Finalsolution
Finalsolution
Finalsolution
√ ×
The IP header is used by network devices for routing and fragmentation of packets.
√ ×
If the PPP protocol and PAP authentication are enabled on interfaces of two routers,
the authentication information in the captured packets is in plain text.
√ ×
An intranet server can be accessed from an external network using the static NAT or NAT
server function.
√ ×
In Easy IP mode, NAT only implements the mapping from private IP addresses to public IP
addresses, and it does not support port mappings.
√ ×
A shared Ethernet hub can isolate collision domains, but not broadcast domains.
√ ×
√ ×
Question8 True or False(15.0point.)
The persistent connection allows for the setting of an extra-long aging time on specific TCP
and UDP data streams to ensure that session information is not aged for a long period of time.
√ ×
The main control panel of the Huawei USG6300 includes a fixed management interface named
GigabitEthernet 0/0/0 that is used for device management.
√ ×
For ease of management, STAs connected to a WLAN can obtain IP addresses only using
DHCP but not by manual configuration.
√ ×
When two devices have the same root bridge priority, the device with a larger MAC
address is selected.
√ ×
Bottom of Form
√ ×
Question9 True or False(15.0point.)
SSL is a security protocol that provides secure connections for TCP at the application
layer. SSL runs between the transport and application layers of the TCP/IP stack. It also
provides secure connections for HTTP.
√ ×
√ ×
Question9 True or False(15.0point.)
The length of an Ethernet data frame is in the range from 64 bytes to 1518 bytes.
√ ×
Bottom of Form
Which of the following statements about VLAN tag processing on switch's interfaces is
correct?
Question12 Single(15.0point.)
[B].Ultra-high frequency
[C].Ultra-low frequency
[D].High frequency
Question13 Single(15.0point.)
In the WLAN project implementation, which of the following equipment or method can be
used to prevent wired access switches from lightning strikes?
Question14 Single(15.0point.)
[A].Management VLAN
[B].Service VLAN
[C].User VLAN
[D].Transmit VLAN
Question15 Single(15.0point.)
If packet loss occurs when hosts A and B communicate with each other through TCP, how
does TCP ensure reliability?
Question16 Single(15.0point.)
Client A and server B set up a TCP connection. In the three-way handshake, server B sends a
SYN-ACK (seq = b, ack = a+1) to client A. Which of the following statements is correct?
[A].The SYN-ACK is the acknowledgement for the SYN with the sequence number being
a+1.
[B].The SYN-ACK is the acknowledgement for the SYN with the sequence number being
b.
[C].Server B wants to receive an ACK with the sequence number being a+1.
Question17 Single(15.0point.)
After logging in to a router using Telnet, an administrator finds that IP addresses cannot be
configured for interfaces of the router. Which of the following is a possible cause?
Question18 Single(15.0point.)
A router is connected to the interface Ethernet1/0/4 of a switch SWA. To disable the STP
function on the interface, which of the following commands can be executed?
[A].[SWA]stp disable
[A].Direct route
[B].Static route
[C].OSPF route
[D].RIP route
Question20 Single(15.0point.)
[A].Unicast
[B].Broadcast
[C].Multicast
[D].Anycast
Question21 Single(15.0point.)
[A].TCP
[B].UDP
[C].RTP
[D].SIP
Question22 Single(15.0point.)
Which command can be used to check whether an OSPF neighbor relationship has been set
up?
[A].display ospf neighbor
Question23 Single(15.0point.)
In standard STP mode, which of the following ports of a non-root-bridge switch can forward
BPDUs with TC bits set generated by a root switch?
[A].Root port
[B].Designated port
[C].Backup port
[D].Alternate port
Question24 Single(15.0point.)
If you enter the first several letters of a keyword in a command, which shortcut key can be
pressed to complete the command?
[A].Ctrl+c
[B].Tab
[C].Enter
[D].Space
Question25 Single(15.0point.)
Which of the following statements about the access and trunk ports is correct?
[A].A trunk port can forward both tagged and untagged data frames.
[D].An access port can process data frames from multiple VLANs.
Question26 Single(15.0point.)
Which of the following is the default priority of the Trust zone for USG firewalls?
[A].5
[B].50
[C].85
[D].100
Question27 Single(15.0point.)
Which of the following is false about the working principles of a Layer 3 switch?
