Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONH12-811 DATACOM V1.0

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
H12-811 DATACOM V1.0

Description:
exam test ABCD

Author:
AVATAR

Creation Date:
10/03/2024

Category:
Others

Number of questions: 150
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
When the Trunk port send the data frame, how to deal with? When the VLAN ID is the same as the PVID of the port and is a VLAN ID allowed by the port, remove the Tag and send the message When the VLAN ID is different from the PVID of the port, the data frame is dropped When the VLAN ID is different from the PVID of the port, replace it with PVID forwarding When the VLAN ID is different from the PVID of the port, strip off the TAG and forward.
How many bits are there in the VLAN ID in the VLAN format defined by IEEE802.1Q? 12 6 10 8.
In the network shown in the figure below, the output information of switch A is shown in the figure. Then in the MAC address table of switch A, which interface does the MAC address of host B correspond to? GigabitEthernet 0/0/3 GigabitEthernet0/0/2 Eth-Trunk 1 GigabitEthernet0/0/1 .
In the configuration BPDU sent by the switch, which bridge ID is unlikely to appear? 8192 00-01-02-03-04-CC 4096 00-01-02-03-04-CC 0 00-01-02-03-04-CC 2048 00-01-02-03-04-CC.
The number of VLANs that can be created using the commands "vlan batch 10 20" and "vlan batch 10 to 20" respectively is 11 and 11 11 and 2 2 and 2 2 and 11.
The administrator wants all hosts to be unable to access the Internet between 8:00-17:00 every day, so which ACL rule needs to be bound to the traffic-filter outbound in the GO/0/1 interface allocation? time-range am9topm5 08:00 to working-day Acl number 2003 rule 5 deny time-range am9topjni5 time-range am9topm5 08:00 to 17:00 off-day # acl number 2004 rule 5 permit time-range time-range am9topm5 08:00 to 17:00 daily acl number 2001 rule 5 deny time-range am9topm5 time-range am9topm5 07:00 to 18:00 daily Acl number 2002.
As shown in the figure below, the wrong statement is: acl number 2000] rule 5 deny source 200.0.12.00.0.0.7 rule 10permit source200.0.12.00.0.0.15 # interface GigabitEthernetO/0/1 traffic-filteroutbound acl2000 The host whose source IP address is 200.0.12.4 cannot access the Internet The host whose source IP address is 200.0.12.2 cannot access the Internet The host whose source IP address is 200.0.12.8 cannot access the Internet The host whose source IP address is 200.0.12.6 cannot access the Internet.
What percentage does the DHCP client expect to send the lease renewal message for the first time? 0.5 0.875 1 0.25.
After the administrator successfully logs in to the router through Telnet, and finds that the router's interface IP address cannot be allocated, the possible reasons are () The Telnet user level is incorrectly configured SNMP parameter is incorrectly configured The Telnet user authentication mode is incorrectly configured The administrator uses the telnet terminal software to prohibit the corresponding operation .
What is the maximum negotiation rate supported by the IEEE 802.llg standard? 300Mbps 150Mbps 54Kbps 1200Mbps .
Which of the following SNMP packets are sent to the NMS by the Agent on the managed device? Set-Request Get-Request Get-Next-Request Response.
Which field is added to the IPv6 packet header than the IPv4 packet header? Destination Address Flow Label Version Source Address.
In the network shown in the figure below, the router receives a data packet with a destination IP address of 11.0.12.1 from host A. After this data packet is forwarded by the router, what are the destination MAC and destination IP? MAC-C, 11.0.12.1 MAC-D, 10.0.12.2 MAC-D, 11.0.12.1 MAC-B, 11.0.12.1.
In the network shown in the figure below, assuming that all routers enable the OSPF protocol at the same time, which router is the BDR in this network? Router D Router B Router C Router A.
There are multiple route entries to the same destination network in the routing table. These routes are called: Sub-optimal routing Multi-path routing Default route Equal cost routing.
Which of the following cannot be the length of the IPv4 packet header? 32B 60B 20B 64B .
In the network shown in the figure below, all links are Ethernet links, and all interfaces of all routers run OSPF protocol, how many DRs are elected in the entire network? 4 1 3 2.
