Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! H31-211 has been withdrawn.

H31-211 Practice Exam Questions with Answers HCNA - Carrier IP Certification

Question # 6

RlP protocol, in the RIPV2 version, which address is sent by default to the update message?

A.

224.0.0.2

B.

224.0.0.9

C.

224.0.0.5

D.

224.0.0.13

Full Access
Question # 7

The following statement about the message used by LCP for link layer parameter negotiation is wrong?

A.

Configure-Request: The first packet that appears in the link layer negotiation process. The packet indicates that the peer-to-peer negotiation of link layer parameters begins.

B.

Configure-Ack: Receives a Configure-Request packet from the peer. If the value of the negotiated parameter is fully accepted, the packet responds.

C.

Configure-Nak: Receives the Configure-Request packet sent by the peer. If the value of the negotiated parameter is not recognized by the local end, the packet is sent and the configuration parameters acceptable to the local end are received.

D.

Configure-Reject: Sends a Configure-Request packet from the peer. If the value of the negotiated parameter is not recognized by the local end, the packet is sent and carries the configuration parameters acceptable to the local end.

Full Access
Question # 8

One-arm routing implements VLAN interworking. The number of router sub-interfaces depends on the number of VLANs that are accessed.

A.

True

B.

False

Full Access
Question # 9

According to the different protocols applied by the routing protocol, what kind of routing protocols can be divided into? (multiple choice)

A.

Multicast routing protocol

B.

Unicast

C.

Distance vector

D.

Link status

Full Access
Question # 10

What kinds of frame types does HDLC have? (multiple choice)

A.

Information frame

B.

Monitoring frame

C.

Unnumbered frames

D.

Retransmission frame

Full Access
Question # 11

Link state routing protocol, which factors will usually be considered to calculate the route to the destination network segment?

A.

Hops to the destination address

B.

Manually specified next hop address

C.

Link bandwidth resource information

D.

Whether the outgoing interface of the route aggregates the port

Full Access
Question # 12

In the OSI reference model, which of the following options is composed of service requests and responses between applications in different devices?

A.

Data link layer

B.

Session layer

C.

Network layer

D.

Application layer

Full Access
Question # 13

Twisted pair can be classified as? (multiple choice)

A.

Direct network cable

B.

Crossover cable

C.

Interwoven network cable

D.

Shielded network cable

Full Access
Question # 14

The sender of the data communication system cannot be the receiver.

A.

True

B.

False

Full Access
Question # 15

A common PPP authentication protocol is PAP and CHAP. The two ends of a PPP link can use different authentication protocols to authenticate the peer. However, the authenticated party must support the authentication protocol used by the authenticator and correctly configure the authentication information such as the username and password.

A.

True

B.

False

Full Access
Question # 16

Which Telnet protocol is used for data transmission?

A.

RTP

B.

SIP

C.

UDP

D.

TCP

Full Access
Question # 17

Which of the following is not the bottom layer of the OSI reference model?

A.

Physical layer

B.

Data link layer

C.

Transport layer

D.

Network layer

Full Access
Question # 18

I will assign you a Class C IP network 192.16.24.0. After dividing 7 subnets, what is the maximum number of hosts per subnet?

A.

30

B.

31

C.

32

D.

33

E.

34

Full Access
Question # 19

A MAC address consists of 48 bits and is generally expressed in 12-bit dotted decimal notation. What kind of address does a MAC address consisting of all 1s stand for?

A.

Virtual address

B.

Multicast address

C.

Broadcast address

D.

Unicast address

Full Access
Question # 20

Which of the following statements regarding proxy firewall are correct? (Select multiple)

A.

Proxy firewall does not support abundant services.

B.

The performance of proxy firewall is higher.

C.

Proxy firewall has better security compared with packet filtering firewall.

D.

For the proxy firewall, a module must be developed for each application. Therefore, the development cost is high.

Full Access
Question # 21

Which attribute is selection of a root bridge based on when the spanning tree is calculated by the STP?

A.

Path Cost

B.

Port ID

C.

Bridge ID

D.

Port Cost

Full Access
Question # 22

How many hosts are available for a class B IP address?

A.

2M

B.

16K

C.

64K

D.

254

Full Access
Question # 23

This type of firewall directly obtains the information such as source IP address, destination IP address, source TCP/UDP port, destination TCP/UDP port and protocol number in the packet header and filters the packets based on the defined policy. Which of the following is the firewall described above?

A.

Proxy firewall

B.

Packet filtering firewall

C.

Stateful firewall

D.

Link layer firewall

Full Access
Question # 24

Which of the following descriptions about function of VRRP is true?

A.

VRRP improves the reliability of the default gateway in the network.

B.

VRRP is mainly used for load balancing.

C.

