0% found this document useful (0 votes)
82 views87 pages

H12 831

The document contains a series of questions and answers related to the HCIP-Datacom-Advanced Routing & Switching Technology V1.0 exam. It covers various topics including OSPF, IS-IS, BGP, and network troubleshooting, providing correct answers for each question. The content is structured as a study guide for individuals preparing for the exam, focusing on key concepts and technical details.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views87 pages

H12 831

The document contains a series of questions and answers related to the HCIP-Datacom-Advanced Routing & Switching Technology V1.0 exam. It covers various topics including OSPF, IS-IS, BGP, and network troubleshooting, providing correct answers for each question. The content is structured as a study guide for individuals preparing for the exam, focusing on key concepts and technical details.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 87

Http://www.passcert.

com
The safer, easier way to help you pass any IT exams.

Exam : H12-831_V1.0

Title : HCIP-Datacom-Advanced
Routing & Switching
Technology V1.0

1 / 86
The safer, easier way to help you pass any IT exams.

1. In order to speed up the perception of link failures in the IS-IS network, IS-IS can be linked with BFD.
A. TRUE
B. FALSE
Answer: A

2. In OSPF, ABR will convert all Type 7 LSAs in the NSSA area into Type 5 LSAs.
A. TRUE
B. FALSE
Answer: B

3. Regarding the IPSG, which of the following statement is incorrect?


A. IPSG can prevent IP address spoofing attacks
B. IPSG is a source IP address filtering technology based on the three-layer interface
C. IPSG can turn on the IP packet inspection and alarm function, and cooperate with the network
management to perform alarms
D. IPSG can prevent the host from changing the IP address privately
Answer: B

4. Which of the following are not included in the security protection actions that a secure MAC address
can perform?
A. Protect
B. Restrict
C. Shutdown
D. Remark
Answer: D

5. An engineer uses two routers to test IPv6 services, and simulates the interconnection between the
headquarters and branches by running BGP4+. As shown in the figure, an engineer captures the packet
to view the update message sent by R1.

2 / 86
The safer, easier way to help you pass any IT exams.

Regarding the description of the message information, which of the following statements is correct?
A. The next-hop address of the route described in this message is: 2001:db8::2345:1.:1
B. The message describes the currently revoked IPv6 route
C. The routing address prefix and its prefix length described in this message are:
2001:db8:2345:1::1/128/
D. The route described in the message may be imported through import
Answer: C

6. As shown in the figure, a certain park has deployed IPv6 for service testing, and there are 4 routers in
the network. Run OSPFv3 to realize network interconnection.

Regarding the LSA generated by the OSPFv3 network, which of the following statements is wrong?
A. R1 itself will generate Router-LSA to describe device interface information, and will receive Router-LSA
generated by R2 and R3 at the same time
B. There is a Network LSA generated by R3 in the LSDB of R1, indicating that R3 may be the DR of this
link
C. R1 will receive the two Link-LSAs generated by R2, describing the two links information connected to

3 / 86
The safer, easier way to help you pass any IT exams.

R2 respectively
D. As an ABR, R2 will generate Inter-Area-Prefix-LSA describing the IPv6 address prefix of Area 1, and
advertise it to R1 and R3
Answer: C

7. A network engineer outputs the following information when troubleshooting OSPF. Based on this,
determine which reason causes the adjacency relationship to fail to be established normally?

A. Authentication password is not-consistent


B. Regional type is not-consistent
C. The interval for sending Hello messages is not-consistent
D. The IP address mask of the interface is not-consistent
Answer: D

8. A router is running OSPF, and the output information is as shown in the figure. Which of the following
statements is correct?

4 / 86
The safer, easier way to help you pass any IT exams.

A. The type of the LSA is AS-externa1-LSA


B. The destination network described by this LSA is 10.0.23.0/24
C. The LSA in the figure is generated by this router
D. This device is ABR
Answer: B

9. When there are multiple redundant links in the IS-S network, multiple equal-cost routes may appear.
Regarding equal-cost routes in an IS-IS network, which of the following descriptions is wrong?
A. When the number of equal-cost routes in the networking is greater than the number configured through
commands, and the priorities of these routes are the same, the route with the higher System ID of the
next hop device is preferred for load sharing
B. If negative arbitration sharing is configured, the traffic will be evenly distributed to each link
C. After the equal-cost routing priority is configured, when the IS-IS device forwards the traffic that
reaches the destination network segment, it will not adopt the load sharing method, but will forward the
traffic to the next-hop with the highest priority.
D. For each route in the equal-cost route, the priority can be specified, and the route with the higher
priority will be preferred. The rest are used as backup routes
Answer: C

10. As shown in the figure, all routers run OSPF.

5 / 86
The safer, easier way to help you pass any IT exams.

Which of the following statements is correct?


A. R2 generates Router LSA in both area 1 and area 0
B. R2 forwards the Router LSA generated by R3 to R1
C. R2 forwards the Router LSA generated by R1 to R3
D. R2 only generates Router LSA in area 0
Answer: A

11. What is the value of OSPF and BFD linkage?


A. The hello sending interval of OSPF is at the second level, which is faster than BFD inductive link state
B. The sending interval of BFD packets can reach the millisecond level, which is slower than the OSPF
inductive link state
C. Through the BFD detected at the millisecond level, the OSPF status is associated to achieve the
purpose of OSPF quickly inductive link state
D. Any change in the BFD status will not affect the OSPF neighbor status
Answer: C

12. According to this figure, which of the following is the correct description of the IPv6 routing information
calculated by the R4 router through IS-IS?

6 / 86
The safer, easier way to help you pass any IT exams.

A. R4 has 1 IS-IS default route


B. R4 has 2 equal-cost IS-IS default routes
C. R4 has 2 unequal IS-IS default routes
D. R4 has no IS-IS routing entry
Answer: B

13. The routing attributes of the three routing entries are shown in the figure. Assuming that the next hop
of the three routing entries are all reachable, when the three routing entries arrive at the BP router in
sequence, by default, BGP will finally select one route entry?

A. Route B
B. Route C
C. Route A
Answer: C

14. As shown in the figure, Client1 and Client2 act as clients of RR1 and RR2 at the same time, RR1 and
RR2 are in the same Cluster, and R has introduced 10 routes. Assume that the BCP configuration is
correct.

7 / 86
The safer, easier way to help you pass any IT exams.

The neighbor relationship has been established. How many routing entries are there in the BGP routing
table of Client2 ultimately?
A. 10
B. 20
C. 0
D. 15
Answer: B

15. Which of the following is not a hardware preparation item for cutover?
A. Test the operation of the board
B. Power-on test
C. Device version check
D. Cable connectivity test
Answer: C

16. When troubleshooting dual-master faults in a VRRP backup group, which of the following statements
is wrong?
A. There is no need to check whether the switch port that transmits the VRRP advertisement message is
in the same VLAN
B. Need to check whether the VRRP group ID on the interface is the same
C. Need to check whether the interface IP address is in the same network segment
D. Need to check whether the virtual IP addresses of the VRRP group are the same

8 / 86
The safer, easier way to help you pass any IT exams.

Answer: A

17. When troubleshooting the EBGP neighbor relationship, you found that two directly connected devices
use Loopback ports to establish a connection, so execute display current-configuration configuration bgp
to view the configuration of peer ebgp-max-hop hop-count. Which of the following statements is correct?
A. hop-count must be greater than 2
B. hop-count must be greater than 15
C. hop-count must be greater than 1
D. hop-count must be greater than 255
Answer: C

18. When a fault occurs, the fault can be classified to reduce the scope of fault location. Which of the
following is not an interface configuration fault?
A. The duplex modes of the interfaces on both ends are inconsistent
B. IP address conflict
C. Inconsistent interface authentication
D. The receiving and emitting power of both ends is inconsistent
Answer: D

19. If you want to check files under Flash, which command should use?
A. dir sdl:
B. dir sd0:
C. display patch-information
D. dir flash:
Answer: D

20. As shown in the figure, MPLS LSP is configured in the network, and the goal is to establish an LDP
session between SWA and SWB, then which of the following statement is correct?

A. The configuration is correct


B. No need to enable MPLS globally

9 / 86
The safer, easier way to help you pass any IT exams.

C. No need to enable MPLS on the port


D. Two devices mpls lsr-id cannot be configured as the same
Answer: D

21. As shown in the figure, the cost value of the link that all interfaces of the router enable DSPF is
identified in the figure.

The Loopback D interface of R2 is advertised in area 1. Then the cost value of R1 to 10.2/32 is:
A. 200
B. 150
C. 50
D. 100
Answer: A

22. As shown in the figure, all interfaces of the router enable OSPF. The ip address identified in the figure
is the IP address of the device's Loopback 0 port. R1, R2, R3EJLoopbacD are advertised in area 1, and
Loopbacfk D of R4 is advertised in area D, the Loopback D of R5 is advertised in area 2. Which of the
following addresses can ping each other?

10 / 86
The safer, easier way to help you pass any IT exams.

A. 10.0.3.3 and 10.0.5.5


B. 10.0.4.4 and 10.0.2.2
C. 10.0.2.2 and 10.0.3.3
D. 10.0.2.2 and 10.0.5.5
Answer: C

23. According to this picture, we can judge:

11 / 86
The safer, easier way to help you pass any IT exams.

A. The system ID of R1 is ee8c.a0c2.bafl


B. R1 has both leve1-1 and level-1-2 link state information
C. R1 only has link state information for leve1-2
D. In the leve1-2 network, there are a total of 8 routers
Answer: A

24. In the network shown in the figure below, if you want to implement a remote LDP session between
SWA and SWC, which statement is correct?

A. No need to specify the lsr-id of the correct equivalent


B. The configuration in the figure can be achieved
C. Need to create a remote peer, and then specify the lsr-id of the peer
D. Need to be equipped with a straight connection port to establish a TCP connection
Answer: C

25. As shown in the figure, MPLS/BGP IPVPN is deployed in the network. The MP-BGP neighbor
relationship is established between PE1 and PE2 through the LoopbackD interface. After the
configuration is completed, it is found that CE1 and CE2 cannot learn routes from each other. Use the
command on PE2 to query neighbor information as shown in the figure. What is the most likely cause of
the problem?

12 / 86
The safer, easier way to help you pass any IT exams.

A. The VPN instance parameters on PE1 or PE2 are incorrectly configured


B. PE1 and PE2 are not enabled with neighbors in the BGP-VPN4 unicast address family view
C. The LSP tunnel between PE1 and PE2 is not established
D. The routing protocol configuration between PE1 or PE2 and the respective CE is incorrect
Answer: B

26. According to this picture, we can judge:

A. R1 is configured with regional authentication


B. The device type of R1 is Level-1
C. The device type of R1 is Level-2
D. R1 has configured the routing domain authentication
Answer: C

27. According to this picture, we can judge:

13 / 86
The safer, easier way to help you pass any IT exams.

A. The device type of R3 must be Level-1-2


B. Unable to determine the device type of R3
C. The device type of R3 must be Level-1
D. The device type of R3 must be Level-2
Answer: A

28. The IS-IS neighbor between R3 and R1 is not established. According to the information in this figure,
what is the possible cause?

14 / 86
The safer, easier way to help you pass any IT exams.

A. The IIH certification of R3 and R1 failed


B. The System ID of R3 and R1 are duplicated
C. The lS-Level of R3 and R1 do not match
D. The circuit-type of the interconnection interface between R3 and R1 does not match
Answer: A

29. The network administrator A wants to use ACL to match only the four routing entries 1, 3.5, and 7 in
the figure. How many ACL rules does the network administrator A need to configure at least?

15 / 86
The safer, easier way to help you pass any IT exams.

A. 2
B. 1
C. 4
D. 3
Answer: B

30. As shown in the figure, an engineer uses 4 routers to test branch network interoperability. Among
them, R1, R2, and R3 in branch 1 deploy OSPF to achieve network interoperability. R2, R3, and R4 in
branch 2 deploy IS-S to achieve network interoperability.

Now the engineer wants to realize the loopback address of R1 to R4. Which of the following operations
can meet this requirement?
A. In the OSFF process and the IS-IS process of R2, respectively advertise the default route
B. No configuration is required
C. Advertise the default route only in the IS-IS process of R2

16 / 86
The safer, easier way to help you pass any IT exams.

D. Advertise the default route only in the OSPF process of R2


Answer: A

31. According to this figure, it can be known that in VLAN300, 0 MAC drift occurred by 00e0-fc3d-3bdb
from 17:22:38 to 17:22.44 on 2020-06-04.

