TCP protocol?
2863Select one or more:
2864a. OSPF
2865b. PING
2866c. FTP
2867d. TELNET
2868Feedback
2869The correct answers are: FTP, TELNET
2870Question 219
2871Incorrect
2872Mark 0 out of 1
2873 Not flaggedFlag question
2874Question text
2875Which of the following statements about FTP are true?
2876Select one or more:
2877a. FTP is used to provide low-speed file transfer.
2878b. TFTP can control an FTP user according to the login name and password.
2879c. FTP is based on the UDP protocol.
2880d. A router can work as either an FTP Client or an FTP Server.
2881Feedback
2882The correct answers are: TFTP can control an FTP user according to the login name and password., A router can work as either an FTP Client or an FTP Server.
2883Question 220
2884Incorrect
2885Mark 0 out of 1
2886 Not flaggedFlag question
2887Question text
2888Which of the following statements about TFTP are true?
2889Select one or more:
2890a. TFTP can control a TFTP user according to the login name and password.
2891b. TFTP is based on the UDP protocol.
2892c. TFTP supports only the Client mode.
2893d. TFTP is a simple file transfer protocol and applicable to read-only memory.
2894Feedback
2895The correct answers are: TFTP is based on the UDP protocol., TFTP is a simple file transfer protocol and applicable to read-only memory., TFTP supports only the Client mode.
2896Question 221
2897Correct
2898Mark 1 out of 1
2899 Not flaggedFlag question
2900Question text
2901Which port number does Telnet uses for protocol transmission?
2902Select one:
2903a. 23
2904b. 48
2905c. 8080
2906d. 24
2907Feedback
2908The correct answer is: 23
2909Question 222
2910Incorrect
2911Mark 0 out of 1
2912 Not flaggedFlag question
2913Question text
2914Which transport-level protocol does Telnet use?
2915Select one:
2916a. ECMP
2917b. UDP
2918c. UCMP
2919d. TCP
2920Feedback
2921The correct answer is: TCP
2922Question 223
2923Incorrect
2924Mark 0 out of 1
2925 Not flaggedFlag question
2926Question text
2927Which of the following port numbers is used by Telnet?
2928Select one:
2929a. 27
2930b. 29
2931c. 23
2932d. 25
2933Feedback
2934The correct answer is: 23
2935Question 224
2936Incorrect
2937Mark 0 out of 1
2938 Not flaggedFlag question
2939Question text
2940What is the underlying protocol used by Telnet to transmit data?
2941Select one:
2942a. SIP
2943b. UDP
2944c. RTP
2945d. TCP
2946Feedback
2947The correct answer is: TCP
2948Question 225
2949Partially correct
2950Mark 0 out of 1
2951 Not flaggedFlag question
2952Question text
2953Compared with telnet, which of the following advantages does SSH support?
2954Select one or more:
2955a. Encrypt the transmitted data to guarantee its security and reliability
2956b. Accelerate the data transmission speed by compressing the data
2957c. Scalable application based on UDP connection
2958d. Prevent DNS and IP spoofing
2959Feedback
2960The correct answers are: Encrypt the transmitted data to guarantee its security and reliability, Prevent DNS and IP spoofing, Accelerate the data transmission speed by compressing the data
2961Question 226
2962Partially correct
2963Mark 0 out of 1
2964 Not flaggedFlag question
2965Question text
2966Which of the following protocols or applications are based on TCP?
2967Select one or more:
2968a. DNS
2969b. FTP
2970c. SNMP
2971d. Telnet
2972Feedback
2973The correct answers are: FTP, DNS, Telnet
2974Question 227
2975Correct
2976Mark 1 out of 1
2977 Not flaggedFlag question
2978Question text
2979Which of the following commands is used to check whether an application-level protocol works normally?
2980Select one:
2981a. TELNET
2982b. PING
2983c. TRACE
2984d. Extended ping
2985Feedback
2986The correct answer is: TELNET
2987Question 228
2988Incorrect
2989Mark 0 out of 1
2990 Not flaggedFlag question
2991Question text
2992An administrator connects two switches together in a local enterprise network. The ports of one switch support Fast Ethernet, while the ports of the other switch support Gigabit Ethernet. Hosts connected to one switch are able to communicate, however communication between the two switches fails. What is the possible reason for this?
2993Select one:
2994a. One port is supporting auto-negotiation, while auto-negotiation is disabled on the port of the other switch.
2995b. The port of one switch is operating using half duplex mode, while the port of the other switch is using full duplex mode.
2996c. The ports have disabled auto-negoatition.
2997d. A Fast Ethernet port cannot communicate directly with a Gigabit Ethernet port.
2998Feedback
2999The correct answer is: The ports have disabled auto-negoatition.
3000Question 229
3001Incorrect
3002Mark 0 out of 1
3003 Not flaggedFlag question
3004Question text
3005( ) combines “multiple” ports to form an aggregation group. It can be used to balance the traffic among member ports and improve the connection reliability.
3006Select one:
3007a. Port Aggregation
3008b. Port load balance
3009c. Port binding
3010d. Port group
3011Feedback
3012The correct answer is: Port binding
3013Question 230
3014Incorrect
3015Mark 0 out of 1
3016 Not flaggedFlag question
3017Question text
3018What benefits does port aggregation yield?
3019Select one or more:
3020a. Facilitates data copy for analysis
3021b. Improves network reliability
3022c. Improves link bandwidth
3023d. Implements load sharing
3024Feedback
3025The correct answers are: Improves link bandwidth, Implements load sharing, Improves network reliability
3026Question 231
3027Correct
3028Mark 1 out of 1
3029 Not flaggedFlag question
3030Question text
3031( ) What is the maximum number of member interfaces supported by a single Eth-Trunk?
3032Select one:
3033a. 8
3034b. 12
3035c. 6
3036d. 10
3037Feedback
3038The correct answer is: 8
3039Question 232
3040Incorrect
3041Mark 0 out of 1
3042 Not flaggedFlag question
3043Question text
3044The Eth-Trunk frame forwarding mechanism used to prevent changes in the data sequence forwards frames based on which of the following parameters?
3045Select one or more:
3046a. The same protocol type.
3047b. The same source or destination IP address
3048c. The same source or destination port number.
3049d. The same source or destination MAC address.
3050Feedback
3051The correct answers are: The same source or destination IP address, The same source or destination MAC address.
3052Question 233
3053Incorrect
3054Mark 0 out of 1
3055 Not flaggedFlag question
3056Question text
3057( ) In Layer 2 mode, the transmission rate of an Eth-Trunk interface is determined by which of the following?
3058Select one or more:
3059a. Number of interfaces.
3060b. Maximum number of Up member links
3061c. Number of Up member interfaces
3062d. Minimum number of Up member links
3063Feedback
3064The correct answers are: Maximum number of Up member links, Number of Up member interfaces
3065Question 234
3066Correct
3067Mark 1 out of 1
3068 Not flaggedFlag question
3069Question text
3070( ) The network administrator wishes to forward data over an Eth-trunk, however associated member interfaces operate at different rates. In terms of the resulting behavior, which of the following is true?
3071Select one:
3072a. The lower rate member interfaces may incur packet loss.
3073b. The Eth-Trunk will work normally.
3074c. The higher rate member interfaces may incur packet loss.
3075d. The two switches will not be able to communicate.
3076Feedback
3077The correct answer is: The lower rate member interfaces may incur packet loss.
3078Question 235
3079Partially correct
3080Mark 1 out of 1
3081 Not flaggedFlag question
3082Question text
3083( ) The network administrator attempts to add interface G0/0/1 on Switch A to Eth-trunk 1, however the command fails. Which of the following may cause this?
3084Select one or more:
3085a. The interface is already associated with another Eth-trunk.
3086b. The interface is an access port.
3087c. The interface is operating in half-duplex mode.
3088d. The interface has been shutdown.
3089Feedback
3090The correct answers are: The interface is already associated with another Eth-trunk., The interface is an access port.
3091Question 236
3092Correct
3093Mark 1 out of 1
3094 Not flaggedFlag question
3095Question text
3096According to IEEE802.1Q, where is VLAN ID in the tagged Ethernet frame?
3097Select one:
3098a. Behind the source MAC address and destination MAC address
3099b. In front of the source MAC address and destination MAC address
3100c. Between the source MAC address and destination MAC address
3101d. Not fixed
3102Feedback
3103The correct answer is: Behind the source MAC address and destination MAC address
3104Question 237
3105Incorrect
3106Mark 0 out of 1
3107 Not flaggedFlag question
3108Question text
3109On VRP platform, what is the function for command "interface vlan-interface vlan-id"?
3110Select one:
3111a. Create a VLAN
3112b. No such command
3113c. Configure VLAN for an interface
3114d. Create or enter VLAN interface
3115Feedback
3116The correct answer is: Create or enter VLAN interface
3117Question 238
3118Incorrect
3119Mark 0 out of 1
3120 Not flaggedFlag question
3121Question text
3122How many bytes does a VLAN tag consist of?
3123Select one:
3124a. 3
3125b. 2
3126c. 4
3127d. 5
3128Feedback
3129The correct answer is: 4
3130Question 239
3131Partially correct
3132Mark 0 out of 1
3133 Not flaggedFlag question
3134Question text
3135After the VLAN function is introduced to the Ethernet, the ports on a switch can be classified into ( ).
3136Select one or more:
3137a. Hybrid port
3138b. Trunk port
3139c. None port
3140d. Access port
3141Feedback
3142The correct answers are: Access port, Trunk port, Hybrid port
3143Question 240
3144Incorrect
3145Mark 0 out of 1
3146 Not flaggedFlag question
3147Question text
3148A VLAN in the Ethernet is used to separate ( ).
3149Select one:
3150a. Layer 2 multicast domain
3151b. Layer 2 unicast domain
3152c. Layer 2 broadcast domain
3153d. Layer 2 MAC address
3154Feedback
3155The correct answer is: Layer 2 broadcast domain
3156Question 241
3157Incorrect
3158Mark 0 out of 1
3159 Not flaggedFlag question
3160Question text
3161During frame forwarding, a switch checks the VLAN tag carried in an Ethernet frame and then determines whether to forward the Ethernet frame through a port if the VLAN tag is a ( ) of this port.
3162Select one:
3163a. Default PVID
3164b. Permitted tag
3165c. STP disable state
3166d. MAC address equivalence
3167Feedback
3168The correct answer is: Permitted tag
3169Question 242
3170Incorrect
3171Mark 0 out of 1
3172 Not flaggedFlag question
3173Question text
3174After an Ethernet frame uses a VLAN tag, the Ethernet frame can be expressed in two formats, namely, ( ) and ( ) in a switched network.
3175Select one or more:
3176a. Row frame
3177b. Tagged frame
3178c. Column frame
3179d. Untagged frame
3180Feedback
3181The correct answers are: Untagged frame, Tagged frame
3182Question 243
3183Incorrect
3184Mark 0 out of 1
3185 Not flaggedFlag question
3186Question text
3187VLAN tagged frame has extra ( ) bytes compared with standard Ethernet frame?
3188Select one:
3189a. 8
3190b. 4
3191c. 12
3192d. 32
3193Feedback
3194The correct answer is: 4
3195Question 244
3196Correct
3197Mark 1 out of 1
3198 Not flaggedFlag question
3199Question text
3200How many bits are used to identify the VLAN id of the data frame?
3201Select one:
3202a. 12
3203b. 32
3204c. 8
3205d. 4
3206Feedback
3207The correct answer is: 12
3208Question 245
3209Incorrect
3210Mark 0 out of 1
3211 Not flaggedFlag question
3212Question text
3213The fixed value of the TPID field in VLAN tag is ( ).
3214Select one:
3215a. 0x0800
3216b. 0x8100
3217c. 0x9100
3218d. 0x0806
3219Feedback
3220The correct answer is: 0x8100
3221Question 246
3222Correct
3223Mark 1 out of 1
3224 Not flaggedFlag question
3225Question text
3226A VLAN can be considered as a ( ).
3227Select one:
3228a. Broadcast domain
3229b. Management domain
3230c. Collision domain
3231d. Blocking domain
3232Feedback
3233The correct answer is: Broadcast domain
3234Question 247
3235Partially correct
3236Mark 0 out of 1
3237 Not flaggedFlag question
3238Question text
3239Which of the following are the advantages of VLAN compared with traditional LAN technology?
3240Select one or more:
3241a. Isolate broadcast domain and control the broadcast packets
3242b. Enhance the network high available
3243c. Improve the network security
3244d. Lower cost for relocation and changes
3245Feedback
3246The correct answers are: Lower cost for relocation and changes, Isolate broadcast domain and control the broadcast packets, Improve the network security
3247Question 248
3248Correct
3249Mark 1 out of 1
3250 Not flaggedFlag question
3251Question text
3252A port of the switch belongs to VLAN 5. If VLAN 5 is removed by using command "undo vlan 5", then which VLAN does this port belong?
3253Select one:
3254a. 1
3255b. 1023
3256c. 0
3257d. 1024
3258Feedback
3259The correct answer is: 1
3260Question 249
3261Partially correct
3262Mark 1 out of 1
3263 Not flaggedFlag question
3264Question text
3265Which of the following methods can realize communication between VLANs at network layer?
3266Select one or more:
3267a. L2 Switch+Router
3268b. L3 Switch
3269c. GVRP
3270d. STP
3271Feedback
3272The correct answers are: L2 Switch+Router, L3 Switch
3273Question 250
3274Incorrect
3275Mark 0 out of 1
3276 Not flaggedFlag question
3277Question text
3278Workstation A and workstation B are respectively connected to two ports of a switch. Assume the MAC table of the switch is empty now. Which of the following statements is true as soon as the switch receives the first packet sent by Workstation A to Workstation B?
3279Select one:
3280a. The switch will learn address of B
3281b. The switch will not learn any address
3282c. The switch will learn address of A
3283d. The switch will learn addresses of both A and B
3284Feedback
3285The correct answer is: The switch will learn address of A
3286Question 251
3287Incorrect
3288Mark 0 out of 1
3289 Not flaggedFlag question
3290Question text
3291Which of the following descriptions are correct about VLAN interface?
3292Select one or more:
3293a. The VLAN interface can be configured for the non-existed VLAN
3294b. A virtual interface is required to be created for the VLAN if we want to assign an IP address for that VLAN,
3295c. The VLAN interface number must be the same with VLAN ID
3296d. Two VLAN interfaces on the same switch can be assigned with the same IP address
3297Feedback
3298The correct answers are: A virtual interface is required to be created for the VLAN if we want to assign an IP address for that VLAN,, The VLAN interface number must be the same with VLAN ID
3299Question 252
3300Partially correct
3301Mark 0 out of 1
3302 Not flaggedFlag question
3303Question text
3304An access port on a switch generally connects to a port on a computer. Which of the following statements are true?
3305Select one or more:
3306a. An access port can belong to only one VLAN.
3307b. The default VLAN of an access port is the VLAN where the port is located. You do not need to manually configure a default VLAN for an access port.
3308c. After receiving an untag packet, the access port attaches its PVID information to the packet.
3309d. After receiving a tag packet, the switch forwards it directly.
3310Feedback
3311The correct answers are: The default VLAN of an access port is the VLAN where the port is located. You do not need to manually configure a default VLAN for an access port., An access port can belong to only one VLAN., After receiving an untag packet, the access port attaches its PVID information to the packet.
3312Question 253
3313Correct
3314Mark 1 out of 1
3315 Not flaggedFlag question
3316Question text
3317What action does a Trunk port take after it receives an untag packet?
3318Select one:
3319a. Attaches its PVID information to the packet and then sends out the packet.
3320b. Discards the packet directly.
3321c. Sends out the packet directly without adding the tag information to the packet.
3322d. Attaches its trunk VLAN ID to the packet and then sends out the packet.
3323Feedback
3324The correct answer is: Attaches its PVID information to the packet and then sends out the packet.
3325Question 254
3326Partially correct
3327Mark 1 out of 1
3328 Not flaggedFlag question
3329Question text
3330Which of the following statements are true after a Trunk port receives a tag packet?
3331Select one or more:
3332a. Discards the tag packet directly if the Trunk port does not allow the tag packet to pass through.
3333b. Transparently transmits the tag packet.
3334c. Checks whether the Trunk port allows the tag packet to pass through.
3335d. Attaches its PVID information to the packet and then sends out the packet.
3336Feedback
3337The correct answers are: Checks whether the Trunk port allows the tag packet to pass through., Discards the tag packet directly if the Trunk port does not allow the tag packet to pass through.
3338Question 255
3339Incorrect
3340Mark 0 out of 1
3341 Not flaggedFlag question
3342Question text
3343Which of the following statements about VLAN communication are true?
3344Select one or more:
3345a. Layer 3 VLAN interfaces can be configured on a Layer 2 switch to implement VLAN communication.
3346b. Layer 3 VLAN interfaces can be configured on a Layer 3 switch to implement VLAN communication.
3347c. One-arm routing can be configured for a Layer 2 switch only by using a router to implement VLAN communication.
3348d. One-arm routing can be configured for a Layer 3 switch only by using a router to implement VLAN communication.
3349Feedback
3350The correct answers are: One-arm routing can be configured for a Layer 2 switch only by using a router to implement VLAN communication., Layer 3 VLAN interfaces can be configured on a Layer 3 switch to implement VLAN communication.
3351Question 256
3352Partially correct
3353Mark 1 out of 1
3354 Not flaggedFlag question
3355Question text
3356Which of the following statements about the advantages of the VLAN function are true?
3357Select one or more:
3358a. The VLAN function improves network performance by implementing flow control and using the window advertisement mechanism.
3359b. The VLAN function divides a network into several small logical networks, reducing the impact of a broadcast storm on a network.
3360c. The VLAN function reduces network costs by reducing the number of physical ports on switches.
3361d. The VLAN function improves network security by identifying users that are allowed to access sensitive data and applications.
3362Feedback
3363The correct answers are: The VLAN function improves network security by identifying users that are allowed to access sensitive data and applications., The VLAN function improves network performance by implementing flow control and using the window advertisement mechanism.
3364Question 257
3365Correct
3366Mark 1 out of 1
3367 Not flaggedFlag question
3368Question text
3369Which of the following standards is defined by IEEE to regulate the implementation of VLAN between switches?
3370Select one:
3371a. 802.1q
3372b. 802.1d
3373c. 802.1x
3374d. 802.3
3375Feedback
3376The correct answer is: 802.1q
3377Question 258
3378Incorrect
3379Mark 0 out of 1
3380 Not flaggedFlag question
3381Question text
3382A frame tag adds ( ) to each frame so that the frame can be transmitted through Trunk ports on switches.
3383Select one:
3384a. Bridge ID of a switch
3385b. VLAN ID
3386c. Destination MAC address
3387d. Source MAC address of a switch
3388Feedback
3389The correct answer is: VLAN ID
3390Question 259
3391Partially correct
3392Mark 1 out of 1
3393 Not flaggedFlag question
3394Question text
3395Which of the following are the features of the default VLAN setting in a switch configuration?
3396Select one or more:
3397a. The default VLAN cannot be deleted manually.
3398b. The IP address configured for a switch is applied only to a member port in the default VLAN.
3399c. By default, the ports on all switches are member ports of a default VLAN.
3400d. A default VLAN must be created before a port is allocated to a VLAN.
3401Feedback
3402The correct answers are: The default VLAN cannot be deleted manually., By default, the ports on all switches are member ports of a default VLAN.
3403Question 260
3404Incorrect
3405Mark 0 out of 1
3406 Not flaggedFlag question
3407Question text
3408Which of the following statements about VLAN are true?
3409Select one or more:
3410a. A “single” access port can pass through “multiple” VLANs.
3411b. In the switch configuration, if the default VLAN is VLAN 1, it cannot be deleted or renamed.
3412c. A switch supports a maximum number of 255 VLANs.
3413d. “Multiple” VLANs can pass through a “single” trunk.
3414Feedback
3415The correct answers are: In the switch configuration, if the default VLAN is VLAN 1, it cannot be deleted or renamed., “Multiple” VLANs can pass through a “single” trunk.
3416Question 261
3417Incorrect
3418Mark 0 out of 1
3419 Not flaggedFlag question
3420Question text
3421Switch-A and Switch-B are configured with ports in VLANs for R&D Department, Sales Department, Product Department, Financial Department, and HR Department. Each VLAN contains 20 users. In this case, how many subnets at least are required to provide routes between all VLANs?
3422Select one:
3423a. 50
3424b. 5
3425c. 20
3426d. 100
3427Feedback
3428The correct answer is: 5
3429Question 262
3430Incorrect
3431Mark 0 out of 1
3432 Not flaggedFlag question
3433Question text
3434Of all the VLAN grouping methods, the grouping method by IP address is called ( ) VLAN.
3435Select one:
3436a. Port-based
3437b. MAC address-based
3438c. Route-based
3439d. Policy-based
3440Feedback
3441The correct answer is: Route-based
3442Question 263
3443Incorrect
3444Mark 0 out of 1
3445 Not flaggedFlag question
3446Question text
3447Which VLAN does an access port of a switch belong to?
3448Select one:
3449a. All VLANs
3450b. The only defined VLAN
3451c. The VLAN with the greatest No.
3452d. The VLAN with the smallest No.
3453Feedback
3454The correct answer is: The only defined VLAN
3455Question 264
3456Incorrect
3457Mark 0 out of 1
3458 Not flaggedFlag question
3459Question text
3460A network administrator wants to divide the hosts in building A into VLAN 3 and VLAN 5. Which of the following statements about VLAN configuration is true?
3461Select one:
3462a. After VLAN 3 and VLAN 5 are created manually, the default VLAN is removed automatically.
3463b. VLAN information is saved automatically in the starting configuration.
3464c. The two VLANs can be named BUILDING_A to differentiate them from the VLANs in other geographical areas.
3465d. The network administrator can create a VLAN either in the global view or in the VLAN view.
3466Feedback
3467The correct answer is: The network administrator can create a VLAN either in the global view or in the VLAN view.
3468Question 265
3469Partially correct
3470Mark 1 out of 1
3471 Not flaggedFlag question
3472Question text
3473Which of the following statements are true in the process of deleting a VLAN?
3474Select one or more:
3475a. A network administrator can delete a VLAN either in the global view or in the VLAN view.
3476b. The member port of a VLAN becomes inactive after the VLAN is deleted.
3477c. A VLAN can be deleted only after its member port is allocated to another VLAN.
3478d. When a routing-based interface (Vlanif) is available for a VLAN, the Vlanif interface must be deleted before the VLAN is deleted.
3479Feedback
3480The correct answers are: When a routing-based interface (Vlanif) is available for a VLAN, the Vlanif interface must be deleted before the VLAN is deleted., A network administrator can delete a VLAN either in the global view or in the VLAN view.
