Technology Sharing

Huawei HCIP Datacom H12-821 Volume 35

2024-07-12

한어Русский языкEnglishFrançaisIndonesianSanskrit日本語DeutschPortuguêsΕλληνικάespañolItalianoSuomalainenLatina

Multiple choice questions

  1. The display bgp routing-table command output is shown in the figure. Which of the following descriptions of the content is correct?

A. The MED value of the route to the 192.168.1.0/24 network segment is 100.

B. The route to the 192.168.1.0/24 network segment is learned through AS200

C. The route to the 192.168.1.0/24 network segment is injected into the BGP routing table through the network command

D. The route to the 192.168.1.0/24 network segment is not optimal in the BGP routing table.

correct answer:

C

Analysis: The Oringin attribute in the command output is i, which means IGP. Use the network command to inject it into the BGP routing table.

True or False

2. To modify the OSPF network type of an interface under the interface, you need to restart the device or reset ospf, otherwise ospf will not take effect.

A. Yes

B. Wrong

correct answer:

B

Analysis: Modifying the OSPF network type of an interface under the interface takes effect immediately.

True or False

3. VLAN Pool can support multiple service VLANs at the same time through one SSID, thereby reducing the broadcast domain and reducing the waste of IP addresses.

A. Yes

B. Wrong

correct answer:

A

Analysis: By assigning access users to different VLANs through VLAN Pool, you can reduce the broadcast domain, reduce the broadcast messages in the network, and improve network performance. One SSID needs to be able to correspond to multiple VLANs, and disperse a large number of users to different VLANs to reduce the broadcast domain.

True or False

4. Type 7 LSAs are generally not allowed to be transmitted in the backbone area, but the suppress-forwarding-address command can be used to allow Type 7 LSAs to be transmitted in Area 0.

A. Yes

B. Wrong

correct answer:

B

Analysis: suppress-forwarding-address sets the FA (Aaddress Forwarding) of the Type 5 LSA generated after translation by the NSSA ABR to 0.0.0.0.

Multiple Choice

5. Which of the following functions is implemented using NDP 135/136 type messages?

A. Duplicate address detection

B. Neighbor Status Tracking

C. Address resolution

D. Router discovery

correct answer:

A,B,C

Analysis: This question is a multiple-choice question, but you can actually choose ABC. The router finds that it is RA/RS.

Multiple choice questions

6. By default, how many seconds does the BGP peer adjacency hold time?

A. 120 seconds

B. 60 seconds

C. 10 seconds

D. 180 seconds

correct answer:

D

Analysis: By default, the survival time is 60 seconds and the hold time is 180 seconds.

Multiple choice questions

7. Which of the following descriptions about LSDB synchronization is incorrect?

A. Detailed LSA information will be exchanged between ExStart and Loading states

B. DD messages in the Exchange state will carry summary information of the link state

C. LSR does not carry detailed link status information

D. In the Loading state, neighbors will send LSR messages, LSU messages, and L.SAck messages to each other.

correct answer:

A

Analysis: The ExStart state carries summary information, and the Loading state carries detailed information about the start of interaction.

Multiple choice questions

8. The default-route-advertise command can be used to advertise the default route into the OSPF domain. To which of the following types of LSA does the default route belong?

A. Type 2 LSA

B. Type 1 LSA

C. Type 3 LSA

D. Type 4 LSA

E. Type 5 LSA

correct answer:

E

Analysis: The default route delivered by the default-route-advertise command is type 5 LSA.

Multiple choice questions

9. In IPsec, which protocol can be used to achieve data integrity?

A、AES

B、3DES

C、MD5

D、DES

correct answer:

C

Analysis: IPSec uses a hash algorithm to implement data integrity verification. Before sending a data packet, the data will be hashed and the hash value of the entire data packet will be obtained. After receiving the data packet, the peer device will hash the data and compare the obtained value with the hash value in the data packet. If they are the same, it means that the data has not been tampered with, otherwise it means that the data has been tampered with.