In the network shown in the figure below, if Router A and Router B's loopback 0 communicate through static routing, which command needs to be entered on Router A? ip route-static 10.0.2.2 0 GigabitEthernet 0/0/0 ip route-static 10.0.2.2 32 GigabitEthernet 0/0/0 ip route-static 10.0.2.2 255.255.255.255 10.0.12.1 ip route-static 10.0.2.2 255.255.255.255 10.0.12.2 .
What is the priority value of the direct route entry? 0 30 10 20.
As shown in the figure, if host A and host B want to achieve inter-VLAN communication through single-arm routing, which configuration should be done under the G0/0/1.1 interface of RTA? dot1q termination vid 30 dot1q termination vid 20 dot1q termination vid 10 dot1q termination vid 40.
As shown in the figure, the correct description of this network topology is (). There are 6 collision domains in this network There are 2 broadcast domains in this network There are 6 broadcast domains in this network There are 12 conflict domains in this network .
The network administrator created VLAN 10 on the Layer 3 switch and configured an IP address under the virtual interface of the VLAN. When the command "display ip interface brief" is used to check the port status, it is found that the VLANIF 10 interface is in the down state. What should be done to restore the VLANIF 10 interface to normal? Add an interface that must be Up and must be of type Trunk into VLAN 10 Assign any physical interface to VLAN 10 Assign a physical interface that must be Up to VLAN 10 Use the command "undo shutdown" under VLANIF 10 interface .
As shown in the figure below, suppose the MAC address table of SWA is as follows. Now host A sends a data frame with the destination MAC address MAC-B. Which of the following statements is correct? Forward this data frame only from port G0/0/2 Forward this data frame only from port G0/0/3 STA discards the data frame Flood this data frame.
Which of the following does not be included in AAA? Authentication Accounting Authorization Audit.
Which of the following statements about Prefix Segment is wrong? Prefix Segment spreads to other network elements through the IGP protocol, which is globally visible and effective Prefix Segment needs to be configured manually Prefix Segment is used to identify a destination address prefix in the network (Prefix) Prefix Segment can be automatically allocated by IGP.
In the OSI reference model, what can complete end-to-end error detection and flow control? Physical layer Network layer Transport layer Data link layer.
In the network shown in the figure below, all routers run OSPF protocol. Above the link is the value of the Cost value, then the path for RTA to reach the network 10.0.0.0/8 is: A-B-D RTA cannot reach 10.0.0.0/8 A-C-D A-D.
Which of the following statement about static routing in Huawei equipment is wrong? The cost value (Cost) of the static route cannot be modified. The default value of the static route priority is 60 The range of the static route priority value is 1-255 When the priority of the static route is 0, the route will definitely be preferred.
Which of the following statements is correct? The router works at the physical layer The switch works at the physical layer The switch works at the network layer The router works at the network layer .
Which of the following description about the Layer 2 Ethernet switch is incorrect? It is necessary to make certain modifications to the layer 3 header of the forwarded message, and then forward it Able to learn MAC address Forward according to the Layer 2 header information of the Ethernet frame Layer 2 Ethernet switches work at the data link layer .
As shown in the information in the figure, when learning this switch needs to forward the frame with the destination MAC address of 5489-98ec-f011, which of the following description is correct? The switch will flood the frame on all ports except the port that received the frame The switch will send a message that the destination is unreachable to the source device The switch does not find a matching entry in the MAC address table, so it will discard the frame The switch needs to send a request to discover the device with the MAC address of 5489 98ec-f011.
What is the range of VLAN ID that users can use? 1-4096 1-4094 0-4096 0-4095.
By default, in the SNMP protocol, which port number does the agent process use to send alarm messages to NS? 164 163 162 161.
What is the port number used by the FTP protocol control plane? 23 24 21 22.
After the link authentication is completed, the STA will continue to initiate link service negotiation. Which of the following messages is used to achieve the specific negotiation? Join Handshake Association Negotiate.
What is the IEEE802.11 standard corresponding to Wi-F16? 802.11au 802.11ax 802.11at 802.11ac.
