ESTUDAR
|
|
Title of test:
![]() ESTUDAR Description: test estudos HCIA |



| New Comment |
|---|
NO RECORDS |
|
The undo command can be used in the CLI of a Huawei device to restore default settings, disable functions, or delete configurations. Which of the following are correct undo commands? (Select all that apply). <HUAWEI> system-view [HUAWEI] undo system-view <HUAWEI>. [HUAWEI] interface GE 1/0/1 [HUAWEI-GE1/0/1] ip address 10.12.1.1 24 [HUAWEI-GE1/0/1] undo ip address. [HUAWEI] interface GE 1/0/1 [HUAWEI-GE1/0/1] undo portswitch [HUAWEI-GE1/0/1]. [HUAWEI] sysname TEST [TEST] undo sysname [HUAWEI]. In the figure, a web client sends an HTTP request to a web server, and the router in between performs operations on the HTTP request. Which of the following statements are false about the router’s operations? (Select all that apply). The router encapsulates a new destination IP address before sending the data. The router removes the data frame header and checks the destination IP address. The router searches the IP routing table based on the port number in the transport layer header. The router checks the content of the application-layer data and determines the port from which to send the data. You can enter a question mark (?) in the CLI of a Huawei switch to obtain online help. Which of the following statements is true about the meaning of in the output of the command sysname SW1?. There are too many parameters in that position. There is no keyword or parameter in that position. The entered keywords are incorrect. The command is incomplete. The essence of communication is the transmission and exchange of information between two or more points. The three elements of communication are the sender, content, and transmission channel of the information. The receiver of the information is not included among these elements. TRUE. FALSE. In TCP/IP-based end-to-end communication, only the source and destination hosts process the header information added at the transport layer. Routers along the path will definitely not process this information. TRUE. FALSE. In the figure, a TCP connection has been established between PC1 and PC2. After PC1 sends a data segment to PC2, which of the following is the acknowledgment number in the packet returned by PC2?. b+23. a+44. b+1. a+22. On the network shown in the figure, GE1/0/1 and GE1/0/2 of SW1 are access interfaces, and their PVIDs are VLAN 2 and VLAN 3 respectively. GE1/0/1 of SW2 is also an access interface, and its PVID is VLAN 4. SW1-->GE1/0/3 G1/0/3-->SW2 GE1/0/1 /\ GE1/0/2 |GE1/0/1 / \ | / \ | PC1 PC2 PC3 Which of the following configurations on SW1 and SW2 can ensure that data packets sent from PC1 and PC2 can reach PC3?. Configure GE1/0/3 of SW2 as a hybrid interface, add it to VLAN 4 in untagged mode, and retain the default PVID. Configure GE1/0/3 of SW1 as a hybrid interface, add it to VLAN 2 and VLAN 3 in untagged mode, and set its PVID to VLAN 4. Configure GE1/0/3 of SW2 as a trunk interface, configure it to allow packets from VLAN 4 to pass through, and set its PVID to VLAN 4. Configure GE1/0/3 of SW1 as a trunk interface, configure it to allow packets from VLAN 2 and VLAN 3 to pass through, and set its PVID to VLAN 4. Four links between two switches establish an Eth-Trunk in manual mode, and the bandwidth of each link is 1 Gbit/s. One of the links fails. Which of the following statements are true about this scenario? (Select all that apply). The Eth-Trunk interfaces on the switches are still in the Up state. The available link bandwidth between the switches is 3 Gbit/s. The service traffic originally carried by the faulty link stops being forwarded by the switches until the faulty link recovers. All TCP sessions established over the Eth-Trunk are immediately interrupted and re-established. On the network shown in the figure, the administrator creates Eth-Trunk 1 in manual mode on SW1 and SW2, and adds GE1/0/1 and GE1/0/2 on both switches to the Eth-Trunk. After the administrator runs the display