[A].If the destination MAC address of a received data frame is the MAC address of the
switch, the switch performs Layer 3 forwarding; otherwise, the switch performs Layer 2
forwarding.
[C].After transmitting the first data flow based on the routing table, a Layer 3 switch
generates a mapping between the MAC address and IP address. When the same data flow
arrives, the switch directly forwards the data flow at Layer 2 based on the mapping table.
Question28 Single(15.0point.)
An enterprise network has 50 private IP addresses. An administrator wants to use the NAT
technology to access the public network and only one public IP address is available for the
enterprise. Which NAT mode can be used?
[A].Static NAT
[B].Dynamic NAT
[C].NAPT
[D].Easy IP
Question29 Single(15.0point.)
Which of the following commands can be run to set the PPP authentication mode to chap?
[C].ppp pap
[D].ppp chap
Question30 Single(15.0point.)
[D].Optical fiber
Question31 Single(15.0point.)
[B].If a router receives a packet with the TTL value being 0, the router discards this
packet.
[C].The TTL value is reduced by 1 every time the packet is forwarded to a Layer 3 node.
Question32 Single(15.0point.)
[A].20
[B].21
[C].22
[D].23
Question33 Single(15.0point.)
Which of the following commands is not commonly used for IPSec troubleshooting?
[C].display ikesa
[D].display ipsecsa
Question34 Single(15.0point.)
A network administrator runs the tracert command to trace the path to an external website
server, but only * is displayed. Which of the following is a possible cause?
[A].The ICMP function is disabled on a router.
[C].This is normal.
Question35 Single(15.0point.)
Which of the following VPNs can be used with L2TP VPN together to improve security?
[A].MPLS VPN
[B].GRE VPN
[C].IPSec VPN
[D].SSL VPN
Question36 Single(15.0point.)
If the network administrator needs to map the private IP address of the server on the intranet to
the public IP address to provide services for Internet users, which of the following NAT
technologies can meet the requirements?
[A].Source NAT
[B].Destination NAT
[C].NAT Server
[D].NAT ALG
Question37 Single(15.0point.)
[A].FCC
[B].IEEE
[C].IETF
[D].Wi-Fi Alliance
Question39 Single(15.0point.)
Which of the following messages can provide error information and processing of IP data
packets for source nodes?
[A].IGMP
[B].TCP
[C].UDP
[D].ICMP
Question40 Single(15.0point.)
Which of the following commands can be used to configure all ports of a switch as edge ports?
Question11 Single(15.0point.)
An enterprise wants to assign VLANs on its network, and requires that users belong to a fixed
VLAN no matter which access point is used to access the network. So which VLAN
assignment mode is recommended?
Question12 Single(15.0point.)
Two routers are connected through serial ports and the link layer protocol is PPP, but the MRU
values on the two ends of the PPP link are different. Which of the following statements about
PPP LCP negotiation is correct?
[B].The smaller MRU value will be used according to the LCP negotiation.
[C].The larger MRU value will be used according to the LCP negotiation.
[D].The standard MRU value of 1500 will be used according to the LCP negotiation.
Question17 Single(15.0point.)
When the radio radiation decreases by 10 dB, how much does power density decrease to?
[A].0.01
[B].0.1
[C].0.5
[D].0.9
Question18 Single(15.0point.)
[A].Blocking
[B].Listening
[C].Learning
[D].Forwarding
Question19 Single(15.0point.)
[A].5
[B].6
[C].17
[D].22
Question20 Single(15.0point.)
Which of the following statements about DD packets and LSAs in OSPF is false?
Question21 Single(15.0point.)
How many IPsec SAs are created for setting up an IPsec tunnel in AH+ESP mode?
[A].1
[B].2
[C].3
[D].4
Question23 Single(15.0point.)
[A].802.11s
[B].802.11n
[C].802.11i
[D].802.11g
Question24 Single(15.0point.)
After running OSPF, which of the following router roles can establish 2-way neighbors?
[D].Dothers
Question26 Single(15.0point.)
Which port of UDP is used by RIPng to send and receive routing information?
[A].520
[B].521
[C].89
[D].189
Question27 Single(15.0point.)
When using only one public IP address to provide address translation for multiple users on the
intranet, which of the following NAT technologies can meet the demand?
[A].Source NAT
[B].Destination NAT
[C].NAT Server
[D].PAT
Question29 Single(15.0point.)
Which of the following subnet masks can be configured to make 192.168.0.94 and
192.168.0.116 on the same network segment?
