Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H12-261_V3.0 has been withdrawn.

H12-261_V3.0 Practice Exam Questions with Answers HCIE-Routing & Switching (Written) V3.0 Certification

Question # 6

What is wrong about the description of the permanent multicast address?

A.

All running OSPF Protocol routers are listening 224.0.0.5

B.

All routers are listening 224.0.0.2

C.

All running PIM Protocol routers are listening 224.0.0.100

D.

All hosts and routers in the network segment are listening 224.0.0.1

Full Access
Question # 7

As shown in the figure, a company has built an OSPF network. The links in the figure all form an OSPF adjacency relationship, and all OSPF devices announce their own loopback interface addresses. One day, the two links of S1-R2 and S2-R1 suddenly failed. In order to check whether the network is running normally, the engineer checked the equipment status. Which of the following descriptions is correct?

H12-261_V3.0 question answer

H12-261_V3.0 question answer

A.

R5 can learn the loopback route of R2 normally

B.

R3 cannot learn the loopback route of R2

C.

R1 can normally learn the loopback route of R2

D.

R3 can learn the loopback route of R2 normally

Full Access
Question # 8

BGP4+ carries the next-hop address of the IPv6 route through the next-Hop attribute in the Update packet.

A.

TRUE

B.

FALSE

Full Access
Question # 9

On a newly deployed routerWRED is configured on HW., which of the following descriptions about WRED features is correct? (multiple choice) ( confirmed)

A.

WREDDifferent drop thresholds and packet loss rates can be set for packets with different priorities

B.

When traffic exceeds a minimum threshold, WRED starts dropping all ingress traffic (tail drop)

C.

Avoid global synchronization by selectively dropping multiple TCP streams

D.

Low-bandwidth traffic is more likely to drop than high-bandwidth traffic

Full Access
Question # 10

The MSTP switch regards the RSTP switch as an MSTP domain composed of a single switch, and the MSTP switch parses the RSTBPDU into MSTBPDU, where the IRPC is 0.

A.

True

B.

false

Full Access
Question # 11

Regarding the description of IGMP Snooping, is it correct?

A.

IGMP Snooping does not consume the CPU of the switch

B.

IGMP Snooping solves the problem of multicast multicast broadcast at Layer 3

C.

IGMP Snooping runs at the link layer and is a multicast constraint mechanism on a Layer 2 Ethernet switch to manage and control multicast groups.

D.

IGMP Snooping establishes a MAC multicast address table by monitoring the IGMP messages sent by the host.

Full Access
Question # 12

Which of the following statements about VXLAN gateways is false?

A.

Layer 2 gateway:It is used to solve the problem of tenants accessing the VXLAN virtual network, and can also be used for subnet communication of the same VXLAN virtual network.

B.

Layer 3 gateway:Used for cross-subnet communication of VXLAN virtual networks and access to external networks.

C.

VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways.

D.

The Layer 2 gateway is bound to the VPN instance.

Full Access
Question # 13

OSPFAmong the five types of LSAs are used to transmit external routes, which of the following statements about the five types of LSAs is incorrect (single choice)

A.

Five types of LSA by ASBR advertises and floods the OSPF network in non-Stub/NSSA areas

B.

A router in the same area as the ASBR can calculate the external route through the intra-area LSA and Category 5 1SA

C.

The FA address is included in the five types of LSAs. The FA address is 0.0.0.0, which is only reserved and has no practical effect.

D.

existFive types of LSAs can be filtered by configuring corresponding filtering policies on ABR or ASBR.

Full Access
Question # 14

What is the protocol number of the IP header of the VRRP packet?

A.

116

B.

118

C.

112

D.

114

Full Access
Question # 15

What type of prefixes a router running BGP will advertise to its IBGP neighbors (assuming the router is not configured as a route reflector) ?

A.

The prefix is learned through other IBGP neighbors, or the prefix is learned from EBGP neighbors, or the prefix is learned through route importarrived

B.

Prefixes that exist in the routing table

C.

The prefix is learned through other BGP neighbors, or the prefix is locally through network or route introduction learned

D.

The prefix is learned via EBGP neighbors, or the prefix is locally via network or route introduction learned

E.

The prefix is learned from EBGP neighbors, or the prefix is learned from RR

Full Access
Question # 16

The intranet users of a company use the no-pat mode of NAT to access the Internet. If all the public network IP addresses are used, what will happen to the intranet users who access the Internet subsequently?

A.