3481Question 266
3482Partially correct
3483Mark 1 out of 1
3484 Not flaggedFlag question
3485Question text
3486Which of the following statements about the process of creating a VLAN are true?
3487Select one or more:
3488a. A network administrator can create a VLAN either in the global view or in the VLAN view.
3489b. A routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created.
3490c. A VLAN can be created only after its member port is allocated to another VLAN
3491d. The member port of this VLAN enters the active state immediately.
3492Feedback
3493The correct answers are: A routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created., A network administrator can create a VLAN either in the global view or in the VLAN view.
3494Question 267
3495Partially correct
3496Mark 1 out of 1
3497 Not flaggedFlag question
3498Question text
3499Which of the following steps are necessary to configure a port to the specified vlan in SYSTEM view?
3500Select one or more:
3501a. Assign VLAN for the Ethernet port
3502b. Enter the VLAN view
3503c. Specify description for VLAN or VLAN interface
3504d. Specify proportion of broadcast storm for VLAN
3505Feedback
3506The correct answers are: Enter the VLAN view, Assign VLAN for the Ethernet port
3507Question 268
3508Correct
3509Mark 1 out of 1
3510 Not flaggedFlag question
3511Question text
3512Which of the following technologies can reduce the scope of broadcast domain?
3513Select one:
3514a. VLAN
3515b. STP
3516c. RARP
3517d. Trunk
3518Feedback
3519The correct answer is: VLAN
3520Question 269
3521Incorrect
3522Mark 0 out of 1
3523 Not flaggedFlag question
3524Question text
3525Information below shows the partial interface configuration on a Huawei switch. According to this configuration, PVID of this interface is ( ).
3526[Quidway\]display interface Ethernet 1/0/1
3527---
3528Mdi type: auto
3529Port link-type: access
3530Tagged VLAN ID: none
3531Untagged VLAN ID: 5
3532Select one:
3533a. 0
3534b. Not able to interpret the PVID from the information given
3535c. 1
3536d. 5
3537Feedback
3538The correct answer is: 5
3539Question 270
3540Incorrect
3541Mark 0 out of 1
3542 Not flaggedFlag question
3543Question text
3544Which of the following ports can be configured to permit VLAN to pass?
3545Select one or more:
3546a. Access
3547b. Hybrid
3548c. Normal
3549d. Trunk
3550Feedback
3551The correct answers are: Trunk, Hybrid
3552Question 271
3553Incorrect
3554Mark 0 out of 1
3555 Not flaggedFlag question
3556Question text
3557A trunk port is configured to permit vlan 3, vlan4 and vlan 5 to pass. The frames of vlan 3 and vlan 4 are tagged but the frames of VLAN 5 are untagged. Which of the following may cause the problem?
3558Select one:
3559a. GVRP is enabled on this port
3560b. Only the command "port trunk permit vlan 3 4 "was configured for the trunk port.
3561c. Port PVID is 3 and 4
3562d. Port PVID is 5
3563Feedback
3564The correct answer is: Port PVID is 5
3565Question 272
3566Incorrect
3567Mark 0 out of 1
3568 Not flaggedFlag question
3569Question text
3570Which of the following descriptions about access-link are correct?
3571Select one or more:
3572a. When access port receives a frame with VLAN ID in 802.1Q tag header different from the default PVID, VLAN ID in 802.1Q tag header is changed to the default PVID.
3573b. When access port receives a frame without 802.1Q tag header, the default PVID will be added to the frame.
3574c. When access port sends a frame, 802.1Q tag header is kept and a tagged frame is sent
3575d. When access port sends a frame, 802.1Q tag header is removed and standard Ethernet frame is sent.
3576Feedback
3577The correct answers are: When access port receives a frame without 802.1Q tag header, the default PVID will be added to the frame., When access port sends a frame, 802.1Q tag header is removed and standard Ethernet frame is sent.
3578Question 273
3579Incorrect
3580Mark 0 out of 1
3581 Not flaggedFlag question
3582Question text
3583Which of the following descriptions about trunk link are correct?
3584Select one or more:
3585a. When trunk port sends a frame whose VLAN ID is same as the default PVID, no modification is done on the tag.
3586b. When trunk port receives a frame with 802.1Q tag header, no changes is done on the frame.
3587c. When trunk port sends a frame whose VLAN ID is not same as default PVID, the frame is sent directly.
3588d. When trunk port receives a frame without 802.1Q tag header, the default PVID will be added to the frame.
3589Feedback
3590The correct answers are: When trunk port receives a frame without 802.1Q tag header, the default PVID will be added to the frame., When trunk port receives a frame with 802.1Q tag header, no changes is done on the frame., When trunk port sends a frame whose VLAN ID is not same as default PVID, the frame is sent directly.
3591Question 274
3592Incorrect
3593Mark 0 out of 1
3594 Not flaggedFlag question
3595Question text
3596To make sure all hosts belonging to the same VLAN can receive the broadcast packets sent to this VLAN, which of the following operations are needed on the switch?
3597Select one or more:
3598a. Send the packets to all trunk links.
3599b. Send the packets out of all ports of the switch.
3600c. Send the packets to all trunk links that allow this VLAN to pass.
3601d. Send the packets out of other ports that belong to the same VLAN.
3602Feedback
3603The correct answers are: Send the packets out of other ports that belong to the same VLAN., Send the packets to all trunk links that allow this VLAN to pass.
3604Question 275
3605Correct
3606Mark 1 out of 1
3607 Not flaggedFlag question
3608Question text
3609When the value of the two-byte TPID field in an Ethernet frame header is 0x8100, it indicates that this frame carries an ( ) tag.
3610Select one:
3611a. 802.1Q
3612b. 802.1P
3613c. 802.1D
3614d. 802.1S
3615Feedback
3616The correct answer is: 802.1Q
3617Question 276
3618Incorrect
3619Mark 0 out of 1
3620 Not flaggedFlag question
3621Question text
3622All Ethernet frames in a switch flow in the form of ( ).
3623Select one:
3624a. Untagged frame
3625b. Tagged frame
3626c. BPDU
3627d. PVID
3628Feedback
3629The correct answer is: Tagged frame
3630Question 277
3631Incorrect
3632Mark 0 out of 1
3633 Not flaggedFlag question
3634Question text
3635A switch is based on port-based VLAN IDs. When the switch receives untagged frames, the VLAN ID is determined by ( ).
3636Select one:
3637a. MAC mapping table
3638b. PVID
3639c. BPDU
3640d. IP Address
3641Feedback
3642The correct answer is: PVID
3643Question 278
3644Incorrect
3645Mark 0 out of 1
3646 Not flaggedFlag question
3647Question text
3648For VLAN link type,the link between a switch and a PC is ( ).
3649Select one:
3650a. Trunk link
3651b. Access link
3652c. Hybrid link
3653d. ISL link
3654Feedback
3655The correct answer is: Access link
3656Question 279
3657Incorrect
3658Mark 0 out of 1
3659 Not flaggedFlag question
3660Question text
3661A switch supports 802.1Q protocol, what is the maximum number of VLAN it can support?
3662Select one:
3663a. 1024
3664b. 2048
3665c. 512
3666d. 4096
3667Feedback
3668The correct answer is: 4096
3669Question 280
3670Incorrect
3671Mark 0 out of 1
3672 Not flaggedFlag question
3673Question text
3674VLAN is short for?
3675Select one:
3676a. Virtual long area networking
3677b. Virtual local area network
3678c. Virtual local area networking
3679d. Virtual long area network
3680Feedback
3681The correct answer is: Virtual local area network
3682Question 281
3683Incorrect
3684Mark 0 out of 1
3685 Not flaggedFlag question
3686Question text
3687Which of the following are the formats of Ethernet frame in the switching network?
3688Select one or more:
3689a. FDDI frame
3690b. Token frame
3691c. Untagged frame
3692d. Tagged frame
3693Feedback
3694The correct answers are: Untagged frame, Tagged frame
3695Question 282
3696Partially correct
3697Mark 1 out of 1
3698 Not flaggedFlag question
3699Question text
3700To implement network layer capability on the VLAN interface, we need to configure ( ) on VLAN interface.
3701Select one or more:
3702a. IP address
3703b. MAC address
3704c. Subnet mask
3705d. IP prefix
3706Feedback
3707The correct answers are: IP address, Subnet mask
3708Question 283
3709Incorrect
3710Mark 0 out of 1
3711 Not flaggedFlag question
3712Question text
3713A switch is configured with VLAN 3, VLAN 4 and VLAN 5. GVRP is not enabled for the trunk port. The trunk port then receives a frame with VLAN ID 6. This frame will be ( ).
3714Select one:
3715a. Flooded to VLAN 1 only
3716b. Flooded to all trunk ports
3717c. Discarded
3718d. Flooded to all VLANs
3719Feedback
3720The correct answer is: Discarded
3721Question 284
3722Incorrect
3723Mark 0 out of 1
3724 Not flaggedFlag question
3725Question text
3726Which of the following protocols can dynamically register VLAN information?
3727Select one:
3728a. STP
3729b. GMRP
3730c. VRRP
3731d. GVRP
3732Feedback
3733The correct answer is: GVRP
3734Question 285
3735Correct
3736Mark 1 out of 1
3737 Not flaggedFlag question
3738Question text
3739GVRP represents Generic VLAN registration protocol, it is an application of ( ).
3740Select one:
3741a. GARP
3742b. GMTP
3743c. GMRP
3744d. IGMP
3745Feedback
3746The correct answer is: GARP
3747Question 286
3748Incorrect
3749Mark 0 out of 1
3750 Not flaggedFlag question
3751Question text
3752GVRP is short for ?
3753Select one:
3754a. GARP VLAN Rewrite Protocol
3755b. GARP VLAN Record Protocol
3756c. GARP VLAN Registration Protocol
3757d. GARP VLAN Remark Protocol
3758Feedback
3759The correct answer is: GARP VLAN Registration Protocol
3760Question 287
3761Correct
3762Mark 1 out of 1
3763 Not flaggedFlag question
3764Question text
3765A gvrp command is used to enable GVRP, and an undo gvrp command is used to disable GVRP. By default, GVRP is ( ).
3766Select one:
3767a. in disable state
3768b. in enable state
3769c. in an arbitrary state
3770d. subject to the last VLAN operation
3771Feedback
3772The correct answer is: in disable state
3773Question 288
3774Partially correct
3775Mark 0 out of 1
3776 Not flaggedFlag question
3777Question text
3778Which of the following statements about the gvrp command are true?
3779Select one or more:
3780a. Before port GVRP is enabled by running this command, global GVRP must be enabled.
3781b. Enabling or disabling global GVRP is performed in the system view by running a gvrp command.
3782c. If global GVRP is in disable state, this command can enable port GVRP.
3783d. If global GVRP is in disable state, port GVRP is also in disable state.
3784Feedback
3785The correct answers are: Before port GVRP is enabled by running this command, global GVRP must be enabled., If global GVRP is in disable state, port GVRP is also in disable state., Enabling or disabling global GVRP is performed in the system view by running a gvrp command.
3786Question 289
3787Incorrect
3788Mark 0 out of 1
3789 Not flaggedFlag question
3790Question text
3791GVRP protocol can operate at ( ) port.
3792Select one:
3793a. hybrid
3794b. Normal
3795c. Trunk
3796d. Access
3797Feedback
3798The correct answer is: Trunk
3799Question 290
3800Incorrect
3801Mark 0 out of 1
3802 Not flaggedFlag question
3803Question text
3804Which of the following descriptions about GARP is incorrect?
3805Select one:
3806a. GARP is called generic attribute registration protocol
3807b. GARP provides a mechanism by which the members in a switched network can implement distribution, propagation and registration of certain information.
3808c. GARP has only one application: GVRP
3809d. In GARP working mechanism, the attribute is spread to the whole network by the process "declaration-registration-declaration"
3810Feedback
3811The correct answer is: GARP has only one application: GVRP
3812Question 291
3813Incorrect
3814Mark 0 out of 1
3815 Not flaggedFlag question
3816Question text
3817Direct interconnection of traffic with different VLANs is not allowed. Such traffic must be transmitted based on ( ).
3818Select one:
3819a. VLAN switching
3820b. MAC addresses
3821c. Port isolation
3822d. VLAN routing
3823Feedback
3824The correct answer is: VLAN routing
3825Question 292
3826Incorrect
3827Mark 0 out of 1
3828 Not flaggedFlag question
3829Question text
3830On huawei router,Before you configure the IP address of an Ethernet sub-port, you need to configure ( ).
3831Select one:
3832a. Global GVRP
3833b. Port GVRP
3834c. MAC address
3835d. VLAN encapsulation
3836Feedback
3837The correct answer is: VLAN encapsulation
3838Question 293
3839Partially correct
3840Mark 1 out of 1
3841 Not flaggedFlag question
3842Question text
3843Which of the following methods can realize communication between VLANs at network layer?
3844Select one or more:
3845a. L2 Switch+Router
3846b. L3 Switch
3847c. GVRP
3848d. STP
3849Feedback
3850The correct answers are: L2 Switch+Router, L3 Switch
3851Question 294
3852Partially correct
3853Mark 1 out of 1
3854 Not flaggedFlag question
3855Question text
3856Which of the following descriptions are correct about VLAN interface?
3857Select one or more:
3858a. A virtual interface is required to be created for the VLAN if we want to assign an IP address for that VLAN,
3859b. Two VLAN interfaces on the same switch can be assigned with the same IP address
3860c. The VLAN interface number must be the same with VLAN ID
3861d. The VLAN interface can be configured for the non-existed VLAN
3862Feedback
3863The correct answers are: A virtual interface is required to be created for the VLAN if we want to assign an IP address for that VLAN,, The VLAN interface number must be the same with VLAN ID
3864Question 295
3865Partially correct
3866Mark 1 out of 1
3867 Not flaggedFlag question
3868Question text
3869Which of the following statements about VLAN communication are true?
3870Select one or more:
3871a. Layer 3 VLAN interfaces can be configured on a Layer 2 switch to implement VLAN communication.
3872b. One-arm routing can be configured for a Layer 2 switch only by using a router to implement VLAN communication.
3873c. Layer 3 VLAN interfaces can be configured on a Layer 3 switch to implement VLAN communication.
3874d. One-arm routing can be configured for a Layer 3 switch only by using a router to implement VLAN communication.
3875Feedback
3876The correct answers are: Layer 3 VLAN interfaces can be configured on a Layer 3 switch to implement VLAN communication., Layer 3 VLAN interfaces can be configured on a Layer 2 switch to implement VLAN communication.
3877Question 296
3878Incorrect
3879Mark 0 out of 1
3880 Not flaggedFlag question
3881Question text
3882Of all the VLAN grouping methods, the grouping method by IP address is called ( ) VLAN.
3883Select one:
3884a. MAC address-based
3885b. port-based
3886c. policy-based
3887d. route-based
3888Feedback
3889The correct answer is: route-based
3890Question 297
3891Incorrect
3892Mark 0 out of 1
3893 Not flaggedFlag question
3894Question text
3895Of all the VLAN grouping methods, the grouping method by IP address is called ( ) VLAN.
3896Select one or more:
3897a. The member port of a VLAN becomes inactive after the VLAN is deleted.
3898b. A network administrator can delete a VLAN either in the global view or in the VLAN view.
3899c. A VLAN can be deleted only after its member port is allocated to another VLAN.
3900d. When a routing-based interface (Vlanif) is available for a VLAN, the Vlanif interface must be deleted before the VLAN is deleted.
3901Feedback
3902The correct answers are: When a routing-based interface (Vlanif) is available for a VLAN, the Vlanif interface must be deleted before the VLAN is deleted., A network administrator can delete a VLAN either in the global view or in the VLAN view.
3903Question 298
3904Partially correct
3905Mark 1 out of 1
3906 Not flaggedFlag question
3907Question text
3908Which of the following statements about the process of creating a VLAN are true?
3909Select one or more:
3910a. A routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created.
3911b. A network administrator can create a VLAN either in the global view or in the VLAN view.
3912c. The member port of this VLAN enters the active state immediately.
3913d. A VLAN can be created only after its member port is allocated to another VLAN.
3914Feedback
3915The correct answers are: A routing-based interface (Vlanif) can be created for a VLAN only after the VLAN is created., A network administrator can create a VLAN either in the global view or in the VLAN view.
3916Question 299
3917Partially correct
3918Mark 1 out of 1
3919 Not flaggedFlag question
3920Question text
3921Which of the following WLAN standards support operation in the 5GHz range?
3922Select one or more:
3923a. 802.11a
3924b. 802.11g
3925c. 802.11b
3926d. 802.11n
3927Feedback
3928The correct answers are: 802.11a, 802.11n
3929Question 300
3930Correct
3931Mark 1 out of 1
3932 Not flaggedFlag question
3933Question text
3934which of the following standards provide a transmission rate of more than 1Gbps ?
3935Select one:
3936a. 802.11ac
3937b. 802.11b
3938c. 802.11g
3939d. 802.11n
3940Feedback
3941The correct answer is: 802.11ac
3942Question 301
3943Incorrect
3944Mark 0 out of 1
3945 Not flaggedFlag question
3946Question text
3947Which of the following PPP protocols are classified into the NCP protocol?
3948Select one or more:
3949a. TCP
3950b. IPCP
3951c. IPv6CP
3952d. ICMP
3953Feedback
3954The correct answers are: IPv6CP, IPCP
3955Question 302
3956Correct
3957Mark 1 out of 1
3958 Not flaggedFlag question
3959Question text
3960After a PPP connection is established, the VRP platform sends Echo-Request packets at the interval of ( ) seconds by default.
3961Select one:
3962a. 10
3963b. 1
3964c. 5
3965d. 60
3966Feedback
3967The correct answer is: 10
3968Question 303
3969Correct
3970Mark 1 out of 1
3971 Not flaggedFlag question
3972Question text
3973What function does the NCP protocol can provide for a PPP connection?
3974Select one:
3975a. Carrying of “multiple” Layer 3 protocols
3976b. User identifier authentication
3977c. Error detection
3978d. Congestion control
3979Feedback
3980The correct answer is: Carrying of “multiple” Layer 3 protocols
3981Question 304
3982Partially correct
3983Mark 0 out of 1
3984 Not flaggedFlag question
3985Question text
3986Which of the following components are defined by PPP protocol?
3987Select one or more:
3988a. Data encapsulation
3989b. Data encryption
3990c. Network Control Protocol(NCP)
3991d. Link Control Protocol(LCP)
3992Feedback
3993The correct answers are: Data encapsulation, Link Control Protocol(LCP), Network Control Protocol(NCP)
3994Question 305
3995Partially correct
3996Mark 0 out of 1
3997 Not flaggedFlag question
3998Question text
3999PPP protocol consists of three types of protocols, they are ( ).
4000Select one or more:
4001a. LCP(Link Control Protocol)
4002b. PPP extension protocol
4003c. NCP(Network Control Protocol)
4004d. PPPOE
4005Feedback
4006The correct answers are: LCP(Link Control Protocol), NCP(Network Control Protocol), PPP extension protocol
4007Question 306
4008Incorrect
4009Mark 0 out of 1
4010 Not flaggedFlag question
4011Question text
4012Which of the following statements are true?
4013Select one or more:
4014a. LCP negotiates on authentication information.
4015b. CHAP performs authentication by exchanging packets twice.
4016c. PAP is used for user authentication
4017d. IPCP can be used to negotiate on IP addresses and compress information.
4018Feedback
4019The correct answers are: IPCP can be used to negotiate on IP addresses and compress information., PAP is used for user authentication
4020Question 307
4021Partially correct
4022Mark 0 out of 1
4023 Not flaggedFlag question
4024Question text
4025Which of the following functions does LCP provide?
4026Select one or more:
4027a. Disconnects a link when the idle timer of the link expires.
4028b. Tests a link to check the link quality and thus to determine whether a link can be established.
4029c. Negotiates to use which Layer 3 protocols.
4030d. Negotiates to establish links.
4031Feedback
4032The correct answers are: Negotiates to establish links., Disconnects a link when the idle timer of the link expires., Tests a link to check the link quality and thus to determine whether a link can be established.
4033Question 308
4034Partially correct
4035Mark 0 out of 1
4036 Not flaggedFlag question
4037Question text
4038Which of the following packets belong to CHAP authentication protocol?
4039Select one or more:
4040a. Failure
4041b. Request
4042c. Success
4043d. Response
4044e. Challenge
4045Feedback
4046The correct answers are: Challenge, Response, Success, Failure
4047Question 309
4048Partially correct
4049Mark 0 out of 1
4050 Not flaggedFlag question
4051Question text
4052When you configure PPP authentication method as PAP, which of the following operations are necessary?
4053Select one or more:
4054a. Configure the encapsulation type of the interface connected to the peer as PPP.
4055b. Configure PPP authentication method as CHAP
4056c. On the authenticated party end, configure the user name and password that are sent to authenticator
4057d. Add the user name and password of the authenticated party to local user list
4058Feedback
4059The correct answers are: Add the user name and password of the authenticated party to local user list, Configure the encapsulation type of the interface connected to the peer as PPP., On the authenticated party end, configure the user name and password that are sent to authenticator
4060Question 310
4061Incorrect
4062Mark 0 out of 1
4063 Not flaggedFlag question
4064Question text
4065How many bytes does the Maximum Receive Unit (MRU) of PPP consist of by default?
4066Select one:
4067a. 8096
4068b. 1518
4069c. 1024
4070d. 1500
4071Feedback
4072The correct answer is: 1500
4073Question 311
4074Incorrect
4075Mark 0 out of 1
4076 Not flaggedFlag question
4077Question text
4078Which of the following protocol is required in negotiation to compress the TCP/IP packet header for a PPP link?
4079Select one:
4080a. LCP
4081b. PAP
4082c. IPCP
4083d. CHAP
4084Feedback
4085The correct answer is: IPCP
4086Question 312
4087Incorrect
4088Mark 0 out of 1
4089 Not flaggedFlag question
4090Question text
4091In network switching technology, circuit switching technology is based on the PSTN switching technology. Which of the following statements about circuit switching are correct?
4092Select one or more:
4093a. Fixed bandwidth, utilization rate for the network resource is high
4094b. Ensure the Quality of service
4095c. Low delay
4096d. Transparent transmission, which means no modification on user data
4097Feedback
4098The correct answers are: Low delay, Transparent transmission, which means no modification on user data, Ensure the Quality of service
4099Question 313
4100Correct
4101Mark 1 out of 1
4102 Not flaggedFlag question
4103Question text
4104According to OSI reference model, which layer does PPP reside at?
