H12-821
![]() |
![]() |
![]() |
Title of test:![]() H12-821 Description: exam test ABCD |




New Comment |
---|
NO RECORDS |
Which of the following statements about the forwarding plane of a switch is false?. Provides high-speed and non-blocking data channels. Can encapsulate and decapsulate packets. Can collect packet statistics. Consists of main control boards and interface boards. A monitoring plane usually comprises the monitoring units of main control boards and interface boards. This plane can monitor the system environment independently. Which of the following environment monitoring functions can be provided by the monitoring plane?. Voltage monitoring. Temperature monitoring. Fan control. System power-on and power-off control. Which of the following statement regarding the display ospf peer command output is true?. Address: 10.1,1.1 Indicates that the local interface address is 10.1.1.1. Through negotiation during DD packet exchange, the local end becomes the slave. Router ID indicates that the local router ID Is 10.1.1.1. The DR address is 10.1.1.1. Which of the following statements regarding different LSA types is false?. LS Request packets contain only LS Type, LS ID, and Advertising Router. LS Ack packets contain complete LSA information. DD packets contain only LSA summary information, including LS Type, LS ID, Advertising Router, and LS Sequence Number. LS Update packets contain complete LSA information. Which of the following statements regarding OSPF route summarization is false?. OSPF supports two route summarization modes: ABR summarization and ASBR summarization. Any router in OSPF can summarize routes. Route summarization is the process of summarizing routes with the same prefix into one route and then advertising only the summarized route to other areas. Route summarization can reduce routing information, decrease the routing table size, and improve router performance. Which of the following statements is false?. If the current DR fails, the current BDR automatically becomes a new DR, and a BDR will be elected again. A device with a higher router priority has a higher election priority. When a router with the highest router priority joins an OSPF network, this router will become the new DR. If two devices have the same router priority, the device with a larger router ID has a higher election priority. Which of the following statements regarding the LSA age field are true?. The unit of this field is seconds. In a LSDB, the LS age of a LSA increases with time. If the LS age of a LSA has reached the LSRefreshTime (30 minutes), any router can regenerate an instance of this LSA again. The unit of this field is seconds. In a LSDB, the LS age of a LSA decreases with time. If the LS age of a LSA has reached the LSRefreshTime (30 minutes), the originator of this LSA needs to regenerate an instance of this LSA again. Which of the following statements regarding DR/BDR are false?. In a broadcast network, DR and BDR must be elected. A broadcast network without a DR or BDR cannot operate normally. DR others listen on the multicast address 224.0.0.5. All DR others establish neighbor relationships with DR and BDR only. DR others listen on the network address 224.0.0.6. Which of the following TLVs is used by ISIS to describe the IP address of an interface?. 129. 131. 128. 132. A local router runs IS-IS and its command output is shown in the following figure. Which of the following statements is true?. The circuit level of S4/0/0 is Level-1. S4/0/0 supports IPv6. S4/0/0 sends IIH packets at the interval of 30s. The cost of S4/0/0 is 20. Four routers run ISIS and have established adjacencies. The area IDs and router levels are marked in the following figure. If route leaking is configured on R3, which of the following is the cost of the route from R4 to 10.0.2.2/32?. 80. 50. 40. 30. Which of the following is the default interval at which the DIS on a broadcast IS_IS network sends CSNPs. 30. 3.3. 10. 40. See the following figure. RTA, RTB, RTC, and RTD are in the same AS and establish IBGP peer relationships through direct links. RTB an RTC are route reflectors (RRs), RTA and RTC are the RR clients of RTB, and RTB and RTD are the RR clients of RTC. If RTA advertises the route 10.1.1.0/24 to the BGP process, the Originator ID of the BGP route received by RTD is------------------. After which of the following parameters are modified does an IS-IS neighbor relationship need to reestablished? (multiple answer). The cost of an IS-IS interface is changed. The IP address of an ISIS interface is changed. The level of an ISIS interface is changed. The interval at which an IS-IS interface sends IIH packets is changed. In a route-policy, which of the following BGP attributes can be used in apply clauses?. MED. AS_Path. Tag. Local-Preference. Which of the following attribute must be carried in an Update message?. Local-pref. Prefval. MED. AS-Path. Which of the following statements regarding the BGP error display of a router false?. The error may be caused by the incorrect neighbor address. The neighbor address of this router is 10.1.1.5. Error Type indicates that the BGP error is caused by the neighbor relationship error. The error occurred at 12:40:39 on March 22, 2010. Which of the following statements regarding BGP route advertisement are false?(multiple answer). All the BGP routes learned from all BGP peer will be advertised to other BGP peers. Only the optimal routes preferred by BGP can be advertised to other BGP peers. By default, the routes learned from an IBGP peer will not be forwarded to other IBGP peers. Only the routes learned from IGPs can be advertised to other BGP peers. Which of the following statements regarding the summary automatic command and BGP route summarization is false?. After this command is configured, BGP sends only the summarized routes to peers. This command is used to implement automatic summarization. Automatic summarization takes precedence over manual summarization. This command enables automatic summarization for the locally imported routes. After this command is configured, BGP summarizes routes based on natural network segments. Which of the following routing protocols support the default route through command configuration?. BGP. IS-IS. OSPF. ICMP. When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?. 1.1.1.1/26. 1.1.1.2/16. 1.1.1.1/32. 