[A].255.255.255.192
[B].255.255.255.224
[C].255.255.255.240
[D].255.255.255.248
Question30 Single(15.0point.)
In which link aggregation mode will Huawei switches implement link backup?
[A].Manual mode
[D].Automatic mode
Question31 Single(15.0point.)
Question32 Single(15.0point.)
Which type of address is indicated by the IP address 10.0.10.63 and subnet mask
255.255.255.224?
[A].Host address
[B].Network address
[C].Broadcast address
[D].Multicast address
Question34 Single(15.0point.)
Using the Tracert command on the host to detect the path to the destination device. During the
detection process, which of the following ICMP messages will be sent back to the source
device?
[A].Time Exceeded
[B].Echo Request
[C].Echo Reply
[D].Port Unreachable
Question11 Single(15.0point.)
In the port transition mechanism of STP, to which state will the root ports and designated ports
be transited finally?
[A].Blocking
[B].Listening
[C].Learning
[D].Forwarding
Question12 Single(15.0point.)
Which of the following technologies can be used by USG series firewalls to provide well-
known application services through ephemeral ports?
[B].Port mapping
[C].Persistent connection
[D].Application specific packet filter (ASPF)
Question17 Single(15.0point.)
[A].5
[B].11
[C].13
[D].21
Question18 Single(15.0point.)
Which of the following is the Encapsulating Security Payload (ESP) protocol number?
[A].49
[B].50
[C].51
[D].52
Question20 Single(15.0point.)
What do we generally use to connect APs and antennas during WLAN network deployment?
[A].Power splitter
[B].Combiner
[C].Arrester
[D].Feeder
Question24 Single(15.0point.)
[A].20
[B].21
[C].22
[D].23
Question29 Single(15.0point.)
When you view configurations, if there are a lot of configuration commands that cannot be
displayed in one screen, which shortcut key can be pressed to display the next screen?
[A].Ctrl+C
[B].Tab
[C].Enter
[D].Space
uestion30 Single(15.0point.)
If two routers have set up an OSPF adjacency relationship, which packet must be sent to each
other within one minute?
[A].Hello
[B].DD
[C].LSR
[D].LSU
[E].LSACK
Question31 Single(15.0point.)
After a DHCP server is deployed on a network, an administrator finds that some hosts obtain
IP addresses that are not specified on the DHCP server. Which of the following is not a
possible cause?
[A].Another DHCP server with higher working efficiency exists on the network.
[B].These hosts cannot communicate with the DHCP server, so clients on these hosts
automatically obtain IP addresses on the 169.254.0.0 network segment.
[C].These hosts cannot communicate with the DHCP server, so clients on these hosts
automatically obtain IP addresses on the 127.254.0.0 network segment.
Question32 Single(15.0point.)
[C].Routes to the network segment where the interface resides cannot be learnt by other
routers.
Question33 Single(15.0point.)
Which of the following tables is used by a firewall in transparent mode to forward data?
[A].FIB table
[C].Routing table
[D].Hash table
Question35 Single(15.0point.)
Which of the following powerful SSL VPN functions can enable mobile users on business trips
to access an enterprise internal file server?
[A].Web proxy
[B].File sharing
[C].Port forwarding
[D].Network extension
Question36 Single(15.0point.)
[A].192.168.0.1
[B].169.254.1.1
[C].127.0.0.1
[D].10.1.10.1
uestion39 Single(15.0point.)
If the broadcast address of a network is 172.16.1.255, which of the following addresses may be
its network address?
[A].172.16.1.253
[B].172.16.1.128
[C].172.16.2.0
[D].172.168.1.1
Question40 Single(15.0point.)
[A].Channel Selection
[B].Antenna Selection
[D].SSID Selection
Question11 Single(15.0point.)
Which of the following statements about the process of establishing a PPP link is false?
[A].The physical layer is unavailable during the Dead phase. When two
communicating devices detect that the physical link between them is activated, PPP
enters the Establish phase from the Dead phase.
[B].In the Establish phase, the two devices perform LCP negotiation to negotiate the
maximum receive unit (MRU), authentication mode, and magic number.
[C].In the Network phase, the two devices perform NCP negotiation to select and
configure a network layer protocol and to negotiate network-layer parameters.
[D].After NCP negotiation is successful, the PPP link maintains the communication
state and enters the Terminate phase.