A. 5
B. 65535
C. 300
D. 1
Answer: A

32. According to this picture, we can judge:

17 / 86
The safer, easier way to help you pass any IT exams.

A. R4 does not have any IS-IS neighbors


B. R4 and ee8c.aOc2.baf3 have established IPv4 and IPv6 IS-IS neighbors
C. R4 and ee8c.aOe2.baf3 only established IPv6 IS-IS neighbors
D. R4 and ee8c.aOc2.bat3 only established IPv4 IS-IS neighbors
Answer: B

33. As shown in the figure, all interfaces of the router enable OSPF. Which of the following statements is
correct?

18 / 86
The safer, easier way to help you pass any IT exams.

A. The Type1 LSA generated by R2 in area 0 contains 10.0.2.2/32 routing information


B. The Type5 LSA generated by R2 in area 0 contains 10.0.2.2/32 routing information
C. The Type2 LSA generated by R2 in area 0 contains 10.0.2.2/24 routing information
D. The Type3 LSA generated by R2 in area 0 contains 10.0.2.2/32 routing information
Answer: A

34. An engineer used two routers to test IPv6 services, and simulated the interconnection between
headquarters and branches by running BGP4+.

19 / 86
The safer, easier way to help you pass any IT exams.

The logical topology of the network is shown in the figure. Regarding the transmission of IPv6 routes
between two devices, which of the following statements is wrong?
A. When routing, the Next_Hop attribute must be an IPv6 global unicast address
B. BGP4+ transmits routing information between peers through Update messages
C. If the Update message carries the MP_REACH_NLRI attribute, it means that the advertised route is
reachable
D. When routing, it will carry AS_Path and other recognized mandatory attributes
Answer: A

35. As shown in the figure, Site1 and Site2 need to achieve mutual access through the operator's
BGP/MPLS IPVPN. It is known that the public network tunnel between PE1 and PE2 has been
established (the label information is shown in the figure), and PF1 has advertised the 192.168.1.0/24
network segment route in Site1 to PE2 through the MP.JIBGP neighbor relationship, and the route
learning is normal.

When capturing the data that Site2 visits the 192.168.1.0/24 of Site1 between P and PE1, what should be
the outermost label?
A. 6661
B. 3

20 / 86
The safer, easier way to help you pass any IT exams.

C. 6662
D. 8888
Answer: D

36. Part of the configuration of R1 is as follows. Which statement about OSPF on R1 is correct?

A. The device type of R1 is Level-2


B. The device type of R1 cannot be determined
C. The device type of R1 is Leve1-1
D. The device type of R1 is Level-1-2
Answer: D

37. Which of the following regarding the configuration description is wrong?

21 / 86
The safer, easier way to help you pass any IT exams.

A. If the DHCP request message received by the GigabitEthemnet0/0/1 interface does not contain the
SutOption information of Option82, the device will generate Option82 and insert it into the message
B. Enabling the DHCP Snooping configuration can be used to prevent DHCP Server counterfeiters from
attacking
C. Configure GigabitEthernet0/0/1 as a trusted interface
D. Enabling the DHCP Snooping configuration can be used to prevent ARP spoofing attacks
Answer: D

38. Assuming that the neighbor relationship between BGP routers has been established successfully, the
configuration on R1 is as shown in the figure.

Which router can the route entry 10.10.10.0/24 advertised by R1 be delivered to?
A. R1
B. R2

22 / 86
The safer, easier way to help you pass any IT exams.

C. R3
D. R4
Answer: C

39. According to the configuration shown in the figure below, you can know that how many interfaces of
R4 are advertised into IS-IS?

A. 1
B. 3
C. 2
D. 0
Answer: B

40. As shown in the figure:

23 / 86
The safer, easier way to help you pass any IT exams.

A. The LSA in the figure is generated by this router


B. The destination network described by this LSA is 10.0.23.0/24
C. The type of the LSA is AS-exterma1-LSA
D. This device is ABR
Answer: B

41. As shown in the figure:

24 / 86
The safer, easier way to help you pass any IT exams.

A. There is Type 5 LSA flooding in Area2


B. There is no Type 3 LSA flooding in Area2
C. There is Type 5 LSA flooding in Area1
D. There is no Type3 LSA flooding in Area1
Answer: D

42. As shown in the figure:

25 / 86
The safer, easier way to help you pass any IT exams.

A. IS-Leve1 of R3 and R1 do not match


B. R3 and R1 have different area codes
C. The IIH certification of R3 and R1 failed
D. The System ID of R3 and R1 are duplicated
Answer: D

43. OSPFv2 is an IGP running on an IPv4 network; OSPFv3 is an IGP running on an IPv6 network. The
basic working mechanism of OSPFv3 is the same as OSPFv2, such as the election of DR and BDR. As
shown in the figure, an engineer uses three routers to test IPv6 services. He wants to realize the
interconnection and interoperability of IPv6 networks by running OSPFv3.

Which of the following statements regarding the election of DR on this network is correct?

26 / 86
The safer, easier way to help you pass any IT exams.

A. After the network converges, the engineer changes the priority of R1 to 100, the priority of R2 to 10,
and the default value of R3. When the network converges again, R1 is DR and R2 is BDR
B. After the network converges, a new device R4 is added to the broadcast link, and the priority of R4 is
150. When the network converges again, R4 is the DR
C. After the network converges, R1 is powered off and restarted. When the network converges again, R3
is the DR
D. After the network converges, R1 is the DR
Answer: C

44. As shown in the figure, the cost value of the link that all interfaces of the router enable OSPF is
identified in the figure. Loogback0 interfect of R2 is advertised in area 0. In area 1, both R2 and R3 will be
transmitted in the form of Typae3 LSA 10.0.2.2/32 routing information.

A. TRUE
B. FALSE
Answer: A

45. An enterprise purchased the leased lines of two operators. In order to optimize the route, the
enterprise used the 6GP protocol to learn routing entries of the two operators. However, the company
found that after such a configuration, the traffic of the export routing increased greatly. After the network
engineering investigation, it was found that the traffic of the two operators was passed to each other
through the company's export router.

27 / 86
The safer, easier way to help you pass any IT exams.

Therefore, the company intends to use routing strategies to prevent the traffic between different operators
from passing each other. Is the configuration in the figure correct?
A. TRUE
B. FALSE
Answer: A

46. As shown in the figure, the carrier BGP/MPLS IP VPN backbone network constructs SP through DP. If
you want to realize the intercommunication between the two sites of user X through the BGP/MPLS
IPVPN network, the 32bit mask of Loopback interface address must be used between PE1 and PE2 to
establish the MP-IBGP peer relationship.

A. TRUE
B. FALSE
Answer: A

47. As shown in the figure, all interfaces of the router enable OSPF, among which R4 and R5 can
establish OSPF virtual connections.

A. TRUE
B. FALSE
Answer: B

48. As shown in the figure, OSPF is deployed in a campus, and Area 1 is deployed as an NSSA area. By
default, R2 will automatically generate a Type 7 LSA default route and flood it in the NSSA area.

28 / 86
The safer, easier way to help you pass any IT exams.

A. TRUE
B. FALSE
Answer: A

49. As shown in the figure, network administrator A on the R1 router, after modifying the Local Preference
value of the routing entry sent to R2 through the routing policy, can control the path of traffic leaving
AS100.

A. TRUE
B. FALSE
Answer: B

50. As shown in the figure, all routers run OSPF, because R3 is in the backbone area, so there is no type
3 LSA in the LSDB of R3.

A. TRUE

29 / 86
The safer, easier way to help you pass any IT exams.

B. FALSE
Answer: B

51. As shown in the figure, network administrator A on the R1 router, after modifying the MED value of the
routing entry sent to R2 through the routing policy, can control the path of traffic entering AS100.

A. TRUE
B. FALSE
Answer: A

52. The OSPF protocol runs between CE and PE, when CE1 advertises the route of the site to CE2.
Which of the following description is wrong?
A. When PE2 receives a BGP route from PE1 that carries a different Domain ID from the local one, it is
correct for all LSAs, and PE2 will generate Type5 LSA or Type7 LSA
B. When PE2 receives the same Domain ID as the local BGP route sent by PE1, PE2 will generate Type3
LSA for Type1 LSA and Type2 LSA
C. When PE2 receives the same Domain ID as the local BGP route sent by PE1, for Type3 LSA, PE2 will
generate Type5 LSA
D. The Domain ID configured by PE1 can be used as an extended community attribute of BGP and sent
along with the route to PE2.
Answer: C

53. In the LDP session establishment process, the active party will first send the lnitialization information
for parameter negotiation, and if the passive party does not accept the negotiation parameters, it will send
.
A. Keepalive Message
B. Initialization Message
C. Hello Message
D. Error Notification Message
Answer: D

54. Regarding MP-BGP, whici of the following description is incorrect?


A. When the PE and CE exchange routes through BGP, you need to create a BGP process for each VPN
instance on the CE
B. MP-BGP's message type and VPNv4 routing policy are the same as BGP-4
C. MP-BGP needs to assign private network labels to VPNv4 routes
D. MP-BGP advertises VPNv4 routes through two attributes: MP_REACH_NLRI and MP_UREACH_NLRI

30 / 86
The safer, easier way to help you pass any IT exams.

Answer: A

55. By default, which of the following secure MAC address types will be lost after the device restarts?
A. Black hole MAC address
B. Sticky MAC address
C. Secure dynamic MAC address
D. Secure static MAC address
Answer: C

56. What is the command to adjust the link cost value of an IS-IS interface?
A. isis cost
B. isis timer hello
C. isis circuit-level
D. isis circuit-type
Answer: A

57. What is the purpose of configuring LSP fragmentation for IS-IS equipment?
A. Make the device unable to establish IS-IS neighbors
B. Allow the device to support more IS-IS routing entries
C. Make the device unable to learn IS-IS routing information
D. No practical purpose
Answer: B

58. A router LSA is shown in the figure. Which of the following statement is wrong?
A. The Router ID of this router is 10.0.12.1
B. This router is DR
C. The router has established adjacency
D. This router supports the import of external routes
Answer: B

59. Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is
the most unlikely?
A. The link that transmits the VRRP notification message is faulty
B. The low-priority VRRP backup group discards the received VRRP notification packets as illegal
packets
C. The VRRP backup group IDs on both ends are different
D. Master device sends 1 notification message per second
Answer: D

60. Which of the following is not part of the preliminary preparations for the cutover plan?
A. On-site defense
B. Cutover target
C. Introduction to the current network
D. Risk assessment

31 / 86
The safer, easier way to help you pass any IT exams.

Answer: A

61. During the process of viewing the debug output through the SSH terminal, a lot of information pops up.
Which of the following operations can make the Moni tor terminal no longer pop up the debug message?
(Multiple Choice)
A. Exit the current Moni tor interface, log in to the device again using SSH to open the new Monitor
interface
B. Open the notepad, enter undo debugging all, copy the command line, and paste it into the Monitor
interface
C. Open the notepad, enter undo terminal monitor, copy the command line, and paste it into the monitor
interface
D. Open the notepad, enter undo terminal debugging, copy the command line, and paste it into the
Monitor interface
Answer: D

62. R1 executes the operation ping -a 10.1.1.1 10.5.16.2, what does this command mean?
A. The source IP address of the ping packet is any directly connected port address of R1
B. The source IFP address of the ping packet is the outgoing interface address of the optimal IP route that
R1 points to 10.5.16.2, and is not 10.1.1.1
C. The source IP address of the ping packet is 10.1.1.1
D. The destination IP address of the ping packet is 10.1.1.1 and 10.5.16.2
Answer: C

63. Regarding the role of ping and tracert, which of the following statements is correct?
A. Ping detects the two-way reachability between the correct end and the one-way icmp echo request
packet
B. Tracert must be able to trace every hop IP address from source to destination
C. Ping verifies the reachability from the local end to the opposite end, it does not mean that the opposite
end is reachable from the local end
D. Tracert has the same function as ping, but the name is different
Answer: C

64. In the intra-domain MPLS VPN network, when the data packet enters the public network and is
forwarded, it will be encapsulated with two layers of MPLS labels. Regarding the description of the two
layers of labels, which of the following options is wrong?
A. The outer label of MPLS VPN is allocated by the LDP protocol or statically, and the inner label is
allocated by the MP-BGP neighbor at the correct end.
B. The outer label of MPLS VPNE is called the private network label, and the inner label is called the
public network label.
C. By default, the outer label is singled out before the packet is forwarded to the last hop device
D. The outer label is used to correctly send the data packet to the corresponding VPN on the PE device
Answer: B

65. Which of the following commands can be used to view BGP VPNv4 routing and BGP private network

32 / 86
The safer, easier way to help you pass any IT exams.

routing information on the PE?