interface brief command on SW1, the administrator finds that GE1/0/1 is Up and GE1/0/2 is Down. Which of the following statements is true about this scenario? ----> GE1/0/1 G1/0/1----> SW1<----- <----- SW2 -----> GE1/0/2 G1/0/2---->. Eth-Trunk 1 is Up because it is Up as long as one member interface is Up. Eth-Trunk 1 is Down because the states of member interfaces must be the same in manual mode. Eth-Trunk 1 is Down because it has only two member interfaces and the minimum number of active links is not reached after one member interface is Down. Eth-Trunk 1 is Down because all member interfaces of the Eth-Trunk must be Up. The administrator configures an Eth-Trunk in LACP mode between two switches, and sets the maximum number of active links in the Eth-Trunk to 3 and the number of remaining standby links to 1. If one of the active links fails, the two switches automatically adjust the number of active links to 2 through negotiation, and the standby link remains in the standby state. TRUE. FALSE. In the figure, both PC1 and PC2 belong to VLAN 10. Interface GE1/0/1 on SW1 is a trunk interface with the default PVID, and interface GE1/0/2 on SW1 is an access interface in VLAN 10. Which of the following statements are true about the forwarding of data frames between PC1 and PC2? (Select all that apply) SW1----> # <---- vlan batch 10 ----> # GE1/0/1/ \ GE1/0/2 interface GW1/0/1 / \ port link-type acess / \ port default vlan 10 PC1 PC2 # 192.168.1.1/24 192.168.1.2/24 interface GE1/0/2 VLAN10 VLAN10 port link-type acess port default vlan 10 #. After receiving the data frame sent from PC1 to PC2, SW1 adds the VLAN 10 tag to the data frame and then accepts the data frame. SW1 accepts the data frame sent from PC1 to PC2, but discards the data frame returned from PC2 to PC1. The data frame processed inside SW1 does not carry any VLAN tag. SW1 removes the VLAN 10 tag from the data frame before forwarding it from GE1/0/2 to PC2. In the STP topology shown in the figure, all links have the same path cost, and SW1 is the root bridge. Which of the following ports will become designated ports? (Select all that apply) [ SW1 ]────────────[ SW2 ] │ \ / │ │ \ / │ │ \ / │ │ \ / │ │ \ / │ │ \ / │ [ SW3 ]────────────[ SW4 ]. GE1/0/2 of SW2. GE1/0/1 of SW2. GE1/0/3 of SW3. GE1/0/1 of SW4. On the network shown in the figure, all switches run STP. All links have a path cost of 20, and SW1 is the root bridge. What is the root path cost (RPC) of SW4?. 20. 40. 60. 80. On a switched network where STP is enabled on all devices, when a downstream device detects a topology change, it continuously sends configuration BPDUs to the upstream device until the root bridge is informed of the topology change. TRUE. FALSE. After the root bridge is elected on an STP network, which of the following parameters may be compared by ports on non-root bridge nodes to elect the root port? (Select all that apply). PID of a port on the local device. Root path cost (RPC). BID of the device that sends BPDUs. PID of a port on the device that sends BPDUs. On an STP network, an administrator wants SW2 to be elected as the root bridge. Which of the following methods can be used to achieve this goal? [SW1] [SW2] GE1/0/1 ──────────────────────────── GE1/0/1 GE1/0/2 ──────────────────────────── GE1/0/2 GE1/0/3 ──────────────────────────── GE1/0/3 GE1/0/4 ──────────────────────────── GE1/0/4 ║║║ (Agregação de links) ║║║. Set a lower port priority on SW2. Set a higher system priority on SW2. Set a lower system priority on SW2. Set a lower root path cost on SW2. The figure shows the simplified topology of an enterprise campus network. On this network, the aging time of dynamic MAC address entries on switches is 300 seconds. The administrator connects PC1 to GE1/0/1 of SW1 and successfully pings the IP address of PC2 from PC1. Then, the administrator disconnects the Ethernet cable of PC1 from GE1/0/1 of SW1, immediately connects the cable to GE1/0/2 of SW1, and pings the IP address of PC2 from PC1. Which of the