Question12 Single(15.0point.)
Which of the following statements about VLAN is false?
Question13 Single(15.0point.)
What are the common non-overlapping channels working at the 2.4 GHz frequency
band?
[A].1/6/11
[B].1/5/9/13
[C].1/7/12
[D].2/7/11
Question16 Single(15.0point.)
Which of the following is an outdoor high-power AP?
[A].AP4050DN
[B].AP7010DN
[C].AP9131DN
[D].AP8150DN
Question18 Single(15.0point.)
Which of the following Huawei switches supports PoE?
[A].S3700-28TP-EI-MC-AC
[B].S5710-28C-PWR-EI-AC
[C]. S5700-26X-SI-12S-AC
[D]. S6720-26Q-LI-24S-AC
Question19 Single(15.0point.)
In order to prevent the edge port from receiving the BPDU loss edge port feature, what
protection measures should be taken?
[A].BPDU-protection
[B].BPDU-filter
[C].Root-protection
[D].Root-filter
Question20 Single(15.0point.)
Which of the following is another expression of the IPv6 address
2001:0DB8:0000:0000:0000:0000:3460:8D58?
[A].2001:DB8::346:8D58
[B].2001:DB8::3460:8D58
[C].2001:0DB8:::3460:8D58
[D].2001:0DB8::346:8D58
Question21 Single(15.0point.)
If an interface of a router uses HDLC as the data link layer protocol, which is the default
network type determined by OSPF?
[A].Broadcast
[B].Point-to-point
[C].Point-to-multipoint
[D].NBMA
Question22 Single(15.0point.)
Which of the following statements about VTY is correct?
[D].The maximum number of VTY interfaces that can be used is the same for
different devices or VRP systems in different versions.
Question28 Single(15.0point.)
Since the signal strength is too weak during wireless communication, the wireless
client switches to the channel of other wireless APs. This process is called?
[A].Association
[B].Roaming
[C].Reassociation
[D].Load balancing
Question29 Single(15.0point.)
Which of the following is correct about route selection rules based on the routing
table?
Question32 Single(15.0point.)
Which of the following statements about gratuitous ARP is correct?
[B].A device sends gratuitous ARP packets only after obtaining an IP address
through DHCP.
[C].Generally, gratuitous ARP packets are sent automatically when the IP address of
a host changes.
[A].L2TP VPN
[B].GRE VPN
[C].IPSec VPN
[D].SSL VPN
Question34 Single(15.0point.)
Which of the following statements about RADIUS is incorrect?
[A].RADIUS uses the UDP protocol, with the authentication and authorization port
numbers as 1812 and 1813, or 1645 and 1646, respectively.
[A].The switch will immediately delete the entire MAC address table.
[B].The switch will immediately send updated configuration BPDUs from a specified
port.
Question37 Single(15.0point.)
Which of the following VPNs is more secure?
[A].L2TP VPN
[B].GRE VPN
[C].IPSec VPN
[D].MPLS VPN
Question39 Single(15.0point.)
Which packet is used to terminate a PPPoE session?
[A].PADI
[B].PADO
[C].PADR
[D].PADT
Question11 Single(15.0point.)
Which command is run in the interface view to encapsulate the serial interface with
HDLC on a router?
[A].link-protocol hdlc
[B].encapsulation hdlc
[C].enable hdlc
[D].address hdlc
Question13 Single(15.0point.)
In the VRP system, which of the following functions does the Ctrl+Z key combination
have?
Question23 Single(15.0point.)
How many PVCs are required for a full mesh topology on a frame relay network (FRN)
that is composed of 10 routers?
[A].6
[B].66
[C].45
[D].12
Question25 Single(15.0point.)
Which of the following is not included in the VRP system login method?
[A].Telnet
[B].SSH
[C].Web
[D].Netstream
Question26 Single(15.0point.)
Which of the following options is used to indicate the unit of antenna gain
[A].dB
[B].dBm
[C].dBi
[D].mW
Question28 Single(15.0point.)
In the GRE configuration environment, which IP address does the destination IP
address in the tunnel interface mode refer to?
Question29 Single(15.0point.)
When a router is configured using the console port, which of the following
configurations is correct for the terminal-emulation program?