4105Select one:
4106a. Data link layer
4107b. Physical layer
4108c. Network layer
4109d. Transport layer
4110Feedback
4111The correct answer is: Data link layer
4112Question 314
4113Correct
4114Mark 1 out of 1
4115 Not flaggedFlag question
4116Question text
4117PAP requires ( )-way hand-shake.
4118Select one:
4119a. Two
4120b. Three
4121c. One
4122d. Four
4123Feedback
4124The correct answer is: Two
4125Question 315
4126Incorrect
4127Mark 0 out of 1
4128 Not flaggedFlag question
4129Question text
4130Which of the following protocols requires three-way handshake and allows only username to be transmitted through network while keeping the password secret?
4131Select one:
4132a. TCP
4133b. PAP
4134c. MD5
4135d. CHAP
4136Feedback
4137The correct answer is: CHAP
4138Question 316
4139Incorrect
4140Mark 0 out of 1
4141 Not flaggedFlag question
4142Question text
4143Which of the following descriptions about PAP and CHAP is correct?
4144Select one:
4145a. CHAP authentication requires two-way handshake
4146b. PAP authentication uses plain text to send authentication message
4147c. PAP authentication requires three-way handshake
4148d. CHAP authentication uses plain text to send authentication message
4149Feedback
4150The correct answer is: PAP authentication uses plain text to send authentication message
4151Question 317
4152Incorrect
4153Mark 0 out of 1
4154 Not flaggedFlag question
4155Question text
4156On VRP platform, which of the following commands is used to configure PPP authentication method as PAP?
4157Select one:
4158a. ppp chap
4159b. ppp authentication-mode pap
4160c. ppp authentication-mode chap
4161d. ppp pap
4162Feedback
4163The correct answer is: ppp authentication-mode pap
4164Question 318
4165Incorrect
4166Mark 0 out of 1
4167 Not flaggedFlag question
4168Question text
4169Which layer is the PPP protocol located in the TCP/IP protocol stack?
4170Select one:
4171a. Transport Layer
4172b. Data Link Layer
4173c. Physical Layer
4174d. Network Layer
4175Feedback
4176The correct answer is: Data Link Layer
4177Question 319
4178Incorrect
4179Mark 0 out of 1
4180 Not flaggedFlag question
4181Question text
4182(Multiple Choice) A complete data communication system includes
4183Select one or more:
4184a. Harddisk
4185b. Protocol
4186c. Sender
4187d. Receiver
4188e. Message
4189Feedback
4190The correct answers are: Sender, Receiver, Message, Protocol
4191Question 320
4192Incorrect
4193Mark 0 out of 1
4194 Not flaggedFlag question
4195Question text
4196(Multiple Choice) The most significant feature of a local area network (LAN) is that the LAN is intended for only one organization and is geographically limited, allowing interconnections of a limited number of stations. Which of the following transmission media are most common to a LAN?
4197Select one or more:
4198a. ADSL
4199b. Fiber
4200c. Twisted pair cable
4201d. Coaxial cable
4202Feedback
4203The correct answers are: Fiber, Coaxial cable, Twisted pair cable
4204Question 321
4205Incorrect
4206Mark 0 out of 1
4207 Not flaggedFlag question
4208Question text
4209(Single Choice) The OSI reference model defines a simple hierarchical network model for a computer network. Which of the following standardization organizations develops the OSI reference model?
4210Select one:
4211a. IETF
4212b. ISO
4213c. IEEE
4214d. ITU
4215Feedback
4216The correct answer is: ISO
4217Question 322
4218Incorrect
4219Mark 0 out of 1
4220 Not flaggedFlag question
4221Question text
4222What kind of LMI protocols does VRP support?
4223Select one or more:
4224a. Cisco
4225b. Ansi
4226c. Nonstandard
4227d. Q933a
4228Feedback
4229The correct answers are: Q933a, Ansi, Nonstandard
4230Question 323
4231Incorrect
4232Mark 0 out of 1
4233 Not flaggedFlag question
4234Question text
4235(Single Choice) A network provides data communication services for a relatively large geographical area and is mainly used to interconnect LANs. Which network type does this network belong to?
4236Select one:
4237a. Backbone network
4238b. Metropolitan area network (MAN)
4239c. Large LAN
4240d. Wide area network (WAN)
4241Feedback
4242The correct answer is: Wide area network (WAN)
4243Question 324
4244Incorrect
4245Mark 0 out of 1
4246 Not flaggedFlag question
4247Question text
4248(Single Choice) When a node transmits data over a network medium, the data is transmitted to all the nodes on the network. Which topology does this network use?
4249Select one:
4250a. Ring
4251b. Star
4252c. Tree
4253d. Bus
4254Feedback
4255The correct answer is: Bus
4256Question 325
4257Incorrect
4258Mark 0 out of 1
4259 Not flaggedFlag question
4260Question text
4261(Single Choice) A topological structure has a central control point to enable easy network design and equipment installation. The network media connect to the area where workstations reside through the hub or switch at the central control point. The disadvantage of such a structure is that a fault on the hub or switch results in a “single”-point fault. Which topology does this type of LAN usually use?
4262Select one:
4263a. Tree
4264b. Ring
4265c. Star
4266d. Bus
4267Feedback
4268The correct answer is: Star
4269Question 326
4270Incorrect
4271Mark 0 out of 1
4272 Not flaggedFlag question
4273Question text
4274(Multiple Choice) As a device for converting signals between an edge system and a communications system, a modem is essential in a WAN. A modem is connected to a serial port on a router. Which two of the following transmission modes does the serial port work in?
4275Select one or more:
4276a. Routing
4277b. Switching
4278c. Asynchronous
4279d. Synchronous
4280Feedback
4281The correct answers are: Synchronous, Asynchronous
4282Question 327
4283Incorrect
4284Mark 0 out of 1
4285 Not flaggedFlag question
4286Question text
4287(Single Choice) Which of the following statements is incorrect regarding LAN features?
4288Select one:
4289a. High transmission efficiency and high reliability
4290b. Extensive coverage
4291c. The structure is simple and easy to be constructed.
4292d. Large coverage scale
4293Feedback
4294The correct answer is: Large coverage scale
4295Question 328
4296Incorrect
4297Mark 0 out of 1
4298 Not flaggedFlag question
4299Question text
4300(Single Choice) In OSI reference model, OSI stands for
4301Select one:
4302a. Organization Standard Institute
4303b. Organization Standard Interconnection
4304c. Open System Interconnection
4305d. Open System Internet
4306Feedback
4307The correct answer is: Open System Interconnection
4308Question 329
4309Incorrect
4310Mark 0 out of 1
4311 Not flaggedFlag question
4312Question text
4313(Single Choice) The ( ) is the physical path along which a message passes.
4314Select one:
4315a. Protocol
4316b. Harddisk
4317c. Receiver
4318d. Message
4319e. Sender
4320Feedback
4321The correct answer is: Harddisk
4322Question 330
4323Incorrect
4324Mark 0 out of 1
4325 Not flaggedFlag question
4326Question text
4327(Single Choice) How many layers are included in OSI reference model?
4328Select one:
4329a. 5
4330b. 3
4331c. 7
4332d. 6
4333Feedback
4334The correct answer is: 7
4335Question 331
4336Incorrect
4337Mark 0 out of 1
4338 Not flaggedFlag question
4339Question text
4340(Single Choice) According to OSI reference model, when a packet is transmitted from upper layer to lower layer, the header will be
4341Select one:
4342a. Modified
4343b. Rearranged
4344c. Added
4345d. Removed
4346Feedback
4347The correct answer is: Added
4348Question 332
4349Incorrect
4350Mark 0 out of 1
4351 Not flaggedFlag question
4352Question text
4353(Single Choice) In OSI reference model, Transport Layer is located at layer
4354Select one:
4355a. 7
4356b. 3
4357c. 4
4358d. 6
4359Feedback
4360The correct answer is: 4
4361Question 333
4362Incorrect
4363Mark 0 out of 1
4364 Not flaggedFlag question
4365Question text
4366(Single Choice) In OSI reference model, which layer resides at the bottom?
4367Select one:
4368a. Data link layer
4369b. Physical layer
4370c. Application layer
4371d. Network layer
4372Feedback
4373The correct answer is: Physical layer
4374Question 334
4375Incorrect
4376Mark 0 out of 1
4377 Not flaggedFlag question
4378Question text
4379(Single Choice) According to OSI reference model, which layer defines mechanical, electrical, functional and procedural functions to realize data transmission?
4380Select one:
4381a. Transport layer
4382b. Network layer
4383c. Physical layer
4384d. Data link layer
4385Feedback
4386The correct answer is: Physical layer
4387Question 335
4388Correct
4389Mark 1 out of 1
4390 Not flaggedFlag question
4391Question text
4392(Single Choice) The PDU (Protocol Data Unit) that resides at physical layer is called
4393Select one:
4394a. Binary bit flow
4395b. Packet
4396c. Frame
4397d. Segment
4398Feedback
4399The correct answer is: Binary bit flow
4400Question 336
4401Correct
4402Mark 1 out of 1
4403 Not flaggedFlag question
4404Question text
4405(Single Choice) The PDU (Protocol Data Unit) that resides at data link layer is called
4406Select one:
4407a. Frame
4408b. Packet
4409c. Segment
4410d. Binary bit flow
4411Feedback
4412The correct answer is: Frame
4413Question 337
4414Incorrect
4415Mark 0 out of 1
4416 Not flaggedFlag question
4417Question text
4418(Multiple Choice) Which of the following protocols reside at data link layer?
4419Select one or more:
4420a. IP
4421b. IEEE 802.3
4422c. PPP
4423d. HDLC
4424Feedback
4425The correct answers are: PPP, HDLC, IEEE 802.3
4426Question 338
4427Incorrect
4428Mark 0 out of 1
4429 Not flaggedFlag question
4430Question text
4431(Multiple Choice) Data link layer has two sub-layers, they are
4432Select one or more:
4433a. PVC sub-layer
4434b. VC sub-layer
4435c. MAC sub-layer
4436d. LLC sub-layer
4437Feedback
4438The correct answers are: MAC sub-layer, LLC sub-layer
4439Question 339
4440Incorrect
4441Mark 0 out of 1
4442 Not flaggedFlag question
4443Question text
4444(Multiple Choice) Which of the following devices operate at data link layer?
4445Select one or more:
4446a. Firewall
4447b. Switch
4448c. Router
4449d. Hub
4450e. Bridge
4451Feedback
4452The correct answers are: Bridge, Switch
4453Question 340
4454Partially correct
4455Mark 0 out of 1
4456 Not flaggedFlag question
4457Question text
4458(Multiple Choice) Network topology type includes:
4459Select one or more:
4460a. Bus
4461b. Peer-to-peer
4462c. Mesh
4463d. Star
4464e. Tree
4465Feedback
4466The correct answers are: Bus, Star, Tree, Mesh
4467Question 341
4468Incorrect
4469Mark 0 out of 1
4470 Not flaggedFlag question
4471Question text
4472(Single Choice) Which of the following is the broadcast MAC address?
4473Select one:
4474a. 00-00-00-00-00-00
4475b. FF-FF-FF-FF-FF-FF
4476c. FF-FF-FF-FF
4477d. 00-00-00-FF-FF-FF
4478Feedback
4479The correct answer is: FF-FF-FF-FF-FF-FF
4480Question 342
4481Partially correct
4482Mark 1 out of 1
4483 Not flaggedFlag question
4484Question text
4485(Multiple Choice) Which of the following protocols are related to WAN?
4486Select one or more:
4487a. PPP
4488b. Ethernet
4489c. UDP
4490d. HDLC
4491Feedback
4492The correct answers are: PPP, HDLC
4493Question 343
4494Incorrect
4495Mark 0 out of 1
4496 Not flaggedFlag question
4497Question text
4498(Single Choice) According to OSI reference model, router operates at
4499Select one:
4500a. Application layer
4501b. Network layer
4502c. Data link layer
4503d. Physical layer
4504Feedback
4505The correct answer is: Network layer
4506Question 344
4507Incorrect
4508Mark 0 out of 1
4509 Not flaggedFlag question
4510Question text
4511(Single Choice) The protocol data unit that resides at network layer is called
4512Select one:
4513a. Bit
4514b. Segment
4515c. Frame
4516d. Packet
4517Feedback
4518The correct answer is: Packet
4519Question 345
4520Incorrect
4521Mark 0 out of 1
4522 Not flaggedFlag question
4523Question text
4524(Single Choice) According to OSI reference model, which of the following statements about the function of network layer is correct?
4525Select one:
4526a. Control transmission of bit flow
4527b. Error correction and flow control
4528c. Control the forwarding and routing of data packet
4529d. Ensure the correctness of data transmission
4530Feedback
4531The correct answer is: Control the forwarding and routing of data packet
4532Question 346
4533Incorrect
4534Mark 0 out of 1
4535 Not flaggedFlag question
4536Question text
4537(Single Choice) The OSI reference model contains seven layers in two groups, namely, upper layer and lower layer. The upper layer starts from ( ) to Layer 7 and is also called host layer.
4538Select one:
4539a. Layer 3
4540b. Layer 2
4541c. Layer 5
4542d. Layer 4
4543Feedback
4544The correct answer is: Layer 5
4545Question 347
4546Incorrect
4547Mark 0 out of 1
4548 Not flaggedFlag question
4549Question text
4550(Single Choice) The upper layer of the OSI reference model ensures that data is transmitted properly. Which of the following at the upper layer is used to ensure this?
4551Select one:
4552a. Both hardware and software
4553b. Either software or hardware
4554c. Software
4555d. Hardware
4556Feedback
4557The correct answer is: Software
4558Question 348
4559Incorrect
4560Mark 0 out of 1
4561 Not flaggedFlag question
4562Question text
4563(Single Choice) In the OSI reference model, one layer is used to establish end-to-end connections between hosts and checks for bit errors before data is transmitted or retransmitted. Which of the following layers stands for this layer?
4564Select one:
4565a. Physical Layer
4566b. Network Layer
4567c. Data Link Layer
4568d. Transport Layer
4569Feedback
4570The correct answer is: Transport Layer
4571Question 349
4572Incorrect
4573Mark 0 out of 1
4574 Not flaggedFlag question
4575Question text
4576(Single Choice) In the OSI reference model, one layer defines the format of data to be sent to the Application Layer in addition to providing data encryption, data encoding, and data conversion. Which of the following layers stands for this layer?
4577Select one:
4578a. Network Layer
4579b. Presentation Layer
4580c. Session Layer
4581d. Application Layer
4582Feedback
4583The correct answer is: Presentation Layer
4584Question 350
4585Incorrect
4586Mark 0 out of 1
4587 Not flaggedFlag question
4588Question text
4589(Single Choice) In the OSI reference model, one layer converts bits into bytes and then into frames in addition to providing medium access. Which of the following layers stands for this layer?
4590Select one:
4591a. Session Layer
4592b. Data Link Layer
4593c. Application Layer
4594d. Network Layer
4595Feedback
4596The correct answer is: Data Link Layer
4597Question 351
4598Correct
4599Mark 1 out of 1
4600 Not flaggedFlag question
4601Question text
4602(Single Choice) Which of the following network topologies has the highest reliability?
4603Select one:
4604a. Mesh
4605b. Star
4606c. Ring
4607d. Bus
4608Feedback
4609The correct answer is: Mesh
4610Question 352
4611Correct
4612Mark 1 out of 1
4613 Not flaggedFlag question
4614Question text
4615(Single Choice) In the OSI reference model, one layer transmits bit streams between devices. Which of the following layers stands for this layer?
4616Select one:
4617a. Physical Layer
4618b. Network Layer
4619c. Data Link Layer
4620d. Application Layer
4621Feedback
4622The correct answer is: Physical Layer
4623Question 353
4624Partially correct
4625Mark 1 out of 1
4626 Not flaggedFlag question
4627Question text
4628(Multiple Choice) Which of the protocols are commonly used at the Data Link Layer of a WAN?
4629Select one or more:
4630a. HDLC
4631b. 802.4
4632c. PPP
4633d. 802.2
4634Feedback
4635The correct answers are: HDLC, PPP
4636Question 354
4637Partially correct
4638Mark 0 out of 1
4639 Not flaggedFlag question
4640Question text
4641(Multiple Choice) Which layers in OSI reference model belong to upper layer, also called as host layer and are responsible for data transmission and providing interface for user?
4642Select one or more:
4643a. Presentation layer
4644b. Session layer
4645c. Network layer
4646d. Application layer
4647e. Transport layer
4648f. Data link layer
4649Feedback
4650The correct answers are: Session layer, Presentation layer, Application layer
4651Question 355
4652Incorrect
4653Mark 0 out of 1
4654 Not flaggedFlag question
4655Question text
4656(Single Choice) According to OSI reference model, which of the following presents the correct layer sequence if packet goes from the bottom of the protocol stack to the top?
4657Select one:
4658a. Physical, Data link, Transport, Presentation, Network, Session, Application
4659b. Physical, Data link, Network, Transport, Session, Presentation, Application
4660c. Physical, Transport, Data link, Network, Presentation, Session, Application
4661d. Physical, Data link, Network, Transport, Presentation, Session, Application
4662Feedback
4663The correct answer is: Physical, Data link, Network, Transport, Session, Presentation, Application
4664Question 356
4665Incorrect
4666Mark 0 out of 1
4667 Not flaggedFlag question
4668Question text
4669(Multiple Choice) Which of the following are functions of data link layer?
4670Select one or more:
4671a. Routing
4672b. Physical medium access
4673c. Physical address definition
4674d. Network topology discovery
4675e. Error checking
4676Feedback
4677The correct answers are: Physical address definition, Network topology discovery, Physical medium access, Error checking
4678Question 357
4679Partially correct
4680Mark 0 out of 1
4681 Not flaggedFlag question
4682Question text
4683(Multiple Choice) Which of the following are the advantages of OSI reference model?
4684Select one or more:
4685a. Divide complicated network problem into simple problems to make it easier for learning and operation
4686b. Divide the complex network into simple components
4687c. Make it impossible for network engineers to concentrate on design and development of module functions
4688d. Define standard interface to realize compatibility for different manufacturers
4689Feedback
4690The correct answers are: Divide the complex network into simple components, Define standard interface to realize compatibility for different manufacturers, Divide complicated network problem into simple problems to make it easier for learning and operation
4691Question 358
4692Partially correct
4693Mark 1 out of 1
4694 Not flaggedFlag question
4695Question text
4696(Multiple Choice) Which of the following devices have functions of all seven layers of OSI reference model?
4697Select one or more:
4698a. Email Server
4699b. Router
4700c. Network management server
4701d. Layer three switch
4702Feedback
4703The correct answers are: Email Server, Network management server
4704Question 359
4705Partially correct
4706Mark 0 out of 1
4707 Not flaggedFlag question
4708Question text
4709(Multiple Choice) According to TCP/IP reference model, which of the following application layer protocols are based on TCP?
4710Select one or more:
4711a. HTTP
4712b. SNMP
4713c. TFTP
4714d. SMTP
4715e. FTP
4716Feedback
4717The correct answers are: HTTP, FTP, SMTP
4718Question 360
4719Incorrect
4720Mark 0 out of 1
4721 Not flaggedFlag question
4722Question text
4723(Single Choice) A MAC address has ( ) bits.
4724Select one:
4725a. 24
4726b. 6
4727c. 12
4728d. 48
4729Feedback
4730The correct answer is: 48
4731Question 361
4732Incorrect
4733Mark 0 out of 1
4734 Not flaggedFlag question
4735Question text
4736(Single Choice) MAC address consists of two parts: provider number and serial number. The first 24 bits of MAC address represents provider number, which of the following is the provider number of Huawei?
4737Select one:
4738a. 000001
4739b. 00e0fc
4740c. 0003cf
4741d. 0010fe
4742Feedback
4743The correct answer is: 00e0fc
4744Question 362
4745Incorrect
4746Mark 0 out of 1
4747 Not flaggedFlag question
4748Question text
4749(Multiple Choice) According to the scope of the geographical area,network type includes?
4750Select one or more:
4751a. Enterprise network
4752b. LAN
4753c. Campus network
4754d. WAN
4755Feedback
4756The correct answers are: LAN, WAN
4757Question 363
4758Correct
4759Mark 1 out of 1
4760 Not flaggedFlag question
4761Question text
4762(Single Choice) Hub work at ( ) layer.
4763Select one:
4764a. Physical
4765b. Data link
4766c. Network
4767d. Application
4768Feedback
4769The correct answer is: Physical
4770Question 364
4771Correct
4772Mark 1 out of 1
4773 Not flaggedFlag question
4774Question text
4775(Single Choice) According to OSI reference model, switch operates at ( ) layer.
4776Select one:
4777a. Data link
4778b. Transport
4779c. Physical
4780d. Application
4781Feedback
4782The correct answer is: Data link
4783Question 365
4784Incorrect
4785Mark 0 out of 1
4786 Not flaggedFlag question
4787Question text
4788(Single Choice) A switch receives entire data frame and then perform CRC checking,the frame is forwarded unless CRC checking fails. The switch mode for this switch is ?
4789Select one:
4790a. Store-free
4791b. Cut-Through
4792c. Store-and-Forward
4793d. Fragment-free
4794Feedback
4795The correct answer is: Store-and-Forward
4796Question 366
4797Incorrect
4798Mark 0 out of 1
4799 Not flaggedFlag question
4800Question text
4801(Multiple Choice) Which of the following are advantages of layer 2 switch compared with hub?
4802Select one or more:
4803a. Increase the collision
4804b. Higher port density
4805c. Isolate collision domains
4806d. Higher throughput
4807Feedback
4808The correct answers are: Higher throughput, Higher port density, Isolate collision domains
4809Question 367
4810Correct
4811Mark 1 out of 1
4812 Not flaggedFlag question
4813Question text
4814(Single Choice) ( ) combines “multiple” ports to form an aggregation group. It can be used to balance the traffic among member ports and improve the connection reliability.
4815Select one:
4816a. Port Aggregation
4817b. Port binding
4818c. Port load balance
4819d. Port group
4820Feedback
4821The correct answer is: Port Aggregation
4822Question 368
4823Incorrect
4824Mark 0 out of 1
4825 Not flaggedFlag question
4826Question text
4827(Single Choice) The data forwarding of the switch is based on
4828Select one:
4829a. Source IP address
4830b. Source MAC address
4831c. Destination MAC address
4832d. Destination IP address
4833Feedback
4834The correct answer is: Destination MAC address
4835Question 369
4836Partially correct
4837Mark 0 out of 1
4838 Not flaggedFlag question
4839Question text
4840(Multiple Choice) What describe the working principles of Ethernet Switches?