Subsequent intranet users will not be able to access the Internet

B.

Automatically switch from NAT to PAT to access the Internet

C.

Synchronize the message to other MT conversion devices for NAT conversion D. Squeeze out the previous user and force NAT conversion to access the Internet

Full Access
Question # 17

In the process of using the LACP protocol, which of the following descriptions is correct? (multiple choice)

Eth can be avoided by-Trunk interface frequently flaps interface due to physical link eth-trunk 1

lacp preempt enable

lacp preempt delay delay-time

You can configure the source IP address for load balancing in an enabled link aggregation group through the following commands: interface eth-trunk 1

load-balance src-dst-ip

Member interfaces can be removed from an enabled link aggregation group with the following command: interface GigabitEthermet0/0/1 shutdownwn

A.

interface GigabitEthernet0/0/1 undo eth-trunk 1

B.

interface GigabitEthernet0/0/1 undo shutdownwn

C.

Member interfaces can be added to a link aggregation group enabled by the following command: interface GigabitEthermet0/0/1 shutdownwn

D.

interface GigabitEthernet0/0/1 trunkport GigabitEthernet0/0/1 interface GigabitEthermet0/0/1 undo shutdownwn

Full Access
Question # 18

What is Huawei's SDN controller using VXLAN technology?

A.

Agile Controller-Campus

B.

Agile Controller-WAN

C.

Agile Controller-DCN

Full Access
Question # 19

Which of the following BGP attributes is not a BGP routeUp date. What must be included in the message? (multiple choice)

A.

AS PATH

B.

NED

C.

Oorigin

D.

Local -Preference

Full Access
Question # 20

The engineer uses 3 routers to test IPv6 services. He wants to realize the interconnection of IPv6 networks by running OSPFV3. Which of the following statements about the election of the network DR is correct?

H12-261_V3.0 question answer

A.

After the network converges, R1 is DR

B.

After the network converges, a new broadcast link is set to R4, and the priority of R4 is 150. When the network converges again, R4 is DR

C.

After the network converges, R1 is powered off and restarted, and when the network converges again, R3 is the DR

D.

After the network converges, the engineer modifies the priority of R1 to 100, the priority of R2 to 10, and the default value of R3. When the network is closed again, R1 is DR, R2 is BDR

Full Access
Question # 21

The following are for the source side in PIM-SMWhich of the descriptions of the process of DR registering with RP is correct?

A.

The registration packet encapsulates multicast service data.

B.

RPA registration stop message is sent upon receipt of a registration message.

C.

The registration message is used to construct the RPT tree between the source DR and RP.

D.

The registration message is a multicast message.

Full Access
Question # 22

VLAN L3 Gateway is used to implement different V?The three-layer logical interface of ANW virtual network communication is?

A.

VBDIF interface

B.

Layer 2 sub-interface

C.

VLANIF interface

D.

NVE interface

Full Access
Question # 23

IGMP SSM Mapping By statically binding multicast sources to multicast groups, IGMPv1 with IGMPv2 group members can also access SSMMulticast network. The following about IGMP SSM Mapping statementMistakeYes? (single choice)

A.

SSM The address of the multicast group is 232.0.0.0~232.255.255.255

B.

IGMP SSM Mapping Does not handle IGMPv3 report message. In order to ensure that any version of IGMP runs on the same network segment hosts can get SSM service, you need to run IGMPv on the interface of the multicast router connected to the network segment where the member host is located3

C.

If IGMP is not enabled SSM Mapping Features, IGMPv1 and IGMPv2 Neither supports the deployment of SSM The multicast

D.

option of the mode is missing. The ABC option is correct. Anyway, ABC is not selected.

Full Access
Question # 24

As shown in the figure, the router load shares the communication traffic between branch network 1 and branch network 2. In this case, configure the configuration on the physical interface of the router.

URPF must use loose mode to prevent source IP address spoofing attacks.

H12-261_V3.0 question answer

A.

True

B.

false

Full Access
Question # 25

What is wrong about the description of RRP fast switching?

A.

Use VRRP to monitor the BFD session or EFM function. After the BFD session or EFM session status changes, the VRRP module will be notified to realize fast VRP switching

B.

When the VRRP voice group monitors ordinary BFD, when the BFD state changes, the active and standby states will be changed by modifying the priority of the backup group. When the monitored BFD session state is restored, the priority of the router in the backup group will be restored. to the original value

C.