[A].4,800 bit/s, 8 data bits, 1 stop bit, odd parity check, and no flow control
[B].9,600 bit/s, 8 data bits, 1 stop bit, even parity check, and hardware-based flow
control
[C].9,600 bit/s, 8 data bits, 1 stop bit, no parity check, and no flow control
[D].19,200 bit/s, 8 data bits, 1 stop bit, no parity check, and no flow control
Question30 Single(15.0point.)
Which of the following statements about ARP packet sending is correct?
[A].The destination MAC address of ARP Request packets sent from a host is a
unicast MAC address.
[C].The destination MAC address of ARP Reply packets sent from a host is a unicast
MAC address.
[D].The destination MAC address of ARP Reply packets sent from a host is a
broadcast MAC address.
Question32 Single(15.0point.)
RSTP reduces the number of port states (five in STP) to three. Which of the following
port states is not included?
[A].Blocking
[B].Discarding
[C].Learning
[D].Forwarding
Question34 Single(15.0point.)
About VRRP packets, which of the following statements is true?
/////////////////////////////////////////////////////////////////////////////
Question11 Single(15.0point.)
Huawei Redundancy Protocol (HRP) is used to synchronize data on the active firewall,
such as key configuration, connection status, routing table, and interface address, to the
standby firewall. Which of the following is not covered in synchronization?
[A].Routing table
[B].Security policy
[C].Blacklist
[D].NAT policy
Question13 Single(15.0point.)
Which of the following protocols is used to
implement the backup group switchover in
the firewall hot standby networking?
[A].VRRP
[B].VGMP
[C].HRP
[D].IGMP
Question15 Single(15.0point.)
On a broadcast network, which address is
used by the DR and BDR to receive Link
State Update (LSU) packets?
[A].224.0.0.1
[B].224.0.0.2
[C].224.0.0.5
[D].224.0.0.6
Question17 Single(15.0point.)
Which of the following user systems can be
used to modify information such as user
accounts or passwords directly in the USG
product system?
[A].VPNDB user
[B].LDAP user
[D].RADIUS user
Question12 Single(15.0point.)
Which of the following IP addresses is a private IP address?
[A].192.200.1.1
[B].172.32.1.1
[C].192.1.1.1
[D].172.20.2.1
Question13 Single(15.0point.)
How many concurrent login users through the console port are supported by Huawei
network devices?
[A].1
[B].2
[C].5
[D].15
Question19 Single(15.0point.)
Which of the following is true about the order of starting AP?
Question20 Single(15.0point.)
Two routers are running on a PPP link. An administrator configures the same OSPF
area and router ID on these routers. Which of the following is correct?
[B].VRP will display a message indicating that router IDs of the two routers conflict.
[A].MAC address spoofing attacks take advantages of the MAC address learning
mechanism employed by switches.
[B].An attacker can forge source MAC address data frames and send them to
switches to implement MAC address spoofing attacks.
[C].MAC address spoofing attacks may cause packets, which should be sent by
switches to correct destinations, to be incorrectly sent to attackers.
[D].MAC address spoofing attacks can cause switches to learn incorrect mapping
relationships between MAC addresses and IP addresses.
Question24 Single(15.0point.)
Fragmentation can be performed on both the original packet sending host and
intermediate router. After an IP data packet is fragmented, where can the fragments be
reassembled?
[A].Packet loopback
[B].Next router
[C].Intermediate router
[D].Packet destination
Question27 Single(15.0point.)
Which of the following statements about OSPF area division is correct?
[B].Two backbone areas that are not physically adjacent can be connected by a
virtual link.
[A].11Mbps
[B].54Mbps
[C].10Mbps
[D].100Mbps
Question35 Single(15.0point.)
After running OSPF, how many states does the router need to go through during the
process of establishing a neighbor relationship?
[A].4
[B].5
[C].6
[D].7
Question37 Single(15.0point.)
Which of the following is correct when RIPv1 or RIPv2 runs on an AR router?
[C].Destination network segments in the routes sent from a RIPv1 router must be
classful networks.
[D].Destination network segments in the routes sent from a RIPv2 router must be
network segments with variable-length subnet masks.
Question12 Single(15.0point.)
Which of the following statements about IP spoofing attacks is correct?
[A].An intruder generates a packet with a forged source IP address to obtain the
access permission.
[B].IP spoofing attacks send a large number of IP packets to the destination host to
make it break down.
[C].An attacker sends an ICMP echo request, and the destination IP address is
specified to the broadcast address of the victim network.
Question20 Single(15.0point.)
Which of the following statements about the Routing Information Protocol (RIP) is
correct?