1. SHA: (English: Secure Hash Algorithm, abbreviated as SHA) is a family of cryptographic hash functions and a secure hash algorithm certified by FIPS. It can calculate the fixed-length string (also known as the message digest) corresponding to a digital message. If the input messages are different, there is a high probability that they correspond to different strings.

2. MD5: A widely used cryptographic hash function that can generate a 128-bit (16-byte) hash value to ensure complete and consistent information transmission. It has the characteristics of irreversibility and avalanche effect.

Multiple choice questions

10. Telemetry is mainly used to monitor the network, including packet inspection and analysis, security intrusion and attack detection, intelligent data collection, application performance management, etc. Which of the following descriptions about Telematry is wrong?

A. The data collected is highly accurate and of various types, fully reflecting the network status.

B. Ability to quickly locate faults, achieving a fault location speed of seconds or even sub-seconds

C. The number of managed devices is small, but the accuracy is high, which is suitable for small and medium-sized networks.

D. Support multiple implementation methods to meet different needs of users

correct answer:

C

Analysis: Advantages of Telemetry:

Support multiple implementation methods to meet the different needs of users.

The collected data is of high accuracy and rich types, fully reflecting the network status.

Subscribe once, keep reporting.

Fault location is faster and more accurate. A large number of devices can be managed, making it suitable for large networks.

Multiple choice questions

11. The LSDB output of a router R2 is shown in the figure. According to the content analysis in the figure, which of the following options is wrong?

A. R2 is deployed in the backbone area and is an ABR.

B. Area 1 has area border routing aggregation

C. There is an ASBR in Area 2, and the router ID of the ASBR is 6.6.6.6

D. There is no Stub area in the entire environment involved in the figure

correct answer:

C

Analysis:

A is correct because R2's LSDB exists in area 0 and other areas, and each has a type of LSA, so it is an ABR.

B is correct. Area 1 has aggregation, which is reflected in the fact that area 2 has a type 3 aggregation LSA with the address 192.168.0.0, and the advertiser is ABR 2.2.2.2.

C is wrong. The four types of LSA show that the ASBR advertiser is 2.2.2.2, and the actual ASBR is 6.6.6.6. A type of LSA of 6.6.6.6 exists in area 1, so there is an ASBR in area 1.

D is correct. There are only three areas in the whole figure, namely 0, 1 and 2. From the LSDB, we can see that area 2 has four and five types of LSAs, which is not a stub. We just analyzed that area 1 has an ASBR, which is also not a stub. Therefore, there is no stub.

Multiple choice questions

12. In BGP, not only the configuration of peers in a fully connected IBGP network becomes complicated, but also the consumption of network resources and device CPU resources will increase. Which of the following technologies can be used to simplify IBGP network connections?

A. Route attenuation

B. Route reflector

C. Route aggregation

D、GTSM

correct answer:

B

Analysis: To simplify IBGP network connections, route reflectors and alliances can be used in the IBGP network.

Multiple choice questions

13. After a stack split occurs, the MAD conflict handling mechanism will perform MAD competition. In the MAD competition principle, how many seconds of difference in startup completion time will be considered that the startup completion time of the stack is the same?

A. 5 seconds

B. 20 seconds

C. 15 seconds

D. 10 seconds

correct answer:

B

Analysis: MAD competition principle and main switch competition principle

1. The startup time is compared first. The stack system with the earlier startup completion time enters the Detect state. If the startup completion time difference is within 20S, the startup completion time of the stack is considered to be the same.

2. When the startup completion time is the same, compare the priority of the master switch in the stack, and the stack system with the higher priority becomes the Detcet state.

3. When the priorities are the same, compare the stacking system MAC. The stacking system with the smaller MAC address becomes the Detect state.

Multiple choice questions

14. Which of the following descriptions of the Cluster List attribute in BGP is incorrect?

A. When RR receives a BGP route with the Cluster_List attribute, and the attribute value contains the Cluster_ID of the cluster, RR considers that the route has a loop and will ignore updates about the route.