VRRP makes the routing protocols converge faster.

D.

VRRP provides the same default gateway for different network segments, thus simplifies gateway configuration of PCs in the network.

Full Access
Question # 25

OSPF runs over the IP protocol and the IP protocol No. used by which OSPF?

A.

89

B.

512

C.

80

D.

2328

Full Access
Question # 26

Which of the following values is the default preference value for static route on the VRP platform?

A.

60

B.

20

C.

100

D.

0

Full Access
Question # 27

Which of the following statements regarding routing convergence is correct?

A.

Convergence is a process of combining the routing tables of two routers.

B.

Convergence is a process of synchronizing all routing tables for all the routers in the network. It is the process for a router to reach the stable and consistence state after the network changes.

C.

Convergence is a process of establishing neighbor relationships between any two routers by sending hello packets.

D.

Convergence is a process that occurs due to network topology changes.

Full Access
Question # 28

In an OSPF network, an ASBR router advertises the information about the routes outside an AS to the AS. Which of the following routers can function as an ASBR?

A.

IR

B.

A router that does not belong to the backbone OSPF area

C.

ABR

D.

A router that belongs to the backbone OSPF area

Full Access
Question # 29

Which of the following statements are correct? (Select multiple)

A.

Some of the dynamic routing protocols calculate the best path base on the cost value. However, Different routing protocol calculates the metric in different ways.

B.

The calculation of cost may be based on "single" link attribute or several link attributes such as delay, hop count, bandwidth and etc.

C.

When several dynamic routing protocols have the best routes to the same destination, all these routes will be added to the routing table.

D.

The calculation method of the preference and cost in the routing table are the same.

Full Access
Question # 30

Which of the following fibers allows for multiangular incidence of "multiple" beams of light for transmission?

A.

4-core fiber

B.

"Single-mode" fiber

C.

Active fiber

D.

Multimode fiber

Full Access
Question # 31

Which of the following communication types are defined based on information interaction between the transmitter and the receiver? (Select multiple)

A.

Simplex

B.

Half-duplex

C.

Duplex

D.

Auto-negotiation

Full Access
Question # 32

How many bits does a MAC address have?

A.

24

B.

6

C.

12

D.

48

Full Access
Question # 33

Which layer is used to implement internal communication of a same IP network segment in an IP network?

A.

Layer 3

B.

Layer 2

C.

Application Layer

D.

Physical Layer

Full Access
Question # 34

Which of the following is the correct description of the configuration BPDU generation? (multiple choice)

A.

As long as the port is enabled with STP, the configuration BPDU will be sent from the designated port at regular intervals.

B.

When the root port receives the configuration BPDU, the device where the root port resides will copy a configuration BPDU to each of its designated ports.

C.

When the designated port receives a configuration BPDU that is worse than itself, it will immediately send its own BPDU to the downstream device.

D.

The topology of the non-root bridge changes. The BPDU is notified by configuring the BPDU.

Full Access
Question # 35

In the VRP system platform, output such an error Error: Unrecognized command found at '^' position, which are the possible reasons? (multiple choice)

A.

The parameter type is wrong.

B.

No command found

C.

Input command is incomplete

D.

No keywords found

Full Access
Question # 36

The following may result in the inability to establish an adjacency relationship between OSPF routers? (multiple choice)

A.

The interface network segment is inconsistent

B.

Ethernet or NBMA network interface priority is all zero

C.

Timer parameters are inconsistent

D.

The same router ID

Full Access
Question # 37

The protocol converges quickly and uses the link bandwidth to calculate the best route to the destination network segment. It is commonly used in routing protocols for medium and large networks. What are the options? (multiple choice)

A.

BGP

B.

OSPF

C.

ISIS

D.

RIP

Full Access
Question # 38

The network administrator has purchased a new Eudemon firewall. I want it to work on the current network, but I can't change the current network configuration. At this time, what mode should he use to make the Eudemon firewall work?

A.

Routing mode

B.

Transparent mode

C.

Mixed mode

D.

Proxy mode

Full Access
Question # 39

Which of the following types of ports allow transparent transmission of VLANs? (multiple choice)

A.

Trunk

B.

Access

C.

Hybrid

D.

Normal

Full Access
Question # 40

When configuring a static route on a router, what parameters can be configured in the | field? (multiple choice)

A.

Outlet

B.

Outbound interface IP address

C.

Next hop address

D.

null 0

Full Access
Question # 41

In HDLC, the start and end fields of the flag frame are a fixed value, is it?

A.

11111111

B.

1111110

C.

0

D.

11111110

Full Access
Question # 42

A classful route update means that the RIP carries the subnet mask information when sending a route update.

A.

True

B.

False

Full Access
Question # 43

The parameter blackhole in the static route configuration command indicates?

A.