following operations does SW1 perform after receiving a data frame from PC1 when PC1 is connected to GE1/0/2 of SW1? GE1/0/3 [SW1] ----------------------- [SW2] | | | GE1/0/1 | GE1/0/1 | | [PC1] [PC2] IP: 192.168.1.1/24 IP: 192.168.1.2/24 MAC: 0050-5600-0001 MAC: 0050-5600-0002 \ \ GE1/0/2 (ligação tracejada) \ [PC1] IP: 192.168.1.1/24 MAC: 0050-5600-0001. SW1 saves the mapping between the MAC address of PC1 and GE1/0/1, and also keeps the mapping between the MAC address of PC1 and GE1/0/2. SW1 saves the mapping between the MAC address of PC1 and GE1/0/2 and deletes the mapping between the MAC address of PC1 and GE1/0/1. SW1 deletes all MAC address entries and relearns them from all ports. SW1 does not update the MAC address table until the original entry ages out. On the switched network shown in the figure, STP is enabled on all devices. SW1 is the root bridge. The port costs are shown in the figure. Other parameters retain the default values. After the network is stable, which of the following paths is used by SW1 to send traffic to SW4? GE1/0/1 (Cost=50) [SW1] ------------------------ [SW2] | \ / | | \ / | | \ GE1/0/3 (Cost=50) / | GE1/0/2 (Cost=30) | \ / | GE1/0/2 | \ / | (Cost=40) | \ / | | \ / | | \ / | | \ / | [SW3] ------- X ----- [SW4] | / \ | | / \ | | / \ | | / \ | | / \ | | / \ | GE1/0/3 | / \ | GE1/0/2 (Cost=20) | / | (Cost=100) | / | GE1/0/2 | / | (Cost=10) | / | |/ | GE1/0/1 (Cost=30) GE1/0/1 (Cost=30) [SW3] ---------------- [SW4]. SW1 → SW2 → SW4. SW1 → SW3 → SW4. SW1 → SW2 → SW3 → SW4. SW1 → SW4. If the neighbor relationship between R1 and R2 has reached the Full state in OSPF, which of the following statements are true? (Select all that apply). R1 and R2 have different router IDs. R1 and R2 belong to the same area. R1 and R2 use the same process ID. R1 and R2 have the same LSDB in the same area. On the network shown in the figure, R1 serves as the gateway for PC2 and PC3, and directly connects to S1 through a physical link. GE1/0/1 on S1 is configured as a trunk interface and permits traffic of VLANs 2 and 3. Its PVID retains the default value. Which of the following statements are true if PC2 and PC3 can communicate with each other? (Select all that apply) [R1] GE0/0/1 | | GE1/0/1 [S1] / \ / \ GE1/0/2 / \ GE1/0/3 / \ [PC2] [PC3] PC2: VLAN 2 IP: 192.168.2.2/24 PC3: VLAN 3 IP: 192.168.3.1/24. Sub-interfaces GE0/0/1.2 and GE0/0/1.3 have been created on R1. S1 has MAC address entries of PC2 and PC3. R1 can terminate data frames of VLAN 2 and VLAN 3. PC2 and PC3 must be connected to different physical switches. PC2 and PC3 must be connected to different physical switches. ospf 1. area 0. network 10.0.12.1 0.0.0.0. ospf enable 1 area 0. DAD enables a node to detect whether an IPv6 address is already in use by another node before assigning it to an interface. This ensures that duplicate unicast addresses do not exist on a network. Which of the following packets are used for DAD? (Select all that apply). NS. RS. RA. NA. OSPF supports the division of a network into areas, each identified by an area ID that ranges from 0 to 255. Area 0 is designated as the backbone area. TRUE. FALSE. What is the broadcast address of the network that contains a host with IP address 192.168.1.147/28?. 192.168.1.157. 192.168.1.255. 192.168.1.159. 192.168.1.145. OSPF has five types of packets. Which type is used to notify an OSPF neighbor of its required LSAs?. DD. LSR. LSU. Hello. Which of the following IP addresses cannot be configured for a host by default?. 172.16.1.1/16. 192.168.1.1/24. 10.0.0.1/8. 224.0.0.1/24. According to the following routing table, it can be inferred that the IP address of VLANIF 2 on R1 is 10.0.12.1/24. [R1] display ip routing-table Proto: Protocol Pre: Preference Route Flags: R - relay, D - download to fib, T - to vpn-instance, B - black hole route Routing Table: public Destinations: 10 Routes: 10 Destination/Mask Proto Pre Cost Flags NextHop Interface 10.0.12.0/24 Direct 0 0 D 10.0.12.1 Vlanif2 10.0.12.1/32 Direct 0 0 D 127.0.0.1 Vlanif2 10.0.12.255/32 Direct 0 0 D 127.0.0.1 Vlanif2 10.0.21.0/24 Direct 0 0 D 10.0.21.1 Vlanif3 10.0.21.1/32 Direct 0 0 D 127.0.0.1 Vlanif3 10.0.21.255/32 Direct 0 0 D 127.0.0.1 Vlanif3. TRUE. FALSE. Which of the following hosts are reachable to the host at 192.168.1.200/27 at Layer 2? (Select all that apply). 