Which of the following statements about Adjacency Segment is wrong? Adjacency Segment is identified by Adjacency Segment ID (SID) Adjacency Segment spreads to other network elements through IGP protocol, which is visible globally and effective locally Adjacency Segment must be configured manually Adjacency Segment is used to identify an adjacency of a node in the network .
If during the PPP authentication process, the authenticatee sends the wrong user name and password to the authenticator, what type of message will the authenticator send to the authenticatee? Authenticate-Reject Authenticate-Ack Authenticate-Nak Authenticate-Reply.
Which version of the SNMP protocol below supports encryption features? SNMPv3 SNMPv2c SNMPv1 SNMPv2.
Which of the following statements about direct routing is correct? Direct routing requires the administrator to manually configure the destination network and the next-hop address Direct route has lower priority than static route Direct route priority is lower than dynamic route Direct routing has the highest priority.
Which of the following is not the reason for RSTP improving the convergence speed? Introduction of edge ports Fast switching of the root port P/A mechanism Forward Delay canceled.
The MAC address table of the existing switch is shown in the figure. Which of the following statements are correct? When the switch restarts, the MAC address learned by port Eth0/0/2 does not need to be relearned When the switch restarts, the MAC address learned by port Eth0/0/3 needs to be learned again The data frame with the source MAC address of 5489-9811-0b49 and the destination MAC address of 5489-9894-1d30 received from the port is forwarded from the Eth0/0/2 port The data frame with the source MAC address of 5489-9885-18a8 and the destination MAC address of 5489-989d-1d30 received from the port is forwarded from the Eth0/0/1 port .
The MAC address table of a certain switch is shown in the figure. If the switch receives a data frame with a destination MIAC of 5489-9885-18a8 from port Eth0/0/2, which of the following statements is correct? Forward this data frame from Eth0/0/1 port Flood this data frame Discard this data frame Forward this data frame from the Eth0/0/2 port.
The switch GO/0/1 port configuration information is shown in the figure. Which VLAN data frame does the switch forward without VLAN TAG? # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 10 port trunk allow-pass vlan 10 20 3040 # 10 30 20 40.
When the Access type port sends a message, it will (). Send messages with tag Strip the VLAN information of the message, and then send it out Type the PVID information of this port, and then send it out Add the ZLAN message of the message, and then send it out.
The configuration information of a certain port of the switch is shown in the figure, then this port carries VLAN TAG when sending data frames carrying which VLAN? interface GigabitEtherneto/0/1 port hybrid tagged vlan 2 to 3 100 port hybrid untagged vlan 4 6 # 1,2.3,100 2.3.100 1.2.3.4.6,100 2.3.4.6,100 .
What is the value of the Type field in the RStp configuration BPDU message? A. B. C. D. Ox01 0x00 0x02 0x03.
The Priority field in the VLAN tag can identify the priority of the data frame. What is the range of this priority? 0-15 0-63 0-3 0-7.
What elements can NAPT convert? Only MAC address IP address + port number MAC address + port number Only IP address.
As shown in the figure, there is a web server in the private network that needs to provide HITRP services to public network users. Therefore, the network administrator needs to configure NAT on the gateway router RTA to achieve the requirements. Which of the following configuration can meet the requirement? RTA-Gigabitethernet0/0/1]nat server protocol tcp global 192.168.1.1 www inside 202.10.10.18080 [RTA-Seria11/0/1]nat server protocol tcp global 192.168.1.1 www inside 202.10.10.1 8080 [RTA-Gigabitethernet0/0/1]nat server protocol tcp global 202.10.10.1 www inside 192.168.1.18080 [RTA-Serial1/0/1]nat server protocol tcp global 202.10.10.1 www inside 192.168.1.1 8080.
A network engineer prompts the following information when entering the command line: Error: Unrecognized command found at ‘^’position. Which of the prompt information is correct? The input command is incomplete Wrong parameter type No keyword found Input command is not clear.
<huawei>system-view [huawei]command-privilege level 3 view user save The correct statement about the above configuration command is: Modify the user's authority level to 3, and save the configuration Modify the permission level of the user view command to 3, and save the configuration Modify the authority level of the save command used by a user to 3 Modify the permission level of the save command in the user view to 3.