4841Select one or more:
4842a. Generate MAC address table according to the source MAC address of the received frame
4843b. Layer 3 packet forwarding
4844c. Receive all the data frames in the network segment
4845d. Maintain MAC address table with aging mechanism
4846Feedback
4847The correct answers are: Receive all the data frames in the network segment, Generate MAC address table according to the source MAC address of the received frame, Maintain MAC address table with aging mechanism
4848Question 370
4849Incorrect
4850Mark 0 out of 1
4851 Not flaggedFlag question
4852Question text
4853(Single Choice) IEEE 802.3 frame contains ( ) bits of DSAP field. It is used to indicate the upper layer protocols that are used.
4854Select one:
4855a. 16
4856b. 24
4857c. 4
4858d. 8
4859Feedback
4860The correct answer is: 8
4861Question 371
4862Incorrect
4863Mark 0 out of 1
4864 Not flaggedFlag question
4865Question text
4866(Single Choice) The last field of Ethernet frame is FCS (Frame Check Sequence). Its length is ( ) bytes.
4867Select one:
4868a. 8
4869b. 2
4870c. 4
4871d. 32
4872Feedback
4873The correct answer is: 4
4874Question 372
4875Incorrect
4876Mark 0 out of 1
4877 Not flaggedFlag question
4878Question text
4879(Multiple Choice) Which of the following statements about switching modes of LAN switch are true?
4880Select one or more:
4881a. Store-and-forward switching mode does not check for error frames
4882b. Fragment-free switching mode can check for error frames in the first 64 octets of the frame.
4883c. Store-and-forward switching mode discards the frame with length less than 64 octets.
4884d. Cut-through switching mode forwards a frame after it received the first 64 octets of the frame.
4885Feedback
4886The correct answers are: Fragment-free switching mode can check for error frames in the first 64 octets of the frame., Store-and-forward switching mode discards the frame with length less than 64 octets.
4887Question 373
4888Incorrect
4889Mark 0 out of 1
4890 Not flaggedFlag question
4891Question text
4892(Single Choice) Which organizations drafts RFC (Request for Comments)?
4893Select one:
4894a. ITU-T
4895b. IETF
4896c. IEEE
4897d. ISO
4898Feedback
4899The correct answer is: IETF
4900Question 374
4901Partially correct
4902Mark 1 out of 1
4903 Not flaggedFlag question
4904Question text
4905(Multiple Choice) Port mirroring means to get a copy of the data and then send it to the monitoring device for data analysis and diagnosis. Port mirroring can be divided into
4906Select one or more:
4907a. Port based mirroring
4908b. Flow based mirroring
4909c. Upper layer protocol based mirroring
4910d. Application based mirroring
4911Feedback
4912The correct answers are: Port based mirroring, Flow based mirroring
4913Question 375
4914Incorrect
4915Mark 0 out of 1
4916 Not flaggedFlag question
4917Question text
4918(Single Choice) A MAC address consists of 48 bits and is generally expressed in 12-bit dotted decimal notation. What kind of address does a MAC address consisting of all 1s stand for?
4919Select one:
4920a. Multicast address
4921b. Unicast address
4922c. Broadcast address
4923d. Virtual address
4924Feedback
4925The correct answer is: Broadcast address
4926Question 376
4927Incorrect
4928Mark 0 out of 1
4929 Not flaggedFlag question
4930Question text
4931(Single Choice) Which of the following together with the MAC address of a general L2 switch determines the MAC address table of the L2 switch?
4932Select one:
4933a. ARP table
4934b. RARP table
4935c. Port
4936d. Transmission medium
4937Feedback
4938The correct answer is: Port
4939Question 377
4940Incorrect
4941Mark 0 out of 1
4942 Not flaggedFlag question
4943Question text
4944(Single Choice) An L2 switch checks the MAC address forwarding table before it forwards a packet. How does the L2 switch forward a packet that contains an address not listed in the MAC address forwarding table?
4945Select one:
4946a. Multicast
4947b. Searching for routes
4948c. Unicast
4949d. Broadcast
4950Feedback
4951The correct answer is: Broadcast
4952Question 378
4953Correct
4954Mark 1 out of 1
4955 Not flaggedFlag question
4956Question text
4957(Single Choice) The data field of standard Ethernet frame is ( ) bytes.
4958Select one:
4959a. 46-1500
4960b. 40-1500
4961c. 64-1500
4962d. 64-1518
4963Feedback
4964The correct answer is: 46-1500
4965Question 379
4966Correct
4967Mark 1 out of 1
4968 Not flaggedFlag question
4969Question text
4970(Single Choice) Which of the following commands can be used to set Ethernet port so that buffer will not overflow when congestion occurs?
4971Select one:
4972a. Flow-control
4973b. Flow control
4974c. Flow on
4975d. Enable flow-control
4976Feedback
4977The correct answer is: Flow-control
4978Question 380
4979Partially correct
4980Mark 0 out of 1
4981 Not flaggedFlag question
4982Question text
4983(Multiple Choice) When congestion occurs on port working in full duplex mode, switch will send "PAUSE" frame to the source to notify the source temporarily stop sending message for a short while. Which of the following circumstances can use the "PAUSE" method for flow control?
4984Select one or more:
4985a. A switch and a terminal
4986b. A pair of terminals
4987c. The link between two switches
4988d. End to end flow control
4989e. Congestion that occurs on a stable network
4990Feedback
4991The correct answers are: A pair of terminals, A switch and a terminal, The link between two switches
4992Question 381
4993Incorrect
4994Mark 0 out of 1
4995 Not flaggedFlag question
4996Question text
4997(Single Choice) In a destination MAC address, which bit of the address determines whether a frame is sent to a “single” station or a group of stations?
4998Select one:
4999a. 7
5000b. 9
5001c. 10
5002d. 8
5003Feedback
5004The correct answer is: 8
5005Question 382
5006Incorrect
5007Mark 0 out of 1
5008 Not flaggedFlag question
5009Question text
5010(Single Choice) Which of the following standard organizations has defined the protocol for LAN such as 802 series protocols?
5011Select one:
5012a. ETSI
5013b. IETF
5014c. IEEE
5015d. ITU-T
5016Feedback
5017The correct answer is: IEEE
5018Question 383
5019Incorrect
5020Mark 0 out of 1
5021 Not flaggedFlag question
5022Question text
5023(Single Choice) Which network topology has risk of whole network failure when a link is broken?
5024Select one:
5025a. Mesh
5026b. Bus
5027c. Tree
5028d. Star
5029Feedback
5030The correct answer is: Bus
5031Question 384
5032Partially correct
5033Mark 1 out of 1
5034 Not flaggedFlag question
5035Question text
5036(Multiple Choice) Which of the following network topologies consist of redundant links between any two nodes?
5037Select one or more:
5038a. Ring
5039b. Star
5040c. Mesh
5041d. Bus
5042e. Tree
5043Feedback
5044The correct answers are: Mesh, Ring
5045Question 385
5046Partially correct
5047Mark 0 out of 1
5048 Not flaggedFlag question
5049Question text
5050Frame Relay operates at data link layer, which of the following are the functions of Frame Relay?
5051Select one or more:
5052a. Statistical time division multiplexing
5053b. Error detection
5054c. Transparent transmission of the frame
5055d. Retransmission
5056Feedback
5057The correct answers are: Statistical time division multiplexing, Transparent transmission of the frame, Error detection
5058Question 386
5059Incorrect
5060Mark 0 out of 1
5061 Not flaggedFlag question
5062Question text
5063Which port on a UNI-side host or terminal is used to connect to frame relay network?
5064Select one:
5065a. DCE
5066b. NNI
5067c. None of the above
5068d. DTE
5069Feedback
5070The correct answer is: DTE
5071Question 387
5072Incorrect
5073Mark 0 out of 1
5074 Not flaggedFlag question
5075Question text
5076Which of the following parameters are defined in Frame Relay?
5077Select one or more:
5078a. TTL (Time to Live)
5079b. BE (Excess Burst Size)
5080c. BC (Committed Burst Size)
5081d. CIR (Committed Information Rate)
5082Feedback
5083The correct answers are: CIR (Committed Information Rate), BE (Excess Burst Size), BC (Committed Burst Size)
5084Question 388
5085Correct
5086Mark 1 out of 1
5087 Not flaggedFlag question
5088Question text
5089Which of the following commands is used to enable dynamic address mapping protocol in the interface encapsulated with Frame Relay?
5090Select one:
5091a. Fr inarp
5092b. Reverse-arp
5093c. Fr reverse-arp
5094d. Inverse-arp
5095Feedback
5096The correct answer is: Fr inarp
5097Question 389
5098Incorrect
5099Mark 0 out of 1
5100 Not flaggedFlag question
5101Question text
5102What does the number "30" in the following frame relay configuration command stand for?
5103[RTB-Serial0\]fr map ip 10.1.1.2 30
5104Select one:
5105a. Cost
5106b. DLCI
5107c. Weight
5108d. Subnet mask
5109Feedback
5110The correct answer is: DLCI
5111Question 390
5112Partially correct
5113Mark 1 out of 1
5114 Not flaggedFlag question
5115Question text
5116Which of the following parameters must be specified when configure static mapping for Frame Relay network?
5117Select one or more:
5118a. Local DLCI
5119b. Remote network layer protocol address
5120c. Remote DLCI
5121d. Local network layer protocol address
5122Feedback
5123The correct answers are: Local DLCI, Remote network layer protocol address
5124Question 391
5125Partially correct
5126Mark 1 out of 1
5127 Not flaggedFlag question
5128Question text
5129Which of the following DLCI numbers are used by Frame Relay LMI ?
5130Select one or more:
5131a. 1023
5132b. 1007
5133c. 16
5134d. 0
5135Feedback
5136The correct answers are: 0, 1023
5137Question 392
5138Incorrect
5139Mark 0 out of 1
5140 Not flaggedFlag question
5141Question text
5142The standards for Frame Relay encapsulation that Huawei router supports include ( ).
5143Select one or more:
5144a. ANSI
5145b. Q.933a
5146c. Nonstandard
5147d. IETF
5148Feedback
5149The correct answers are: IETF, Nonstandard
5150Question 393
5151Partially correct
5152Mark 0 out of 1
5153 Not flaggedFlag question
5154Question text
5155The distance vector routing protocol uses a split horizon mechanism. This makes a frame relay node connecting “multiple” peer devices together fail to transmit the route information to all peer devices. Which of the following methods can solve this problem?
5156Select one or more:
5157a. Use “multiple” logical sub-ports of a physical port.
5158b. Use “multiple” physical ports to connect “multiple” adjacent nodes together.
5159c. Ignore the risk resulting from a routing loop because no routing loop occurs in any case.
5160d. Disable the split horizon function and take into account the risk resulting from a loop.
5161Feedback
5162The correct answers are: Use “multiple” physical ports to connect “multiple” adjacent nodes together., Use “multiple” logical sub-ports of a physical port., Disable the split horizon function and take into account the risk resulting from a loop.
5163Question 394
5164Partially correct
5165Mark 0 out of 1
5166 Not flaggedFlag question
5167Question text
5168Which of the following statements about Frame Relay are true?
5169Select one or more:
5170a. Frame Relay is a kind of fast packet switching technology that uses the simplified method to transmit and switch the data unit on data link layer.
5171b. Frame Relay adopts virtual circuit technology thus network resources are fully utilized
5172c. Frame Relay implements the functions of physical layer and network layer.
5173d. In Frame Relay, flow control and error correction are implemented by higher-layer protocol and application services. This simplifies the protocols operation between devices.
5174e. High throughput, low delay, and suitable for burst data
5175Feedback
5176The correct answers are: Frame Relay is a kind of fast packet switching technology that uses the simplified method to transmit and switch the data unit on data link layer., In Frame Relay, flow control and error correction are implemented by higher-layer protocol and application services. This simplifies the protocols operation between devices., Frame Relay adopts virtual circuit technology thus network resources are fully utilized, High throughput, low delay, and suitable for burst data
5177Question 395
5178Incorrect
5179Mark 0 out of 1
5180 Not flaggedFlag question
5181Question text
5182On Frame Relay, VC (Virtual Circuit) is a logical circuit between two network devices. It can be divided into ( )
5183Select one or more:
5184a. TVC(temporary Virtual Circuit)
5185b. PVC(Permanent Virtual Circuit)
5186c. SVC(Static Virtual Circuit)
5187d. SVC(Switching Virtual Circuit)
5188Feedback
5189The correct answers are: PVC(Permanent Virtual Circuit), SVC(Switching Virtual Circuit)
5190Question 396
5191Incorrect
5192Mark 0 out of 1
5193 Not flaggedFlag question
5194Question text
5195A Frame Relay network consists of 12 routers, how many PVCs are built in a full mesh network?
5196Select one:
5197a. 6
5198b. 132
5199c. 12
5200d. 66
5201Feedback
5202The correct answer is: 66
5203Question 397
5204Incorrect
5205Mark 0 out of 1
5206 Not flaggedFlag question
5207Question text
5208Frame Relay has congestion avoidance mechanism, which of the following fields are used for congestion avoidance?
5209Select one or more:
5210a. C/R
5211b. FECN
5212c. DLCI
5213d. BECN
5214e. DE
5215Feedback
5216The correct answers are: BECN, FECN, DE
5217Question 398
5218Incorrect
5219Mark 0 out of 1
5220 Not flaggedFlag question
5221Question text
5222When configure Frame Relay sub-interface on VRP platform, which of the following sub interfaces type are available?
5223Select one or more:
5224a. Broadcast
5225b. P2P
5226c. P2MP
5227d. NBMA
5228Feedback
5229The correct answers are: P2P, P2MP
5230Question 399
5231Incorrect
5232Mark 0 out of 1
5233 Not flaggedFlag question
5234Question text
5235What are functions of Inverse ARP?
5236Select one or more:
5237a. Find the DLCI number of the connection
5238b. Find the IP address of the remote device based on virtual circuit in Frame Relay network
5239c. Find the hardware address of the device according to its IP address
5240d. Establish the mapping relationship between IP address of remote device and DLCI
5241Feedback
5242The correct answers are: Find the IP address of the remote device based on virtual circuit in Frame Relay network, Establish the mapping relationship between IP address of remote device and DLCI
5243Question 400
5244Incorrect
5245Mark 0 out of 1
5246 Not flaggedFlag question
5247Question text
5248Frame Relay implements the function of ( )only.
5249Select one:
5250a. Transport Layer and Session Layer
5251b. Data Link Layer and Network layer
5252c. Physical Layer and Data Link layer
5253d. Network layer and Transport Layer
5254Feedback
5255The correct answer is: Physical Layer and Data Link layer
5256Question 401
5257Incorrect
5258Mark 0 out of 1
5259 Not flaggedFlag question
5260Question text
5261What function does the NCP protocol can provide for a PPP connection?
5262Select one:
5263a. Error detection
5264b. Carrying of “multiple” Layer 3 protocols
5265c. User identifier authentication
5266d. Congestion control
5267Feedback
5268The correct answer is: Carrying of “multiple” Layer 3 protocols
5269Question 402
5270Incorrect
5271Mark 0 out of 1
5272 Not flaggedFlag question
5273Question text
5274How many bytes does the Maximum Receive Unit (MRU) of PPP consist of by default?
5275Select one:
5276a. 1518
5277b. 8096
5278c. 1500
5279d. 1024
5280Feedback
5281The correct answer is: 1500
5282Question 403
5283Correct
5284Mark 1 out of 1
5285 Not flaggedFlag question
5286Question text
5287Which of the following protocol is required in negotiation to compress the TCP/IP packet header for a PPP link?
5288Select one:
5289a. IPCP
5290b. LCP
5291c. CHAP
5292d. PAP
5293Feedback
5294The correct answer is: IPCP
5295Question 404
5296Incorrect
5297Mark 0 out of 1
5298 Not flaggedFlag question
5299Question text
5300In the Internet, two technologies are widely used to access services and support both dial-up connections and connections through private lines. One of them is ADSL. What is the other technology?
5301Select one:
5302a. MSTP
5303b. WAN
5304c. Metro
5305d. LAN
5306Feedback
5307The correct answer is: LAN
5308Question 405
5309Partially correct
5310Mark 0 out of 1
5311 Not flaggedFlag question
5312Question text
5313Which of the following components are defined by PPP protocol?
5314Select one or more:
5315a. Data encapsulation
5316b. Data encryption
5317c. Link Control Protocol(LCP)
5318d. Network Control Protocol(NCP)
5319Feedback
5320The correct answers are: Data encapsulation, Link Control Protocol(LCP), Network Control Protocol(NCP)
5321Question 406
5322Partially correct
5323Mark 0 out of 1
5324 Not flaggedFlag question
5325Question text
5326PPP protocol consists of three types of protocols, they are ( ).
5327Select one or more:
5328a. NCP(Network Control Protocol)
5329b. LCP(Link Control Protocol)
5330c. PPPOE
5331d. PPP extension protocol
5332Feedback
5333The correct answers are: LCP(Link Control Protocol), NCP(Network Control Protocol), PPP extension protocol
5334Question 407
5335Incorrect
5336Mark 0 out of 1
5337 Not flaggedFlag question
5338Question text
5339In the PPP protocol, which of the following encryption algorithms is used by CHAP?
5340Select one:
5341a. AES
5342b. DES
5343c. None
5344d. MD5
5345Feedback
5346The correct answer is: MD5
5347Question 408
5348Incorrect
5349Mark 0 out of 1
5350 Not flaggedFlag question
5351Question text
5352Which of the following packets belong to CHAP authentication protocol?
5353Select one or more:
5354a. Request
5355b. Failure
5356c. Success
5357d. Response
5358e. Challenge
5359Feedback
5360The correct answers are: Challenge, Response, Success, Failure
5361Question 409
5362Partially correct
5363Mark 0 out of 1
5364 Not flaggedFlag question
5365Question text
5366When you configure PPP authentication method as PAP, which of the following operations are necessary?
5367Select one or more:
5368a. Configure the encapsulation type of the interface connected to the peer as PPP.
5369b. Configure PPP authentication method as CHAP
5370c. On the authenticated party end, configure the user name and password that are sent to authenticator
5371d. Add the user name and password of the authenticated party to local user list
5372Feedback
5373The correct answers are: Add the user name and password of the authenticated party to local user list, Configure the encapsulation type of the interface connected to the peer as PPP., On the authenticated party end, configure the user name and password that are sent to authenticator
5374Question 410
5375Incorrect
5376Mark 0 out of 1
5377 Not flaggedFlag question
5378Question text
5379Which of the following statements are correct about NAT?
5380Select one or more:
5381a. When hosts inside a private network access the outside network, NAT is not needed at all.
5382b. NAT is used for translation between private network address and public network address.
5383c. NAT provides an effective way to solve the problem of insufficient IP address.
5384d. NAT is the abbreviation for "Network Address Translation"
5385Feedback
5386The correct answers are: NAT is the abbreviation for "Network Address Translation", NAT is used for translation between private network address and public network address., NAT provides an effective way to solve the problem of insufficient IP address.
5387Question 411
5388Incorrect
5389Mark 0 out of 1
5390 Not flaggedFlag question
5391Question text
5392Which of the following technologies can allow a host with IP address 10.0.0.1 to access the internet?
5393Select one:
5394a. Route import
5395b. Static route
5396c. NAT
5397d. Dynamic route
5398Feedback
5399The correct answer is: NAT
5400Question 412
5401Incorrect
5402Mark 0 out of 1
5403 Not flaggedFlag question
5404Question text
5405Which of the following problems can be solved by NAT?
5406Select one:
5407a. Improving the forwarding performance of routers
5408b. Saving Internet public address
5409c. Enhancing the security of data transmission
5410d. Protecting computers from viruses attacks
5411Feedback
5412The correct answer is: Saving Internet public address
5413Question 413
5414Correct
5415Mark 1 out of 1
5416 Not flaggedFlag question
5417Question text
5418What type of network addresses can be translated by NAT?
5419Select one:
5420a. IP
5421b. AppleTalk
5422c. DECNET
5423d. IPX
5424Feedback
5425The correct answer is: IP
5426Question 414
5427Incorrect
5428Mark 0 out of 1
5429 Not flaggedFlag question
5430Question text
5431Which of the following problems can be solved by NAT?
5432Select one:
5433a. Improving the forwarding performance of routers
5434b. Enhancing the security of data transmission
5435c. Protecting computers from viruses attacks
5436d. Saving Internet public address
5437Feedback
5438The correct answer is: Saving Internet public address
5439Question 415
5440Incorrect
5441Mark 0 out of 1
5442 Not flaggedFlag question
5443Question text
5444What type of network addresses can be translated by NAT?
5445Select one:
5446a. DECNET
5447b. AppleTalk
5448c. IP
5449d. IPX
5450Feedback
5451The correct answer is: IP
5452Question 416
5453Incorrect
5454Mark 0 out of 1
5455 Not flaggedFlag question
5456Question text
5457Which of the following is a typical WWAN?
5458Select one:
5459a. 3G network
5460b. All of the above
5461c. 2G network
5462d. 4G network
5463Feedback
5464The correct answer is: All of the above
5465Question 417
5466Incorrect
5467Mark 0 out of 1
5468 Not flaggedFlag question
5469Question text
5470Which of the following are the disadvantages of packet filtering firewall?
5471Select one or more:
5472a. Low overhead, high processing speed
5473b. As the complexity and length of ACL increase, its performance will degrade greatly
5474c. Complicated configuration and can result in a lot of problems due to mis-configuration
5475d. Simple configuration
5476Feedback
5477The correct answers are: Complicated configuration and can result in a lot of problems due to mis-configuration, As the complexity and length of ACL increase, its performance will degrade greatly
5478Question 418
5479Partially correct
5480Mark 0 out of 1
5481 Not flaggedFlag question
5482Question text
5483Packet filtering firewall filters packet based on quintuplet. Which of the following are the components of quintuplet?
5484Select one or more:
5485a. Protocol number
5486b. Application program
5487c. MAC address
5488d. Port number
5489e. IP address
5490Feedback
5491The correct answers are: IP address, Protocol number, Port number
5492Question 419
5493Incorrect
5494Mark 0 out of 1
5495 Not flaggedFlag question
5496Question text
5497What of the following statements is correct regarding access control list types and ranges?
5498Select one:
5499a. An interface ACL value ranges 1000-2000
5500b. A layer 2 ACL value ranges from 4000-4999
5501c. An advanced ACL value ranges from 3000-4000
5502d. A basic ACL value ranges from 1000-2999
5503Feedback
5504The correct answer is: A layer 2 ACL value ranges from 4000-4999
5505Question 420
5506Incorrect
5507Mark 0 out of 1
5508 Not flaggedFlag question
5509Question text
5510Which of the following parameters is not used by Advanced ACL?