A VRRP backup group cannot monitor Peer BFD, Link BFD and Norma.1BFD at the same time.

D.

If multiple BFDs are configured to monitor at the same time, the configurations are related to each other and may affect the

Full Access
Question # 26

Which of the following descriptions about the characteristics of 802.1S deployment is correct?? (confirm)

A.

All VLANs share one spanning tree instance

B.

Multiple bridges share a spanning tree instance

C.

eachVLAN owns a spanning tree instance

D.

multipleVLANs share a spanning tree instance

Full Access
Question # 27

IPSGWhat check frames can be set? (multiple choices))

A.

Outgoing interface

B.

MAC address

C.

IP address

D.

VLAN ID

Full Access
Question # 28

VXLAOne BD in N can correspond to multiple VNIs.

A.

True

B.

false

Full Access
Question # 29

The switches SWA and SWB are connected together through 2 Ethernet links, and the switch SWA has the following interface configuration

[SWA]interface Gigabitethernet 1/0/1

[SWA-gigabitethernet1/0/1]port link-type trunk

[SWA-gigabitethernet1/0/1]port trunk allow-pass vlan 1 10 100

[SWA]interface Gigabitethernet 1/0/2

[SWA-gigabitethernet1/0/2]port link-type trunk

[SWA-gigabitethernet1/0/2]port trunk allow-pass vlan 1 10

Configure link aggregation to tie the two links together. If the configuration on SWB is correct, it can be known from the above information

A.

Gigabitethernet1/0/1 and Gigabitethernet1/0/2 can join the same aggregation group without changing the current configuration

B.

After link aggregation is configured on both SWA and SWB, if the switches SWA and SWB enable MSTP, then the interface status of Gigabitethernet1/0/1 and Gigabitethernet1/0/2 in MSTP is the same

C.

Because of different link types, Gigabitethernet1/0/1 and Gigabitethernet1/0/2 cannot join the same aggregation group

D.

Only by changing the configuration of Gigabitethernet1/0/2 to be consistent with Gigabitethernet1/0/1, the two can join the same aggregation group

Full Access
Question # 30

ISIS Elections in Broadcast Multiple Access NetworkDIS, which of the following statements about DIS is correct?

A.

ISIS elects by comparing prioritiesDIS, if the priority is the same, compare the MAC address

B.

In a broadcast multiple access network,DIS sends Hello three times as often PDU

C.

DIS ensures database synchronization by periodically sending CSNP messages

D.

The DIS supports the preemption function. After the new DIS is successfully preempted, it does not need to flood any LSP packets.

Full Access
Question # 31

Since BGP is an EGP routing protocol, BGP routing policies can only be deployed between EBGP neighbors. The routing policy deployed between neighbors is invalid.

A.

TRUE

B.

FALSE

Full Access
Question # 32

What is wrong with the description of MAC address spoofing attacks?

A.

The MAC address spoofing attack mainly uses the MAC address learning mechanism of the switch

B.

The MAC address spoofing attack will cause the switch to learn the wrong mapping between the Mac address and the IP address

C.

An attacker can implement a MAC address spoofing attack by sending forged source Mac address data frames to the switch

D.

A MAC address spoofing attack will cause the data to be sent by the switch to the correct destination to be sent to the attacker

Full Access
Question # 33

Compared with IGMPv1, what improvements have the IGMPv2 protocol made?? (multiple choice)

A.

Added maximum response time field

B.

Added out-of-group packets

C.

Added specific group query message

D.

Added specific source group query packets

Full Access
Question # 34

What is the main reason why RSTP converges faster than STP?

A.

RSTP adds types of port states

B.

RSTP has less overhead

C.

RSTP does not converge based on timers

D.

RSTP has smaller timers

Full Access
Question # 35

The HW device network administrator plans to migrate the multicast network from IGMPv2 to IGMPv3. What is the improvement of IGMPv3 compared to IGMPv2? .

A.

IGMPv3 adds the function of specifying a multicast group not to join a specific multicast source for a host

B.

IGMPv3 adds the function of specifying a multicast group for a host to join a specific multicast source

C.

IGMPv3 adds between source and local IGMP queriersRequest-to-send andClear-to-send

D.

IGMPv3 removed for membership reportingReport-suppression Features

E.

IGMPv3 removes the ability to join all sources with a wildcard in a multicast group

Full Access
Question # 36

A multi-protocol network, the topology is shown in the figure. Please study the topology carefully, router R4(In Area1) Import the routes learned through BGP into the OSPF process. So what types of LSAs will R3 advertise to Area 0?