A. display bgp routing-table address-family vpnv4
B. display bgp vpnv4 routing-table
C. display bgp routing-table ipv4-family vpnv4
D. display vpnv4 bgp routing-table
Answer: B

66. Regarding BGP/MPLS IPVPN data forwarding, which of the following descriptions is wrong?
A. When data is transmitted on the BCP/MPLS IPVPN backbone network, it always carries two layers of
labels
B. The inner label during data forwarding is assigned by MP-BGP
C. The outer label during data forwarding can be allocated by LDP
D. The data sent by the PE to the CE is an IPv4 packet
Answer: A

67. Regarding BGP/MPLS IPVPN routing interaction, which of the following descriptions is wrong?
A. The egress PE can send IPv4 routes to the remote CE through BGP, IGP or static routing
B. After the egress PE receives the VPNv4 route advertised by the ingress PE, it filters the VPNv4 route
according to the RT attribute carried by the route
C. The exchange between PE and CE is IPv4 routing information
D. The ingress PE changes the IPv4 route received from CE to VPNv4 route, and saves it according to
different VPN instances
Answer: A

68. Which of the following descriptions is wrong?


A. The LSP established by statically assigning labels can also be dynamically adjusted according to
network topology changes without the intervention of the administrator
B. The principle to be followed for manual label allocation is: the value of the outgoing label of the
upstream node is the value of the incoming label of the downstream node
C. LSP is divided into static LSP and dynamic LSP. The static LSP is manually configured by the
administrator, and the dynamic LSP is dynamically established using the label protocol
D. Dynamic LSP is dynamically established through label distribution protocols, such as MP-BGP,
RSVP-TE, LDP
Answer: A

69. MPLS has the concept of FEC forwarding equivalence class, so FEC cannot be allocated based on
which of the following standards?
A. Class of Service
B. Fragment of fiset
C. Application Protocol
D. Destination Addess
Answer: B

70. What is the flooding scope in OSPFv3 for the LSA in the entire autonomous system?

33 / 86
The safer, easier way to help you pass any IT exams.

A. Link-LSA
B. As-external-LSA
C. Inter-Area-Prefix-LSA
D. Intra-Area-Prefix-LSA
Answer: D

71. What is the flooding scope in OSPFv3 for the LSA in the entire autonomous system?
A. Link-LSA
B. As-external-LSA
C. Inter-Area-Prefix-LSA
D. Intra-Area-Prefix-LSA
Answer: B

72. When troubleshooting MSTP, you executed the display current-configuration command to obtain the
configuration file of the device. Which of the following statements is wrong?
A. No matter whether the BPDU Tunnel is configured on the device or not, MSTP will not affect it correctly
B. Whether the MSTP port connected to the user terminal device is disabled or configured as an edge
port
C. Check the port configuration to confirm whether the MSTP-enabled port is enabled with the protocol
message sending command. Such as: bpdu enable
D. Check whether the port is added to the correct WLAN
Answer: A

73. If the display current-configuration can reach the IS-IS configuration, but there is no IS-IS
configuration in the display saved-configuration, what does it mean?
A. The IS-IS configuration that the Flash is running is not saved to the memory
B. The running IS-IS configuration in the memory has been saved to the Flash
C. No IS-IS command is entered
D. The running IS-IS configuration of the memory is not saved to the Flash
Answer: D

74. Compared with the OSPFv2 message header, what fields are added in the OSPFv3 message
header?
A. IPV6 Auth Type
B. Link ID
C. Instance ID
D. IPV6 Router ID
Answer: C

75. What is the default aging time of the MAC address table of Huawei switches in seconds?
A. 300
B. 500
C. 400
D. 5

34 / 86
The safer, easier way to help you pass any IT exams.

Answer: A

76. Which of the following is wrong about DHCP Snooping?


A. DHCP Snooping can prevent illegal attacks by setting trusted ports (all interfaces are untrusted by
default)
B. Enable DHCP Snooping globally, without any post parameters, the device only processes DHCPv4
messages by default
C. Enable the DHCP Snooping function in the interface view, then all the DHCP message command
functions under the interface will take effect
D. Enable the DHCP Snooping function in the VLAN view, and the command function of DHCP messages
belonging to the VLAN received by all interfaces of the device will take effect
Answer: A

77. What is the most effective way to view device alarms through CLI?
A. display interface brief
B. display c1ock
C. display alarm
D. display current-configuration
Answer: C

78. Regarding the site in the BGPIMPLS IP VPN network architecture. Which of the following descriptions
is correct?
A. In any case, different sites belonging to the same VPN cannot use overlapping address spaces
B. Terminals connected to the operator's network through the same CE may belong to different sites
(MCE)
C. A site is a group of IP systems, and a network formed by a host cannot be called a site
D. The two networks separated by geographical locations must belong to different sites
Answer: B

79. If you are faced with a complex network failure, and after evaluation, it is considered that the
troubleshooting cannot be completed in a short time, and at this time the user urgently needs to restore
the availability of the network, then which is the correct approach?
A. Tell users that this is impossible
B. Directly build an alternative network environment without notifying the customer
C. Always try to troubleshoot, and do not inform users of the current difficulty of troubleshooting
D. Communicate with users whether it is possible to skip the faulty node and build an alternative network
environment
Answer: D

80. In an operator's MPLSVPN network, there are two devices, PE1 and PE2, for MPLSVPN data
forwarding. PE1 receives a 172.16.1.0/24 private network route from the client, and transforms it into a
VPNv4 route on PE1 and assigns labels. Released to PE2 as 1027. The outgoing label of the
MPLSLSR-ID from PE2 to PE1 is 1025.
When the client on PE2 accesses 172.16.1.0/24, the inner and outer labels of the frame sent by PE2

35 / 86
The safer, easier way to help you pass any IT exams.

should be the combination of the following options?


A. Outer label: 1025, inner label: 1027
B. Outer label: 1027, inner label: 1027
C. Outer label: 1027, inner label: 1025
D. Outer label: 1025, inner label: 1025
Answer: A

81. After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you
can configure the actions of the interface according to your needs.
Which of the following is not a configurable action?
A. Flow filtering
B. Send alert
C. Interface blocking
D. MAC address blocking
Answer: A

82. In addition to the virtual link, what type of IPv6 address is the source IPv6 address of the He11o
packet of OSPFv3?
A. IPv6 anycast address
B. Unique local address
C. Global unicast address
D. Link local address
Answer: D

83. OSPFv2 is an IGP running on an IPv4 network, OSPFvV3 is an ICP running on an IPv6 network.
OSPFv3 and OSPFv2 have the same message types, including Hallo messages, DD messages, LSU
messages, LSU messages and SACK messages.
Regarding OSPFv3 packets, which of the following statements is correct?
A. OSPFv3 uses the authentication field in the header of the message to complete message
authentication
B. OSPFv3 uses the link-local address as the source address of the sent message, and the message can
be forwarded outside the range of the originating link
C. OSPFv3 uses IPv6 multicast addresses FFO2::5 and FFO2:.6 to send OSPFv3 packets
D. The He11o packet of OSPFv3 carries the IPv6 address prefix list of the router interface
Answer: C

84. Which of the following regular expressions can only match BGP routing entries that pass through
AS200 and then AS300?
A. 200$|300$
B. ^200|^300
C. _(200 300)_
D. _[200 300]_
Answer: C

36 / 86
The safer, easier way to help you pass any IT exams.

85. Configure under a certain interface: isis timer hello 5 leve1-2, which of the following statements is
correct?
A. The interval for sending Level-2 hello packets on this interface is 5s
B. The hello packet sending interval of Level-1 and Leval-2 of this interface is 3s.
C. The interval for sending Level-2 CSNP packets of this interface is 5s
D. The interval for sending Level-1 hello packets on this interface is 5s
Answer: A

86. In the test phase of cutover, which standards that can indicate the test has been completed?
A. The configuration check result of the IP device is normal as the standard
B. Test network business as normal as the standard
C. The upper-layer application service test carried by the network is normal as the standard
D. Check that the network is running normally as a standard
Answer: C

87. What is the meaning of the display current-configuration I include vlan command?
A. View the physical interface information bound to each VLAN
B. Check which VLANs are currently created
C. View the IP address of the VLANIF interface
D. View all configurations that contain the "VLAN" keyword
Answer: D

88. Regarding the BGPI MPLS IPVPN network architecture, which of the following descriptions is wrong?
A. The P device only needs to have basic MPLS forwarding capabilities and does not maintain VPN
related information
B. Sites can visit each other through VPN, and a site can only belong to 1 VPN
C. Under normal circumstances, CE equipment does not perceive the existence of VPN, and CE
equipment does not need to support MPLS, MP-BGP, etc.
D. The BGP/MPLS IP VPN network architecture consists of three parts: CE (Customer Edge), PE
(ProviderEdge), and P (Provider). PE and P are operator equipment, and CE is BGP/MPLS IPVPN user
equipment.
Answer: B

89. Regarding sham link, which of the following description is wrong?


A. The sham link is a link between two VPN instances. Each VPN instance must have an endpoint
address of the sham link, which must be a Loopback with a 32-bit mask in the VPN address space on the
PE router. interface address
B. In order to forward the VPN flow through the MPLS backbone network, the routing cost of the sham link
should be less than the OSPF routing cost of the backdoor road
C. The endpoint address of the sham link is advertised as a VPhv4 address by BGP. Routes that have
passed sam1ik can also be imported into BGP in the form of VPNv4 routes
D. The sham link can be configured in any area and needs to be configured manually, and there must be
a route to the sham link destination address (the sham link endpoint address of the peer PE) in the local
VPN instance

37 / 86
The safer, easier way to help you pass any IT exams.

Answer: C

90. Which LSA in OSPFv3 can be flooded within an area?


A. Link-LSA
B. Inter-Area-Router-LSA
C. Inter-Area-Prefix-LSA
D. Intra-Area-Prefix-LSA
Answer: D

91. OSPF is deployed in a small and medium-sized network. When checking the routing table of a certain
device, it is found that there are only direct routes. Which operation is unlikely to cause the fault?
A. Routing protocol configuration error
B. The routing policy is incorrectly configured
C. Port address configuration problem
D. The configured user authority is too low
Answer: D

92. LDP messages are exchanged between LSRs running the LDP protocol. LDP messages can be
divided into four types according to their functions. Which of the following is not an LDP message type?
A. Discovery
B. Announcement
C. Conversation message
D. Label exchange messages
Answer: D

93. Regarding the label space of MPLS, which of the description is wrong?
A. When the penultimate hop LSR performs label switching, if the value of the label after the exchange is
found to be 3, the label will be ejected by default and the packet will be sent to the last hop
B. 1024 or more is the label space shared by dynamic signaling protocols such as LDP, RSVP-TE,
MP-BGP, etc.
C. 16~1023 is the label space shared by static LSP and static CR-LSP
D. If the outgoing label value is 0, the router will directly discard the packet
Answer: D

94. When deploying MPLS/BGP IP VPN, regarding the use of BGP to exchange routing information
between PE-CE, which of the following description is wrong?
A. In the case of CE multi-homing, enabling the BGP AS number replacement function may cause routing
loops, which can be used to prevent routing loops in VPN sites through BGP SoD
B. When PE and CE use BGP to exchange routing information, if the autonomous systems of two VPN
sites use the same private AS number, the AS number replacement function can be used, that is, the
received AS number can be replaced with any designated AS number. The AS number in the private
network route to prevent the route from being discarded due to repeated AS numbers
C. In the Hub&Spoke scenario, when Hub-CE and Hub-PE use IGP, Spoke-PE and Spoke-CE cannot
enable EBGP

38 / 86
The safer, easier way to help you pass any IT exams.