Which of the following descriptions about the switch is wrong? The switch can complete the exchange of data frames The switch can provide network access services for terminal equipment (PC. Server) Switches generally work at the data link layer Switches are generally used as network export equipment.
Which of the following descriptions about firewalls is wrong? Firewall can realize user identity authentication Firewall can realize access control between different networks Firewall can isolate networks with different security levels The firewall cannot achieve network address translation.
What kind of message does the OSPF protocol use to discover and maintain neighbor relationships? DD LSR LSU HELLO.
On the VRP platform, the default protocol priority of routes in the direct routing, static routing, RIP, OSPF area is: Direct routing,OSPF,Static routing,RIP Direct routing,Static routing,RIP,OSPF Direct routing,RIP,Static routing,OSPF Direct routing,OSPF,RIP,Static routing .
On Huawei routers, what is the default value of the OSPF protocol internal routing priority? 20 10 30 0.
As shown in the figure below, which of the following statements are correct? Host A can ping host B Host A and Host B cannot obtain each other's MAC address The following entry 10.0.12.5 MAC-B exists in the ARP cache of host A The broadcast address of host A and host B are the same.
When Huawei switches allow STP, the priority of the switch is by default: 32768 8192 16384 4096 .
As shown in the figure, the switch runs STP with default parameters, which of the following ports will be elected as the designated port? G0/0/1 port of switch A Port G0/0/2 of switch A HUB's G0/0/1 port HUB's G0/0/2 port .
What is the Solicited-node multicast address corresponding to IPv6 address 2019:: 8:AB? FF02::1::FF08:AB FF02::FF08 :AB FF02::1::FF20:19 FF02::1::FE08 :AB.
For the description of the PPP link establishment process, which of the following statement is wrong? In the Establish phase, the PPP link performs LCP parameter negotiation. The negotiation content includes the maximum receiving unit MRU, authentication method, magic word and other options. After the NCP negotiation is successful, the PPP link will maintain the communication state and enter the Terminate phase. The Dead phase is also called the physical layer unavailable phase. When the two ends of the communication detect that the physical line is activated, they will migrate from the Dead phase to the Establish phase, which is the link establishment phase. In the Network phase, the PPP link performs NCP negotiation. Select and configure a network layer protocol through NCP negotiation, and negotiate network layer parameters PPP link supports half-duplex and full-duplex modes.
Which statement about SNMP protocol is correct? SNMP uses UDP as the transport layer protocol SNMP uses ICMP as the network layer protocol SNMP protocol uses multicast to send management messages The SNMP protocol only supports the sending of flash management messages on the Ethernet link.
Which of the following commands can be used to view the router's CPU usage? display cpu-state display interface display memory display cpu-usage .
Which of the following IPv6 addresses is a multicast address? FE80::2E0 :FCFF:FEEF:FEC FC00 ::2E0:FCFF:FEEF:FEC FF02::2E0:FCFF:FEEF:FEC 2000 ::2E0:FCFF:FEEF:FEC.
A device has been configured to complete the Telnet configuration. The device login address is 10.1.1.10. The Telnet user name is admin and the password is Huawei@123. Which of the following is the correct way to log in to this device using telnetlib? telnetlib.Telnet (10.1.1.0,23,admin,Huawei@123) telnetlib.Telnet (10.1.1.0) telnetlib.Telnet (10.1.1.0,23, Huawei@123 ) telnetlib.Telnet (10.1.1.0,admin).
Which of the following IPv4 addresses the host uses cannot directly access the Internet? 100.1.1.1 50.1.1.1 10.1.1.1 200.1.1.1.
What kind of message does the OSPF protocol use to confirm the received LSU message? LSU LSR LSACK LSA.
The RSTP protocol uses the P/A mechanism to speed up the speed of the upstream port to the Forwarding state, but what is the reason why there is no temporary loop? Speed up port role election Through the synchronization mechanism to ensure that no temporary loop occurs Edge ports are introduced Shorten the time of Forward Delay.