[A].A router cannot send a routing entry with the hop count of 16 to its directly
connected neighbors.
[B].A router may receive a routing entry with the hop count of 16 from its directly
connected neighbors, but it will discard the entry immediately.
[C].A router may receive a routing entry with the hop count of 16 from its directly
connected neighbors, and it will use the entry to update its routing table.
[D].A router may send a routing entry with the hop count of 16 to its directly
connected neighbors, but the neighbors will not use the entry to update their routing
tables.
Question21 Single(15.0point.)
Which of the following statements about ACL application scenarios is false?
Question22 Single(15.0point.)
Which of the following IP addresses is a Class D address?
[A].192.1.1.1
[B].223.1.1.1
[C].224.1.1.1
[D].240.1.1.1
Question24 Single(15.0point.)
Which of the following statements about the Proposal/Agreement (P/A) mechanism of
RSTP is correct?
[D].The P/A mechanism of RSTP can still be used in interconnection with the STP.
Question31 Single(15.0point.)
In the seven-layer OSI model, which layer provides logical addresses for a router to
determine packet forwarding paths?
[A].Data link layer
[B].Network layer
[C].Transport layer
[D].Application layer
Question34 Single(15.0point.)
Which of the following states indicates that a BFD session has been established?
[A].Down
[B].Init
[C].Up
[D].AdminUp
Question37 Single(15.0point.)
When running in the system view on a USG, which of the following will delete the
sslconfig.cfg file located in the hda1:/ directory?
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
After OSPF is running, how many types of packets need to be exchanged to establish Full
state?
[A].4
[B].5
[C].6
[D].7
[A].Split horizon
[B].Poison reverse
[C].Triggered update
[D].Path attribute
[A].192.168.100.255/22
[B].192.168.100.64/26
[C].192.168.100.100/30
[D].192.168.100.100/25
[C].PAP authentication and CHAP authentication are both based on MD5 technology.
[A].SPI
[B].Source IP address
[C].Destination IP address
[D].Security protocol ID
Which of the following authentication modes are supported for APs to go online?
[B].SN authentication
[A].2001:410:0:1:0:0:0:45FF
[B].2001:41:0:1:0:0:0:45FF
[C].2001:410:0:1::45FF
[D].2001:410::1::45FF
Which ports of servers are used by default for the FTP service?
[A].20
[B].21
[C].22
[D].23
Which of the following statements about WLAN Layer 2 and Layer 3 networking modes are
correct?
A link-group has three physical interfaces. If any of the interfaces fails, which of the following
statements are correct?
[C].After some interfaces in the group recover, the system changes the status of all
interfaces to Up.
[D].After all interfaces in the group recover, the system changes the status of all interfaces
to Up.
When using Source NAT for address translation on the firewall to implement intranet access to
the Internet, which of the following configurations are required?
[A].Access layer
[B].Aggregation layer
[C].Core layer
[D].Network layer
[E].Physical layer
[A].Client
[B].Authenticator
[C].Authentication server
[D].Thin client
If the PVID of a trunk link is 5, and the port trunk allow-pass vlan 2 3 command is run on the
interface, traffic from which VLAN can pass through the trunk link?
[A].VLAN 1
[B].VLAN 2
[C].VLAN 3
[D].VLAN 5
/////////////////////////////////////////////////////44444444///////////////////////////////////////////////////////////////////////
[A].File identification
[B].Decompression
[C].Unpacking
[D].Decryptio
[A].Checks duplicate IP addresses: Normally, a device does not receive an ARP Reply
packet. If the device receives an ARP Reply packet, another device is using the same IP
address.
[B].Advertises a new MAC address: If the MAC address of a device changes because its
network adapter is replaced, the device sends a gratuitous ARP packet to notify all devices of
the change before the ARP entry is aged out.
[C].Detects connectivity with the gateway when a host communicates with the gateway.
In the following port states of STP, which are unstable intermediate states?
[A].Blocking
[B].Listening
[C].Learning
[D].Forwarding
[B].Hello packets are sent periodically to discover and maintain OSPF neighbor
relationships.
[D].If a device does not receive Hello packets from its neighbor for a period of time, it will
disconnect the neighbor relationship.
[A].Bus topology
[B].Tree topology
[C].Star topology
[E].Ring topology
[A].Routes discovered by link layer protocols, which are also called interface routes
or direct routes.