D. When BGP is used to exchange routing information between PE and CE, there is no need to import
BGP private network routes on PE
Answer: B

95. Qing technology is a technology that expands the VLAN space. It achieves the function of expanding
the VLAN space by adding a layer of 8D2.1Q Tag on the basis of the 8Q2.12 tag message.
Which of the following statements about qinq is wrong?
A. Flexible QinQ can add different outer tags according to different inner tags, which is more precise in the
division of user VLANs.
B. QinQ increases the number of VLANs to 4095*4095
C. QinQ technology can make the private network LAN transparently transmitted on the public network
D. Basic QinQ is implemented based on the interface method
Answer: B

96. What is the Router-ID of OSPFv3?


A. 100-bit value
B. 128-bit value
C. 32-bit value
D. 64-bit value
Answer: C

97. In order to publish IPv6 routes in BGP4+, what fields are added in Update?
A. A new NLRI type, IPv6_NLR, which carries IPv6 NLRl prefix length and IPv6 NLRl prefix
B. A new path attribute: MP_UNREACH_NLRl
C. A new path attribute: MP_REACH_NLRI
D. A new path attribute: IPv6_REACH_NLRI
Answer: C

98. OSFFv2 is an IGP running on an IPv4 network: OSPFV3 is an IGP running on an IPv6 network.
Compared with OSPFv2, SPFV3 has a similar LSA type, but the function is slightly different. Which of the
following is not included in the LSA type of OSPFv3?
A. AS-External-LSA
B. Router-LSA
C. ASBR-Summary-LSA
D. Network-LSA
Answer: C

99. What is the meaning of ipv6 enable topology ipv6 in IS-IS protocol view?
A. SPF calculation is performed separately in the topology of IPv4 and lpv6
B. Doesn't have any meaning
C. Does not support IPv6 SPF calculation
D. IPv4 and IPv6 use the same topology for SPF calculation
Answer: A

39 / 86
The safer, easier way to help you pass any IT exams.

100. Which of the following role of Link-LSA in OSPFv3 not include?


A. Noon time to Tiandikou on other roads on the link-
B. Advertise the interface ID of this router to other routers on the link
C. Advertise the link-local address of this interface to other routers on the link
D. Notify other routers on the link of the options set in the Network-LSA originating from this link
Answer: A

101. Which of the following BGP routing attributes cannot control BGP route selection?
A. MED
B. AS Path
C. Community
D. Originator ID
Answer: C

102. Which of the following will not cause the VRRP backup group to oscillate?
A. The VRRP backup group preemption delay configuration on both ends is inconsistent
B. Backup device interface packet loss
C. The time interval of notification messages is too small
D. The link that transmits VRRP notification packets flaps
Answer: A

103. Regarding multi-instance CE (Mlulti-VPN-Instance CE, MCE), which of the following description is
wrong?
A. On the MCE device, you need to create separate routing and forwarding tables for different VPNs, and
bind them to the correct interface
B. Users connected to the same MCE but not belonging to a VPN instance cannot access each other
C. Devices with MCE function can access multiple VPN instances in BGPIMPLS IP VPN applications,
reducing user investment in network equipment
D. There must be multiple physical links between MCE and PE to achieve isolation between different
VPIN instances
Answer: D

104. In an MPLS network, there are different types of operations for labels, among which the meaning of
the "pop" action is?
A. Replace the top label with another value
B. Add the top label to the MPLS label stack
C. Replace the top label with another set of labels
D. Remove the top label from the MPLS label stack
Answer: D

105. In a multi-level RR scenario, a large number of second-level RR are connected to the first-level RR,
which may cause the BGP routing table of the first-level RR to overflow. What method can be used to
reduce the risk of overflow of the BGP routing table of the first-level RR?
A. ORF

40 / 86
The safer, easier way to help you pass any IT exams.

B. Route aggregation
C. Routing control
D. Set the same Cluster-lD
Answer: B

106. Which of the following tools cannot be used to match BGP routing entries?
A. Community Filter
B. Advanced ACL
C. Basic ACL
D. IP Prefix List
Answer: B

107. Regarding the difference between NSR and NSF, which one is correct?
A. NSF does not need neighbor routers to complete
B. NSR must rely on neighboring routers to complete
C. NSF must rely on neighbor routers to complete
D. Both NSR and NSF need neighbor routers to complete
Answer: C

108. The routing policy tools that BGP can use mainly include Filterpolicy and Route-policy. Its Fiterpolicy
can only filter routes, and Rote-policy can only modify routes.
A. TRUE
B. FALSE
Answer: B

109. Because BGP is the EGP routing protocol, BGP routing policies can only be deployed between
EBGP neighbors. Routing policies deployed between IBGP neighbors are invalid.
A. TRUE
B. FALSE
Answer: B

110. The link state value information between different ISIS processes of multiple routers is considered to
be isolated.
A. TRUE
B. FALSE
Answer: A

111. MPLS has always been slower than IP forwarding.


A. TRUE
B. FALSE
Answer: B

112. By default, the Domain ID of each OSPF process running on the router is the same as the process
number of the process, which can be modified by the domain-id command under the process

41 / 86
The safer, easier way to help you pass any IT exams.

A. TRUE
B. FALSE
Answer: B

113. In the VLAN aggregation technology, multiple Sub-VLANs are used to isolate the wide recruitment
area, and these Sub-VLANs are aggregated into a logical Super-VLAN. A company divides different
departments into different Sub-VLANs because of the Sub-VLAN. VLAN not only includes physical
connections, but also can establish a three-layer VLANIF interface, which can directly communicate with
the external network on the three-layer.
A. TRUE
B. FALSE
Answer: B

114. In order to prevent hackers from attacking user equipment or network through MAC address, the
MAC address of untrusted users can be configured as black hole MAC address to filter out illegal MAC
A. TRUE
B. FALSE
Answer: A

115. After a fault occurs, it is necessary to collect and backup various fault information in time as a
reference for handling the fault. In addition, when seeking emergency help from Huawei Technologies Co.,
Ltd., you need to provide the fault information to Huawei Technologies Co., Ltd. technical support
personnel to facilitate their location and troubleshooting.
Answer: A

116. Senior engineers with rich experience can quickly solve faults only by relying on experience, and the
efficiency is very high.
A. TRUE
B. FALSE
Answer: A

117. Through the display ip interface GE0/D/D command, you can view the statistics of ping packets
received on this interface.
A. TRUE
B. FALSE
Answer: A

118. By default, LDP adjacencies will trigger the establishment of LSP based on the IP routing of the 32bit
address.
A. TRUE
B. FALSE
Answer: A

119. BGP/MPLS IP VPN can only use LDP to construct public network free channels.

42 / 86
The safer, easier way to help you pass any IT exams.

A. TRUE
B. FALSE
Answer: B

120. The Router ID of OSPFv3 needs to be configured in dotted decimal notation with a length of 128bits.
A. TRUE
B. FALSE
Answer: B

121. IEIF has extended the functions of OSPF by taking advantage of the strong scalability of OSPF. To
enable it to support IPv6 networks, the expanded protocol is called OSPFv3, and OSPFv3 is compatible
with OSPFv2.
A. TRUE
B. FALSE
Answer: B

122. When OSPFv2 evolves to OSPFv3, the format and function of LSA are exactly the same, except that
the network layer address in LSA changes from IPv4 to IPv6.
A. TRUE
B. FALSE
Answer: B

123. BGP4+ carries the next hop address of the IPv6 route through the Next Hop attribute in the Update
message.
A. TRUE
B. FALSE
Answer: B

124. The ipv6 enable topology standard is configured in IS-IS protocol view. The meaning of this
command is that Pv4 and IPv6 share the same topology.
A. TRUE
B. FALSE
Answer: A

125. If the temperature of the device is found to be too high, it can be concluded that the fan has failed
A. TRUE
B. FALSE
Answer: B

126. When deploying BCPIMPLS TP VPN, the OSPF VPN route tag (VPN Route Tag) is not transmitted in
the MP-BGP extended community attributes. It only makes sense on PE routers that receive MP-BGP
routes and generate OSPF LSA.
A. TRUE
B. FALSE

43 / 86
The safer, easier way to help you pass any IT exams.

Answer: B

127. In an MPLS network, SR running the DP protocol exchange LDP messages to realize functions such
as neighbor discovery, session establishment and maintenance, and label management. In order to
ensure the reliability of message delivery, all sending and receiving of LDP messages must be based on
TCP connections.
A. TRUE
B. FALSE
Answer: B

128. Basic QinQ can select the outer tag encapsulation method according to the type of business.
A. TRUE
B. FALSE
Answer: B

129. The deployment of port isolation technology in Ethernet can realize Layer 2 intercommunication and
Layer 3 isolation, making the network more flexible.
A. TRUE
B. FALSE
Answer: B

130. To ensure security, authentication can be configured in the OSPFv3 process area view.
A. TRUE
B. FALSE
Answer: A

131. BGP routing strategy can control the distribution and reception of routes.
A. TRUE
B. FALSE
Answer: A

132. In an MPLS domain, LSR can be divided into Ingress LSR, Transit LSR and Egress LSR according
to the way the LSR processes data. For the same FEC, a certain LSR can be the Ingress LSR of the FEC
or the Transit LSR of the FEC.
A. TRUE
B. FALSE
Answer: B

133. A certain park deployed IPv6 for service testing. At the initial stage of deployment, engineers wanted
to achieve network interoperability through Pv6 static routing. When creating IPv6 static routes. You can
specify both the outgoing interface and the next hop, or only the outgoing interface or only the next hop.
A. TRUE
B. FALSE
Answer: B

44 / 86
The safer, easier way to help you pass any IT exams.

134. When configuring the DHCP Relay function on the device, the VLANIF interface of the relay
connected to the client must be bound to the DHCP server group, and the bound DHCP server group
must be configured with the proxy DHCP server IP address.
A. TRUE
B. FALSE
Answer: B

135. From the user's point of view, any phenomenon that affects the business can be defined as a failure.
A. TRUE
B. FALSE
Answer: A

136. Display interface GE0/0/0 once, and find that the Total Eror count (the total number of error packets
on the physical layer of the interface) is not 0. At this point, it can be concluded that the current fault has
not disappeared.
A. TRUE
B. FALSE
Answer: A

137. When MPLS is deployed in the network and the network layer protocol is IP, the route corresponding
to the FEC must exist in the IP routing table of the LSR, otherwise the label forwarding entry of the FEC
will not take effect.
A. TRUE
B. FALSE
Answer: A

138. In the DU label distribution mode, if the Liberal retention mode is adopted, the device will retain all
the labels distributed by the LDP Peer, regardless of whether the LDP Peer is the optimal next-hop to
reach the target network segment.
A. TRUE
B. FALSE
Answer: A

139. The rollback operation of the project cutover can be determined temporarily according to the
situation during the cutover, and no advance planning is required.
A. TRUE
B. FALSE
Answer: B

140. BFD session down will cause the direct link to fail.
A. TRUE
B. FALSE
Answer: B

45 / 86
The safer, easier way to help you pass any IT exams.

141. After executing reset isis all, the IS-Is protocol process needs to be restarted and neighbors need to
be re-established, and various IS-IS statistics will not be cleared.
A. TRUE
B. FALSE
Answer: A

142. In BGPIMPLS IP VPN, if the OSPF protocol is used to exchange routing information between PE and
CE, the domain identifier (Domain ID) is used to distinguish whether the routes imported in the VPI
instance are from the same OSPF domain.
A. TRUE
B. FALSE
Answer: A

143. In BGP/MPLS IP VPN, the OSPF multi-instance process uses the DN bit to prevent Type5 LSA
loops.
A. TRUE
B. FALSE
Answer: B

144. For the same MAC address, the priority of the manually configured MAC entry is higher than the
automatically generated entry.
A. TRUE
B. FALSE
Answer: A

145. Configure ipv6 preference in IS-IS protocol view. The function of this command is to configure the
preference of IPv6 routes generated by lS-Is protocol.
A. TRUE
B. FALSE
Answer: A

146. When deploying BGPIMPLS IPVPN, when two VPNs have a common site, the common site must
not use overlapping address spaces with other sites of the two VPNs.
A. TRUE
B. FALSE
Answer: B

147. Which of the following tools cannot be used to match BGP routing entries?
A. Community Filter
B. Advanced ACL
C. Basic ACL
D. IP Prefix List
Answer: B

46 / 86
The safer, easier way to help you pass any IT exams.