As shown in the figure below, the MAC address table of SWA is as follows. The switch can't learn the MAC address of HOST A all the time. Which of the following is impossible? The G0/0/1 port of the switch has disabled MAC address learning SWA turns off the MAC address learning function of the VLAN to which host A belongs HOST A did not send any data frames The G0/0/1 port of the switch is set to ACCESS mode.
In standard STP mode, which of the following non-root switches will forward the TC set BPDU generated by the root switch? Designated port Root port Backup port Preparation port.
if a windows host is started for the first time, if the IP address is obtained by DHCP, then what is the source IP address of the first packet sent by this host? 127.0.0.1 169.254.2.33 0.0.0.0 255.255.255.255.
Which of the following messages is used by AP to request software version from AC? VRP System Request Software Request Image Data Request Image package Request.
Which of the following does not include in VRP system login method? Telnet Netstream SSH web .
In which view can the administrator modify the device name for the router? User-view Protocol-view System-view Interface-view.
If the application layer protocol is Te1net, what is the value of the Protoco1 field in the IPv4 header? 23 17 6 67.
In the network shown in the figure below, host A is not configured with a gateway, and host B has the ARP cache of the gateway. Use the command ping 11.0.12.1 on host A. Which of the following statements are correct? No data packets will be sent from host A The IP address of the data packet sent by host A is 11.0.12.1 The destination MAC address of the data frame sent by host A is MAC-C The destination MAC address of the data frame sent by host A is MAC-B.
Which layer of the OSI reference model does the router work at? Data link layer Transport layer Application layer Network layer.
VRP operating platform, which of the following commands can only view static routes? display ip routing-table statistics display ip routing-table verbose display ip routing-table display ip routing-table protocol static.
Which OSPF version below is suitable for IPv6? OSPFv1 OSPFv2 OSPFv3 OSPFv4.
On which layer of the OSI reference model does the Ethernet switch work? Network layer Data link layer Physical layer Transport layer.
The bridge ID of the STP protocol in the switching network is as follows. Which of the following bridge ID switches will become the root bridge? 4096 00-01-02-03-04-DD 32768 00-01-02-03-04-AA 32768 00-01-02-03-04-CC 32768 00-01-02-03-04-BB.
The network administrator configures the Huawei router RTA as shown in the figure. If a user needs to be authenticated in the authentication domain "huawei", the correct description below is (). [RTA]aaa [RTA-aaa]domain Huawei RTA-aaa-domain-huawei]authentication-s cheme aul [RTA-aaa-domain-huawei]authentication-scheme au2 "authentication-scheme aul" authentication will be used, if "au1" is deleted, "au2" authentication will be used Will use "au2" authentication and will use "authentication-scheme au1" authentication Will use "authentication-scheme au2" authentication "authentication-scheme au2" authentication will be used, if "au2" is registered, "aul" authentication will be used.
As shown in the figure, RTA uses NAT technology and realizes multiple-to-multiple NAPT address translation by defining an address pool, so that hosts in the private network can access the public network. Suppose that there are only two public IP addresses in the address pool, and they have been assigned to hosts A and B for address conversion, and if host C also wants to access the public network, which of the following description is correct? Host C cannot be assigned a public network address and cannot access the public network All hosts can access the public network by using the public network address in turn RTA converts the source port of host C, and host C can access the public network RTA assigns the interface address (200.10.10.3) to host C, host C can access the public network .
The correct description of the information as shown in the figure is (). [R1]display interface g0/0/0 GigabitEthernet0/0/0 current state: Administratively DOWN Line protocol current state: DOWN The GigabitEthernet 0/0/0 interface was manually closed by the administrator GigabitEthernet 0/0/0 interface does not enable dynamic routing protocol The GigabitEthernet 0/0/0 interface is not configured with an IP address GigabitEthernet 0/0/0 interface is connected to a wrong cable .
What is the total length of the IPv6 address in bits? 96 64 32 128.
The IPv4 address assigned by the network administrator to a host in the network is 192.168.1.1/28. How many hosts can be added to the network where this host is located? 12 15 13 14.
What is the number range of advanced ACL? 3000-3999 2000-2999 4000~ 4999 6000~6031 .