B. This property belongs to the optional transition type

C. Cluster_List is generated by the route reflector and consists of a series of Cluster_IDs

D. When a route is reflected by a reflector, the Cluster_ID of the RR will be added to the Cluster_List attribute of the route.

correct answer:

B

Analysis: Cluster_List attributes: Optional non-transition

Multiple choice questions

15. BGP uses TCP as the transport layer protocol. What is the TCP port number used by BGP?

A、179

B、201

C、249

D、182

correct answer:

A

Analysis: BGP uses TCP as its transport layer protocol (port number is 179)

Multiple choice questions

16. Which of the following descriptions about MP-BGP is incorrect?

A. A router that supports MP-BGP cannot interact with a router that only supports BGP-4.

B. MP-BGP can isolate the routing information of different address clusters from each other

C. MP-BGP introduces two new optional non-transition path attributes: MP_REACH_NLRI and MP_UNREACH_NLRI

D. MP-BGP can carry multiple network layer protocols

correct answer:

A

Explanation: A router that supports MP-BGP can interact with a router that only supports BGP-4.

Multiple choice questions

17. Which of the following descriptions of NSSA areas is incorrect?

A. The ABR in the NSSA area will convert the Type 7 LSA into the Type 5 LSA and inject the LSA into the backbone area, thereby flooding the entire OSPF domain.

B. NSSA area can introduce external routes without learning external routes from other areas of the OSPF network

C. Type 3 LSAs are not allowed inside the NSSA area, nor are Type 4 and Type 5 LSAs allowed inside the area.

D. The ABR in the NSSA area will automatically inject a default route into the area. The route is described by 7 types of LSA.

correct answer:

C

Analysis: There are three types of LSAs in the NSSA area.

Multiple choice questions

18. Which of the following descriptions of the fields in the ASBR-Summary-LSA message of OSPF is incorrect?

A. The Advertising Router field indicates the ABR that generates the LSA.

B. The Advertising Router field in the ASBR-Summary-LSA in all areas is the same

C. Link State ID indicates the Router ID of the ASBR

D. Metric indicates the OSPF cost from the ABR to the ASBR

correct answer:

B

Analysis: ASBR-Summary-LSA is generated by ABR. Link State ID indicates the neighbor's Router ID. Advertising Router indicates the Router ID of this route.

Mertic indicates the OSPF cost of the route to the neighbor.

Advertising Router indicates the Router ID of this route. Therefore, the Advertising Router field in the ASBR-Summary-LSA generated by ABRs in different areas is different.

Multiple choice questions

19. The OSPF protocol has the ability to authenticate all data packets exchanged between neighboring routers. In the VRP system, which of the following algorithms does OSPF support?

A、AES

B、DES

C、MD5

D、RSA

correct answer:

C

Analysis: Set the authentication mode used by the OSPF area.

•If you select the Simple authentication mode, you also need to configure a simple authentication password and confirm the password again.

•If you select MD5 authentication mode, you also need to configure the MD5 key value and password and confirm the password again.

•If you select the HMAC-MD5 authentication mode, you also need to configure the HMAC-MD5 key value and password and confirm the password again.

Multiple choice questions

20. Which of the following descriptions about CloudFabric intelligent operation and maintenance is incorrect?

A. CloudFabric intelligent operation and maintenance uses SNMP protocol to achieve automated operation and maintenance

B. CloudFabric intelligent operation and maintenance is business-centric

C. CloudFabric intelligent operation and maintenance can proactively operate and maintain, and automatically troubleshoot

D. CloudFabric intelligent operation and maintenance can achieve second-level data collection through Telemetry

correct answer:

A

Analysis: Huawei's data center controller (see the iMaster NCE-Fabric product introduction on Huawei's official website for details) manages network devices in the south and connects to platform systems at the resource management layer in the north to complete automated deployment and network resource management over the entire service life cycle.