192.168.1.221/27. 192.168.1.192/27. 192.168.1.193/27. 192.168.1.222/27. R1 has four static routes, each of which has a reachable next hop. Given the following static route configuration, what is the next hop of the route to 20.0.0.0/30 in R1’s routing table? [R1] ip route-static 20.0.0.0 30 10.1.1.2 [R1] ip route-static 20.0.0.0 30 10.1.2.2 preference 70 [R1] ip route-static 20.0.0.0 30 10.1.3.2 preference 50 [R1] ip route-static 20.0.0.0 30 10.1.4.2 preference 100. 10.1.4.2. 10.1.1.2. 10.1.2.2. 10.1.3.2. Which of the following commands can be used to check OSPF routes in the global routing table?. display ip routing-table protocol ospf. display ospf peer. display ospf interface. display ospf routing. Which of the following configurations can enable connectivity between interfaces on R1 and R3? (Select all that apply) [ R1 ] ----------- [ R2 ] ----------- [ R3 ] GE0/0/1 GE0/0/1 S1/0/0 10.0.0.1/24 10.0.0.2/24 20.1.1.3/24 | | S1/0/0 20.1.1.2/24. [R1] ip route-static 20.1.1.0 24 10.0.0.2. [R1] ip route-static 20.1.1.0 24 20.1.1.2. [R3] ip route-static 10.0.0.0 24 20.1.1.2. [R3] ip route-static 10.0.0.0 24 20.1.1.1. When a Huawei network device functions as an FTP server, which of the following are possible causes of an FTP client failing to log in to the FTP server? (Select all that apply). The FTP server function is not enabled on the device. The authorized directory is not specified for FTP users. The FTP user name and password are not configured. The network between the device and the FTP client is unreachable. R1 has the following configurations: [R1] radius-server template 1 [R1-radius-1] radius-server authentication 10.1.6.6 1812 [R1-radius-1] radius-server accounting 10.1.6.6 1813 [R1-radius-1] radius-server shared-key cipher YsHsjx_202206139 [R1-radius-1] quit [R1] aaa [R1-aaa] authentication-scheme auth1 [R1-aaa-authen-auth1] authentication-mode radius [R1-aaa-authen-auth1] quit [R1-aaa] accounting-scheme acc1 [R1-aaa-accounting-acc1] accounting-mode radius [R1-aaa-accounting-acc1] quit [R1-aaa] domain huawei.com [R1-aaa-domain-huawei.com] authentication-scheme auth1 [R1-aaa-domain-huawei.com] accounting-scheme acc1 [R1-aaa-domain-huawei.com] radius-server 1 [R1-aaa-domain-huawei.com] quit [R1-aaa] quit Which of the following statements is true?. RADIUS does not support accounting. Even if an accounting server is specified in the RADIUS server template, accounting cannot be performed when terminals access the network. The user cannot obtain authorization information after being authenticated because the IP address of the authorization server is not configured in the RADIUS server template. When a terminal initiates an authentication request, R1 needs to first establish a TCP connection with the server whose IP address is 10.1.6.6. When a terminal uses the user name hcia-datacom@huawei.com to initiate authentication, RADIUS authentication is used. When a terminal uses the user name hcia-datacom@huawei.com to initiate authentication, RADIUS authentication is used. Key exchange. Algorithm negotiation. Version negotiation. User authentication. n the OSPF network shown in the figure, all IP addresses can communicate with each other. Then the following configurations are added on R1: [R1] acl 3000 [R1-acl4-advance-3000] rule deny ip source 10.0.1.1 0.0.0.0 [R1-acl4-advance-3000] rule deny ip source 10.1.1.1 0.0.0.0 [R1-acl4-advance-3000] rule deny ip source 10.3.1.1 0.0.0.0 [R1-acl4-advance-3000] rule permit ip [R1-acl4-advance-3000] quit [R1] traffic classifier test [R1-classifier-test] if-match acl 3000 [R1-classifier-test] quit [R1] traffic behavior test [R1-behavior-test] permit [R1-behavior-test] quit [R1] traffic policy test [R1-trafficpolicy-test] classifier test behavior test [R1-trafficpolicy-test] quit [R1] interface GE 0/0/1 [R1-GE0/0/1] traffic-policy test inbound [R1-GE0/0/1] quit Which IP address of S1 can successfully ping 10.2.23.3? GE1/0/1 GE0/0/1 GE0/0/2 GE1/0/1 [ S1 ] ------------ [ R1 ] ------------ [ R1 ] ------------ [ S2 ] 10.0.12.1/24 10.0.12.2/24 10.0.23.2/24 10.0.23.3/24. 