By default, how long is the lease period of the IP address assigned by the DHCP server? 12h 1h 24h 18h.
In the network shown in the figure below, when the OSPF neighbor status is stable, what is the neighbor status of Router B and Router C? Attempt 2-way Full Down.
Which parameter is used in the spanning tree protocol for root bridge election? Port ID Bridge priority Root path cost Bridge ID.
Now it is necessary to implement a Python automation script Te1net to the device to view the device running configuration. Which of the following statements is wrong? Telnetlib can achieve this function. Use telnet.Telnet (host) to connect to the Telnet server. can use telnet.write(b"display current-configuration \n") to input the command to view the current configuration of the device. telnet.close() is used after a command entered every time, the function is that the user waits for the switch to return information. .
The network administrator of a certain company wants to uniformly divide the users who often access the company network from different switches into VLAN 10 when they frequently change office locations. Which of the following methods should be used to divide VLANs? Divide VLAN based on protocol Divide VLAN based on MAC address Divide VLAN based on port Divide VLAN based on subnet .
The picture shows the display startup information of AR2200 router. Regarding these information, which of the following statement iswrong? next system startup file system can use the command "startup system software <startup-software-name>" to modify The running configuration file is not saved The system file used by the device this time is ar2220-v200r003c00spc00.cc The system file cannot be modified when the device is started next time.
The administrator plans to implement route backup by configuring static floating routes, what is the correct way to achieve this? The administrator needs to configure different metric values for the main static route and the standby static route The administrator needs to configure different TAGs for the main static route and the standby static route The administrator only needs to configure two static routes The administrator needs to configure different protocol priority values for the main static route and the standby static route .
Which of the following descriptions about Trunk port and Access port is correct? Trunk port can only send untagged frames Access port can only send untagged frames Access port can only send tagged frames Trunk port can only send tagged frames .
Which of the following statements about the division of OSPF protocol area is wrong? Area 0 is the backbone area, and other areas must be connected to this area The LSDBs in the routers in the same OSPF area are completely consistent Dividing OSPF areas can reduce the LSDB scale of some routers Only ABR can be used as ASBR .
VRP operating system commands are divided into 4 levels: access level, Monitoring level, Configuration level, and Management level. Which level can run various business configuration commands but cannot operate the file system? Configuration level Monitoring level Access level Management level .
In what state does the OSPF protocol determine the master-slave relationship of DD packets? ExStart Full 2-way Exchange.
In the network shown in the figure below, the bridge ID of the switch has been marked. Enter the command stp root secondary on the SWD switch, and which of the following switch will become the root bridge of this network? SWC SWA SWB SWD.
If the Length/Type of an Ethernet data frame = 0x8100, which of the following statements is correct? There must be an IP header in the upper layer of this data frame This data frame must carry VLAN TAG There must be a UDP header in the upper layer of this data frame There must be a TCP header in the upper layer of this data frame.
In the WLAN network architecture, what is terminal equipment that supports the 802.11 standard called? Client AC STA AP.
Which of the following statement about static routing is wrong? Cannot automatically adapt to changes in network topology Manual configuration by the network administrator Low system performance requirements Routers need to exchange routing information.
Which of the following IPv4 addresses can be used by a host to directly access the Internet? 192.168.1.1/24 172.32.1.1/24 172.16.255.254/24 10.255.255.254/24.
What is the value of TPID defined by IEEE802.1Q? 0x8200 0x7200 0x8100 0x9100 .
Which state does the OSPF protocol use to indicate that the adjacency relationship has been established? Full 2-way Attempt Down.
The last option field of IPv4 is variable-length optional information. What is the maximum length of this field? 10B 40B 60B 20B.
Which of the following advantages does router-on-a-stick achieve inter-VLAN routing intercommunication? Reduce the number of equipment Reduce the use of IP addresses Reduce the number of link connections Reduce routing table entries .
The output information of the link aggregation port of a certain switch is as follows. If you want to delete Eth-Trunk 1, which of the following commands is correct? undo interface Eth-trunk 1 inte GigabitEthernet 0./0/2 Undo eth-trunk Quit Undo interface eth-trunk 1 inte GigabitEthernet 0./0/1 Undo eth-trunk Quit inte GigabitEthernet 0./0/2 Undo eth-trunk Quit inte GigabitEthernet 0./0/1 Undo eth-trunk Quit Undo interface eth-trunk 1 .