H12-261_V3.0 question answer

A.

5Class LSA

B.

7Class LSA

C.

1Class LSA

D.

4Class LSA

E.

Class 2 LSA

Full Access
Question # 37

In the process of viewing the debug output through the SSH terminal, a lot of information pops up. Which of the following operations can make the monitor terminal no longer pop up the debug message?

A.

Open Notepad, enter undo debugging all, copy the command line, paste it into the Monitor interface

B.

Exit the current Monitor interface, re-SSH into the device to open a new Monitor interface

C.

Open Notepad, enter undo terminal debugging, copy the command line, and paste it into the Monitor interface

D.

Open Notepad, enter undo terminal monitor, copy the line command, and paste it into the Monitor interface

Full Access
Question # 38

OSPFv3 Adopted with OSPFv2 The same route advertisement method, in OSPFv3 Area views are advertised through the network command.

A.

TRUE

B.

FALSE

Full Access
Question # 39

As shown below,R1 and R2 have established a Level 2 neighbor relationship. The key configuration is as follows. The following statement about the routing entry of R2 is correct

H12-261_V3.0 question answer

A.

2020: The /64 router will appear in the IP routing table

B.

The 2022:/64 router will appear in the IP routing table

C.

2019: The /64 router will appear in the IP routing table

D.

The 2021:/64 router will appear in the IP routing table

Full Access
Question # 40

As shown in the figure, which of the following options can satisfy two routers to establish an ISIS neighbor relationship?

H12-261_V3.0 question answer

A.

Both routers are Level-1type.

B.

Both routers remain the default type.

C.

One of the two routers can be a Level-1-2 type, and the other can be a Leve1-1 type.

D.

ISIS with two routersProcess IDs must be the same.

Full Access
Question # 41

ISIS does not send during neighbor establishment under P2P network typeCSNP message.

A.

True

B.

false

Full Access
Question # 42

A routerRouter LSA As shown in the picture, which of the following statements is wrong? (single choice)

H12-261_V3.0 question answer

A.

This router is the DR

B.

This router has established an adjacency relationshipC. This router supports external route import

C.

The router of this router ID for 10.0.12.1

Full Access
Question # 43

Both OSPFv3 and ISIS are running on the router, and OSPFv3 routes need to be imported into ISIS. Which of the following import configurations is correct: (Multiple Choice)

A.

Huawei] isis 1

[Huawei-isis-1] is-level level-1

[Huavvei-isis-1] network-entity 47.000.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1 [Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

B.

Huawei] isis 1

[Huawei-isis-1] is-level level-1

[Huavvei-isis-1] network-entity 47.000.0000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 [Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

C.

[Huawei] isis 1

[Huavvei-isis-1] network-entity 47.0001.000.0000.0002.00 [Huawei-isis-1] ipv6 enable topology standard

[Huawei-isis-1] ipv6 import-route ospfv3 1 level-1 [Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

D.

[Huawei] isis 1

[Huavvi-isis-1] network-entity 47.0001.0000 000002.00 [Huawei-isis-1] import-route ospfv3 1

[Huawei-isis-1] quit [Huawei] ospfv3 1

E.

[Huawei-ospfv3-1] routerid 2.2.2.2

F.

[Huawei] isis 1

[Huawei-isis-1] is-level level-1

[Huavvei-isis-1] network-entity 47.0001 0000000.0002.00

[Huawei-isis-1] import-route ospfv3 1 level-1 [Huawei-isis-1] quit

[Huawei] ospfv3 1

[Huawei-ospfv3-1] router-id 2.2.2.2

Full Access
Question # 44

In Huawei equipment, when ISIS imports external routes and sets the external route label of the routing information, the ISIS MetThe ric type does not need to be modified, keep silentAccept it. ( confirmed)

A.

True

B.

false

Full Access
Question # 45

Look at the picture and talk?

H12-261_V3.0 question answer

A.

GE0/0/2 on STB is an alternative port

B.

GE0/0/1 on SWA is a backup port

C.

GE0/0/1 on SWB is an alternative port

D.

SWB will become the root bridge

Full Access
Question # 46

command ip as path-filterr 1 permit ^12.*74$ can match which AS_ PATH?

A.

AS_ _PATH (321 12 2374)

B.

AS_ _PATH (123621 7432374)

C.

AS_ PATH (125328 74 twenty three)

D.