10.1.1.1. 10.2.1.1. 10.3.1.1. 10.0.1.1. The following command output is displayed on R1: [R1] display aaa configuration Domain Name Delimiter: @ Domainname parse direction: Left to right Domainname location: After-delimiter Administrator user default domain: default_admin Normal user default domain: default Domain: total: 256 used: 3 Authentication-scheme: total: 32 used: 2 Accounting-scheme: total: 32 used: 1 Authorization-scheme: total: 32 used: 2 Service-scheme: total: 256 used: 0 Recording-scheme: total: 32 used: 0 Local-user: total: 512 used: 2 Remote-admin-user block retry-interval: 5 Min(s) Remote-admin-user block retry-time: 3 Remote-admin-user block time: 5 Min(s) Session timeout invalid enable: No Which of the following statements is false?. The maximum number of consecutive authentication failures of the local account is 3. The local account lockout duration is 30 minutes. The domain name delimiter is at sign (@). A maximum of 512 local users can be created. Two local users have been created. Secure Shell (SSH) is a protocol that uses encryption and authentication mechanisms to implement network services, such as secure access and file transfer, securely over an insecure network. Which of the following protocols use SSH? (Select all that apply). DNS. NETCONF. SFTP. STelnet. On the OSPF network shown in the figure, all IP addresses can communicate with each other. Then the following configurations are added on R1: [R1] acl 3000 [R1-acl4-advance-3000] rule deny ip source 10.0.1.1 0.0.0.0 [R1-acl4-advance-3000] rule deny ip source 10.1.1.1 0.0.0.0 [R1-acl4-advance-3000] rule permit ip source 10.3.1.1 0.0.0.0 [R1-acl4-advance-3000] rule permit ip [R1-acl4-advance-3000] quit [R1] traffic classifier test [R1-classifier-test] if-match acl 3000 [R1-classifier-test] quit [R1] traffic behavior test [R1-behavior-test] permit [R1-behavior-test] quit [R1] traffic policy test [R1-trafficpolicy-test] classifier test behavior test [R1-trafficpolicy-test] quit [R1] interface GE 0/0/1 [R1-GE0/0/1] traffic-policy test outbound [R1-GE0/0/1] quit GE1/0/1 GE0/0/1 GE0/0/2 GE1/0/1 [ S1 ] ------------ [ R1 ] ------------ [ R1 ] ------------ [ S2 ] 10.0.12.1/24 10.0.12.2/24 10.0.23.2/24 10.0.23.3/24 Which IP addresses of S1 can successfully ping 10.0.23.3? (Select all that apply). 10.3.1.1. 10.2.1.1. 10.0.1.1. 10.1.1.1. The domain to which a user belongs is determined by the user name used by the user to log in to the NAS device. If the domain name carried in the user name is not configured on the NAS device, the authentication fails. TRUE. FALSE. R1 has the following configurations: [R1] nat address-group test 1 [R1-address-group-test] section 1 100.1.23.1 100.1.23.254 [R1-address-group-test] mode pat [R1-address-group-test] quit [R1] nat-policy [R1-policy-nat] rule name test [R1-policy-nat-rule-test] source-address range 192.168.0.0 192.168.255.255 [R1-policy-nat-rule-test] action source-nat address-group test [R1-policy-nat-rule-test] quit [R1-policy-nat] quit [R1] interface GE 0/0/2 [R1-GE0/0/2] nat enable [R1-GE0/0/2] quit Which of the following statements is false?. An intranet user's post-NAT IP address may be 100.1.23.254. If data packets from intranet users are not sent through GE0/0/2 of R1, the users may fail to access the public network. The post-NAT IP addresses of intranet users with different IP addresses must be different. The intranet user with the IP address 192.168.1.100 can access the public network. The emergence of AI poses new requirements on data center networks. To meet AI computing requirements, a high-speed intelligent computing data center network with zero packet