Multiple choice questions

21. Which of the following descriptions about roaming group servers is incorrect?

A. After an AC is set as a roaming group server, it will join the roaming group by default and can manage other ACs

B. An AC can serve as a roaming group server for multiple roaming groups at the same time

C. The roaming group server needs to maintain the member table of the roaming group

D. The roaming group server manages each AC through the CAPWAP tunnel.

correct answer:

A

Analysis: In a WLAN network, roaming is not possible between any two ACs. STAs can only roam between ACs in the same roaming group.

There are two methods to configure a roaming group:

1. To specify a roaming group server, you need to configure the roaming group on the roaming group server and add member ACs to the roaming group. At the same time, you need to specify the roaming group server on the roaming group member ACs, and then the roaming group server sends the roaming group configuration information to each member AC. After receiving the roaming group configuration information, each member AC automatically establishes an inter-AC tunnel with other member ACs in the roaming group to exchange STA information and forward service messages when the STA roams.

①Configure the roaming group server on the member AC

②Configure roaming groups on the roaming group server

2. If you do not specify a roaming group server, you need to configure a roaming group on each AC in the roaming group and add member ACs.

① Each member AC needs to configure a roaming group

Multiple choice questions

22. Three switches run the RSTP protocol, and the topology and configuration are shown in the figure. Which of the following descriptions about the root bridge is correct?

A. The root bridge is SWA

B. The root bridge cannot be determined

C. The root bridge is SwC

D. The root bridge is SWB

correct answer:

A

Analysis: The bridge with the lowest priority is elected as the root bridge.

Multiple choice questions

23. It is known that the router R1 has Loopback0 and the address is 1.1.1.1/32. When OSPF is enabled and direct routes are introduced, the loopback interface will be introduced. Which of the following configurations can ensure that Loopback0 will not be introduced when direct routes are introduced, and can ensure that other direct routes are introduced into OSPF?

A、

B、

C、

D、

correct answer:

C

Analysis: According to the information in the figure, option C is more consistent.

Multiple choice questions

24. The output of ip as-path-filter of a router is shown in the figure. Which of the following descriptions of this configuration is correct?

A. This configuration matches packets originating from any AS and arriving at this router. This router belongs to AS 12345.

B. This configuration matches packets that originate from any AS, pass through AS 12345, reach another AS, and finally reach this router.

C. This configuration matches packets originating from AS 12345 and passing through any AS to reach this router.

D. This configuration matches packets originating from any AS and passing through AS 12345 to reach this router.

correct answer:

D

Analysis: This configuration matches packets originating from any AS and passing through AS 12345 to reach this router.

Multiple choice questions

25. In IS-IS, DIS is used to create and update pseudonodes and is responsible for generating the link state protocol data unit LSP of the pseudonode. What is the priority of DIS by default?

A、10

B、64

C、0

D、127

correct answer:

B

Analysis: By default, the DIS priority of the IS-IS interface in a broadcast network is 64 at both Level-1 and Level-2 levels.

Multiple choice questions

26. As shown in the figure, four Huawei switches have been running and configured with the MSTP protocol. Now you need to set SW3 as the root bridge of Instance 10. Which of the following commands can be used to achieve this?

A、stp vlan 10 root primary

B、stp instance 10 priority 4096

C、stp root primary

D、stp instance 10 root primary

correct answer:

D

Explanation: primary specifies the device configured as the root bridge of the spanning tree.

Multiple choice questions

27. Which of the following descriptions of the reset ip ip-prefix command is correct?

A. This command enables the router interface to recall the prefix list during traffic filtering (Traffic-Filter)

B. This command can clear the statistics of the IPv4 address prefix list

C. This command can rematch the routing entries

D. This command enables the router to recall the prefix list during routing protocol injection.

correct answer:

B

Explanation: The reset ip ip-prefix command is used to clear the counters of the specified IPv4 address prefix list.