148. Regarding the difference between NSR and NSF, which one is correct?
A. NSF does not need neighbor routers to complete
B. NSR must rely on neighbor routers to complete
C. NSF must rely on neighbor routers to complete
D. Both NSR and NSF need neighbor routers to complete
Answer: C

149. During the process of viewing the debug output through the SSH terminal, a lot of information pops
up. Which of the following operations can make the Moni tor terminal no longer pop up the debug
message? (Multiple choice)
A. Exit the current Moni tor interface, log in to the device again using SSH to open the new Monitor
interface
B. Open the notepad, enter undo debugging all, copy the command line, and paste it into the Monitor
interface
C. Open the notepad, enter undo terminal monitor, copy the command line, and paste it into the Monitor
interface
D. Open the notepad, enter undo terminal debugging, copy the command line, and paste it into the
Monitor interface
Answer: D

150. R1 executes the operation ping -a 10.1.1.1 10.5.16.2, what does this command mean?
A. The source IP address of the ping packet is any directly connected port address of R1
B. The source IFP address of the ping packet is the outgoing interface address of the optimal IP route that
R1 points to 10.5.16.2, and is not 10.1.1.1
C. The source IP address of the ping packet is 10.1.1.1
D. The destination IP address of the ping packet is 10.1.1.1 and 10.5.16.2
Answer: C

151. Regarding the role of ping and tracert, which of the following statements is correct?
A. Ping detects the two-way reachability between the correct end and the one-way icmp echo request
packet
B. Tracert must be able to trace every hop IP address from source to destination
C. Ping verifies the reachability from the local end to the opposite end, it does not mean that the opposite
end is always reachable to the local end
D. Tracert has the same function as ping, but the name is different
Answer: C

152. In the intra-domain MPLS VPN network, when the data packet enters the public network and is
forwarded, it will be encapsulated with two layers of MPLS labels. Which of the following description of the
two layers of labels is wrong?
A. The outer label of MPLS VPN is allocated by the LDP protocol or statically, and the inner label is
allocated by the MP-BGP neighbor at the correct end.
B. The outer label of MPLS VPNE is called the private network label, and the inner label is called the

47 / 86
The safer, easier way to help you pass any IT exams.

public network label.


C. By default, the outer label is ejected before the packet is forwarded to the last-hop device
D. The outer label is used to correctly send the data packet to the corresponding VPN on the PE device
Answer: B

153. Which of the following commands can be used to view BGP VPNv4 routing and BGP private network
routing information on PE?
A. display bgp routing-table address-family vpnv4
B. display bgp vpnv4 routing-table
C. display bgp routing-table ipv4-family vpnv4
D. display vpnv4 bgp routing-table
Answer: B

154. Regarding BGP/MPLS IPVPN data forwarding, which of the following description is wrong?
A. When data is transmitted on the BCP/MPLS IP VPN backbone network, it always carries two layers of
labels
B. The inner label during data forwarding is assigned by MP-BGP
C. The outer label during data forwarding can be allocated by LDP
D. The data sent by the PE to the CE is an IPv4 packet
Answer: A

155. Regarding BGP/MPLS IPVPN routing interaction, which of the following description is wrong?
A. The egress PE can send IPv4 routes to the remote CE through BGP, IGP or static routing
B. After the egress PE receives the VPNv4 route advertised by the ingress PE, it filters the VPNv4 route
according to the RT attribute carried by the route
C. The exchange between PE and CE is IPv4 routing information
D. The ingress PE will convert the IPv4 route received from the CE into a VPNv4 route, and save it
according to different VPN instances
Answer: A

156. Which of the following statement is wrong?


A. LSPs established by statically assigning labels can also be dynamically adjusted according to changes
in the network topology, without administrator intervention
B. The principle to be followed for manual label allocation is: the value of the outgoing label of the
upstream node is the value of the incoming label of the downstream node
C. LSP is divided into static LSP and dynamic LSP. The static LSP is manually configured by the
administrator, and the dynamic LSP is dynamically established using the label protocol
D. Dynamic LSP is dynamically established through label distribution protocols, such as MP-BGP,
RSVP-TE, LDP
Answer: A

157. MPLS has the concept of FEC-Forwarding Equivalence Class, so on which of the following
standards cannot FEC be allocated based?
A. Class of Service

48 / 86
The safer, easier way to help you pass any IT exams.

B. Fragment of offiset
C. Application Protocol
D. Destination Addess
Answer: B

158. If the Sticky MAC function of the interface is enabled, what is the number of MAC addresses learned
by the interface by default?
A. 15
B. 5
C. 10
D. 1
Answer: D

159. The network administrator A wants to use the IP Prefix List to match specific routing entries. Which of
the following routes will be matched by the IP Prefix List? (Multiple choice)
A. 10.0.0.1/30
B. 10.0.0.0/24
C. 10.0.2.0/24
D. 10.0.1.0/24
Answer: AB

160. Which of the following series can be matched by the regular expression 100.S? (Multiple choice)
A. 100
B. 1000
C. 10000
D. 1001
Answer: BD

161. Which of the following Community attributes can ensure that the propagation range of BGP routing
entries is only within the AS? (Multiple choice)
A. No_Export
B. No_Export_Subconfed
C. Interne
D. No_Advertise
Answer: AB

162. According to this picture, what can we judge? (Multiple choice)

49 / 86
The safer, easier way to help you pass any IT exams.

A. The device type of R1 is definitely not Leve1-1


B. R1 has 6 IS-IS IPv6 routes
C. R1 does not have IS-IS IPv6 routing
D. IS-IS IPv6 must be enabled on GigabitEthernet0D/1 of R1
Answer: ABD

163. A park deployed IPv6 for business testing. There are 4 routers (R1, 22, R3 and R4) in this network,
running OSPFv3 to realize the interconnection of IPv6 network. There is a new router R5 that needs to be
connected to the network for testing. An engineer introduced a direct route in the OSPFvV3 process of R4
to realize that the devices in the campus network can access the GE0/0/1 port address of R5. Which of
the following descriptions of the scene are correct? (Multiple choice)

A. R2 will generate a Type4 LSA and only flood in Area 0


B. R4 will generate an IPv6 routing prefix introduced by Type5 LSA description
C. R2 will generate a Type4 LSA describing the Router ID of R4
D. R4 will generate a Type5 LSA and only flood in Area 1
Answer: ABC

164. According to this picture, what can we judge? (Multiple choice)

50 / 86
The safer, easier way to help you pass any IT exams.

A. If the routing policy on AS_Path is not configured, then 3002:-4/128 must not originate from AS 65001
B. R1 does not have routes of 3002:.3/128 and 3002.-4/128
C. R1 has routes of 3002.-3/128 and 3002:.4/128
D. If the routing policy on AS_Pash is not configured, then 3002:4/28 must originate from AS 65001
Answer: CD

165. Part of the configuration of R1 is as follows. Which of the following statement about IS-IS on R1 is
correct? (Multiple choice)

A. The routing information of process 2 and process 3 are isolated


B. Process 1 only contains global routing information
C. Process 1 also contains global routing information. And VRF tt, rr routing information
D. The routing information of process 2 and process 3 will be shared
Answer: AB

166. A park deployed IPv6 for business testing. There are 4 routers in the network, running OSPFV3 to
realize the interconnection and intercommunication of IPv6 networks. As shown in the figure, an engineer
checked the LSDB of R2 and intercepted one of the Link-LSAs. Regarding the description of the LSA,
which of the following statements are correct? (Multiple choice)

51 / 86
The safer, easier way to help you pass any IT exams.

A. The link-local address of the R2 interface GE0/0/0 is FE80::2E0; FCFF:FECD:4F79


B. The router that generated the LSA is R2
C. The LSA shows that R2 does not support external routing, but participates in IPv6 routing calculations
D. The IPv6 address prefix of the R2 interface GE0/0/0 is 2001:2343: 23: :/64
Answer: ABD

167. According to this picture, what can we know? (Multiple choice)

A. R1 access 172.17.1.5 has a loop


B. R1 has a route to 172.17.1 5
C. R1 does not access the route of 172.17.1.5
D. R1 accesses the path of 172.17.1.5 without any problems
Answer: AB

168. As shown in the figure, the MP_BGP neighbor relationship is established between PE1 and PE2

52 / 86
The safer, easier way to help you pass any IT exams.

through the Loopback0 interface. After the configuration is completed, it is found that CE1 and CE2
cannot learn routes from each other. Which of the following options will cause this problem? (Multiple
choice)

A. PE1 or PE2 is not enabled with neighbors in the BGP-VPNv4 unicast address family view
B. The VPN instance parameters on PE1 or PE2 are incorrectly configured
C. The LSP tunnel between PE1 and PE2 is not established
D. The routing protocol configuration between PF1 or PE2 and the respective CE is incorrect
Answer: ABCD

169. Which of the following description of the configuration on this switch is correct? (Multiple choice)

A. To configure the DHCP server and DHCP relay, DHCP must be enabled globally
B. Specify the DHCP server group as dhcpgroup1 for the VLAN100 interface
C. First, you need to create a DHCP server group and add a DHCP server to the server group
D. The VANIF100 interface will send the received DHCP messages to the external DHCP Server through
the relay
Answer: ABCD

170. The engineer used two routers to test the IPv6 service and simulated the interconnection between
the headquarters and the branch by running BGP4+. As shown in the figure, an engineer captured the
packet to check the Updte message sent by R1. Regarding the description of the message information,
which of the following statements are correct? (Multiple choice)

A. The message describes only one BGP attribute, and the multi-protocol unreachable NLRI attribute

53 / 86
The safer, easier way to help you pass any IT exams.

B. This message describes the currently revoked IPv6 route


C. The length of the top and top strength of the routing address described in the message is:
2001:db8:2345:1::1/128
D. The next hop address of the route described in this message is: 2001:db8:2345:1::1\
Answer: ABC

171. According to this picture, what can we judge? (Multiple choice)

A. R1 access to 172.16.1.4 requires a 2-hop router


B. R1 access to 172.16.1.4 requires a 4-hop router
C. There are 2 equivalent paths for R1 to access 172.16.1.4
D. There are 4 equivalent paths for R1 to access 172.16.1.4
Answer: AC

172. As shown in the figure, all interfaces of the router enable OSPF. The IP address identified in the
figure is the IP address of the oopback0 interface of the device. Loopback0 of R1 and R2 is advertised in
area 1, Loopback0 of R4 is advertised in area 0, and Loopback0 of R3 and R5E are advertised in area 2,
which of the following IP addresses can ping each other? (Multiple choice)

A. 10.0.2.2 and 10.0.3.3. (Not counted when receiving Category 3 in non-backbone areas)
B. 10.0.3.3 and 10.0.5.5 (Class 1 in the same area)
C. 10.0.4.4 and 10.0.2.2. (3 types of normal calculation)
D.10.0.2.2 and 10.0.5.5 (not counted when receiving Category 3 in non-backbone areas)
Answer: BC

173. According to this picture, what can we judge? (Multiple choice)

54 / 86
The safer, easier way to help you pass any IT exams.

A. R4 belongs to Leve1-2 only


B. The device whose system-ID is ee8c. a0c2.baf2, and its type is Level-1-2
C. The device with system-ID ee8a0c2.baf2, its type is Leve1-1
D. R4 belongs to Level-1 only
Answer: BD

174. According to this picture, what can we judge? (Multiple choice)

A. R1's GE0/0/1 must have Leve1-2 capability


B. R1's GE0/0/0 must have the Leve1-2 capability
C. There must be an LSDB of Leve1-2 on R1
D. R1 has 2 IS-IS neighbors
Answer: ABCD

175. As shown in the figure, the network has caused a loop because STP is not enabled. Which of the

55 / 86
The safer, easier way to help you pass any IT exams.

following phenomena may be caused? (Multiple choice)

A. A large number of broadcasts can be received on the Host


B. The device will have a loop alarm
C. The device CPU usage is too high
D. MAC address table flapping
Answer: ABCD

176. According to this picture, what can we judge? (Multiple choice)

A. IS-IS IPv6 is not enabled on GE0/0/1 of R1


B. The IS-IS interface type of GE0/0/1 of R1 is Leve-1
C. The IS-IS interface type of the GE0/0/0 interface of R1 is Level-1-2
D. IS-IS IPv6 is enabled on GE0/0/0 of R1
Answer: CD

177. Part of the configuration of R1 is as follows, which of the following statement about OSPF on R1 is
correct? (Multiple choice)

56 / 86
The safer, easier way to help you pass any IT exams.

A. The routing information of VRF tt will appear in the routing table of OSPF process 1
B. The OSPF LSD8 of process 1 and process 2 have different LSAs in the area
C. The OSPF LSDBs of process 1 and process 2 have exactly the same LSA in area 0
D. The routing information of VRF tt will not appear in the routing table of OSPF process 1
Answer: BD

178. Network administrator A wants to use ACL to match specific routing entries. Which of the following
routing entries will be matched by the ACL rules in the figure? (Multiple choice)
acl number 2000
rule 10 permit source 10.0.0.0 0.0.6.0
A. 10.0.1.0/24 :
B. 10.0.0.0/24
C. 10.0.0.1/32
D. 10.0.2.0/24
Answer: BD

179. According to this picture, what can we judge? (Multiple choice)

A. The device whose system-ID is ee8c. a0c2.baf2, and its type is Level-1

57 / 86
The safer, easier way to help you pass any IT exams.