loss needs to be constructed. Which of the following statements are false about the requirements and solutions of intelligent computing data center networks? (Select all that apply). Measures such as single-port ultra-high bandwidth and lossless network technologies can be used to achieve a network with close to zero packet loss, but not a truly lossless network. Lossless technologies such as PFC and ECN are used on the intelligent computing network to implement a network with zero packet loss. Due to large-scale data synchronization services on the intelligent computing network, a single port must have a high bandwidth, such as 200GE or 400GE. The RDMA protocol stack is used on the intelligent computing network to reduce the transmission latency between GPU servers and physical switches. With the continuous development of AI, data center application scenarios are gradually divided into general-purpose computing and intelligent computing scenarios. Data centers need to ensure service continuity of general-purpose computing clusters while unleashing the full potential of intelligent computing clusters, so as to guarantee stable and efficient operation in the AI era. Which of the following statements are true about the service requirements of data center networks in the two scenarios? (Select all that apply). The general-purpose computing network demands a well-defined hierarchy, adopting a core aggregation-access three-layer architecture. The general-purpose computing network requires high network stability and efficiency. Technologies such as M-LAG can be used to implement fast failover, and VXLAN can be deployed to build a large Layer 2 network for VM migration. The intelligent computing network requires zero packet loss, which necessitates the deployment of various lossless network technologies such as PFC and ECN. The intelligent computing network requires ultra-low latency, including the latency of data transmission within a compute node. The latency can be further reduced by using the RoCE protocol. With the development of data centers, a large number of services are deployed on virtual machines (VMs). The original VLAN isolation solution cannot achieve isolation between so many VMs. VXLAN uses VXLAN Network Identifiers (VNIs) to provide a larger range than VLAN IDs, so that a larger number of VMs can be isolated. TRUE. FALSE. The traditional Fat AP networking usually applies to WLANs of small and micro stores. For a large scale WLAN, the WAC + Fit AP networking is typically used. Which of the following statements are true about the WAC + Fit AP networking architecture? (Select all that apply). The WAC controls and manages all APs on the WLAN. Users need to log in to the Fit AP to configure wireless services. Layer 2 connectivity is required for the WAC and APs to communicate with each other using the CAPWAP protocol. Fit APs provide 802.11-based wireless access for STAs and function as bridges between wired and wireless networks. In Layer 3 in-path WLAN networking, the WAC and Fit APs are connected at Layer 3. APs can obtain the WAC’s address through broadcast or DHCP. TRUE. FALSE. IEEE 802.11 is the standard for WLANs. Which of the following 802.11 protocols uses 1024-QAM modulation?. 802.11n. 802.11ax. 802.11ac. 802.11be. With the release of Wi-Fi 7, wireless networks are now faster, more stable, and more latency-tolerant than ever. Which of the following frequency bands are supported by Wi-Fi 7? (Select all that apply). 