5511Select one:
5512a. protocol number
5513b. destination port number
5514c. time-range
5515d. source interface
5516Feedback
5517The correct answer is: source interface
5518Question 421
5519Partially correct
5520Mark 1 out of 1
5521 Not flaggedFlag question
5522Question text
5523[RTA]acl 2002
5524[RTA-acl-basic-2002]rule permit source 20.1.1.1 0
5525[RTA-acl-basic-2002]rule permit source 30.1.1.1 0
5526Refer to the configuration output. A network administrator configured the ACL on router RTA, as shown. Which of the following statements regarding the rule order are correct?
5527Select one or more:
5528a. The rule-number of the second rule is 10
5529b. The rule-number of the first rule is 5
5530c. The rule-number of the first rule is 1
5531d. The rule-number of the second rule is 2
5532Feedback
5533The correct answers are: The rule-number of the first rule is 5, The rule-number of the second rule is 10
5534Question 422
5535Incorrect
5536Mark 0 out of 1
5537 Not flaggedFlag question
5538Question text
5539Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed. What actions can be taken by the administrator to prevent further changes?
5540Select one or more:
5541a. The administrator should configure port-security on the router
5542b. The administrator should configure AAA to manage user authorization on the router.
5543c. The administrator should limit access by setting the login privilege of users to 0.
5544d. The administrator should configure an ACL to allow only the administrator to manage the router.
5545Feedback
5546The correct answers are: The administrator should limit access by setting the login privilege of users to 0., The administrator should configure AAA to manage user authorization on the router., The administrator should configure an ACL to allow only the administrator to manage the router.
5547Question 423
5548Partially correct
5549Mark 0 out of 1
5550 Not flaggedFlag question
5551Question text
5552Assume that a user is Telneting a router. In this case, which of the following statements are true?
5553Select one or more:
5554a. The router authenticates the user password.
5555b. The router does not authenticate the user.
5556c. The router may perform remote authentication based on AAA.
5557d. The router may perform local authentication based on AAA.
5558Feedback
5559The correct answers are: The router authenticates the user password., The router may perform local authentication based on AAA., The router may perform remote authentication based on AAA., The router does not authenticate the user.
5560Question 424
5561Partially correct
5562Mark 0 out of 1
5563 Not flaggedFlag question
5564Question text
5565An administrator currently manages AR2200 devices in the network through a single password, however the company wishes to introduce another two administrators and provide unique user credentials and privilege levels for telnet access to the network devices. What action can be taken?
5566Select one or more:
5567a. The authentication mode must be changed to AAA.
5568b. A public IP address must be assigned to each user for telnet access.
5569c. Each administrator must be assigned a privilege level.
5570d. Configure three users under the AAA-view, and assign each a different password.
5571Feedback
5572The correct answers are: Configure three users under the AAA-view, and assign each a different password., The authentication mode must be changed to AAA., Each administrator must be assigned a privilege level.
5573Question 425
5574Partially correct
5575Mark 0 out of 1
5576 Not flaggedFlag question
5577Question text
5578Which of the following authentication methods are supported for Telnet users?
5579Select one or more:
5580a. No authentication
5581b. MD5 authentication
5582c. Password authentication
5583d. AAA local authentication
5584Feedback
5585The correct answers are: Password authentication, AAA local authentication, No authentication
5586Question 426
5587Incorrect
5588Mark 0 out of 1
5589 Not flaggedFlag question
5590Question text
5591The users who log on the router through Telnet are not permitted to configure IP address. What is the possible reason?
5592Select one:
5593a. SNMP parameters are set incorrectly.
5594b. Privilege level of Telnet is set incorrectly.
5595c. Communication failures occur between the user and the router.
5596d. The authentication mode of Telnet is set incorrectly.
5597Feedback
5598The correct answer is: Privilege level of Telnet is set incorrectly.
5599Question 427
5600Partially correct
5601Mark 0 out of 1
5602 Not flaggedFlag question
5603Question text
5604A virtual private network (VPN) can be divided into different parts by layer. What are these parts?
5605Select one or more:
5606a. L2VPN
5607b. VPDN
5608c. L3VPN
5609d. GRE VPN
5610Feedback
5611The correct answers are: L2VPN, L3VPN, VPDN
5612Question 428
5613Incorrect
5614Mark 0 out of 1
5615 Not flaggedFlag question
5616Question text
5617If AH and ESP are both required to protect data streams between IPsec peers, how many Security Associations (SA) are required in total?
5618Select one:
5619a. 2
5620b. 1
5621c. 3
5622d. 4
5623Feedback
5624The correct answer is: 4
5625Question 429
5626Incorrect
5627Mark 0 out of 1
5628 Not flaggedFlag question
5629Question text
5630Two routers establish an IPsec tunnel, which of the following does not need to be the same on both peering devices?
5631Select one:
5632a. Transform mode
5633b. authentication algorithm
5634c. Encapsulation mode
5635d. Proposal name
5636Feedback
5637The correct answer is: Proposal name
5638Question 430
5639Incorrect
5640Mark 0 out of 1
5641 Not flaggedFlag question
5642Question text
5643The data is transmitted using IPsec tunnel mode. The fields of which headers will be authenticated?
5644Select one:
5645a. The fields of all headers
5646b. AH, Origin IP, TCP and Data
5647c. Origin IP, TCP and Data
5648d. TCP and Data
5649Feedback
5650The correct answer is: AH, Origin IP, TCP and Data
5651Question 431
5652Correct
5653Mark 1 out of 1
5654 Not flaggedFlag question
5655Question text
5656IPsec VPN uses ESP to encrypt which fields ?
5657Select one:
5658a. TCP, Data and ESP Trailer
5659b. ESP, TCP, Data and ESP Trailer
5660c. ESP, TCP and Data
5661d. ESP, TCP, Data, ESP Trailer and ESP Auth
5662Feedback
5663The correct answer is: TCP, Data and ESP Trailer
5664Question 432
5665Correct
5666Mark 1 out of 1
5667 Not flaggedFlag question
5668Question text
5669RTA and RTB have established a GRE tunnel, but only RTA has enabled the keepalive function. When RTB receive a keepalive message from RTA, how will RTB respond?
5670Select one:
5671a. RTB will send a keepalive in response.
5672b. RTB willl record receipt of the keepalive message but won’t reply
5673c. RTB will discard the keepalive message.
5674d. RTB will send a keepalive reply and begin to actively send keepalive messages.
5675Feedback
5676The correct answer is: RTB will send a keepalive in response.
5677Question 433
5678Incorrect
5679Mark 0 out of 1
5680 Not flaggedFlag question
5681Question text
5682Two hosts communicate through a GRE tunnel. When the GRE tunnel is up, the network administrator configures a static route on RTA to route packets to Host B. Which of the following commands will achieve this?
5683Select one:
5684a. ip route-static 10.1.2.0 24 200.2.2.1
5685b. ip route-static 10.1.2.0 24 tunnel 0/0/1
5686c. ip route-static 10.1.2.0 24 200.1.1.1
5687d. ip route-static 10.1.2.0 24 GigabitEthernet0/0/1
5688Feedback
5689The correct answer is: ip route-static 10.1.2.0 24 tunnel 0/0/1
5690Question 434
5691Correct
5692Mark 1 out of 1
5693 Not flaggedFlag question
5694Question text
5695which version of SNMP supports data encryption?
5696Select one:
5697a. SNMPv3
5698b. SNMPv2c
5699c. SNMPv1
5700d. SNMPv2
5701Feedback
5702The correct answer is: SNMPv3
5703Question 435
5704Incorrect
5705Mark 0 out of 1
5706 Not flaggedFlag question
5707Question text
5708Which of the following statements regarding traps in SNMP is correct?
5709Select one:
5710a. Traps are transmitted using UDP to destination port number 161.
5711b. Traps are transmitted using TCP to destination port number 162.
5712c. Traps are transmitted using TCP to destination port number 161.
5713d. Traps are transmitted using UDP to destination port number 162.
5714Feedback
5715The correct answer is: Traps are transmitted using UDP to destination port number 162.
5716Question 436
5717Correct
5718Mark 1 out of 1
5719 Not flaggedFlag question
5720Question text
5721The Network Management Station uses SNMP to manage devices, which SNMP message is sent when an SNMP registered abnormal event occurs?
5722Select one:
5723a. trap
5724b. set-request
5725c. get-request
5726d. get-response
5727Feedback
5728The correct answer is: trap
5729Question 437
5730Incorrect
5731Mark 0 out of 1
5732 Not flaggedFlag question
5733Question text
5734eSight supports which of the following SNMP versions in order to manage devices?
5735Select one or more:
5736a. SNPMv2
5737b. SNPMv3
5738c. SNPMv1
5739d. SNPMv2c
5740Feedback
5741The correct answers are: SNPMv1, SNPMv2c, SNPMv3
5742Question 438
5743Correct
5744Mark 1 out of 1
5745 Not flaggedFlag question
5746Question text
5747Which of the following descriptions regarding eSight is not correct?
5748Select one:
5749a. eSight supports only Huawei devices
5750b. eSight supports the backup of configuration files and network traffic analysis.
5751c. eSight is used to monitor and manage enterprise networks.
5752d. eSight supports WLAN management and monitoring of hotspot coverage.
5753Feedback
5754The correct answer is: eSight supports only Huawei devices
5755Question 439
5756Partially correct
5757Mark 0 out of 1
5758 Not flaggedFlag question
5759Question text
5760(Multiple Choice) A typical IP Telecommunication Network include
5761Select one or more:
5762a. Backbone Network
5763b. Metropolitan Area Network
5764c. Access Network
5765d. Convergence Network
5766Feedback
5767The correct answers are: Backbone Network, Metropolitan Area Network, Access Network
5768Question 440
5769Incorrect
5770Mark 0 out of 1
5771 Not flaggedFlag question
5772Question text
5773(Single Choice) The default mask of class B address is
5774Select one:
5775a. 255.225.255.255
5776b. 255.255.0.0
5777c. 255.255.255.0
5778d. 255.0.0.0
5779Feedback
5780The correct answer is: 255.255.0.0
5781Question 441
5782Incorrect
5783Mark 0 out of 1
5784 Not flaggedFlag question
5785Question text
5786(Single Choice) How many hosts are available for a class B IP address?
5787Select one:
5788a. 2M
5789b. 64K
5790c. 16K
5791d. 254
5792Feedback
5793The correct answer is: 64K
5794Question 442
5795Incorrect
5796Mark 0 out of 1
5797 Not flaggedFlag question
5798Question text
5799(Single Choice) The network address of 125.3.54.56 with default subnet mask is
5800Select one:
5801a. 125.3.54.32
5802b. 125.0.0.0
5803c. 125.3.0.0
5804d. 125.3.54.0
5805Feedback
5806The correct answer is: 125.0.0.0
5807Question 443
5808Correct
5809Mark 1 out of 1
5810 Not flaggedFlag question
5811Question text
5812(Single Choice) Which of the following class has the first octet beginning with "1110"?
5813Select one:
5814a. Class D
5815b. Class C
5816c. Class B
5817d. Class A
5818Feedback
5819The correct answer is: Class D
5820Question 444
5821Incorrect
5822Mark 0 out of 1
5823 Not flaggedFlag question
5824Question text
5825(Single Choice) Which of the following is reserved for loopback address?
5826Select one:
5827a. 164.0.0.0
5828b. 200.0.0.0
5829c. 127.0.0.0
5830d. 130.0.0.0
5831Feedback
5832The correct answer is: 127.0.0.0
5833Question 445
5834Incorrect
5835Mark 0 out of 1
5836 Not flaggedFlag question
5837Question text
5838(Single Choice) In TCP/IP protocol, what is the decimal range of the first octet of class A address?
5839Select one:
5840a. 0---126
5841b. 1---127
5842c. 0---127
5843d. 1---126
5844Feedback
5845The correct answer is: 1---126
5846Question 446
5847Incorrect
5848Mark 0 out of 1
5849 Not flaggedFlag question
5850Question text
5851(Single Choice) For a traditional class C network without sub-netting, how many hosts are available at most?
5852Select one:
5853a. 65025
5854b. 254
5855c. 1024
5856d. 48
5857Feedback
5858The correct answer is: 254
5859Question 447
5860Incorrect
5861Mark 0 out of 1
5862 Not flaggedFlag question
5863Question text
5864(Single Choice) The function of network number in IP address is
5865Select one:
5866a. Specify the network by which devices can communicate with each other
5867b. Specify the network node which belongs to subnet address
5868c. Identify the host in the network
5869d. Specify the network to which hosts belong
5870Feedback
5871The correct answer is: Specify the network to which hosts belong
5872Question 448
5873Incorrect
5874Mark 0 out of 1
5875 Not flaggedFlag question
5876Question text
5877(Single Choice) Which of the following multicast address represents all routers and hosts of the subnet?
5878Select one:
5879a. 224.0.0.3
5880b. 224.0.0.2
5881c. 224.0.0.1
5882d. 224.0.0.9
5883Feedback
5884The correct answer is: 224.0.0.1
5885Question 449
5886Incorrect
5887Mark 0 out of 1
5888 Not flaggedFlag question
5889Question text
5890(Single Choice) Which of the following multicast address represents all routers of the subnet?
5891Select one:
5892a. 224.0.0.1
5893b. 224.0.0.2
5894c. 224.0.0.3
5895d. 224.0.0.9
5896Feedback
5897The correct answer is: 224.0.0.2
5898Question 450
5899Partially correct
5900Mark 0 out of 1
5901 Not flaggedFlag question
5902Question text
5903(Multiple Choice) Which of the following networks are parts of a complete IP network?
5904Select one or more:
5905a. Metropolitan area network (MAN)
5906b. Mobile network
5907c. Backbone network
5908d. Access network
5909Feedback
5910The correct answers are: Backbone network, Metropolitan area network (MAN), Access network
5911Question 451
5912Incorrect
5913Mark 0 out of 1
5914 Not flaggedFlag question
5915Question text
5916(Single Choice) An IP address whose network portion and host portion are all zero represents
5917Select one:
5918a. Broadcast address of all the network nodes
5919b. Network address
5920c. All networks
5921d. Broadcast address of the specified network segment
5922Feedback
5923The correct answer is: All networks
5924Question 452
5925Incorrect
5926Mark 0 out of 1
5927 Not flaggedFlag question
5928Question text
5929(Single Choice) Which class does IP address 190.233.27.13 belong to?
5930Select one:
5931a. A
5932b. B
5933c. C
5934d. D
5935Feedback
5936The correct answer is: B
5937Question 453
5938Incorrect
5939Mark 0 out of 1
5940 Not flaggedFlag question
5941Question text
5942(Single Choice) The network address of the IP 190.233.27.13/16 is
5943Select one:
5944a. 190.233.27.1
5945b. 190.233.0.0
5946c. 190.233.27.0
5947d. 190.0.0.0
5948Feedback
5949The correct answer is: 190.233.0.0
5950Question 454
5951Incorrect
5952Mark 0 out of 1
5953 Not flaggedFlag question
5954Question text
5955(Single Choice) Which of the following class address are multicast address ?
5956Select one:
5957a. Class A
5958b. Class E
5959c. Class B
5960d. Class D
5961Feedback
5962The correct answer is: Class D
5963Question 455
5964Incorrect
5965Mark 0 out of 1
5966 Not flaggedFlag question
5967Question text
5968(Single Choice) The default mask length of the IP address 219.25.23.56 is
5969Select one:
5970a. 8
5971b. 16
5972c. 24
5973d. 32
5974Feedback
5975The correct answer is: 24
5976Question 456
5977Incorrect
5978Mark 0 out of 1
5979 Not flaggedFlag question
5980Question text
5981(Single Choice) Which part of the IP address is used for sub-netting?
5982Select one:
5983a. Default subnet mask
5984b. Network address
5985c. Host address
5986d. Subnet network segment
5987Feedback
5988The correct answer is: Host address
5989Question 457
5990Incorrect
5991Mark 0 out of 1
5992 Not flaggedFlag question
5993Question text
5994(Single Choice) For a class B address, how many bits at most can be used for sub-netting?
5995Select one:
5996a. 16
5997b. 14
5998c. 8
5999d. 22
6000Feedback
6001The correct answer is: 14
6002Question 458
6003Incorrect
6004Mark 0 out of 1
6005 Not flaggedFlag question
6006Question text
6007(Single Choice) The subnet mask of a class A address is 255.255.240.0. How many bits are used for sub-netting?
6008Select one:
6009a. 9
6010b. 5
6011c. 12
6012d. 4
6013Feedback
6014The correct answer is: 12
6015Question 459
6016Incorrect
6017Mark 0 out of 1
6018 Not flaggedFlag question
6019Question text
6020(Single Choice) For a class C IP address, how many bits at most can be used for sub-netting?
6021Select one:
6022a. 8
6023b. 12
6024c. 6
6025d. 14
6026Feedback
6027The correct answer is: 6
6028Question 460
6029Incorrect
6030Mark 0 out of 1
6031 Not flaggedFlag question
6032Question text
6033(Single Choice) How many hosts are available in the network 154.27.0.0 without sub-netting?
6034Select one:
6035a. 16,777,206
6036b. 65,534
6037c. 1024
6038d. 254
6039Feedback
6040The correct answer is: 65,534
6041Question 461
6042Incorrect
6043Mark 0 out of 1
6044 Not flaggedFlag question
6045Question text
6046Routers are a type of computer equipment for network interconnections. Which layer of the OSI reference model does a router work at?
6047Select one:
6048a. Session Layer
6049b. Application Layer
6050c. Data Link Layer
6051d. Network Layer
6052Feedback
6053The correct answer is: Network Layer
6054Question 462
6055Incorrect
6056Mark 0 out of 1
6057 Not flaggedFlag question
6058Question text
6059(Single Choice) What is the abbreviation of VLSM?
6060Select one:
6061a. Very Long/Shortest Masking
6062b. Variable Length Subnet Masking
6063c. Variable Length Shortest Masking
6064d. Variable Long Subnet Masking
6065Feedback
6066The correct answer is: Variable Length Subnet Masking
6067Question 463
6068Incorrect
6069Mark 0 out of 1
6070 Not flaggedFlag question
6071Question text
6072(Single Choice) How many hosts are available for the network segment 192.168.2.16/28?
6073Select one:
6074a. 15
6075b. 16
6076c. 8
6077d. 7
6078e. 14
6079Feedback
6080The correct answer is: 14
6081Question 464
6082Correct
6083Mark 1 out of 1
6084 Not flaggedFlag question
6085Question text
6086(Single Choice) What is the binary format for subnet mask 255.255.192.0?
6087Select one:
6088a. 11111111 11111111 11000000 00000000
6089b. 11111111 11111111 11111111 00000000
6090c. 11111111 11110000 00000000 00000000
6091d. 11111111 11111111 00001111 00000000
6092Feedback
6093The correct answer is: 11111111 11111111 11000000 00000000
6094Question 465
6095Correct
6096Mark 1 out of 1
6097 Not flaggedFlag question
6098Question text
6099(Single Choice) What is the decimal value for binary 11001011?
6100Select one:
6101a. 203
6102b. 207
6103c. 193
6104d. 171
6105Feedback
6106The correct answer is: 203
6107Question 466
6108Incorrect
6109Mark 0 out of 1
6110 Not flaggedFlag question
6111Question text
6112(Multiple Choice) Which of the following route entries can be aggregate into 10.0.0.24/29?
6113Select one or more:
6114a. 10.0.0.22/30
6115b. 10.0.0.23/30
6116c. 10.0.0.25/30
6117d. 10.0.0.26/30
6118Feedback
6119The correct answers are: 10.0.0.25/30, 10.0.0.26/30
6120Question 467
6121Partially correct
6122Mark 1 out of 1
6123 Not flaggedFlag question
6124Question text
6125(Multiple Choice) An IPv4 address consists of 32 bits and is generally expressed in dotted decimal notation, for example, 11.110.96.132. Such an IP address can also be expressed in other notations. Which are they?
6126Select one or more:
6127a. 0b.6e.60.84
6128b. 0.b.6.e.6.0.8.4
6129c. 0.1011.0110.1110.0110.0.1000.0100
6130d. 00001011.01101110.01100000.10000100
6131Feedback
6132The correct answers are: 00001011.01101110.01100000.10000100, 0b.6e.60.84
6133Question 468
6134Incorrect
6135Mark 0 out of 1
6136 Not flaggedFlag question
6137Question text
6138(Single Choice) In one IP address, the network part is constant and the host part consists of all 1s. What does this IP address stand for?
6139Select one:
6140a. Network address
6141b. Broadcast address of a specific network segment
6142c. All the networks
6143d. Broadcast addresses of all the nodes in the specified network
6144Feedback
6145The correct answer is: Broadcast address of a specific network segment
6146Question 469
6147Incorrect
6148Mark 0 out of 1
6149 Not flaggedFlag question
6150Question text
6151(Single Choice) When the host field of an IP address contains n bits, how many host addresses are available in this network?
6152Select one:
6153a. 2n-1
6154b. 2n-2
6155c. 2n-1
6156d. 2n
6157Feedback
6158The correct answer is: 2n-2
6159Question 470
6160Correct
6161Mark 1 out of 1
6162 Not flaggedFlag question
6163Question text
6164(Single Choice) The first three octets of a Class C IP address represent a network. Which of the following binary numbers does the first byte of the three octets start with?
6165Select one:
6166a. 110
6167b. 100
6168c. 10
6169d. 101
6170Feedback
6171The correct answer is: 110
6172Question 471
6173Correct
6174Mark 1 out of 1
6175 Not flaggedFlag question
6176Question text
6177(Single Choice) Which of the following is the feature of IP protocol?
6178Select one:
6179a. Unreliable and connectionless oriented
6180b. Reliable and connection oriented
6181c. Reliable and connectionless oriented
6182d. Unreliable and connection oriented
6183Feedback
6184The correct answer is: Unreliable and connectionless oriented
6185Question 472
6186Correct
6187Mark 1 out of 1
6188 Not flaggedFlag question
6189Question text
6190(Single Choice) Which of the following represents the subnet mask of the 192.168.1.7/28 IP address?
6191Select one:
6192a. 255.255.255.240
6193b. 255.255.255.224
6194c. 255.255.255.252
6195d. 255.255.255.248
6196Feedback
6197The correct answer is: 255.255.255.240
6198Question 473
6199Correct
6200Mark 1 out of 1
6201 Not flaggedFlag question
6202Question text
6203(Single Choice) Which of the following represents the network IP address corresponding to the 192.168.1.7/28 IP address?