B. The device whose system-ID is ee8c.a0c2.baf2, and its type is Level-1-2


C. R4 belongs to Level-1 only
D. R4 belongs to Level2 only
Answer: BC

180. As shown in the figure, PE1 and PE2 and their respective CEs exchange private network routing
information through OSPF, and the same DomainID is configured on PE1 and PE2. When routes are
imported from BGP to OSPF on PE2, which of the following types of SA may be delivered to CE2?
(Multiple choice)

A. Type1 LSA
B. Type3 LSA
C. Type7 LSA
D. Type5 LSA
Answer: BCD

181. Network administrator A wants to use AS-Path Fiter to match routing entries with the BGP routing
attribute AS_PATH [100 200 300]. Network administrator A sorts out the four configurations in the figure.
Which of the following configurations can satisfy the network administrator A's requirement? (Multiple
choice)

A. Method C
B. Method A
C. Method D
D. Method B
Answer: BD

182. The output information of a router is as follows. Which of the following reasons cause the OSPF
adjacency relationship to fail to be established normally? (Multiple choice)

58 / 86
The safer, easier way to help you pass any IT exams.

A. Inconsistent area codes


B. Inconsistent area types
C. The IP address mask of the interface is inconsistent
D. The interval for sending Hello packets is inconsistent
Answer: AD

183. OSPF is deployed in a campus to realize network interoperability. The L SDB of R2 is shown in the
figure. What information can be derived from this LSDB? (Multiple choice)

A. There is no Type3 LSA in Area1, it may be that the outbound direction of R2 in Area1 is correct. Type3
LSA is filtered
B. Area 1 is an NSSA area
C. R2 converts the default route of Type7 LSA to the default route of Type5 LSA
D. R2 has issued a default route in the OSPF process

59 / 86
The safer, easier way to help you pass any IT exams.

Answer: BD

184. A router Network LSA is shown in the figure. Which of the following statements is correct? (Multiple
choice)

A. The DR priority of the router is 100


B. The Router ID of this router is 10.0.12.2
C. The network segment where the router is located is 10.0.12.0 24
D. This router is DR
Answer: BCD

185. As shown in the figure, which of the following statement is correct? (Multiple choice)

60 / 86
The safer, easier way to help you pass any IT exams.

A. There are 8 MA networks in area 0


B. There are 4 MA networks in area 0
C. There are 4 routers in area 0
D. There are 8 routers in area 0
Answer: BC

186. Which of the following statements about the MP_REACH_NLRI attribute of BGP4+ is correct?
(Multiple choice)
A. The length of the next hop address can be 16 or 3
B. The AFI (address family) value is 2, which represents IPv6
C. The NLRI field carries IPv6 routing prefix and mask information
D. When the length of the next hop address is 16, the Network Address of Next Hop carries the link local
address
Answer: ABC

187. IS-IS supports multi-instance and multi-process, that is, on an IS-IS router. You can configure
multiple VPN instances to be associated with multiple IS-IS processes. Which of the following
descriptions about IS-IS multi-instance and multi-process are correct? (Multiple choice)
A. One IS-IS process can only be associated with one VPN instance
B. If an IS-IS router creates multiple IS-IS processes, each process does not affect each other and is
independent of each other
C. One IS-IS process can be associated with multiple different VPN instances
D. A VPN instance can be associated with multiple different IS-IS processes
Answer: ABD

61 / 86
The safer, easier way to help you pass any IT exams.

188. Which of the following functions will affect the establishment of BGP neighbors? (Multiple choice)
A. BGP authentication
B. BGP GSTM
C. BGP route filtering
D. ebgp max hop
Answer: ABD

189. What types of Link Types are included in the Router LSA in OSPF? (Multiple choice)
A. Vlink
B. StubNet
C. TransNet
D. P-2-P
Answer: ABCD

190. In the finishing work of the structured network troubleshooting process, which of the following are the
documents that need to be handed over? (Multiple choice)
A. Maintenance suggestions to avoid the failure
B. Troubleshooting summary report
C. Troubleshooting process documentation
Answer: ABC

191. When troubleshooting a network, if you need to confirm the business traffic path, which of the
following tasks may be required? (Multiple choice)
A. Confirm the network layer business traffic path
B. Investigate business traffic path planning in the network design stage
C. Confirm the data link layer service traffic path
Answer: AC

192. ping -a X-c Y-s z -vpn-instance M 10.5.16.2, what is the meaning of this command is? (Multiple
choice)
A. The ping sends Y ICMP requests
B. The ICMP request of this ping, the packet size is Z (excluding IP and ICMP header)
C. The source IFP address of the ping packet is X
D. The ping packet belongs to VPN instance M
Answer: ABCD

193. MPLS is called multi-protocol label switching. Regarding the label description in MPLS, which of the
following is correct? (Multiple choice)
A. MPLS system has a variety of label publishing protocols, such as LDP is a label publishing protocol
B. The label is carried by the header of the MIPLS message and has a global meaning, that is, the label
value of all routers cannot be repeated
C. A label is an identifier with a fixed length and only local meaning, which is used to uniquely identify the
FEC to which a group belongs
D. MPLS supports single-layer labels as well as multi-layer labels

62 / 86
The safer, easier way to help you pass any IT exams.

Answer: ACD

194. There is the concept of forwarding equivalence class FEC in MPLS, which of the following
description is wrong? (Multiple choice)
A. MPLS classifies packets with the same forwarding processing method into one category, which is
called FEC
B. A forwarding equivalence FEC will be assigned a unique label value on all routers
C. The packets of the same FEC will be treated differently in the MPLS network
D. The division of FEC is very flexible. It can be based on any combination of source address, address,
source port, destination port, protocol type or VPN, etc.
Answer: BC

195. Regarding the MPLS forwarding process, which of the following description of Ingress node
forwarding is correct? (Multiple choice)
A. After receiving the data packet, the Ingress node will first check the ILM table to find the Tunnel ID
B. Press the obtained label in the IP packet, and process EXP according to the QoS policy, and process L
at the same time, and then send the encapsulated MPLS packet to the next hop
C. Find the corresponding NHLFE entry according to the Tunnel ID of the ILM table, and associate the
LFIB entry with the NHLFE entry
D. Check the NHLFE entry, you can get the outgoing interface, next hop, outgoing label, and label
operation type. The label operation type is Push
Answer: BD

196. Which of the following statements about LDP label retention-free way is correct? (Multiple choice)
A. Need more memory and label space
B. Keep all labels distributed by neighbors
C. Only keep labels from next-hop neighbors, discard all labels sent by non-next-hop neighbors
D. Save memory and label space
Answer: AB

197. Which packets can Huawei equipment perform traffic suppression for? (Multiple choice)
A. unknown Unicast
B. Known unicast
C. Multicast
D. Broadcast
Answer: ABCD

198. Regarding the description of the MPLS forwarding mechanism, which of the following is correct?
(Multiple choice)
A. The system automatically assigns an ID to the upper-layer application that uses the tunnel, also known
as Tunnel ID
B. When an IP packet enters the MRLS domain, the FIB table is the first to be checked
C. If the Tunnel ID value is not 0x0, and then enter the normal IP forwarding process
D. If the Tunnel ID value is 0x0, and then enter the MPLS forwarding process

63 / 86
The safer, easier way to help you pass any IT exams.

Answer: AB

199. Regarding the description of the label encapsulation format in MPLS, which one is correct? (Multiple
choice)
A. The total length of a single MPLS label is 4 bytes (32 bits)
B. For Ethernet and PPP packets, the label stack is located between the layer 2 header and the data like
the "underlay*": when there is a VLAN tag, the MPLS header is placed between the Ethernet header and
the VLAN tag
C. The S field in the label: 1 bit, used to identify whether the label is a label at the bottom of the stack,
when the value is 1, it is the penultimate layer label
D. The TTL field in the label is similar to the TTL (Time To Live) in the IP packet, and it also has the effect
of preventing loops.
Answer: AD

200. Which of the following descriptions about MPLS header TTL are correct? (Multiple choice)
A. There are two ways to correct MPLST and TTL. One is to copy the TTL value of the MPLS header
when an IP packet enters the MPLS network. The other is to set the TTL of the MPLS header to 255 at the
ingress LER.
B. Can prevent infinite loop forwarding of messages
C. The processing method of copying the IP TTL value hides the LSR of the MPLS domain and plays a
certain security role
D. In the case of banning Bay TTL, tracert can see the LSR of the MPLS domain that it passes through
Answer: AB

201. Which of the following statements about VLAN aggregation is correct? (Multiple choice)
A. Super-VLAN only contains physical interfaces and cannot establish a Layer 3 VLANIF interface
B. A Super-VLAN can contain one or more SUb-VLANs
C. Sub-VLAN contains physical interfaces. A three-layer VLANIF interface can be established
D. Sub-VLAN is used to isolate the broadcast domain
Answer: BD

202. What check items can be set in IPSG? (Multiple choice)


A. MAC address
B. Outgoing interface
C. VLANID
D. IP address
Answer: ABCD

203. A certain park deployed both IPv4 and IPv6 networks for service testing, and IS-IS was run to
achieve network interconnection. IS-IS routing protocol has good scalability and is widely used in existing
networks.
Regarding IS-IS scalability, which of the following statements are correct? (Multiple choice)
A. IS-IS uses TLV structure to construct messages, which makes IS-IS more flexible and expandable
B. For IS-IS, adding new features only needs to add a new TLV

64 / 86
The safer, easier way to help you pass any IT exams.

C. IS-IS needs to add TLV to carry Pv6 address information in order to support PV6
D. NLPID is a new TLV of IS-IS to support IPv6
Answer: ABC

204. The Discovery message of LDP is used for neighbor discovery, and LDP has different discovery
mechanisms when discovering neighbors. Then, which of the following statements about Discovery
message in the basic discovery mechanism is correct? (Multiple choice)
A. After the TCP connection is established, the LSR does not continue to send Hello Message
B. The destination IP address of the message is the multicast IP address 224.0.0.2
C. This message is encapsulated in a UDP message, and the destination port number is 646
D. The message is sent to the designated LDP Peer
Answer: BC

205. Which of the following information can the DHCP binding table contain? (Multiple choice)
A. Port and UDP port
B. MAC address
C. IP address
D. Lease time
Answer: BCD

206. Traditional BGP-4 can only manage IPv4 unicast routing information. In order to provide support for
multiple network layer protocols, MP-BGP extends BGP-4.
MP-BGP uses address families to distinguish different network layer protocols. Which of the following
address families are currently supported? (Multiple choice)
A. BGP-VPNv4 address family
B. BGP-IPv6 unicast address family
C. BGP-IPv4 broadcast address family
D. BGP-MP instance IPv6 address family
Answer: ABD

207. Configuring DHCP Snooping can be used to prevent imitators from attacking. Which of the following
steps should be included in the configuration process? (Multiple choice)
A. Enable the global DHCP Snooping function
B. Enable global DHCP function
C. Configure interface trust status
D. Enable DHCP Snooping on the interface or VLAN
Answer: ABCD

208. Which of the following are the advantages of VLAN aggregation? (Multiple choice)
A. Reduce the waste of IP addresses
B. Increased the number of available MLANs
C. Increased flexibility of addressing
D. Realize the isolation of broadcast domains between Sub-VLANs
Answer: AD

65 / 86
The safer, easier way to help you pass any IT exams.

209. Which of the following statements about 1S-IS (IPv6) is correct? (Multiple choice)
A. To support the processing and calculation of IPv6 routing, IS-IS added NLPID to 129 TLV
B. IS-IS working at the data link layer only needs to add a new TLV to support Pv6
C. To support the processing and calculation of IPv6 routes, IS-IS has added TLV232236
D. By default, IS-IS enables the multi-topology feature
Answer: ABC

210. EGP authentication can prevent illegal routers from establishing neighbors with BCP routers. BCP
authentication can be divided into MD5 authentication and Keychain authentication. Which of the
following BGP messages will carry BCGP Keychain authentication information? ((Multiple choice)
A. Open
B. Update
C. Notication
D. Keepalive
Answer: ABCD

211. Which statements are wrong about OSPF Router LSA and Network LSA? (Multiple choice)
A. The router running DSPF must generate Network LSA
B. Routers running OSPF must generate Router LSA
C. There must be both Router LSA and Network LSA in the OSPF network
D. Network LSA carries both topology and routing information
Answer: AC

212. Which of the following operations may affect the normal operation of the customer network? (Multiple
choice)
A. Device naming
B. Software upgrade
C. Hardware expansion
D. Routing protocol configuration changes
Answer: BCD

213. What are the work that needs to be performed in the closing phase after the cutover acceptance is
completed? (Multiple choice)
A. Transition training
B. Data transfer
C. Acceptance summary
D. On-site defense
Answer: ABCD

214. In the intra-domain MPLS VPN network, when a data packet enters the public network and is
forwarded, it will be encapsulated with two layers of MPLS labels. Which of the following description is
wrong about the two layers of labels? (Multiple choice)
A. The outer label of MPLS VPN is allocated by the LDP protocol or statically, and the inner label is

66 / 86
The safer, easier way to help you pass any IT exams.

allocated by the MP-BGP neighbor at the correct end.