5 GHz. 9.6 GHz. 6 GHz. 2.4 GHz. In the leader AP networking architecture, the leader AP functions as a WAC and uses the CAPWAP protocol to uniformly manage and configure Fit APs. TRUE. FALSE. In a wireless communication system, information is first converted into digital signals for easy circuit calculation and processing by the transmitter through source coding, and then converted into radio waves through channel coding and modulation. Which of the following parameters of a carrier are modified during the modulation process based on signal changes? (Select all that apply). Frequency. Phase. Channel. Amplitude. Which of the following statements are true about the Python code shown below? (Select all that apply) import paramiko import time ssh = paramiko.SSHClient() ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy()) ssh.connect('192.168.1.254', username='python', password='Huawei@123') channel = ssh.invoke_shell() channel.send('screen-length 0 temporary\n') time.sleep(1) output = channel.recv(65535). decode('utf-8') print(output) ssh.close(). ssh.close() is used to terminate the SSH connection. ssh.connect('192.168.1.254', username='python', password='Huawei@123') is used to set up a connection with the device whose IP address is 192.168.1.254. import paramiko and import time are used to import the modules required by the code. channel = ssh.invoke_shell() is used to create an interactive shell session. Both SNMP Trap and Inform Request are used by managed devices to send alarms to the NMS. Inform Request requires an acknowledgment from the NMS, whereas Trap does not. TRUE. FALSE. During WLAN deployment, a Fit AP fails to go online on the WAC. You log in to the WAC and run the display ap online-fail-record command to locate the fault. The command output shows that the cause is Insufficient license resources. This means that the license resources on the WAC are insufficient and that you need to expand the license capacity. TRUE. FALSE. PC1 and PC2 are connected to the same switch, but they cannot learn each other’s ARP information. This may be caused by incorrect VLAN configuration on the switch. TRUE. FALSE. Assume that you cannot configure an IP address for GE1/0/1 on a Huawei switch. Which of the following commands can you run in the interface view to resolve this problem?. port link-type trunk. undo portswitch. port link-type access. port link-type hybrid. In the WAC + Fit AP networking, an AP fails to go online. The output of the display ap all command run on the WAC is shown below. <WAC> display ap all Total AP information: ver-mismatch : ver-mismatch [1] ------------------------------------------------------------------------------- ID MAC Name Group IP Type State STA Uptime 0 60de-4476-e360 L1_003 default 192.168.109.254 AP7060DN ver-mismatch 0 - ------------------------------------------------------------------------------- Total: 1 According to the command output, which of the following is the possible cause of the AP’s failure to go online?. The AP is in the blacklist. The AP fails the authentication. The AP’s software version does not match the WAC’s software version. The AP fails to initialize the configuration. During VLAN planning for a campus network, VLAN IDs for different service types must be allocated consecutively, without redundancy, to prevent omissions in future allocations. TRUE. FALSE. Network administrators need to manage and maintain devices on the campus network. Which of the following protocols cannot modify device configurations, such as interface IP addresses, device names, and so on?. SNMP. STelnet. SFTP. NETCONF. .On the campus network shown in the figure below, the core switch Core1 functions as a Layer 3 gateway and as a DHCP server to dynamically assign IP addresses to AP1, PC1, PC2, and PC3. The network below Core1 is a Layer 2 network. WAC1 and R1 are connected to Core1 at Layer 3. AP1 goes online through VLAN 100. The wireless service VLAN is VLAN 101, and the wired service VLANs for PC2 and PC3 are VLAN 102 and VLAN 103, respectively. Additionally, the direct forwarding mode is used for wireless traffic forwarding. If no additional VLANs are allowed on device interfaces, which of the following VLANs must be allowed on GE1/0/1 of ACC1? (Select all that apply) [Internet] | GE0/0/1 | [R1] | GE0/0/2 | Interconnection VLAN 10 | GE1/0/1 [Core1] _________|___________ | | GE1/0/2 GE1/0/4 | | [ACC1] [ACC2] / \ | / \ | MultiGE0/0/0 GE1/0/2 GE1/0/2 | | | [AP1] [PC2] [PC3] | [PC1]. VLAN 100. VLAN 101. VLAN 102. VLAN 200. |