6204Select one:
6205a. 192.168.1.0
6206b. 192.168.1.7
6207c. 192.168.1.6
6208d. 192.168.1.4
6209Feedback
6210The correct answer is: 192.168.1.0
6211Question 474
6212Incorrect
6213Mark 0 out of 1
6214 Not flaggedFlag question
6215Question text
6216(Multiple Choice) Which of the following statements regarding the address space of IP sub-network are true?
6217Select one or more:
6218a. Since IP address borrowing method can be used to preserve IP address, the size of the sub-network required may be smaller than actual requirement.
6219b. All of the statements above are correct but none of them can be used in actual network implementation.
6220c. Address space of sub-network must meet the practical requirements. At the same time, redundancy is needed to ensure the extensibility
6221d. The size of the sub-network should be integral power of two make it easier for the implementation of various policies.
6222Feedback
6223The correct answers are: Address space of sub-network must meet the practical requirements. At the same time, redundancy is needed to ensure the extensibility, The size of the sub-network should be integral power of two make it easier for the implementation of various policies.
6224Question 475
6225Incorrect
6226Mark 0 out of 1
6227 Not flaggedFlag question
6228Question text
6229(Single Choice) What's the broadcast address for host address 101.11.100.100/22?
6230Select one:
6231a. 101.255.255.255
6232b. 101.11.101.255
6233c. 101.11.103.255
6234d. 101.11.100.255
6235Feedback
6236The correct answer is: 101.11.103.255
6237Question 476
6238Incorrect
6239Mark 0 out of 1
6240 Not flaggedFlag question
6241Question text
6242(Single Choice) Which of the following is a valid IP host address?
6243Select one:
6244a. 127.2.3.5
6245b. 192.240.150.255/24
6246c. 1.255.255.2/24
6247d. 225.23.200.9
6248Feedback
6249The correct answer is: 1.255.255.2/24
6250Question 477
6251Correct
6252Mark 1 out of 1
6253 Not flaggedFlag question
6254Question text
6255(Single Choice) According to the OSI reference model, network layer address consistes of ?
6256Select one:
6257a. Network address and host address
6258b. Host address and host number
6259c. Host address and network mask
6260d. Network address and network mask
6261Feedback
6262The correct answer is: Network address and host address
6263Question 478
6264Incorrect
6265Mark 0 out of 1
6266 Not flaggedFlag question
6267Question text
6268(Single Choice) Which of the following statements about IP host address is true?
6269Select one:
6270a. Host portion can be either all one or all zero
6271b. IP host address can be either all one or all zero
6272c. Network portion can be either all one or all zero
6273d. Network portion can be neither all one nor all zero
6274Feedback
6275The correct answer is: Network portion can be neither all one nor all zero
6276Question 479
6277Incorrect
6278Mark 0 out of 1
6279 Not flaggedFlag question
6280Question text
6281(Single Choice) Which of the following is the correct host IP address?
6282Select one:
6283a. 202.112.5.0/24
6284b. 162.111.111.111/16
6285c. 127.32.5.62/8
6286d. 224.0.0.5/24
6287Feedback
6288The correct answer is: 162.111.111.111/16
6289Question 480
6290Correct
6291Mark 1 out of 1
6292 Not flaggedFlag question
6293Question text
6294(Single Choice) Which of the following situations would employ dedicated host address as the source IP and destination IP for the data packets?
6295Select one:
6296a. Unicast
6297b. Broadcast
6298c. Directcast
6299d. Multicast
6300Feedback
6301The correct answer is: Unicast
6302Question 481
6303Incorrect
6304Mark 0 out of 1
6305 Not flaggedFlag question
6306Question text
6307(Single Choice) The subnet mask of the network segment 175.25.8.0/19 is
6308Select one:
6309a. 255.255.0.0
6310b. The subnet mask varies according to the class of IP address
6311c. 255.255.24.0
6312d. 255.255.224.0
6313Feedback
6314The correct answer is: 255.255.224.0
6315Question 482
6316Correct
6317Mark 1 out of 1
6318 Not flaggedFlag question
6319Question text
6320(Single Choice) The default subnet mask of the class D IP address is ( ) bits.
6321Select one:
6322a. Class D address does not have the subnet mask
6323b. 16
6324c. 8
6325d. 24
6326Feedback
6327The correct answer is: Class D address does not have the subnet mask
6328Question 483
6329Partially correct
6330Mark 1 out of 1
6331 Not flaggedFlag question
6332Question text
6333(Multiple Choice) In general, IP address consists of
6334Select one or more:
6335a. Network address
6336b. Link address
6337c. Host address
6338d. Logic address
6339Feedback
6340The correct answers are: Network address, Host address
6341Question 484
6342Incorrect
6343Mark 0 out of 1
6344 Not flaggedFlag question
6345Question text
6346(Single Choice) 172.16.10.32/24 is
6347Select one:
6348a. Network address
6349b. Broadcast address
6350c. Host address
6351d. Multicast address
6352Feedback
6353The correct answer is: Host address
6354Question 485
6355Incorrect
6356Mark 0 out of 1
6357 Not flaggedFlag question
6358Question text
6359(Single Choice) The mask of a class C subnet is 255.255.255.224. How many bits are available for sub-netting? How many subnets are available? How many hosts are available for each subnet?
6360Select one:
6361a. 2, 2, 62
6362b. 4, 14, 14
6363c. 3, 8, 30
6364d. 5, 30, 6
6365Feedback
6366The correct answer is: 3, 8, 30
6367Question 486
6368Incorrect
6369Mark 0 out of 1
6370 Not flaggedFlag question
6371Question text
6372(Single Choice) What's the broadcast address for host address 101.11.100.100/22?
6373Select one:
6374a. 10.1.126.255
6375b. 10.1.128.255
6376c. 10.1.63.255
6377d. 10.1.127.255
6378Feedback
6379The correct answer is: 10.1.127.255
6380Question 487
6381Incorrect
6382Mark 0 out of 1
6383 Not flaggedFlag question
6384Question text
6385(Single Choice) What's the broadcast address for network segment 201.1.0.0/21?
6386Select one:
6387a. 201.1.1.255
6388b. 201.1.7.255
6389c. 201.0.0.255
6390d. 201.1.0.255
6391Feedback
6392The correct answer is: 201.1.7.255
6393Question 488
6394Incorrect
6395Mark 0 out of 1
6396 Not flaggedFlag question
6397Question text
6398(Single Choice) Which of the following is the most appropriate aggregation for network segments 172.128.12.0, 172.128.17.0, 172.128.18.0, and 172.128.19.0?
6399Select one:
6400a. 172.128.12.0/22
6401b. 172.128.0.0/21
6402c. 172.128.20.0/20
6403d. 172.128.0.0/19
6404Feedback
6405The correct answer is: 172.128.0.0/19
6406Question 489
6407Incorrect
6408Mark 0 out of 1
6409 Not flaggedFlag question
6410Question text
6411(Single Choice) Which of the following aggregation by CIDR technology is correct?
6412Select one:
6413a. 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/22
6414b. 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/21
6415c. 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/20
6416d. 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/19
6417Feedback
6418The correct answer is: 192.168.1.0-192.168.15.0 can be aggregated to 192.168.0.0/20
6419Question 490
6420Incorrect
6421Mark 0 out of 1
6422 Not flaggedFlag question
6423Question text
6424(Single Choice) Which of the following is the most appropriate aggregation for network segments 172.168.16.0, 172.168.17.0, 172.168.18.0, and 172.168.19.0?
6425Select one:
6426a. 172.168.20.0/20
6427b. 172.168.17.0/21
6428c. 172.168.16.0/21
6429d. 172.168.16.0/22
6430Feedback
6431The correct answer is: 172.168.16.0/22
6432Question 491
6433Incorrect
6434Mark 0 out of 1
6435 Not flaggedFlag question
6436Question text
6437(Multiple Choice) Which address categories does the 220.32.59.31/27 IP address belong to?
6438Select one or more:
6439a. Invalid address
6440b. Class C address
6441c. Broadcast address in a specific network segment
6442d. Private address
6443Feedback
6444The correct answers are: Class C address, Broadcast address in a specific network segment
6445Question 492
6446Incorrect
6447Mark 0 out of 1
6448 Not flaggedFlag question
6449Question text
6450(Single Choice) When the subnet mask of a network is 255.240.0.0, which of the following is a valid Class A host address?
6451Select one:
6452a. 220.32.59.128
6453b. 12.32.59.160
6454c. 129.32.59.17
6455d. 158.32.59.64
6456Feedback
6457The correct answer is: 12.32.59.160
6458Question 493
6459Incorrect
6460Mark 0 out of 1
6461 Not flaggedFlag question
6462Question text
6463(Single Choice) Interconnected devices of a network are a combination of hardware and software. Which layer are these devices generally located at?
6464Select one:
6465a. Layer 4
6466b. Layer 3
6467c. Layer 5
6468d. Layer 2
6469Feedback
6470The correct answer is: Layer 3
6471Question 494
6472Incorrect
6473Mark 0 out of 1
6474 Not flaggedFlag question
6475Question text
6476(Single Choice) When a Class C subnet mask is 255.255.255.192, how many subnets does this network consist of and how many hosts does each subnet consist of?
6477Select one:
6478a. 8, 62
6479b. 16, 14
6480c. 32, 14
6481d. 4, 62
6482Feedback
6483The correct answer is: 4, 62
6484Question 495
6485Incorrect
6486Mark 0 out of 1
6487 Not flaggedFlag question
6488Question text
6489(Single Choice) For a class B network, if 5 bits are used for sub-netting, how many hosts are available in a “single” subnet?
6490Select one:
6491a. 510
6492b. 2046
6493c. 512
6494d. 1022
6495Feedback
6496The correct answer is: 2046
6497Question 496
6498Incorrect
6499Mark 0 out of 1
6500 Not flaggedFlag question
6501Question text
6502(Single Choice) A class C network is divided into 9 subnets in which 16 hosts at most are available for each subnet. Which of the following is an appropriate subnet mask?
6503Select one:
6504a. 255.255.255.224
6505b. 255.255.224.0
6506c. 255.255.255.240
6507d. No appropriate subnet mask is available
6508Feedback
6509The correct answer is: No appropriate subnet mask is available
6510Question 497
6511Incorrect
6512Mark 0 out of 1
6513 Not flaggedFlag question
6514Question text
6515(Single Choice) What is the numerically nearest subnet for the network 172.168.16.0 with mask 255.255.252.0?
6516Select one:
6517a. 172.168.48.0
6518b. 172.168.32.0
6519c. 172.168.20.0
6520d. 172.168.24.0
6521Feedback
6522The correct answer is: 172.168.20.0
6523Question 498
6524Incorrect
6525Mark 0 out of 1
6526 Not flaggedFlag question
6527Question text
6528(Single Choice) For an IP address 192.168.12.43, its mask is 255.255.255.128, its network address is ( ), and its broadcast address is ( )
6529Select one:
6530a. 192.168.0.0 255.255.255.255
6531b. 192.168.12.32 192.168.12.127
6532c. 192.168.12.43 255.255.255.128
6533d. 192.168.12.0 192.168.12.127
6534e. 192.169.12.128 255.255.255.128
6535Feedback
6536The correct answer is: 192.168.12.0 192.168.12.127
6537Question 499
6538Incorrect
6539Mark 0 out of 1
6540 Not flaggedFlag question
6541Question text
6542(Single Choice) For a class B IP network 172.16.0.0, its mask is 255.255.255.192. How many subnets are available and how many hosts are available for each subnet?
6543Select one:
6544a. 192, 254
6545b. 1024, 62
6546c. 1022, 62
6547d. 512, 126
6548e. 256, 254
6549Feedback
6550The correct answer is: 1024, 62
6551Question 500
6552Incorrect
6553Mark 0 out of 1
6554 Not flaggedFlag question
6555Question text
6556(Single Choice) What are the network address and the broadcast address for the network segment that the IP address 190.5.4.2/22 belongs to?
6557Select one:
6558a. 190.5.4.0, 255.255.255.255
6559b. 190.5.4.0, 190.5.7.255
6560c. 190.5.0.0, 190.5.4.255
6561d. 190.5.4.0, 190.5.4.255
6562Feedback
6563The correct answer is: 190.5.4.0, 190.5.4.255
6564Question 501
6565Incorrect
6566Mark 0 out of 1
6567 Not flaggedFlag question
6568Question text
6569(Single Choice) Which of the following is valid host IP address?
6570Select one:
6571a. 122.245.264.13/26
6572b. 12.3.4.6/24
6573c. 10.0.2.128/26
6574d. 192.168.2.15/28
6575e. 224.0.4.5
6576Feedback
6577The correct answer is: 12.3.4.6/24
6578Question 502
6579Incorrect
6580Mark 0 out of 1
6581 Not flaggedFlag question
6582Question text
6583(Single Choice) What's the network address and broadcast address for IP 190.5.6.1/22?
6584Select one:
6585a. 190.5.4.0, 190.5.4.255
6586b. 190.5.4.0, 190.5.4.254
6587c. 190.5.4.0, 190.5.7.255
6588d. 190.5.1.0, 190.5.1.255
6589Feedback
6590The correct answer is: 190.5.4.0, 190.5.7.255
6591Question 503
6592Partially correct
6593Mark 1 out of 1
6594 Not flaggedFlag question
6595Question text
6596(Multiple Choice) For an IP address 10.110.53.233, if its mask length is the same with that of the following items, which items are in the same network segment with 10.110.53.233?
6597Select one or more:
6598a. 10.110.48.10 mask 255.255.248.0
6599b. 10.110.43.10 mask 255.255.0.0
6600c. 10.110.43.10 mask 255.255.248.0
6601d. 10.110.48.10 mask 255.255.252.0
6602Feedback
6603The correct answers are: 10.110.48.10 mask 255.255.248.0, 10.110.43.10 mask 255.255.0.0
6604Question 504
6605Incorrect
6606Mark 0 out of 1
6607 Not flaggedFlag question
6608Question text
6609(Multiple Choice) Which of the following are routed protocols?
6610Select one or more:
6611a. OSPF
6612b. BGP
6613c. IPX
6614d. IP
6615Feedback
6616The correct answers are: IP, IPX
6617Question 505
6618Correct
6619Mark 1 out of 1
6620 Not flaggedFlag question
6621Question text
6622(Single Choice) Which of the following host IP address is within the same network segment with 10.110.12.29 /27?
6623Select one:
6624a. 10.110.12.30
6625b. 10.110.12.31
6626c. 10.110.12.0
6627d. 10.110.12.32
6628Feedback
6629The correct answer is: 10.110.12.30
6630Question 506
6631Incorrect
6632Mark 0 out of 1
6633 Not flaggedFlag question
6634Question text
6635(Multiple Choice) Which of the following statements regarding the IP address 192.168.16.255/20 are correct?
6636Select one or more:
6637a. It's a network address
6638b. It belongs to the network segment 192.168.16.0
6639c. It's a broadcast address
6640d. It belongs to the network segment 192.168.19.0
6641e. It's a private address
6642f. It's a public address
6643Feedback
6644The correct answers are: It's a private address, It belongs to the network segment 192.168.16.0
6645Question 507
6646Incorrect
6647Mark 0 out of 1
6648 Not flaggedFlag question
6649Question text
6650(Single Choice) In a Class C network, after you add three digits in the default subnet mask to divide the network into different subnets, how many hosts does each subnet allow for?
6651Select one:
6652a. 14
6653b. 30
6654c. 6
6655d. 62
6656Feedback
6657The correct answer is: 30
6658Question 508
6659Correct
6660Mark 1 out of 1
6661 Not flaggedFlag question
6662Question text
6663(Single Choice) When the IP address is 199.32.59.64 and the subnet mask is 255.255.255.224, which of the following represents the IP address of the network segment?
6664Select one:
6665a. 199.32.59.64
6666b. 199.32.59.192
6667c. 199.32.59.224
6668d. 199.32.59.65
6669Feedback
6670The correct answer is: 199.32.59.64
6671Question 509
6672Correct
6673Mark 1 out of 1
6674 Not flaggedFlag question
6675Question text
6676(Single Choice) The IP address of a network is 12.28.75.160. After the network is divided into different subnets, the subnet mask is 255.255.252.0. In this case, which of the following represents the subnet broadcast address?
6677Select one:
6678a. 12.28.75.255
6679b. 12.28.255.255
6680c. 12.255.255.255
6681d. 12.28.69.255
6682Feedback
6683The correct answer is: 12.28.75.255
6684Question 510
6685Correct
6686Mark 1 out of 1
6687 Not flaggedFlag question
6688Question text
6689(Single Choice) The IP address of a network is 129.32.59.17. After the network is divided into different subnets, the subnet mask is 255.255.254.0. In this case, how many subnets are available?
6690Select one:
6691a. 128
6692b. 64
6693c. 32
6694d. 256
6695Feedback
6696The correct answer is: 128
6697Question 511
6698Incorrect
6699Mark 0 out of 1
6700 Not flaggedFlag question
6701Question text
6702(Single Choice) When an IP address is 220.32.59.128/25, which of the following represents the network address?
6703Select one:
6704a. 220.32.59.0
6705b. 220.32.59.254
6706c. 220.32.59.192
6707d. 220.32.59.128
6708Feedback
6709The correct answer is: 220.32.59.128
6710Question 512
6711Incorrect
6712Mark 0 out of 1
6713 Not flaggedFlag question
6714Question text
6715(Single Choice) Which layer is used to implement internal communication of a same IP network segment in an IP network?
6716Select one:
6717a. Physical Layer
6718b. Application Layer
6719c. Layer 2
6720d. Layer 3
6721Feedback
6722The correct answer is: Layer 2
6723Question 513
6724Incorrect
6725Mark 0 out of 1
6726 Not flaggedFlag question
6727Question text
6728(Single Choice) Which address of an Ethernet frame is used by a Layer 3 switch to determine whether to perform Layer 2 forwarding or Layer 3 forwarding?
6729Select one:
6730a. Destination IP address
6731b. Destination MAC address
6732c. Source MAC address
6733d. Source IP address
6734Feedback
6735The correct answer is: Destination MAC address
6736Question 514
6737Incorrect
6738Mark 0 out of 1
6739 Not flaggedFlag question
6740Question text
6741(Multiple Choice) Which of the following statements about the key features of a Layer 3 switch are true?
6742Select one or more:
6743a. All Layer 3 switches provide only ATM port.
6744b. Many Layer 3 switches provide exact search and perform Layer 3 forwarding based on Layer 3 functions.
6745c. Some high-end Layer 3 switches provide high-speed POS ports to improve the upstream link efficiency.
6746d. A Layer 3 switch provides Layer 3 functions while providing Layer 2 functions.
6747Feedback
6748The correct answers are: A Layer 3 switch provides Layer 3 functions while providing Layer 2 functions., Many Layer 3 switches provide exact search and perform Layer 3 forwarding based on Layer 3 functions., Some high-end Layer 3 switches provide high-speed POS ports to improve the upstream link efficiency.
6749Question 515
6750Incorrect
6751Mark 0 out of 1
6752 Not flaggedFlag question
6753Question text
6754(Single Choice) In a TCP/IP protocol stack, the headers of packets at each layer are removed in the decapsulation process in a specified manner. Which of the following is the right manner?
6755Select one:
6756a. From Transport Layer to the lower layers
6757b. From Network Layer to the upper layers
6758c. From lower to upper
6759d. From upper to lower
6760Feedback
6761The correct answer is: From lower to upper
6762Question 516
6763Incorrect
6764Mark 0 out of 1
6765 Not flaggedFlag question
6766Question text
6767(Single Choice) The common address in an IP address is globally unique. Which of the following addresses can be used repeated in a LAN?
6768Select one:
6769a. Network address
6770b. Host address
6771c. Subnet address
6772d. Private address
6773Feedback
6774The correct answer is: Private address
6775Question 517
6776Incorrect
6777Mark 0 out of 1
6778 Not flaggedFlag question
6779Question text
6780Which of the following formats represent an accurate condensing of the IPv6 address 2031:0000:720C:0000:0000:09E0:839A:130B?
6781Select one or more:
6782a. 2031:0:720C:0:0:9E:839A:130B
6783b. 2031:0:720C::9E0:839A:130B
6784c. 2031:0:720C:0:0:9E0:839A:130B
6785d. 2031::720C::9E0:839A:130B
6786Feedback
6787The correct answers are: 2031:0:720C:0:0:9E0:839A:130B, 2031:0:720C::9E0:839A:130B
6788Question 518
6789Partially correct
6790Mark 1 out of 1
6791 Not flaggedFlag question
6792Question text
6793Which of the following IPv6 addresses can be configured on a router’s interface?
6794Select one or more:
6795a. 2001:12e3:1b02::21/64
6796b. ::1/128
6797c. fe80:13dc::1/64
6798d. ff00:8a3c::9b/64
6799Feedback
6800The correct answers are: fe80:13dc::1/64, 2001:12e3:1b02::21/64
6801Question 519
6802Correct
6803Mark 1 out of 1
6804 Not flaggedFlag question
6805Question text
6806The IPv6 address achitecture does not include which of the following address types?
6807Select one:
6808a. broadcast
6809b. multicast
6810c. unicast
6811d. anycast
6812Feedback
6813The correct answer is: broadcast
6814Question 520
6815Incorrect
6816Mark 0 out of 1
6817 Not flaggedFlag question
6818Question text
6819Which of the following descriptions regarding IPv6 addresses are correct?
6820Select one or more:
6821a. IPv6 extension headers are processed randomly.
6822b. IPv6 extension headers are processed in order.
6823c. IPv6 addresses are 128 bits in length.
6824d. IPv6 addresses are 64 bits in length.
6825Feedback
6826The correct answers are: IPv6 addresses are 128 bits in length., IPv6 extension headers are processed in order.
6827Question 521
6828Incorrect
6829Mark 0 out of 1
6830 Not flaggedFlag question
6831Question text
6832Interface G0/0/1 on RTA contains a MAC address of 00e0-fc03-aa73 and is configured with the IPv6 address 2001::2E0:FCFF:FE03:AA73. Which method is most likely to have been used to configure the interface IPv6 address?
6833Select one:
6834a. ARP
6835b. Auto-link
6836c. EUI-64
6837d. DHCPv6
6838Feedback
6839The correct answer is: EUI-64
6840Question 522
6841Incorrect
6842Mark 0 out of 1
6843 Not flaggedFlag question
6844Question text
6845In a small network suppporting IPv6, a network administrator wishes implement RIPng. Which of the following commands should be used to enable this protocol?