AS_ PATH (32 1274 twenty three)

Full Access
Question # 47

What are the three modes of sending IPv4 packets? A. Unicast

B. Broadcast

C. Multicast

D. Anycast

Full Access
Question # 48

There is no routing protocol running on the router HW and only a default route is used to reach the remote network. Use the extension to ping the remote file server address 10.5.40.1 on the router. The result of pinging on the router is presented as "Request time out". According to the above description, the following analysis is wrong

Yes?

A.

The next-hop router of router HW has no path to reach the destination address

B.

Ping was successful, but congestion occurred on the path to the destination

C.

ICMP packets can reach the destination address, but the destination device fails to reply

D.

router HWThere is no valid route to the destination address

E.

There is a firewall in the remote destination network, and I have not been releasedCMP traffic

Full Access
Question # 49

aboutMPLSBasic forwarding process, which of the following descriptions is wrong? (single choice)

A.

The transmission node device will replace the existing stack top label (outermost label) with the label allocated by the next hop device.

B.

When IP Packet enters MPLS domain, check the destination IP Tunne corresponding to the addressl ID Is the value 0x0 if Tunnel ID value is 0x0, then enter MPLS forwarding process.

C.

when IP Packet enters MPLS domain, MPLS The boundary device is in the packet layer 2 header and IP Insert a new label between the headers

sign.

D.

By default, PHP is supported Egress The label value assigned by the node to the penultimate hop node is 3.

Full Access
Question # 50

Which of the following statements about VLAN aggregation is correct?

A.

Sub-VLAN contains physical interface, and can establish three-layer VLANIF interface

B.

Super-VLAN contains only physical interfaces and cannot establish a three-layer LANIF interface

C.

Sub-VLAN is used to isolate broadcast domains

D.

A Super-VLAN can contain one or more Sub-VLANs

Full Access
Question # 51

Network managers can use CAR technology in traffic supervision. Which of the following techniques can be used in CAR?

A.

Double barrels with two speeds

B.

Single barrels with single speed

C.

Three barrels with single speed

D.

Double barrels with single speed

Full Access
Question # 52

When DLDP detects the existence of a unidirectional link in the fiber, the default actions of Huawei equipment include:The DLDP state machine transitions to the Disable state; outputs Trap information; automatically sets the interface to the blocked state. ( confirmed)

A.

True

B.

false

Full Access
Question # 53

In PIM-SM , the following about PIM Join Message. Is the description correct? (single choice)

A.

PIM Join information.Every 60 Sent once per second to refresh the upstream router m for the multicast treeroute State

B.

PIM Join message per 3 Sent once every minute to refresh the upstream router mroute for the multicast tree State

C.

the upstream router sends a PIMJoin acknowledgement in response to each received from the downstream router

D.

PIM Join message PIM Join message. Only sent when the multicast tree is first established

Full Access
Question # 54

Which of the following advanced features does BGP EVPN support?

A.

ARP broadcast suppression

B.

VRRP over VXL AN

C.

Multi-active gateway

D.

VXL AN Qos

Full Access
Question # 55

A router runs IS-IS, and its output information is shown in the figure. Which of the following statements is correct?

H12-261_V3.0 question answer

A.

The circuit-level of the s4/0/0 interface is Leve1-1

B.

The Cost value of the s4/0/0 interface is 20

C.

The s4/0/0 interface sends an IIH cycle of 30S

D.

The s4/0/0 interface supports IPv6

Full Access
Question # 56

When a BGP EVPN Type2 route is used to transmit an IRB type route, the information carried includes?

A.

host IP address

B.

Host MAC address

C.

Layer 3 VNI

D.

Layer 2 VNI

Full Access
Question # 57

There are routing tools that are not only used for BGP routing protocols.

A.

IP-Prefix

B.

community-filterr

C.

as-path- -filter

D.

ACL

Full Access
Question # 58

OSPThe Option field in Fv3 appears in all LSAs

A.

True

B.

false

Full Access
Question # 59

Regarding the authentication of the ISIS protocol, the correct statement is:(multiple choice)

A.

Interface authentication can be used to authenticate Level-1 and Level-2 hello packets

B.

After interface authentication is configured, the IIH sent by the router must carry the authentication TL.V

C.

After configuring the area authentication, the IIH, S sent by the routerNP, LSP must be connected with certified TLV

D.

If the two routers are configured for area authentication and interface authentication respectively, and the passwords are the same, the two routers can establish a neighbor relationship.