B. By default, the outer label is ejected before the packet is forwarded to the last-hop device
C. The outer label of MPLS VPN is called the private network label. The inner label is called the public
network label.
D. The outer label is used to correctly send the data packet to the corresponding VPN on the PE device
Answer: CD

215. In an MPLS VPN network, data packets are forwarded when they enter the public network. Will be
encapsulated with two layers of MPLS labels. Which of the following description is correct about the
processing of the data packet? (Multiple choice)
A. The packet is forwarded to the Egress PE device after the outer label pops up on the penultimate hop
device
B. The Egress PE device correctly sends the data packet to the corresponding VPN according to the inner
label
C. The outer label of the packet received by the penultimate hop device is 3
D. The Egress PE device receives untagged IP packets
Answer: AB

216. After the cutover is completed, which items generally need to be checked? (Multiple choice)
A. Software version
B. Physical topology
C. Data flow
D. Control plane entries
Answer: CD

217. Which of the following statements about the OSPFv3 message format is correct? (Multiple choice)
A. Hello message no longer contains address information and Interface ID
B. OSPF version number changed from 2 to 3
C. Removed Authentication and Auth Type fields
D. There is no change in the option field of the Hello message
Answer: ABC

218. The RR rules for advertising routes break the IBGP split horizon rules, so it may cause loops in the
AS.
What routing attributes does RR use to prevent loops? (Multiple choice)
A. Cluster List
B. Originator ID
C. Next hop
D. AS-PATH
Answer: AB

219. Which of the following reasons may cause the hosts in the same VLAN of the LAN to fail to
communicate? (Multiple choice)
A. Switch MAC address learning error

67 / 86
The safer, easier way to help you pass any IT exams.

B. The interface is manually shut down or the physical interface is damaged


C. Wrong port and MAC address binding is configured on the switch
D. Port isolation is configured on the switch
Answer: ABCD

220. A company consists of a head office and two branches, and uses MPLS VPN technology to deliver
private network routes. In the networking mode of HuB & Spoke. Branches can only send and receive
routing with the head office, and branches cannot directly send and receive routing with each other. In
order to achieve the above requirements, which of the following options can be set for RT? (Multiple
choice)
A. Headquarters: Import Target 12:3; Export Target: 3:12. Branch 1: Import Target: 3:12; Export Target
12:3. Branch 2: Import Target: 3:12: Export Target: 12:3
B. Headquarters: Import Target: 1:1; Export Target: 3:3. Branch 1: Import Target: 3:3; Export Target: 1:1.
Branch 2: Import Target: 3:3; Export Target: 2:2
C. Headquarters: Import Target 1:1, 2:2; Export Target: 3:3. Branch 1: Import Target: 3:3; Export Target:
1:1. Branch 2: Import Target: 3:3; Export Target: 2:2
D. Head Office: Import Target: 2:2; Export Target: 3:3. Branch 1: Import Target: 3:3; Export Target: 1:1.
Branch 2: Import Target: 3:3; Export Target.2:2
Answer: AC

221. Which of the following statements about MUX VLAN are correct? (Multiple choice)
A. Each Group VLAN must be bound to a Principal VLAN
B. Separate VLAN can communicate with all VLANs in MUX VLAN
C. Each Separate VLAN must be bound to a Principal VLAN
D. Principal VLAN can communicate with all VLANs in MUX VLAI
Answer: ACD

222. Which of the following descriptions is correct about configuring static LSP in MPLS network?
(Multiple choice)
A. When a certain LSR is an Egress LSR, only In Labe1 needs to be configured, the range is 16~1023
B. When a certain LSR is a Transit LSR, In Labe1 and Out labe1 need to be configured at the same time,
the range of In Labe1 is 16~1023, and the range of Out Labe1 is 16~1048575
C. When a certain LSR is a Transit LSR, In Labe1 and 0ut Label need to be configured at the same time,
the range is 16~1023
D. When an LSR is an Ingress LSR, only Out Label needs to be configured, ranging from 16 to 1048575
Answer: ABD

223. Which of the following aspects should be considered in the cutover risk assessment? (Multiple
choice)
A. Loss caused by risk
B. Scope of risk impact
C. Time of risk impact
D. Location of key risk points
Answer: ABCD

68 / 86
The safer, easier way to help you pass any IT exams.

224. Which of the following are static information coking analysis? (Multiple choice)
A. Interface type
B. Packet loss rate
C. License
D. Device type
Answer: ACD

225. Ethernet is a network that supports broadcasting. Once there is a loop in the network, this simple
broadcasting mechanism will cause catastrophic consequences.
Which of the following phenomena may be caused by loops? (Multiple choice)
A. CPU usage exceeds 70%
B. The device cannot log in remotely
C. When you use the display interface command to view interface statistics on the device, it is found that
the interface receives a large number of broadcast packets
D. Severe packet loss during network testing through the ping command
Answer: ABCD

226. During the process of viewing the debug output through the SSH terminal, a lot of information pops
up. Which of the following operations can make the Monitor terminal no longer pop up the debug
message? (Multiple choice)
A. Open the notepad, enter undo terminal debugging, copy the command line, and paste it into the
Monitor interface
B. Open the notepad, enter undo debugging all, copy the command line, and paste it into the Monitor
interface
C. Open the notepad, enter undo terminal monitor, copy the command line, and paste it into the monitor
interface
D. Exit the current Monitor interface, log in to the device again using SSH to open a new Monitor interface
Answer: AB

227. How to view log information? (Multiple choice)


A. View the interface of the network management system
B. Log in to the device and view it through the display log
C. There is no way
D. Transfer the log file under flash:/logfile/ to the PC via FIP/TFTP
Answer: ABD

228. Which of the following statements about the MP_REACH_NLRI attribute of BGP4+ is correct?
(Multiple choice)
A. The length of the next hop address can be 16 or 3
B. The value of AFI (address family) is 2, which represents IPv6
C. The NLRI field carries IPv6 routing prefix and mask information
D. When the length of the next hop address is 16, the Network Address of Next Hop carries the link local
address

69 / 86
The safer, easier way to help you pass any IT exams.

Answer: ABC

229. IS-IS supports multi-instance and multi-process, that is, on an IS-IS router. You can configure
multiple VPN instances to be associated with multiple IS-IS processes.
Which of the following descriptions about IS-IS multi-instance and multi-process are correct? (Multiple
choice)
A. One IS-IS process can only be associated with one VPN instance
B. If an IS-IS router creates multiple IS-IS processes, each process does not affect each other and is
independent of each other
C. One IS-IS process can be associated with multiple different VPN instances
D. A VPN instance can be associated with multiple different IS-IS processes
Answer: ABD

230. Which of the following functions will affect BGP neighbor establishment? (Multiple choice)
A. BGP authentication
B. BGP GSTM
C. BGP route filtering
D. ebgp max hop
Answer: ABD

231. What types of Link Types are included in the Router LSA in OSPF? (Multiple choice)
A. Vlink
B. StubNet
C. TransNet
D. P-2-P
Answer: ABCD

232. In the finishing work of the structured network troubleshooting process, which of the following are the
documents that need to be handed over? (Multiple choice)
A. Maintenance suggestions to avoid the failure
B. Troubleshooting summary report
C. Troubleshooting process documentation
Answer: ABC

233. When troubleshooting a network, if you need to confirm the business traffic path, which of the
following tasks may be required? (Multiple choice)
A. Confirm that the network layer service flow is a path
B. Investigate business meteor path planning in the network design stage
C. Confirm the data link layer service traffic path
Answer: AC

234. ping -a X-c Y-s z -vpn-instance M 10.5.16.2, what is the meaning of this command? (Multiple choice)
A. The ping sends Y ICMP requests
B. The ICMP request of the ping, the packet size is Z (excluding IP and ICMP header)

70 / 86
The safer, easier way to help you pass any IT exams.

C. The source IFP address of the ping packet is X


D. The ping packet belongs to VPN instance M
Answer: ABCD

235. MPLS is called multi-protocol label switching. Which description is correct about the label in MPLS?
(Multiple choice)
A. MPLS system has a variety of label publishing protocols, such as LDP is a label publishing protocol
B. The label is carried by the header of the MIPLS message and has a global meaning, that is, the label
value of all routers cannot be repeated
C. A label is an identifier with a fixed length and only local meaning, which is used to uniquely identify the
FEC to which a group belongs
D. MPLS supports single-layer labels as well as multi-layer labels
Answer: ACD

236. There is the concept of forwarding equivalent FEC in MPLS. Which of the following descriptions is
wrong? (Multiple choice)
A. MPLS classifies packets with the same forwarding processing method into one category, which is
called FEC
B. A forwarding equivalence FEC will be assigned a unique label value on all routers
C. The packets of the same FEC will be processed differently in the MPLS network
D. The division of FEC is very flexible. It can be based on any combination of source address, address,
source port, destination port, protocol type or VPN, etc.
Answer: BC

237. Regarding the MPLS forwarding process, which description of the ingress node forwarding is correct?
(Multiple choice)
A. After receiving the data packet, the Ingress node will first check the ILM table to find the Tunnel ID
B. Press the obtained label in the IP packet, and process EXP according to the QoS policy, and process L
at the same time, and then send the encapsulated MPLS packet to the next hop
C. Find the corresponding NHLFE entry according to the Tunnel ID of the ILM table, and associate the
LFlB entry with the NHLFE entry
D. Check the NHLFE entry, you can get the outgoing interface, next hop, outgoing label, and label
operation type. The label operation type is Push
Answer: BD

238. Which of the following statements about the freeway of LDP label retention is correct? (Multiple
choice)
A. Need more memory and label space
B. Keep all labels distributed by neighbors
C. Only keep labels from next-hop neighbors, discard all labels sent by non-next-hop neighbors
D. Save memory and label space
Answer: AB

239. Which packets can Huawei devices perform traffic suppression for? (Multiple choice)

71 / 86
The safer, easier way to help you pass any IT exams.

A. Unknown unicast
B. Known unicast
C. Multicast
D. Broadcast
Answer: ABCD

240. Which description is correct about the MPLS forwarding mechanism? (Multiple choice)
A. The system automatically assigns an ID to the upper-layer application that uses the tunnel, also known
as Tunnel ID
B. When an IP packet enters the MRLS domain, the FIB table is the first to be checked
C. If the Tunnel ID value is not 0x0, enter the normal IP forwarding process
D. If the Tunnel ID value is 0x0, enter the MPLS forwarding process
Answer: AB

241. Which description is correct about the label encapsulation format in MPLS? (Multiple choice)
A. The total length of a single MPLS label is 4 bytes (32 bits)
B. For Ethernet and PPP packets, the label stack is located between the layer 2 header and the data like a
"underlay*": when there is a VLAN tag, the MPLS header is placed between the Ethernet header and the
VLAN tag
C. The S field in the label: 1 bit, used to identify whether the label is the bottom label of the stack, when
the value is 1, it indicates the second-to-last label
D. The TTL field in the label is similar to the TTL (Time To Live.) in the IP packet, and it also has the effect
of preventing loops.
Answer: AD

242. Which of the following descriptions about TTL in the MPLS header are correct? (Multiple choice)
A. There are two ways to deal with MPLST correctly and TTL. One is to copy the TTL value of the MPLS
header when an IP packet enters the MPLS network. The other is to set the TTL of the MPLS header to
255 at the ingress LER.
B. Can prevent infinite loop forwarding of messages
C. The processing method of copying the IP TTL value hides the LSR of the MPLS domain and plays a
certain security role
D. When the TTL of the shell is disabled, tracert can see the LSR of the MPLS domain that it passes
through
Answer: AB

243. Which of the following statements about VLAN aggregation is correct? (Multiple choice)
A. Super-VLAN only contains physical interfaces and cannot establish a Layer 3 VLANIF interface
B. A Super-VLAN can contain one or more Sub-VLANs
C. Sub-VLAN contains physical interfaces. A three-layer VLANIF interface can be established
D. Sub-VLAN is used to isolate the broadcast domain
Answer: BD

244. What check items can be set in IPSG? (Multiple choice)

72 / 86
The safer, easier way to help you pass any IT exams.