Multiple choice questions

28. The Hold time carried by BGP neighbor PeerA in Open is 90s, and the Hold time carried by PeerB in Open is 30s. The time interval for sending Keepalive messages after PeerA and PeerB successfully establish a connection is

A、30s

B、90s

C. Do not send Keepalive messages

D、10s

correct answer:

D

Analysis: One third of the hold time is equal to the keepalive time, that is, 30/3=10

Multiple choice questions

29. Which of the following is correct about LSA?

A. The combination of LS type, LS sequence number and Advertising Router jointly identifies an LSA

B. The combination of LS type, Link State ID, and Advertising Router jointly identifies an LSA

C. The combination of LS type, Link State ID and LS sequence number jointly identifies an LSA

D. The combination of LS sequence number, Link State ID and Advertising Router jointly identifies an LSA

correct answer:

B

Analysis: The three elements that describe an LSA are: ADV Router (the router that generates the LSA), link-ID (the link identifier), and LSA type.

Multiple choice questions

30. Which of the following descriptions about BCP message types and message characteristics is incorrect?

A. HELLO messages are sent periodically between peers to maintain the connection

B. OPEN message is responsible for establishing a neighbor relationship with the peer

C. NOTIFICATION messages are used to transmit error messages between BGP SPEAKERs.

D. UPDATE messages are used to transfer routing information between BGP peers

correct answer:

A

Analysis: BGP Keepalive messages are sent periodically to maintain BGP connections.

Multiple choice questions

31. The following is the information output by a router. Which of the following is the correct description of this information?

A. The router negotiates with its neighbors and uses BGP version 3.

B. The AS number of the router is 100

C. The router has an IBGP neighbor relationship with neighbor 2.2.2.2

D. The router ID of this router is 1.1.1.1

correct answer:

B

Analysis: The AS number of this router is 100.

Multiple choice questions

32. The command to configure BFD and static default routing linkage is:

A、ip route static 0.0.0.0 0.0.0.0 10.0. 12. 2 track bfd-session 1

B、ip route static 0.0.0.0 0.0.0.0 10.0.12. 2 bfd-session 1

C、ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track l

D、ip route-static 0.0.0.0 0.0.0.0 10.0.12.2 track session 1

correct answer:

A

解析:ip route static x.x.x.x x.x.x.x x.x.x.x track bfd-session x

Multiple choice questions

33. When OSPF runs in a broadcast network, it needs to elect a DR and BDR. In which of the following states will the election of DR and BDR be performed?

A、2-way

B、Full

C、Exchange

D、Init

correct answer:

A

Analysis: 2-way starts the election of DR and BDR.

Multiple choice questions

34. Based on which set of parameters is Server-Map generated?

A. Source MAC address, source IP address and source port number

B. Source and destination MAC addresses, source and destination IP addresses, and protocol types

C. Source IP address, source port number and protocol type

D. Source and destination MAC addresses, source and destination port numbers, and protocol types

correct answer:

C

Analysis: The servermap table entry mainly consists of the destination address, destination port, and protocol type.

Multiple choice questions

35. In the hardware module of the frame device, the main control board provides the control plane and management plane of the entire system. Which of the following functions does the management plane not include?

A. Environmental Monitoring

B. System Upgrade

C. System loading

D. Business Scheduling

correct answer:

D

Analysis: 1. The management plane completes the system's operating status monitoring, environment monitoring, log and alarm information processing, system loading, system upgrade and other functions. 2. The control plane completes the system's protocol processing, business processing, routing calculation, forwarding control, business scheduling, traffic statistics, system security and other functions.

Multiple choice questions

36. As shown in the figure, the four switches have run the RSTP protocol and completed the spanning tree calculation. Which of the following descriptions of port roles are correct?

A. G0/0/2 of SW2 is AP, and G0/0/2 of SW3 is DP

B. G0/0/1 of SW4 is RP, and G0/0/2 of SW4 is AP

C. G0/0/1 of SW4 is the AP, and G0/0/2 of SW4 is the RP

D. G0/0/2 of SW2 is DP, and G0/0/2 of SW3 is AP

correct answer:

B

Analysis: This is a multiple-choice question, but you can actually choose BD. The election rules can refer to the comparison principle.