Full Access
Question # 60

Which of the following statements about the VRRP protocol is correct?

A.

Both VRRPv2 and VRRPv3 support authentication

B.

VRRPv3 does not support the authentication function, while VRRPv2 supports the authentication function.

C.

VRRPv2 is only applicable to IPv4 networks, and VRRPv3 is only applicable to IPv6 networks.

D.

Masterr The owner of the IP address VThe RP priority is 255, so the configurable priority range is 0-254

Full Access
Question # 61

Which of the following descriptions about the OSPF protocol are correct?

A.

AS-External-LSA does not belong to any area

B.

The cost value of the second type of external route is only the AS external cost value, ignoring the AS internal cost value

C.

AS-External-LSA describes the path to the AS external route, and the flooding range is AS external

D.

AS-External-LSA Describes the path from the router to the ASBR

Full Access
Question # 62

Which scenarios can use AS-path-filter?

A.

A carried by routeSPATH attribute to filter routes received from BGP neighbors. For example the command peer xxxx as-path-fliter import

B.

Route apply clause in policy

C.

A carried by routeSPATH attribute to filter routes sent to BGP neighbors. For example the command peer xxxx as-path-ilter export

D.

if-match clause in Route-policy

Full Access
Question # 63

The association between LDP and IGP means that IGP suppresses the advertisement of reachable routes to ensure that LDP and IGP cooperate to complete network convergence, so that IGP and LDP maintain the same path, minimize traffic loss, and improve the reliability of the entire network.

A.

True

B.

false

Full Access
Question # 64

Which of the following statements about BGP route reflectors is correct?

A.

Cluster-List is an optional non-transition attribute used to prevent loops within a cluster.

B.

Routes learned from clients, advertised to all non-clients and clients of this RR.

C.

A backbone network is divided into multiple reflection clusters, eachRR configures her RRs as non-clients, and establishes IBGP full connections between RRs.

D.

The trigger-ID attribute is generated by a route reflector (RR) and is used to prevent loops between clusters.

Full Access
Question # 65

Four routers run IS-IS and have established adjacency relationship. The area number and router level are marked as shown in the figure. If route penetration is configured on the R3 device, what is the Cost value of R4 reaching 10.0.2.2/32?

H12-261_V3.0 question answer

A.

30

B.

50

C.

80

D.

40

Full Access
Question # 66

Which of the following options use tunneling to communicate between IPv6 addresses?

A.

Dual Stack

B.

6 to 4

C.

ISATAP

D.

NAT64

Full Access
Question # 67

How many interfaces of the router have IS-IS enabled, the output is as follows:

H12-261_V3.0 question answer

A.

2

B.

3

C.

0

D.

1

Full Access
Question # 68

OSPF There will definitely not be a type of LS in the stub areaA

A.

Type7

B.

Type5

C.

Type4

D.

Type3

Full Access
Question # 69

Which of the following descriptions about the RD attribute filter of BGP is correct?

A.

If not configuredRD-filter. However, if this RD-filter is used for filtering, the matching result is deny.

B.

If configuredRD-filter, but the RD of the route does not match any of the RDs defined in the rule, the default matching result is permit.

C.

Multiple rules are matched according to the configuration order.

D.

RD-filter Between configured rules is always "or"Relationship.

Full Access
Question # 70

Which of the following descriptions about MUX VLANs in Huawei switches is correct? (Single Choice)

A.

MUX VLAN is divided into Principal VL AN and Subordinate VLAN is divided into Separate VLAN and lsolate VLAN

B.

each Separate VLAN can bind multiple Principals VLAN

C.

in the same VLAUnder N, MUX VLAN can and Super Mixed use of VLANs

D.

Principal Port can and MUX All ports within the VLAN communicate

Full Access
Question # 71

In the intra-domain MPLS BGP VPN network, when the data packet enters the public network for forwarding, it will be encapsulated with two layers of MPLS labels. Which of the following descriptions about the two layers of labels is wrong?

A.

By default, the router assigns the same label value to all VPNv4 routes destined for the peer PE.

B.

The egress PE uses the inner layer label when judging which egress CE the message should be sent to.

C.

MPLS BGP VPN uses two layers of labels, the public network label (also called the outer label) and the private network label (also called the inner label).

D.

The private network label is used by NP-BGP It is carried and distributed when the route is passed, and the public network label is set by LDP Agreement distribution.

Full Access