[B].Two security zones in a system cannot have the same security level.
[D].A security level can be set only for a user-defined security zone.
Question44 Multiple Choice(20.0point.)
Which of the following formulas about power are incorrect?
mw 1 = dBm [A].0
mw 0 = dBm [B].0
mw 1 = dBm [C].1
0 mw = dBm [D].1
[C].Source IP address
[D].Destination IP address
Question46 Multiple Choice(20.0point.)
Network administrators use Ping to test network connectivity. Which of the following
protocols might be used in the process?
[A].ICMP
[B].TCP
[C].ARP
[D].UDP
Question47 Multiple Choice(20.0point.)
Which methods are supported in the VRP system to configure the router?
[A].When an IP address and subnet mask are configured for a host, but no gateway is
configured, the host cannot communicate with any device.
[B].A switch automatically learns the source MAC addresses of packets received on
interfaces, and generates MAC address entries.
[A].Carrier sense
[B].Multiple access
[C].Collision detection
[D].Collision avoidance
Question52 Multiple Choice(20.0point.)
Which conditions does an advanced ACL define rules based on?
[A].Blocking
[B].Discarding
[C].Learning
[D].Forwarding
[A].L2TP VPN
[B].GRE VPN
[D].SSL VPN
[A].AC-mode
[B].AP-mode
[C].FTP-mode
[D].SFTP-mode
Question44 Multiple Choice(20.0point.)
Which of the following statements about ARP packet sending are correct?
[A].SNMPv1
[B].SNMPv2
[C].SNMPv2c
[D].SNMPv3
Question46 Multiple Choice(20.0point.)
Which of the following statements about OSPF area are correct?
[A].If only one area exists on the network, the area ID must be 0.
[B].If a router belongs to multiple areas on the network, one of these areas must be
the backbone area.
[C].Only OSPF routers in the same area can establish neighbor and adjacency
relationships.
[D].In the same AS, routers in multiple OSPF areas share the same LSDB.
[C].An edge port can transit from the Disable to Forwarding state without any delay.
[A].Ethernet
[B].Frame relay
[C].PPP
[D].HDLC
[A].Hot standby
[B].Link aggregation
[C].Persistent connection
[D].Static route
[A].L2TP VPN
[B].GRE VPN
[C].IPSec VPN
[D].SSL VPN
Question59 Multiple Choice(20.0point.)
What types can APs be categorized into by
environment?
[A].Indoor AP
[B].Building AP
[C].Outdoor AP
[D].Indoor distributed AP
[A].HTTP
[B].IGMP
[C].Telnet
[D].TCP
Question46 Multiple Choice(20.0point.)
Which of the following statements about the
preference of static routes on a Huawei
device are correct?
[A].The preference value of a static
route is in the range from 0 to 255.
[A].Identification
[B].Protocol
[C].Flags
[D].Fragment offset
[A].19-22-01-63-23
[B].68-F7-23-8B-33-A2
[C].00-3C-1G-A1-23-B2
[D].00-00-11-11-11-AA
[A].display version
[B].debugging ip packet
[C].display current-configuration
[D].display history-command
[A].Authentication
[B].Authorization
[C].Audit
[D].Accounting
[A].WPAN
[B].WLAN
[C].WMAN
[D].WWAN
[A].Feeder
[B].Optical Fiber
[C].Twisted pair
[D].Coaxial cable
Question57 Multiple Choice(20.0point.)
Which flag bits in the TCP header
participate in the TCP three-way
handshake?
[A].SYN
[B].URG
[C].ACK
[D].FIN
Question58 Multiple Choice(20.0point.)
Which of the following statements about a
broadcast domain are correct?
examination ends!
Test paper code: XQIGNE2XOEOWBV12Z5
Test paper name: Huawei ICT Competition North Africa 2018
Ethiopia Preliminary exam
manager: 王东/wwx298448
Total test paper score:1000.0
Login account:fitwi.h/Fitwi.H
Score:280.0
Test paper hand-in status: Normal test paper hand-in
Question20 Single(15.0point.)
examination ends!
Test paper code: XQIGNE2XOEOWBV12Z5
Test paper name: Huawei ICT Competition
North Africa 2018 Ethiopia Preliminary
exam
manager: 王东/wwx298448
Total test paper score:1000.0
Login account:fit.h/Fit.H
Score:430.0
Test paper hand-in status: Normal test paper
hand-in