6846Select one:
6847a. [RTA-ripng-1]ripng 1 enable
6848b. [RTA]ripng 1 enable
6849c. [RTA-GigabitEthernet0/0/0]ripng 1 enable
6850d. ripng 1 enable
6851Feedback
6852The correct answer is: [RTA-GigabitEthernet0/0/0]ripng 1 enable
6853Question 523
6854Incorrect
6855Mark 0 out of 1
6856 Not flaggedFlag question
6857Question text
6858Interface G0/0/1 on RTA contains a MAC address of 00e0-fc03-aa73 and is configured with the IPv6 address 2001::2E0:FCFF:FE03:AA73. Which method is most likely to have been used to configure the interface IPv6 address?
6859Select one:
6860a. Auto-link
6861b. ARP
6862c. DHCPv6
6863d. EUI-64
6864Feedback
6865The correct answer is: EUI-64
6866Question 524
6867Incorrect
6868Mark 0 out of 1
6869 Not flaggedFlag question
6870Question text
6871In a small network suppporting IPv6, a network administrator wishes implement RIPng. Which of the following commands should be used to enable this protocol?
6872Select one:
6873a. [RTA]ripng 1 enable
6874b. ripng 1 enable
6875c. [RTA-GigabitEthernet0/0/0]ripng 1 enable
6876d. [RTA-ripng-1]ripng 1 enable
6877Feedback
6878The correct answer is: [RTA-GigabitEthernet0/0/0]ripng 1 enable
6879Question 525
6880Correct
6881Mark 1 out of 1
6882 Not flaggedFlag question
6883Question text
6884In a network supporting IPv6, OSPF no longer supports which feature?
6885Select one:
6886a. authentication
6887b. multicast updates
6888c. multiple areas
6889d. Router-ID
6890Feedback
6891The correct answer is: authentication
6892Question 526
6893Incorrect
6894Mark 0 out of 1
6895 Not flaggedFlag question
6896Question text
6897Two routers are configured with OSPFv3. OSPFv3 is enabled on all interfaces of each router. Which of the following is true in the event that the network administrator does not configure a Router-ID?
6898Select one:
6899a. The IP address of interface G0/0/0 will be used as the router ID
6900b. The IP address of the loopback 1 interface will be used as the router ID
6901c. The IP address of the loopback 0 interface will be used as the router ID
6902d. No router ID will be assigned to the router.
6903Feedback
6904The correct answer is: No router ID will be assigned to the router.
6905Question 527
6906Incorrect
6907Mark 0 out of 1
6908 Not flaggedFlag question
6909Question text
6910A DHCP Unique Identifier (DUID) in DHCPv6 can be configured in VRP using which formats?
6911Select one or more:
6912a. DUID-EN
6913b. DUID-LLC
6914c. DUID-LLT
6915d. DUID-LL
6916Feedback
6917The correct answers are: DUID-LL, DUID-LLT
6918Question 528
6919Incorrect
6920Mark 0 out of 1
6921 Not flaggedFlag question
6922Question text
6923This type of firewall directly obtains the information such as source IP address, destination IP address, source TCP/UDP port, destination TCP/UDP port and protocol number in the packet header and filters the packets based on the defined policy. Which of the following is the firewall described above
6924Select one:
6925a. Proxy firewall
6926b. Link-layer firewall
6927c. Stateful firewall
6928d. Packet filtering firewall
6929Feedback
6930The correct answer is: Packet filtering firewall
6931Question 529
6932Correct
6933Mark 1 out of 1
6934 Not flaggedFlag question
6935Question text
6936(Single Choice) Which of the following protocols provides error report and send information about the IP datagram processing status back to the source?
6937Select one:
6938a. ICMP
6939b. IGMP
6940c. TCP
6941d. UDP
6942Feedback
6943The correct answer is: ICMP
6944Question 530
6945Incorrect
6946Mark 0 out of 1
6947 Not flaggedFlag question
6948Question text
6949(Single Choice) In which type of packet is an ICMP packet generally advertised during IP packet processing?
6950Select one:
6951a. Source IP address
6952b. Delay
6953c. Jitter
6954d. Error
6955Feedback
6956The correct answer is: Error
6957Question 531
6958Incorrect
6959Mark 0 out of 1
6960 Not flaggedFlag question
6961Question text
6962(Single Choice) Which of the following fields is used to check an ICMP packet?
6963Select one:
6964a. Code field in the ICMP packet
6965b. Header checksum field in an IP datagram
6966c. Checksum field in the ICMP packet
6967d. Type field in the ICMP packet
6968Feedback
6969The correct answer is: Checksum field in the ICMP packet
6970Question 532
6971Incorrect
6972Mark 0 out of 1
6973 Not flaggedFlag question
6974Question text
6975(Single Choice) The IP protocol is a kind of unreliable protocol and offers no error detection. To provide error detection, which of the following must the IP protocol work with?
6976Select one:
6977a. UDP
6978b. ARP
6979c. TCP
6980d. ICMP
6981Feedback
6982The correct answer is: TCP
6983Question 533
6984Partially correct
6985Mark 0 out of 1
6986 Not flaggedFlag question
6987Question text
6988(Multiple Choice) Which of the following applications use ICMP protocol?
6989Select one or more:
6990a. Ping
6991b. Tracert
6992c. Arp
6993d. Igmp
6994Feedback
6995The correct answers are: Ping, Tracert, Arp
6996Question 534
6997Incorrect
6998Mark 0 out of 1
6999 Not flaggedFlag question
7000Question text
7001(Single Choice) When certain fields in the header of a received datagram have incorrect values, this datagram is discarded and a certain ICMP packet is sent to the source. Which type of ICMP packet is sent to the source?
7002Select one:
7003a. Destination Unreachable packet
7004b. Redirect packet
7005c. Source Quench packet
7006d. Parameter Problem packet
7007Feedback
7008The correct answer is: Parameter Problem packet
7009Question 535
7010Incorrect
7011Mark 0 out of 1
7012 Not flaggedFlag question
7013Question text
7014(Single Choice) When certain fields in the header of a received datagram have incorrect values, this datagram is discarded and a certain ICMP packet is sent to the source. Which type of ICMP packet is sent to the source?
7015Select one:
7016a. Destination Unreachable packet
7017b. Parameter Problem packet
7018c. Redirect packet
7019d. Source Quench packet
7020Feedback
7021The correct answer is: Parameter Problem packet
7022Question 536
7023Incorrect
7024Mark 0 out of 1
7025 Not flaggedFlag question
7026Question text
7027(Single Choice) When a router or host discards data because of data congestion, which type of ICMP packet does the router or host send to the source?
7028Select one:
7029a. Parameter Problem packet
7030b. Redirect packet
7031c. Destination Unreachable packet
7032d. Source Quench packet
7033Feedback
7034The correct answer is: Source Quench packet
7035Question 537
7036Incorrect
7037Mark 0 out of 1
7038 Not flaggedFlag question
7039Question text
7040(Single Choice) Which of the following is the most common method used to check the connectivity between an IP network and a host, for example, the connectivity between routers and the connectivity between a router and a host?
7041Select one:
7042a. TFTP
7043b. PING
7044c. DNS
7045d. FTP
7046Feedback
7047The correct answer is: PING
7048Question 538
7049Correct
7050Mark 1 out of 1
7051 Not flaggedFlag question
7052Question text
7053(Single Choice) A series of packets are used in a Ping test to determine whether delay and packet loss occur in communication. Which of the following represents the packet used in a Ping test?
7054Select one:
7055a. ICMP
7056b. Telnet
7057c. FTP
7058d. Tracert
7059Feedback
7060The correct answer is: ICMP
7061Question 539
7062Incorrect
7063Mark 0 out of 1
7064 Not flaggedFlag question
7065Question text
7066(Multiple Choice) Which of the following protocols are not used in a Tracert process?
7067Select one or more:
7068a. ICMP
7069b. UDP
7070c. ARP
7071d. TCP
7072Feedback
7073The correct answers are: TCP, ARP
7074Question 540
7075Partially correct
7076Mark 0 out of 1
7077 Not flaggedFlag question
7078Question text
7079(Multiple Choice) Which of the following statements about Ping and Tracert are true?
7080Select one or more:
7081a. Ping can be used to specify the source IP address of a packet.
7082b. Both Ping and Tracert can be used to test network connectivity.
7083c. Ping is often used to obtain the path for forwarding a datagram.
7084d. Tracert can be used to determine a faulty point.
7085Feedback
7086The correct answers are: Both Ping and Tracert can be used to test network connectivity., Ping can be used to specify the source IP address of a packet., Tracert can be used to determine a faulty point.
7087Question 541
7088Incorrect
7089Mark 0 out of 1
7090 Not flaggedFlag question
7091Question text
7092(Single Choice) Which of the following protocols is a management protocol used at Network Layer to provide IP information service by embedding the protocol information in IP packets?
7093Select one:
7094a. 802.2
7095b. ICMP
7096c. ARP
7097d. IP
7098Feedback
7099The correct answer is: ICMP
7100Question 542
7101Correct
7102Mark 1 out of 1
7103 Not flaggedFlag question
7104Question text
7105(Single Choice) Which type of packet does a Ping application send?
7106Select one:
7107a. ICMP Request packet
7108b. TCP Reply packet
7109c. ICMP Reply packet
7110d. TCP Request packet
7111Feedback
7112The correct answer is: ICMP Request packet
7113Question 543
7114Incorrect
7115Mark 0 out of 1
7116 Not flaggedFlag question
7117Question text
7118(Single Choice) The Tracert application is usually used in data network commissioning. In this case, how many types of ICMP packets are involved in a Tracert application?
7119Select one:
7120a. 3
7121b. 4
7122c. 6
7123d. 2
7124Feedback
7125The correct answer is: 2
7126Question 544
7127Incorrect
7128Mark 0 out of 1
7129 Not flaggedFlag question
7130Question text
7131(Single Choice) Which of the following is the abbreviation for ICMP?
7132Select one:
7133a. Internal Control Mail Protocol
7134b. internet connection Message Protocol
7135c. Internet Control Message Protocol
7136d. Intranet Control Message Protocol
7137Feedback
7138The correct answer is: Internet Control Message Protocol
7139Question 545
7140Incorrect
7141Mark 0 out of 1
7142 Not flaggedFlag question
7143Question text
7144(Single Choice) The protocol number of ICMP is
7145Select one:
7146a. 6
7147b. 1
7148c. 17
7149d. 22
7150Feedback
7151The correct answer is: 1
7152Question 546
7153Incorrect
7154Mark 0 out of 1
7155 Not flaggedFlag question
7156Question text
7157(Single Choice) An RARP request packet is sent by means of broadcast. How is an RARP Reply packet sent to save network resources?
7158Select one:
7159a. Anycast
7160b. Broadcast
7161c. Multicast
7162d. Unicast
7163Feedback
7164The correct answer is: Unicast
7165Question 547
7166Incorrect
7167Mark 0 out of 1
7168 Not flaggedFlag question
7169Question text
7170(Single Choice) Which of the following operations can be used to verify the failure of installation or running of TCP/IP protocol?
7171Select one:
7172a. Ping 169.254.1.1
7173b. Ping 10.1.1.1
7174c. Ping 127.0.0.1
7175d. Ping 192.168.1.1
7176Feedback
7177The correct answer is: Ping 127.0.0.1
7178Question 548
7179Incorrect
7180Mark 0 out of 1
7181 Not flaggedFlag question
7182Question text
7183(Single Choice) Which of the following applications can be used to detect the path along which the data packets are transmitted from the source to the destination?
7184Select one:
7185a. Route
7186b. Tracert
7187c. Nestat
7188d. Send
7189Feedback
7190The correct answer is: Tracert
7191Question 549
7192Incorrect
7193Mark 0 out of 1
7194 Not flaggedFlag question
7195Question text
7196(Single Choice) Which bytes in an ICMP packet use a unified format and consist of the Type, Code, and Checksum fields?
7197Select one:
7198a. First 3 bytes
7199b. First 5 bytes
7200c. First 8 bytes
7201d. First 4 bytes
7202Feedback
7203The correct answer is: First 4 bytes
7204Question 550
7205Incorrect
7206Mark 0 out of 1
7207 Not flaggedFlag question
7208Question text
7209(Single Choice) Which of the following statements about the ICMP protocol is true?
7210Select one:
7211a. The ICMP protocol searches for IP addresses based on MAC addresses.
7212b. The ICMP protocol allocates and manages IP addresses in a network in a uniform manner.
7213c. The ICMP protocol monitors errors generated in datagram transmission.
7214d. The ICMP protocol translates the IP address of a public network into the IP address of a private network.
7215Feedback
7216The correct answer is: The ICMP protocol monitors errors generated in datagram transmission.
7217Question 551
7218Incorrect
7219Mark 0 out of 1
7220 Not flaggedFlag question
7221Question text
7222(Single Choice) The Advanced Research Projects Agency Network (ARPANET) network is created by United States Department of Defense and is the predecessor of the contemporary global. Which of the following is the basis of an ARPANET network?
7223Select one:
7224a. Low-speed serial connection
7225b. MPLS forwarding
7226c. Packet switching
7227d. Circuit switching
7228Feedback
7229The correct answer is: Packet switching
7230Question 552
7231Incorrect
7232Mark 0 out of 1
7233 Not flaggedFlag question
7234Question text
7235(Single Choice) What is the function of ARP?
7236Select one:
7237a. Map port number to IP address
7238b. Broadcast IP address
7239c. Map MAC address to IP address
7240d. Map IP address to Mac address
7241Feedback
7242The correct answer is: Map IP address to Mac address
7243Question 553
7244Incorrect
7245Mark 0 out of 1
7246 Not flaggedFlag question
7247Question text
7248(Single Choice) What is the function of RARP?
7249Select one:
7250a. Map destination IP address to MAC address
7251b. Map source MAC address to IP address
7252c. Map source IP address to MAC address
7253d. Map destination MAC address to IP address
7254Feedback
7255The correct answer is: Map source MAC address to IP address
7256Question 554
7257Correct
7258Mark 1 out of 1
7259 Not flaggedFlag question
7260Question text
7261(Single Choice) Which category does the ARP protocol belong to?
7262Select one:
7263a. Broadcast
7264b. Multicast
7265c. Unicast
7266d. Anycast
7267Feedback
7268The correct answer is: Broadcast
7269Question 555
7270Correct
7271Mark 1 out of 1
7272 Not flaggedFlag question
7273Question text
7274(Single Choice) Which of the following protocols provides connection oriented transmission service?
7275Select one:
7276a. TCP
7277b. IP
7278c. UDP
7279d. IPv6
7280Feedback
7281The correct answer is: TCP
7282Question 556
7283Incorrect
7284Mark 0 out of 1
7285 Not flaggedFlag question
7286Question text
7287(Single Choice) In the OSI reference model, one layer provides network services through applications in addition to communications between different applications. Which of the following layers
7288Select one:
7289a. Data Link Layer
7290b. Application Layer
7291c. Network Layer
7292d. Session Layer
7293Feedback
7294The correct answer is: Application Layer
7295Question 557
7296Incorrect
7297Mark 0 out of 1
7298 Not flaggedFlag question
7299Question text
7300(Single Choice) Similar to the OSI reference model, the TCP/IP model also contains several layers. How many layers does the TCP/IP model contain?
7301Select one:
7302a. Six
7303b. Four
7304c. Seven
7305d. Five
7306Feedback
7307The correct answer is: Four
7308Question 558
7309Partially correct
7310Mark 0 out of 1
7311 Not flaggedFlag question
7312Question text
7313(Multiple Choice) Which of the following are the functions of transport layer?
7314Select one or more:
7315a. Transmit data from one host to another host
7316b. Ensure ordered, reliable, and correct transmission
7317c. Establish end to end connection
7318d. Segment upper layer data
7319e. addressing
7320Feedback
7321The correct answers are: Segment upper layer data, Establish end to end connection, Transmit data from one host to another host, Ensure ordered, reliable, and correct transmission
7322Question 559
7323Correct
7324Mark 1 out of 1
7325 Not flaggedFlag question
7326Question text
7327(Single Choice) According to OSI reference model, when receiver can not process more data, which layer is responsible for sending stop message to the transmitter?
7328Select one:
7329a. Transport layer
7330b. Physical layer
7331c. Session layer
7332d. Presentation layer
7333Feedback
7334The correct answer is: Transport layer
7335Question 560
7336Correct
7337Mark 1 out of 1
7338 Not flaggedFlag question
7339Question text
7340(Single Choice) Which protocol does an application (such as SNMP or RADIUS) that focuses on transmission efficiency use at Transport Layer?
7341Select one:
7342a. UDP
7343b. HDLC
7344c. TCP
7345d. ICMP
7346Feedback
7347The correct answer is: UDP
7348Question 561
7349Incorrect
7350Mark 0 out of 1
7351 Not flaggedFlag question
7352Question text
7353(Single Choice) After a change occurs in a network topology, which of the following routes does not change automatically but changes only after the network administrator updates the change?
7354Select one:
7355a. BGP route
7356b. OSPF route
7357c. Static route
7358d. RIP route
7359Feedback
7360The correct answer is: Static route
7361Question 562
7362Incorrect
7363Mark 0 out of 1
7364 Not flaggedFlag question
7365Question text
7366(Single Choice) Which of the following protocols provides a reliability mechanism and can be used as a transport-level protocol?
7367Select one:
7368a. UDP
7369b. TCP
7370c. HDLC
7371d. ICMP
7372Feedback
7373The correct answer is: TCP
7374Question 563
7375Incorrect
7376Mark 0 out of 1
7377 Not flaggedFlag question
7378Question text
7379(Single Choice) Which of the following protocols is a transport-level protocol based on TCP, translates a domain name into an IP address, and manages domain names in a distributed manner?
7380Select one:
7381a. HTTP
7382b. DNS
7383c. UDP
7384d. TCP
7385Feedback
7386The correct answer is: DNS
7387Question 564
7388Correct
7389Mark 1 out of 1
7390 Not flaggedFlag question
7391Question text
7392(Single Choice) Which of the following protocols is used to transfer Web pages in the Internet?
7393Select one:
7394a. HTTP
7395b. UDP
7396c. DNS
7397d. TCP
7398Feedback
7399The correct answer is: HTTP
7400Question 565
7401Incorrect
7402Mark 0 out of 1
7403 Not flaggedFlag question
7404Question text
7405(Multiple Choice) Which protocols are defined by the TCP/IP model to transmit and receive mails?
7406Select one or more:
7407a. HTTP
7408b. SMTP
7409c. DNS
7410d. POP3
7411Feedback
7412The correct answers are: SMTP, POP3
7413Question 566
7414Correct
7415Mark 1 out of 1
7416 Not flaggedFlag question
7417Question text
7418(Single Choice) Which of the following protocols authenticates a user remotely, authorizes the user access, and performs charging?
7419Select one:
7420a. RADIUS
7421b. DNS
7422c. SMTP
7423d. HTTP
7424Feedback
7425The correct answer is: RADIUS
7426Question 567
7427Partially correct
7428Mark 1 out of 1
7429 Not flaggedFlag question
7430Question text
7431(Multiple Choice) Which of the following protocols reside at transport layer?
7432Select one or more:
7433a. TCP
7434b. SNMP
7435c. IP
7436d. UDP
7437Feedback
7438The correct answers are: TCP, UDP
7439Question 568
7440Partially correct
7441Mark 1 out of 1
7442 Not flaggedFlag question
7443Question text
7444(Multiple Choice) TCP is a connection oriented and reliable transport layer protocol. Which of the following are used to ensure the transmission reliability?
7445Select one or more:
7446a. Acknowledgement
7447b. Source quench messages
7448c. Retransmit
7449d. Buffering
7450Feedback
7451The correct answers are: Acknowledgement, Retransmit
7452Question 569
7453Incorrect
7454Mark 0 out of 1
7455 Not flaggedFlag question
7456Question text
7457(Single Choice) A TCP packet consists of a maximum of 60 bytes. How many bytes does a TCP packet header consist of after the Option field is deducted?
7458Select one:
7459a. 8
7460b. 40
7461c. 30
7462d. 20
7463Feedback
7464The correct answer is: 20
7465Question 570
7466Incorrect
7467Mark 0 out of 1
7468 Not flaggedFlag question
7469Question text
7470(Single Choice) The TCP protocol assigns a source port No. to each application. How many bytes does the source port No. in the TCP packet header consist of?
7471Select one:
7472a. 8
7473b. 4
7474c. 2
7475d. 1
7476Feedback
7477The correct answer is: 2
7478Question 571
7479Incorrect
7480Mark 0 out of 1
7481 Not flaggedFlag question
7482Question text
7483(Multiple Choice) Which of the following fields are contained in a TCP packet header?
7484Select one or more:
7485a. CRC32
7486b. Sequence Number
7487c. Source Port
7488d. Destination Port
7489Feedback
7490The correct answers are: Source Port, Destination Port, Sequence Number
7491Question 572
7492Incorrect
7493Mark 0 out of 1
7494 Not flaggedFlag question
7495Question text
7496(Single Choice) Which of the following ranges represents the size of a maximum transfer unit (MTU) packet?
7497Select one:
7498a. 64–1480
7499b. 60–1518
7500c. 60–1480
7501d. 64–1518
7502Feedback
7503The correct answer is: 64–1518
7504Question 573
7505Incorrect
7506Mark 0 out of 1
7507 Not flaggedFlag question
7508Question text
7509(Single Choice) The TTL field in an IP header specifies the number of routers that a datagram is allowed to traverse. After the datagram traverses a router, the TTL value is deducted by 1. When the TTL reaches a certain value, the datagram is discarded. Which of the following represents this value?
7510Select one:
7511a. Harddisk
7512b. Receiver
7513c. Message
7514d. Protocol
7515e. Sender
7516Feedback
7517The correct answer is: Sender
7518Question 574
7519Incorrect
7520Mark 0 out of 1
7521 Not flaggedFlag question
7522Question text
7523(Single Choice) Defragmentation can occur at either the original transmitter or an intermediate router. Where is an IP datagram is reassembled after it is defragmented?
7524Select one:
7525a. On an intermediate router
7526b. On the next router
7527c. In the process in which the packet is looped back
7528d. At the destination of the packet
7529Feedback
7530The correct answer is: At the destination of the packet
7531Question 575
7532Incorrect
7533Mark 0 out of 1
7534 Not flaggedFlag question
7535Question text
7536(Multiple Choice) Which of the following statements about TCP connection establishment are true?
7537Select one or more:
7538a. The three-way handshake cannot guarantee the security of data switching.
7539b. Three-way handshake can resolve the delay problem with packet data transmission.
7540c. The three-way handshake helps guarantee the reliability of data switching.
7541d. A TCP connection is established after three-way handshake is done.
7542Feedback
7543The correct answers are: A TCP connection is established after three-way handshake is done., The three-way handshake helps guarantee the reliability of data switching.
7544Question 576
7545Correct
7546Mark 1 out of 1
7547 Not flaggedFlag question
7548Question text
7549(Single Choice) Tracert is an application based on application layer, which transport layer protocol is used by Tracert?