Unreachable routing

B.

Black hole routing

C.

Routing loop

D.

Route iteration

Full Access
Question # 44

What parts of the general network address are composed? (multiple choice)

A.

Logical address

B.

Link address

C.

Network address

D.

Host address

Full Access
Question # 45

For the configuration of a VLAN port, what is the correct option described below?

A.

When a port is removed from a VLAN other than the default VLAN, the port will be added to the default VLAN.

B.

When adding a port that has been configured to another VLAN to another VLAN, you must first remove the port from the original VLAN by using the configuration command.

C.

You can configure a trunk port to this VLAN when you configure the port that belongs to the VLAN using the port command in the VLAN view.

D.

In the VLAN view, you can use the undo port command to delete the port of the default VLAN 1.

Full Access
Question # 46

The transmission link used by Frame Relay to transmit data is a logical connection, not a physical connection. Multiple logical connections can be multiplexed on one physical connection, which enables bandwidth multiplexing and dynamic allocation.

A.

True

B.

False

Full Access
Question # 47

The biggest feature of HDLC is support for encrypted transmission.

A.

True

B.

False

Full Access
Question # 48

Tracert records the () of each ICMP TTL timeout message, so that the user can provide the IP address through which the message arrived at the destination.

A.

Destination port

B.

Source port

C.

Source IP address

D.

Destination IP address

Full Access
Question # 49

Each OSPF router advertises LSAs to the outside through the flooding link state. Which ones are included? (multiple choice)

A.

Available ports

B.

reachable neighbors

C.

Information about neighboring routers

D.

Local link status information

Full Access
Question # 50

Which of the following techniques is used to convert a private network address to a public network address?

A.

NAT

B.

DNS

C.

FTP

D.

HTTP

Full Access
Question # 51

PPP data frames cannot be transmitted directly over the link. The transmission of PPP data frames on a serial link follows the HDLC standard.

A.

True

B.

False

Full Access
Question # 52

The IP network is layered. Usually, the network composed of interconnections between different countries and different cities refers to the following one?

A.

Backbone network

B.

Metropolitan Area Network

C.

Access network

D.

Core network

Full Access
Question # 53

What is the network address of the network segment where the IP address 195.233.27.13/16 is located?

A.

190.0.0.0

B.

190.233.0.0

C.

190.233.27.0

D.

190.233.27.1

Full Access
Question # 54

Regarding the characteristics of the OSPF protocol, what are the following statements correct? (multiple choice)

A.

Support flat network design

B.

Routing changes converge fast

C.

Support multiple equal-cost routes

D.

Support authentication of protocol packets

Full Access
Question # 55

The type field of an ICMP packet is 8. The code field is 0. Which type of packet does ICMP represent?

A.

Echo request message

B.

Echo response message

C.

Timeout message

D.

Destination unreachable message

Full Access
Question # 56

IEEE 802.1P standard development?

A.

VLAN tag

B.

VLAN priority

C.

VLAN ID

D.

TPID

Full Access
Question # 57

Which of the following techniques can improve the efficiency of IP address usage?

A.

DHCP

B.

DNS

C.

ARP

D.

FTP

Full Access
Question # 58

What are the correct descriptions of the working principle of the Layer 2 Ethernet switch in the following options? (Multiple choice)

A.

All data frames on the network segment connected to the receiving port

B.

Establish a MAC address table by using the destination MAC address in the received data frame.

C.

Look up the destination MAC address in the data frame in the MAC address table, send the data frame to the corresponding port if it is found (excluding the source port); if not found, go to all ports except the source port send

D.

Address table maintenance using the address aging mechanism

Full Access
Question # 59

Which of the following is the correct description of the Message Age in the configuration BPDU packet? (multiple choice)

A.

If the configuration BPDU is sent by the root bridge, the Message Age is 1.

B.

Message Age is the total time that the BPDU is sent from the root bridge to the current bridge.

C.

In actual implementation, the BPDUs are configured to pass through a bridge, and the Message Age is increased by 1.

D.

The value of Message Age will not exceed 15

Full Access
Question # 60

What are the following descriptions of shared Ethernet defects? (multiple choice)

A.

Serious conflict

B.

Broadcast flooding

C.

Poor security

D.

Carrier sensing

Full Access
Question # 61

Which of the following options is used to view the route that IP datagrams pass from one host to another?

A.

FTP

B.

Tracert

C.

ICMP

D.

Telnet

Full Access
Question # 62

Which of the following options can the application PING specify when sending ICMP messages? (multiple choice)

A.

Source address

B.

Message size

C.

TTL

D.

Transmission frequency

Full Access
Question # 63

Which of the following protocols is used for port 20?

A.

telnet

B.

FTP

C.

DNS

D.

DHCP

Full Access