Which information of the data frame does the VLANIF interface use to determine whether to perform Layer 2 or Layer 3 forwarding? Destination MAC Source MAC Destination port Source IP.
When using FTP for file transfer, how many TCP connections will be established? 2 1 3 4.
In order to join the wireless network STA needs to obtain wireless network information first. Which of the following messages is used by the STA to actively obtain the SSID information? Probe Join Discovery Beacon.
Broadly speaking, which of the following does the transmission medium that constitutes the wireless local area network wlan not include? Ray Radio waves Infrared Laser.
Which field of the ipv6 packet header can be used for QoS? Traffic Class Payload Length Version Next Header.
Connection between switches and hosts, which port link type is often used by the switch? Access link Trunk link Trunk link Hybrid link.
When using the FTP protocol to upgrade the router software, which of the following transmission mode should be selected? Binary mode Byte mode Text mode Stream byte mode.
Network shown below, Host A does not configure the gateway, the host B exists gateway ARP cache, which of the following statements are correct? Enable ARP proxy on the GO/0/1 port of the router, then host A can communicate with host B Host A and Host B cannot communicate in both directions The data packet sent by host B with the destination IP address of 10.0.12.1 can be forwarded to host A The data packet sent by host A with the destination IP address of 11.0.12.1 can be forwarded to host B .
The network administrator hopes to effectively use the IP address of the 192.168.176.0/25 network segment. Now that the company’s marketing department has 20 hosts, which of the following is the best address segments allocated to the marketing department? 192.168.176.160/27 192.168.176.0/25 192.168.176.96/27 192.168.176.48/29.
What is the main function of the dynamic routing protocol? Manage routers Generate IP address Dynamically generate routing entries Control router interface status.
The device port running STP protocol is in Forwarding state. Which of the following statements is correct? The port not only forwards user traffic but also processes BPDU packets. The port only receives and processes BPDUs, and does not forward user traffic. The port will build a MAC address table based on the received user traffic, but does not forward user traffic. The port not only does not process BPDU packets, but also does not forward user traffic.
Which of the following descriptions about spanning tree designated ports is correct? The designated port can forward configuration BPDU messages to the network segment connected to it. The port on the root switch must not be a designated port. Each switch has only one designated port. The port on the root switch must be a designated port.
Which of the following statements about link aggregation is correct? GE electrical interfaces and GE optical interfaces cannot be added to the same Eth-Trurnk interface. Eth-Trurnk interfaces cannot be nested. When two devices are connected, it is necessary to ensure that the link aggregation mode on both devices is the same. GE interface and FE interface cannot be added to the same Eth-Trunk interface.
What is the total length of the VLAN frame format defined by IEEE802.1Q? 1 2 3 4.
Before the STA associates with the AP, it needs to exchange some messages to obtain the SSID. What are these messages? Discovery Beacon Probe ResponseProbe Request.
Which of the following statement about MPLS Labe1 statement label is wrong? The label is encapsulated between the network layer and the transport layer The tags are carried by the head of the packet, does not contain topology Information. The label is used to uniquely identify the forwarding equivalence class FEC to which a packet belongs The label is a short identifier with a fixed length. It has only local meaning. .
A company applies for a Class C address segment, which needs to be evenly distributed to 8 subsidiaries. The largest subsidiary has 14 computers. Different subsidiaries must be in different network segments. The subnet mask should be designed as (). 255.255.255.240 255.255.255.128 255.255.255.192 255.255.255.0.
The priority of the LACP protocol is shown in the figure. Switch A and Switch B adopt LACP mode link aggregation, and all interfaces join the link aggregation group. At the same time, set the maximum number of active ports to 3. Which interface of switch A is not active port? G0/0/1 G0/0/3 G0/0/0 G0/0/2.
Which of the following port states is not included in the RSTP protocol? Learning Discarding Forwarding Blocking.