7550Select one:
7551a. UDP
7552b. ICMP
7553c. TCP
7554d. ARP
7555Feedback
7556The correct answer is: UDP
7557Question 577
7558Correct
7559Mark 1 out of 1
7560 Not flaggedFlag question
7561Question text
7562(Single Choice) What is the main function of DNS?
7563Select one:
7564a. Domain Name Resolution
7565b. File Transfer
7566c. Mail Transfer
7567d. Remote Access
7568Feedback
7569The correct answer is: Domain Name Resolution
7570Question 578
7571Correct
7572Mark 1 out of 1
7573 Not flaggedFlag question
7574Question text
7575(Single Choice) What is the port number of DNS?
7576Select one:
7577a. 53
7578b. 23
7579c. 80
7580d. 21
7581Feedback
7582The correct answer is: 53
7583Question 579
7584Correct
7585Mark 1 out of 1
7586 Not flaggedFlag question
7587Question text
7588(Single Choice) Which of the following is the default TCP port number used by HTTP?
7589Select one:
7590a. 80
7591b. 8080
7592c. 25
7593d. 110
7594Feedback
7595The correct answer is: 80
7596Question 580
7597Incorrect
7598Mark 0 out of 1
7599 Not flaggedFlag question
7600Question text
7601(Single Choice) Which protocol does FTP use to provide reliable data transmission?
7602Select one:
7603a. RTP
7604b. UDP
7605c. SIP
7606d. TCP
7607Feedback
7608The correct answer is: TCP
7609Question 581
7610Incorrect
7611Mark 0 out of 1
7612 Not flaggedFlag question
7613Question text
7614(Single Choice) Which of the following protocols is used to send email on the internet?
7615Select one:
7616a. MSTP
7617b. FTP
7618c. TFTP
7619d. SMTP
7620Feedback
7621The correct answer is: SMTP
7622Question 582
7623Incorrect
7624Mark 0 out of 1
7625 Not flaggedFlag question
7626Question text
7627(Single Choice) Which TCP port number is used by SMTP by default to send e-mail message?
7628Select one:
7629a. 21
7630b. 53
7631c. 25
7632d. 23
7633Feedback
7634The correct answer is: 25
7635Question 583
7636Incorrect
7637Mark 0 out of 1
7638 Not flaggedFlag question
7639Question text
7640(Single Choice) POP (Post Office Protocol) is used for receiving E-mail. Which TCP port numbers does it use by default?
7641Select one:
7642a. 53
7643b. 21
7644c. 23
7645d. 110
7646Feedback
7647The correct answer is: 110
7648Question 584
7649Incorrect
7650Mark 0 out of 1
7651 Not flaggedFlag question
7652Question text
7653(Single Choice) Which of the following is the correct sequence about the data encapsulation process?
7654Select one:
7655a. Bit ->Segment ->Packet->Frame->Data
7656b. Data->Packet->Segment ->Frame->Bit
7657c. Data->Segment->Packet->Frame->Bit
7658d. Segment->Packet->Frame->Bit->Data
7659Feedback
7660The correct answer is: Data->Segment->Packet->Frame->Bit
7661Question 585
7662Incorrect
7663Mark 0 out of 1
7664 Not flaggedFlag question
7665Question text
7666(Single Choice) Which of the following is the function of session layer?
7667Select one:
7668a. Provide data transformation and data format
7669b. Provide encryption and decryption
7670c. Establish connection between hosts
7671d. Establish maintain and terminate session
7672Feedback
7673The correct answer is: Establish maintain and terminate session
7674Question 586
7675Incorrect
7676Mark 0 out of 1
7677 Not flaggedFlag question
7678Question text
7679(Single Choice) Compared with OSI reference model, which of the following is not defined in TCP/IP protocol stack?
7680Select one:
7681a. Transport layer and session layer
7682b. Session layer and presentation layer
7683c. Data link layer and network layer
7684d. Network layer and transport layer
7685Feedback
7686The correct answer is: Session layer and presentation layer
7687Question 587
7688Incorrect
7689Mark 0 out of 1
7690 Not flaggedFlag question
7691Question text
7692(Single Choice) RPC, NFS and SQL protocols reside at the ( ) of the OSI reference model.
7693Select one:
7694a. Network layer
7695b. Presentation layer
7696c. Transport layer
7697d. Session layer
7698Feedback
7699The correct answer is: Session layer
7700Question 588
7701Incorrect
7702Mark 0 out of 1
7703 Not flaggedFlag question
7704Question text
7705(Multiple Choice) According to OSI reference model, which of the following functions belong to presentation layer?
7706Select one or more:
7707a. Session control
7708b. Data encryption
7709c. Data compression
7710d. Data format transformation
7711Feedback
7712The correct answers are: Data encryption, Data compression, Data format transformation
7713Question 589
7714Incorrect
7715Mark 0 out of 1
7716 Not flaggedFlag question
7717Question text
7718(Single Choice) In the OSI reference model, one layer processes requests and responses initiated by applications of different devices. Which of the following layers stands for this layer?
7719Select one:
7720a. Network Layer
7721b. Data Link Layer
7722c. Application Layer
7723d. Session Layer
7724Feedback
7725The correct answer is: Session Layer
7726Question 590
7727Incorrect
7728Mark 0 out of 1
7729 Not flaggedFlag question
7730Question text
7731(Multiple Choice) Which of the following products use the VRP platform as the core engine of their software?
7732Select one or more:
7733a. LTE
7734b. Router
7735c. Service gateway
7736d. Ethernet switch
7737Feedback
7738The correct answers are: Router, Ethernet switch, Service gateway
7739Question 591
7740Incorrect
7741Mark 0 out of 1
7742 Not flaggedFlag question
7743Question text
7744(Multiple Choice) What functions does VRP provide?
7745Select one or more:
7746a. Blocks communication between a forwarding plane and the VRP control plane.
7747b. Provides a unified user interface and a unified management window.
7748c. Defines interfaces of a forwarding plane.
7749d. Provides the functions of a control plane.
7750Feedback
7751The correct answers are: Provides a unified user interface and a unified management window., Provides the functions of a control plane., Defines interfaces of a forwarding plane.
7752Question 592
7753Incorrect
7754Mark 0 out of 1
7755 Not flaggedFlag question
7756Question text
7757(Single Choice) Which component of the VRP platform provides user authentication charging and user policy management?
7758Select one:
7759a. System management plane
7760b. None of the choices
7761c. Service control plane
7762d. Versatile control plane
7763Feedback
7764The correct answer is: Service control plane
7765Question 593
7766Partially correct
7767Mark 0 out of 1
7768 Not flaggedFlag question
7769Question text
7770(Multiple Choice) Which of the following methods can be used to upgrade the VRP software?
7771Select one or more:
7772a. X-modem
7773b. WEB
7774c. FTP
7775d. TFTP
7776Feedback
7777The correct answers are: FTP, TFTP, X-modem
7778Question 594
7779Partially correct
7780Mark 0 out of 1
7781 Not flaggedFlag question
7782Question text
7783(Multiple Choice) Which of the following protocols can be used to upgrade VRP?
7784Select one or more:
7785a. XMODEM
7786b. TELNET
7787c. FTP
7788d. TFTP
7789Feedback
7790The correct answers are: FTP, TFTP, XMODEM
7791Question 595
7792Incorrect
7793Mark 0 out of 1
7794 Not flaggedFlag question
7795Question text
7796(Single Choice) Which of the following is abbreviation of VRP?
7797Select one:
7798a. Virtual Routing Platform
7799b. Virtual Routing Plane
7800c. Versatile Routine Platform
7801d. Versatile Routing Platform
7802Feedback
7803The correct answer is: Versatile Routing Platform
7804Question 596
7805Correct
7806Mark 1 out of 1
7807 Not flaggedFlag question
7808Question text
7809The operation deleting the configuration files saved in the storage devices will become effective after rebooting the router.
7810Select one:
7811True
7812False
7813Feedback
7814The correct answer is 'True'.
7815Question 597
7816Correct
7817Mark 1 out of 1
7818 Not flaggedFlag question
7819Question text
7820VRP uses a component-based system architecture. It provides various functions and features in addition to application-based scalability and customization.
7821Select one:
7822True
7823False
7824Feedback
7825The correct answer is 'True'.
7826Question 598
7827Incorrect
7828Mark 0 out of 1
7829 Not flaggedFlag question
7830Question text
7831Root bridges provide root ports and designated ports.
7832Select one:
7833True
7834False
7835Feedback
7836The correct answer is 'False'.
7837Question 599
7838Correct
7839Mark 1 out of 1
7840 Not flaggedFlag question
7841Question text
7842There may be “multiple” paths between a non-root bridge and a root bridge. Each of the paths has its own total cost, which is the sum of the port costs of all egress ports on the path.
7843Select one:
7844True
7845False
7846Feedback
7847The correct answer is 'True'.
7848Question 600
7849Correct
7850Mark 1 out of 1
7851 Not flaggedFlag question
7852Question text
7853Each router forwards only the packets received by the local station through the optimal path. The packet is forwarded by different routers on the path in a relay mode.
7854Select one:
7855True
7856False
7857Feedback
7858The correct answer is 'True'.
7859Question 601
7860Correct
7861Mark 1 out of 1
7862 Not flaggedFlag question
7863Question text
7864If the optimal path to the destination IP address is unavailable after a change occurs in a network topology, the dynamic routing protocol can make adaptation to this change and determine another optimal path to the destination IP address.
7865Select one:
7866True
7867False
7868Feedback
7869The correct answer is 'True'.
7870Question 602
7871Incorrect
7872Mark 0 out of 1
7873 Not flaggedFlag question
7874Question text
7875After a fault occurs in a network, a static route can be rectified automatically and the network administrator does not need to reconfigure it.
7876Select one:
7877True
7878False
7879Feedback
7880The correct answer is 'False'.
7881Question 603
7882Incorrect
7883Mark 0 out of 1
7884 Not flaggedFlag question
7885Question text
7886A static route can be either configured manually by a network administrator or generated automatically.
7887Select one:
7888True
7889False
7890Feedback
7891The correct answer is 'False'.
7892Question 604
7893Incorrect
7894Mark 0 out of 1
7895 Not flaggedFlag question
7896Question text
7897Routing Information Protocol (RIP) is available in the RIPv1, RIPv2, and RIPv3 versions.
7898Select one:
7899True
7900False
7901Feedback
7902The correct answer is 'False'.
7903Question 605
7904Correct
7905Mark 1 out of 1
7906 Not flaggedFlag question
7907Question text
7908OSPF can generate a loop-free shortest route tree by using a routing protocol algorithm. Thus, the OSPF routing protocol has no loop problem.
7909Select one:
7910True
7911False
7912Feedback
7913The correct answer is 'True'.
7914Question 606
7915Incorrect
7916Mark 0 out of 1
7917 Not flaggedFlag question
7918Question text
7919In broadcast network of OSPF protocol, any two DR Others will neither exchange routing information nor send Hello packet to each other due to the existence of DR.
7920Select one:
7921True
7922False
7923Feedback
7924The correct answer is 'False'.
7925Question 607
7926Correct
7927Mark 1 out of 1
7928 Not flaggedFlag question
7929Question text
7930An OSPF router can belong to two or more areas but can be the ABR for a “single” area only.
7931Select one:
7932True
7933False
7934Feedback
7935The correct answer is 'True'.
7936Question 608
7937Correct
7938Mark 1 out of 1
7939 Not flaggedFlag question
7940Question text
7941After receiving a data frame from any port, a hub forwards it to any other port.
7942Select one:
7943True
7944False
7945Feedback
7946The correct answer is 'True'.
7947Question 609
7948Correct
7949Mark 1 out of 1
7950 Not flaggedFlag question
7951Question text
7952TFTP can control a TFTP user according to the user name and password.
7953Select one:
7954True
7955False
7956Feedback
7957The correct answer is 'True'.
7958Question 610
7959Incorrect
7960Mark 0 out of 1
7961 Not flaggedFlag question
7962Question text
7963A Trunk port always sends tagged frames to the peer equipment.
7964Select one:
7965True
7966False
7967Feedback
7968The correct answer is 'False'.
7969Question 611
7970Incorrect
7971Mark 0 out of 1
7972 Not flaggedFlag question
7973Question text
7974HDLC is ISO standard link layer protocol and it is used to encapsulate data transmitted on asynchronous link.
7975Select one:
7976True
7977False
7978Feedback
7979The correct answer is 'False'.
7980Question 612
7981Correct
7982Mark 1 out of 1
7983 Not flaggedFlag question
7984Question text
7985In the PPP protocol, CHAP authentication involves exchange of three types of packets at different times, namely, Challenge, Response, and Success/Failure packets.
7986Select one:
7987True
7988False
7989Feedback
7990The correct answer is 'True'.
7991Question 613
7992Correct
7993Mark 1 out of 1
7994 Not flaggedFlag question
7995Question text
7996In the PPP protocol, CHAP authentication involves exchange of three types of packets at different times, namely, Challenge, Response, and Success/Failure packets.
7997Select one:
7998True
7999False
8000Feedback
8001The correct answer is 'True'.
8002Question 614
8003Correct
8004Mark 1 out of 1
8005 Not flaggedFlag question
8006Question text
8007The PPP protocol provides a standard method of transmitting datagrams of different protocols on a point-to-point link. It is a point-to-point communication protocol widely used at the present time.
8008Select one:
8009True
8010False
8011Feedback
8012The correct answer is 'True'.
8013Question 615
8014Correct
8015Mark 1 out of 1
8016 Not flaggedFlag question
8017Question text
8018In the PPP protocol, CHAP authentication involves exchange of three types of packets at different times. To match the Request packet with a Reply packet, each packet contains an Identifier field. In each authentication process, all the packets use the same Identifier information.
8019Select one:
8020True
8021False
8022Feedback
8023The correct answer is 'True'.
8024Question 616
8025Incorrect
8026Mark 0 out of 1
8027 Not flaggedFlag question
8028Question text
8029RTA connects with RTB through interface Serial0. The configuration on RTA is as follow:
8030[RTA]aaa
8031[RTA-aaa]local-user huawei password simple quidway
8032[RTA-aaa]local-user huawei service-type ppp
8033[RTA]interface Serial 0
8034[RTA-Serial0]link-protocol ppp
8035[RTA-Serial0]ppp authentication-mode pap
8036[RTA-Serial0]ip address 10.1.1.1 30
8037The configuration on RTB is as follow:
8038[RTB]interface Serial 0
8039[RTB-Serial0]link-protocol ppp
8040[RTB-Serial0]ppp pap local-user huawei password simple hello
8041[RTB-Serial0]ip address 10.1.1.2 30
8042With the configuration above, RTA and RTB are able to communicate with each other.
8043Select one:
8044True
8045False
8046Feedback
8047The correct answer is 'False'.
8048Question 617
8049Correct
8050Mark 1 out of 1
8051 Not flaggedFlag question
8052Question text
8053One of the significant features of the PPP protocol is the authentication function. With this function, the two ends of a link can negotiate with each other to use which authentication protocol and then perform authentication. A PPP connection is established only when the authentication is successful.
8054Select one:
8055True
8056False
8057Feedback
8058The correct answer is 'True'.
8059Question 618
8060Correct
8061Mark 1 out of 1
8062 Not flaggedFlag question
8063Question text
8064HDLC is a type of bit stream-oriented protocol used at Data Link Layer and it can transparently transmit data consisting of different collections of characters.
8065Select one:
8066True
8067False
8068Feedback
8069The correct answer is 'True'.
8070Question 619
8071Correct
8072Mark 1 out of 1
8073 Not flaggedFlag question
8074Question text
8075RTA connects with RTB through interface Serial0. The configuration on RTA is as follow:
8076[RTA]aaa
8077[RTA-aaa]local-user huawei password cipher hello
8078[RTA-aaa]local-user huawei service-type ppp
8079[RTA]interface Serial 0
8080[RTA-Serial0]link-protocol ppp
8081[RTA-Serial0]ppp authentication-mode chap
8082[RTA-Serial0]ip address 10.1.1.1 30
8083The configuration on RTB is as follow:
8084[RTB]interface Serial 0
8085[RTB-Serial0]link-protocol ppp
8086[RTB-Serial0]ppp chap user huawei
8087[RTB-Serial0]ppp chap password cipher hello
8088[RTB-Serial0]ip address 10.1.1.2 30
8089With the configuration above, RTA and RTB are able to communicate with each other.
8090Select one:
8091True
8092False
8093Feedback
8094The correct answer is 'True'.
8095Question 620
8096Incorrect
8097Mark 0 out of 1
8098 Not flaggedFlag question
8099Question text
8100In the PPP protocol, the dynamic negotiation is the same as the static negotiation in the IPCP flow. That is, in either dynamic or static negotiation, allocation of IP addresses is completed after one Config-Request dialog.
8101Select one:
8102True
8103False
8104Feedback
8105The correct answer is 'False'.
8106Question 621
8107Correct
8108Mark 1 out of 1
8109 Not flaggedFlag question
8110Question text
8111All the protocols in the standard HDLC protocol suite run on synchronous serial line.
8112Select one:
8113True
8114False
8115Feedback
8116The correct answer is 'True'.
8117Question 622
8118Correct
8119Mark 1 out of 1
8120 Not flaggedFlag question
8121Question text
8122In data communications, the data format must be determined and agreed by the information creator and the information receiver before the data is transmitted.
8123Select one:
8124True
8125False
8126Feedback
8127The correct answer is 'True'.
8128Question 623
8129Incorrect
8130Mark 0 out of 1
8131 Not flaggedFlag question
8132Question text
8133The bus and star topologies, which are frequently used in a LAN, refer to the physical connection types rather than the logical structure of the network.
8134Select one:
8135True
8136False
8137Feedback
8138The correct answer is 'False'.
8139Question 624
8140Incorrect
8141Mark 0 out of 1
8142 Not flaggedFlag question
8143Question text
8144Regardless of multicast or unicast, an L2 switch establishes its MAC address table entries by means of MAC address learning.
8145Select one:
8146True
8147False
8148Feedback
8149The correct answer is 'False'.
8150Question 625
8151Correct
8152Mark 1 out of 1
8153 Not flaggedFlag question
8154Question text
8155On a port running frame relay, an MAP table corresponds to a logical port. Different logical ports have different MAP tables.
8156Select one:
8157True
8158False
8159Feedback
8160The correct answer is 'True'.
8161Question 626
8162Correct
8163Mark 1 out of 1
8164 Not flaggedFlag question
8165Question text
8166The default format for encapsulating a frame relay protocol is IETF.
8167Select one:
8168True
8169False
8170Feedback
8171The correct answer is 'True'.
8172Question 627
8173Correct
8174Mark 1 out of 1
8175 Not flaggedFlag question
8176Question text
8177When you configure Frame Relay on Quidway routers, you can configure Inverse ARP instead of static address mapping because the function of Inverse ARP is to provide dynamic address mapping.
8178Select one:
8179True
8180False
8181Feedback
8182The correct answer is 'True'.
8183Question 628
8184Incorrect
8185Mark 0 out of 1
8186 Not flaggedFlag question
8187Question text
8188Frame relay point-to-multipoint sub-port can connect “multiple” remote nodes together through a PVC.
8189Select one:
8190True
8191False
8192Feedback
8193The correct answer is 'False'.
8194Question 629
8195Incorrect
8196Mark 0 out of 1
8197 Not flaggedFlag question
8198Question text
8199The 10.1.1.2 IP address in the returned result of the frame relay command represents the IP address of the local device.
8200[RTA\]dis fr map-info
8201Map Statistics for interface Serial0 (DTE)
8202DLCI = 100, IP INARP 10.1.1.2, Serial0
8203create time = 2007/06/04 17:34:59, status = ACTIVE
8204encapsulation = ietf, vlink = 20, broadcast
8205Select one:
8206True
8207False
8208Feedback
8209The correct answer is 'False'.
8210Question 630
8211Correct
8212Mark 1 out of 1
8213 Not flaggedFlag question
8214Question text
8215In the PPP protocol, CHAP authentication involves exchange of three types of packets at different times. To match the Request packet with a Reply packet, each packet contains an Identifier field. In each authentication process, all the packets use the same Identifier information.
8216Select one:
8217True
8218False
8219Feedback
8220The correct answer is 'True'.
8221Question 631
8222Correct
8223Mark 1 out of 1
8224 Not flaggedFlag question
8225Question text
8226One of the significant features of the PPP protocol is the authentication function. With this function, the two ends of a link can negotiate with each other to use which authentication protocol and then perform authentication. A PPP connection is established only when the authentication is successful.
8227Select one:
8228True
8229False
8230Feedback
8231The correct answer is 'True'.
8232Question 632
8233Incorrect
8234Mark 0 out of 1
8235 Not flaggedFlag question
8236Question text
8237In the PPP protocol, the dynamic negotiation is the same as the static negotiation in the IPCP flow. That is, in either dynamic or static negotiation, allocation of IP addresses is completed after one Config-Request dialog.
8238Select one:
8239True
8240False
8241Feedback
8242The correct answer is 'False'.
8243Question 633
8244Correct
8245Mark 1 out of 1
8246 Not flaggedFlag question
8247Question text
8248IP addresses are layer-specific. A Layer 3 network device does not necessarily store the IP address of every host; instead, it stores the IP address of each network segment. This reduces the entries in a routing table to a great extent while improving routing flexibility.
8249Select one:
8250True
8251False
8252Feedback
8253The correct answer is 'True'.
8254Question 634
8255Correct
8256Mark 1 out of 1
8257 Not flaggedFlag question
8258Question text
8259The ICMP protocol (RFC792) is not applied to Application Layer but Network Layer.
8260Select one:
8261True
8262False
8263Feedback
8264The correct answer is 'True'.
8265Question 635
8266Correct
8267Mark 1 out of 1
8268 Not flaggedFlag question
8269Question text
8270In data communications, the data format must be determined and agreed by the information creator and the information receiver before the data is transmitted.
8271Select one:
8272True
8273False
8274Feedback
8275The correct answer is 'True'.
8276Question 636
8277Correct
8278Mark 1 out of 1
8279 Not flaggedFlag question
8280Question text
8281VRP uses a component-based system architecture. It provides various functions and features in addition to application-based scalability and customization.
8282Select one:
8283True
8284False
8285Feedback
8286The correct answer is 'True'.
8287Question 637
8288Incorrect
8289Mark 0 out of 1
8290 Not flaggedFlag question
8291Question text
8292When VRP platform is configured as TFTP client, it can transmit files in binary mode and ASCII mode.
8293Select one:
8294True
8295False
8296Feedback
8297The correct answer is 'False'.