A. MAC address
B. Outgoing interface
C. VLANID
D. IP address
Answer: ABCD

245. A certain park deployed both IPv4 and IPv6 networks for service testing, and IS-IS was run to
achieve network interconnection. IS-IS routing protocol has good scalability and is widely used in existing
networks.
Regarding IS-IS scalability, which of the following statements are correct? (Multiple choice)
A. IS-IS uses TLV structure to construct messages, which makes IS-IS more flexible and expandable
B. For IS-IS, adding new features only needs to add a new TLV
C. IS-IS needs to add TLV to carry Pv6 address information in order to support PV6
D. NLPID is a new TLV of IS-IS to support IPv6
Answer: ABC

246. The Discovery message of LDP is used for neighbor discovery, and LDP has different discovery
mechanisms when discovering neighbors. Then, which of the following statements about Discovery
message in the basic discovery mechanism is correct? (Multiple choice)
A. After the TCP connection is established, the LSR does not continue to send Hello Message
B. The destination IP address of the message is the multicast IP address 224.0.0.2
C. This message is encapsulated in a UDP message, and the destination port number is 646
D. The message is sent to the designated LDP Peer
Answer: BC

247. Which of the following information can the DHCP binding table contain? (Multiple choice)
A. Port and UDP port
B. MAC address
C. IP address
D. Lease time
Answer: BCD

248. Traditional BGP4 can only manage IPv4 unicast routing information. In order to provide support for
multiple network layer protocols, MP-BGP extends BGP-4.
MP-BGP uses address families to distinguish different network layer protocols. Which of the following
address families are currently supported? (Multiple choice)
A. BGP-VPNv4 address family
B. BGP-IPv6 unicast address family
C. BGP-IPv4 broadcast address family
D. BGP-MP instance IPv6 address family
Answer: ABD

249. Configuring DHCP Snooping can be used to prevent imitators from attacking. Which of the following
steps should be included in the configuration process? (Multiple choice)

73 / 86
The safer, easier way to help you pass any IT exams.

A. Enable the global DHCP Snooping function


B. Enable global DHCP function
C. Configure interface trust status
D. Enable DHCP Snooping on the interface or VLAN
Answer: ABCD

250. Which of the following are the advantages of VLAN aggregation? (Multiple choice)
A. Reduce the waste of IP addresses
B. Increased the number of available MLANs
C. Increased flexibility of addressing
D. Realize the isolation of broadcast domains between Sub-VLANs
Answer: AD

251. Which of the following statements about 1S-IS (IPv6) is correct? (Multiple choice)
A. To support the processing and calculation of IPv6 routing, IS-IS added NLPID to 129 TLV
B. IS-IS working at the data link layer only needs to add a new TLV to support Pv6
C. To support the processing and calculation of IPv6 routes, IS-IS has added TLV232236
D. By default, IS-IS enables the multi-topology feature
Answer: ABC

252. EGP authentication can prevent illegal routers from establishing neighbors with BCP routers. BCP
authentication can be divided into MD5 authentication and Keychain authentication. Which of the
following BGP messages will carry BCGP Keychain authentication information? ((Multiple choice)
A. Open
B. Update
C. Notification
D. Keepalive
Answer: ABCD

253. Which statements are wrong about OSPF Router LSA and Network LSA? (Multiple choice)
A. The router running DSPF must generate Network LSA
B. Routers running OSPF must generate Router LSA
C. There must be both Router LSA and Network LSA in the OSPF network
D. Network LSA carries both topology and routing information
Answer: AC

254. Which of the following operations may affect the normal operation of the customer network? (Multiple
choice)
A. Device naming
B. Software upgrade
C. Hardware expansion
D. Routing protocol configuration changes
Answer: BCD

74 / 86
The safer, easier way to help you pass any IT exams.

255. What are the work that needs to be performed in the closing phase after the cutover acceptance is
completed? (Multiple choice)
A. Transition training
B. Data transfer
C. Acceptance summary
D. On-site defense
Answer: ABCD

256. In an intra-domain MPLS VPN network, when a data packet enters the public network and is
forwarded, it will be encapsulated with two layers of MPLS labels. Which of the following description is
wrong about the two layers of labels? (Multiple choice)
A. The outer label of MPLS VPN is allocated by the LDP protocol or statically, and the inner label is
allocated by the MP-BGP neighbor at the correct end.
B. By default, the outer label is ejected before the packet is forwarded to the last-hop device
C. The outer label of MPLS VPN is called the private network label. The inner label is called the public
network label.
D. The outer label is used to correctly send the data packet to the corresponding VPN on the PE device
Answer: CD

257. In an MPLS VPN network, data packets are forwarded when they enter the public network. Will be
encapsulated with two layers of MPLS labels.
Which of the following descriptions are correct about the processing of the data packet? (Multiple choice)
A. The packet is forwarded to the Egress PE device after the outer label pops up on the penultimate hop
device
B. The Egress PE device correctly sends the data packet to the corresponding VPN according to the inner
label
C. The outer label of the packet received by the penultimate hop device is 3
D. The Egress PE device receives untagged IP packets
Answer: AB

258. After the cutover is completed, which items generally need to be checked? (Multiple choice)
A. Software version
B. Physical topology
C. Data flow
D. Control plane entries
Answer: CD

259. Which of the following statements about the OSPFv3 message format is correct? (Multiple choice)
A. Hello message no longer contains address information and Interface ID
B. OSPF version number changed from 2 to 3
C. Removed Authentication and Auth Type fields
D. There is no change in the option field of the Hello message
Answer: ABC

75 / 86
The safer, easier way to help you pass any IT exams.

260. The RR rules for advertising routes break the IBGP split horizon rules, so it may cause loops in the
AS. What routing attributes does RR use to prevent loops? (Multiple choice)
A. Cluster List
B. Originator ID
C. Next hop
D. AS-PATH
Answer: AB

261. (Connection question) Please correspond the alarm level with the importance of the fault and the
countermeasures. (Multiple choice)

Answer:

262. By executing the () command, users on different ports of the same VLAN can be completely isolated
at Layer 2 and Layer 3 and cannot communicate. (Please use English lowercase letters to complete the
command, and the command cannot be abbreviated)
Answer: port-isolate mode all

263. In OSPFv3, the LSA whose propagation range is an area has () types. (Fill in Arabic teaching
characters only)
Answer: 129

264. (Connection question) Please match the command with the realized function.

76 / 86
The safer, easier way to help you pass any IT exams.

Answer:

265. (Drag and drop) Please match the following DHCP attack types with corresponding explanations.

Answer:

77 / 86
The safer, easier way to help you pass any IT exams.

266. (Connection) The default MPLS label release method and label distribution control method of
Huawei routers and label retention methods are respectively

Answer:

267. IS-IS is a link state routing protocol that uses the SPF algorithm for routing calculations. A park has
deployed IPv4 and IPv6 at the same time and runs IS-IS to achieve network interconnection. As shown in
the figure, the network IPv4 and IPv6 have the same overhead, and R1 and R4 only support IPv4. By
default, in the calculated IPv6 shortest path tree, the next hop device for R2 to access R6 is () (Note: The
device name must be consistent with the figure, such as: R1)

78 / 86
The safer, easier way to help you pass any IT exams.

Answer: R3

268. As shown in the figure, the entire network of a certain company uses OSPF to get through the
network. However, RouterS and RouterE cannot establish an OSPF neighbor relationship. When
detecting OSPF failures, network administrators can execute the display ospf 100 () interface GEO/0/1
command on RouterS to obtain error-related information. Users can perform OSPF failure diagnosis
based on this information. (Please use English lowercase letters to complete the command, and the
command cannot be abbreviated)

Answer: error

269. As shown in the figure, all interfaces of the router enable OSPF, and the configurations of R1, R2,
and R3 are as shown in the figure, then () will generate a Type 3 LSA with a linkState ID other than 0.0.0.0.
(Please fill in the device name, such as R1)

79 / 86
The safer, easier way to help you pass any IT exams.

Answer: R3

270. As shown in the figure, a sham link is established between PE1 and PE2 through the LoopBackD
interface. CE2 can learn the route to the 192.168.1.0/24 network segment (the direct route on CE1)
through the sham link and backdoor link. If you keep the default configuration, the cost value of the route
from CE2 to the 192.168.1.0/24 network segment should be (). (Please fill in the Arabic numerals directly,
without symbols)

Answer: 4

271. As shown in the figure, R1, R2, R3, and R4 are in the same MPLS domain, and LDP is used to
allocate MPLS labels between devices. R4 is the FEC Egress LSR of 4.4.4.0/24. If you want to realize
that when R1 accesses 4.4.4.0/24, R4 does not need to query the label table but can understand the
forwarding priority of the data, then R3's outgoing label for the FEC should be (). (Please fill in the Arabic
numerals directly, without symbols)

80 / 86
The safer, easier way to help you pass any IT exams.

Answer: 0

272. Network administrator A wants to check the neighbor status of BGP router R2. R2's BGP neighbor
status information is shown in the figure. Please help network administrator A to obtain the following
information: The AS where R2 is located is AS (). (Note: Only write numbers, do not add punctuation or
spaces)

Answer: 102

273. (Drag and drop) As shown in the figure, there is a message containing three-layer label headers.
Please select the corresponding values of the X, Y, and Z fields in the figure. (Decimal)

81 / 86
The safer, easier way to help you pass any IT exams.

Answer:

274.. OSPFv2 is an IGP running on an IIPv4 network. OSPFV3 is an IGP running on an IPv6 network.
Compared with OSPFv2, OSFv3 has similar LSA, but the function is slightly different. The following is the
description of the LSA function of OSPFv3. Please drag the LSA to the correct LSA function column.

82 / 86
The safer, easier way to help you pass any IT exams.

Answer:

275. As shown in the figure, the router runs OSPF and Area2 is a completely stub area. Please match the
type of LSA contained in each area with the area ID.
Type1 LSA、Type2 LSA、Type3 LSAType1 LSA、Type2 LSA、Types LSA、Type5 LSAType1 LSA、Type2
LSA、Type3 LSA、Type4 LSA、Type5 LSA

Answer:

276. (Drag and drop) Network administrator A needs to permit or deny some specific routes, but
administrator A is not proficient in configuration. Please help administrator A to sort the configuration
reasonably so that the device can permit or deny specific routes according to the requirements in the
figure.

83 / 86
The safer, easier way to help you pass any IT exams.

Answer:

277. When encountering network failures, engineers often use layered failure handling methods. Because
all models follow the same basic premise, when all the low-level structures of the model work normally, its
high-level structures can work normally. Please match the following check items with the corresponding
level according to the tiered method.
1. Is the TCP connection established correctly?
2. Whether the port opens the interface protocol
3. Whether the Layer 2 addressing is normal, whether the physical status of the interface is UP, and
whether the cables and connectors are normal
4. Is the routing protocol working properly?
Answer:

84 / 86
The safer, easier way to help you pass any IT exams.

1. Transport layer
2. Data link layer
3. Physical layer
4. Network layer

278. In the process of daily troubleshooting, engineers may need to check some alarm information of the
device. Turn on the debugging/log/alarm information sent by the terminal display information center by
executing the terminal () command. (Please use English lowercase letters to complete the command, and
the command cannot be abbreviated)
Answer: monitor

279. IGP converges faster than BGP, which may cause network traffic loss. By enabling the OSPF and
BGP linkage feature of the device, the device remains as a () router within the set linkage time, so that the
link metric value in the advertised LSA is the maximum value, thereby telling other OSPF devices not to
use this router to forward data, so as to avoid the loss of traffic. (Note: If English letters are involved, all
capitals are required)
Answer: STUB

280. The configuration shown in the figure is performed on R2 to filter all received routes. Assuming that
there is a BGP route with the AS_Path attribute of [100 200 300 400] on R1 that needs to be sent to R2,
please help the network administrator to adjust the order of AS in the AS_Path attribute of the route on R1
to ensure that the routing entries will not be filtered by the routing policy of R2. (Sorting questions)

85 / 86
The safer, easier way to help you pass any IT exams.

A. 100
B. 200
C. 300
D. 400
Answer: CDAB

281. Please sort by the cutover execution steps.


A. After the cutover is completed, observe the status of the network on the new device
B. Perform business inspections on new equipment
C. Cut over business from old equipment to new equipment
D. Install new equipment and configure
E. After ensuring the normal business operation of the new equipment, the old equipment goes offline
Answer: DCABE

86 / 86

You might also like