Which statement about the Hybrid port is correct? When the Hybrid port sends data frames, it must carry VLAN TAG Hybrid port only receives data frames with VLAN TAG Hybrid port can strip TAG of VLAN in the direction of the interface Hybrid port does not require PVID.
Which of the following statement about Python is incorrect? Is a fully open source high-level programming language Has a rich third-party library Have a clear grammatical structure, simple and easy to learn, colleagues run efficiently can be used for operation and maintenance of automation scripts, Artificial Intelligence, Data science and many other fields.
When building a campus network, which of the following protocols can be used to avoid Layer 2 loops? SNMP RSTP NAT OSPF .
The administrator has configured the AR2200 as shown in the figure, then which of the following description of the configuration information is correct? The saved configuration file will be replaced by the running configuration file If the user wants to clear the next startup configuration file of the device configuration, then should select "N" If the user wants to clear the next startup configuration file of the device configuration, then should select "Y" The next startup file of the device configuration will be retained.
How many types of OSPF messages are there? 2 4 5 3.
By default, the port cost calculated by STP has a certain relationship with the port bandwidth, that is, the greater the bandwidth, the () the cost. greater Consistent Not necessarily smaller.
In the RSTP standard, in order to improve the convergence speed, the port that the switch is directly connected to the terminal can be defined as ( ). Edge port Root port Fast port Backup port.
The configuration information of a certain port of the switch is shown in the figure, then the port will strip off the VLAN TAG when sending data frames carrying which VLAN? 4.6 1.4.5.6 4.5.6 1.4.6.
As shown in the figure, all four switches run STP, and various parameters adopt default values. If the G0/0/2 port of switch C is blocked and the configuration BPDU cannot be sent through this port, how long will it take for the blocked port in the network to enter the forwarding state? about 3 seconds about 50 seconds about 30 seconds about 15 seconds.
If the largest number in an ACL rule is 12, by default, the user does not specify a number when configuring a new rule, then what is the number assigned by the system for the new rule? 13 15 14 16.
Complete the ACL configuration shown in the figure on the router RTA, which of the following description is correct? The VRP system will not adjust the sequence number, but will first match the rule permit source 20.1.1.0 0.0.0.255 Configuration error, the sequence number of the rules must be configured from small to large The VRP system will adjust the sequence number of the first rule to 5 according to the configuration sequence The VRP system will first match the rule by numbering in sequence deny source 20.1.1.0 0.0.0.255 .
What is the main function of the DNS protocol? Domain name resolution File transfer Remote access Mail transmission .
What is the data link layer MAC address of each VAP on the AP? SSID BSS ESS BSSID.
Which of the following does not include the advantages of Wi-Fi 6 compared to Wi-Fi 5? Higher bandwidth Lower transmission delay Higher power consumption Higher number of access terminals per AP.
What is the main function of the DHCP DISCOVER message? The server's confirmation response to the REQUEST message The client is used to find the DHCP server The client requests configuration confirmation, or renews the lease The DHCP server is used to respond to the DHCP DISCOVER message, which carries various configuration information.
In the WLAN architecture, the FIT AP cannot work independently and needs to be managed by the AC. Which of the following protocols are used to communicate between FIT AP and AC? IPsec WEP CAPWAP WAP.
What is the first operation performed by the FIT AP after obtaining the AC's IP address? Upgrade software version Download the configuration file Establish CAPWAP tunnel Request configuration file.
How many types of data flows with different service levels can be marked based on MPLS labels? 4 2 16 8.
Which of the following are not the characteristics of a small-sized campus network? Simple network level Fewer users Simple network requirements Wide coverage.
Which of the following information prompts will the VRP operating platform use for incomplete input commands? Error :Ambiguous command found at' position Error :Incomplete command found at' position Error: Too many parameters found at' position Error: Wrong parameter found at 'position.
As shown in the figure below, which port of the following switches will be blocked? SWC G0/0/1 SWC G0/0/2 SWB G0/0/3 SWA G0/0/3.
An existing switch is connected to a designated port through a port, but the port does not forward any packets, but can monitor network changes by receiving BPDUs, then what is the role of the port? Designated port Alternate port Disable port Root port.
Report abuse Consent Terms of use