1.1.1.1/24. The filter-policy 2000 export command is run in an ISIS process. Which of the following statements about the functions of a filter policy is false?. Is used together with the route import function to advertise some imported external routes to neighbors. If this command is not run, the device by default advertises all routes that ISIS Imports form external routing protocols. Controls the advertisement of routes generated by the device. Filters LSPs to be advertised. Regarding the route-policy set-cost configuration below, which of the following statements is true?. The route 11.1.0.0/16 is permitted by node 10, and its tost Is set to 300. The cost of all routes is set to 200. All the routes that are not permitted by node 10 will be denied. The route 11.1.0.0/16 will continue to match node 20 after permitted by node 10, and the final cost is set to 200. Which of the following statements regarding an IP prefix are true?. An IP prefix filter is used to filter IP address prefixes and cannot match an IP prefix number and a prefix length at the same time. An IP prefix filter cannot be used to filter data packets. An IP prefix filter is used to filter IP address prefixes and can match an IP prefix number and a prefix length at the same time. An IP prefix filter can be used to filter data packets. RSTP provides different functions in different scenarios. Which of the following statements Is false?. After TC-BPDU attack defense function is enabled, you can set the number of times the switch processes TC BPDUs within a certain period. The role of the designated port that is enabled with root protection cannot be changed. If the edge port on the switch enabled with BPDU protection receives RST BPDU, the switch sets the edge port as a non-edge-port and triggers STP calculation. When the designated port enabled with root protection receives optimal RST BPDUs, the port enters the Discarding state and does not forward packets. If the port does not receive optimal RST BPDUs within a certain period of time, the port will automatically restore to the Forwarding state. Compared with STP, RSTP defines the different port states. Which of the following statements regarding discarding and learning states are true?. The port In discarding or learning state does not forward data frames. The port in discarding state does not learn MAC addresses table. The port in discarding or learning state does not learn MAC addresses. The port In learning stole docs not learn MAC addresses table. As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?. Once receiving OPOUs, the edge port re-partlci pates in the calculation of the spanning tree. After a port is Configured as an edge port, the port can quickly enter the Forwarding state. You can enable the edge port on SWD's GEO/0/2 connected to the terminal so that this port can quickly enter the Forwarding state. You can enable the edge port on SWC's GE0/0/2 connected to the terminal so that this port can quickly enter the forwarding state. A switch runs MSTP. The configuration is shown in the figure. What is the role of this switch in MSTI 1?. Uncertain. Root switch. Non-root switch. Secondary root switch. Which of the following statements regarding IGMPv1 and IGMPv2 are true?. 1GMPv2 supports only general query. 1GMPv2 defines the Leave message type. IGMPv1 does not define the IGMP Leave message type. IGMPv1 supports general query. Which of the following statements is false, based on the following IGMP information on an interface of RTA?. The interval for sending group-specific Query messages is 60s. The maximum time for response to Query messages is 10s. The IP address of the interface is 192.168.1.1. The IGMP version is IGMPV2. Which of the following PIM protocol packets have unicast destination addresses. Register Stop. Bootstrap. Graft. Assert. What parameters can a DHCP6 server assign to a DHCPv6 client?. Gateway address. DNS server address. IPV6 address/prefix. SNTP server address. Which of the following statements about multicast packet forwarding is true?. If a multicast data packet fails the RPF check, the packet must have been received through a suboptimal interface. However, this interface still receives and forwards the multicast traffic downstream. IGMP snooping cannot control the scope of multicast traffic flooding on a Layer 2 network. The source address of a multicast packet is a unicast address. In multicast transmission, the destination address of a packet can be the unicast address of a host. Which of the following statements regarding the stateful inspection firewall is true?. When the stateful inspection firewall checks packets, packets of one same connection are not correlated. Because UDP is a connectionless protocol, so the stateful inspection firewall cannot match UDP packets with the status table. The stateful inspection firewall only needs to match the first data packet against a rule, and the subsequent packets of the connection are matched directly in the state table. The stateful inspection firewall needs to match the rules for each incoming packet. Compress the 2001:0DBB:B8:0000:C030:0000:0000:09A0:CDEF address.___________(if the answer contains letters, capitalize them.). A Huawei firewall by default creates security zones named untrust, dmz, _________ and local. (use Lowercase letters). Which of the following attacks is not the network layer attack?. IP spoofing attack. ICMP attack. Smurf attack. ARP spoofing attack. Which of the following statements regarding the firewall zone security level is false?. The configured security level cannot be changed. Two zones cannot be configured with the same security level. The default security level of the new zone is 1. Only the security level of the user-defined zone can be configured. ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?. If the firewall security policy permits packets to pass, the session table is created. By default, when status detection is disabled and the permit policy is configured packets can pass. Packets must pass the firewall, and a session table is established. If the firewall security policy permits packets to pass, the packets can pass the firewall. Which of the following configurations are not mandatory when an administrator configures VRRP?. Preemption mode. Preemption delay. Virtual router priority. Virtual IP address. Drag the following VRRP states to the corresponding working mechanisms. Replies to an ARP request carrying the virtual IP address with the virtual MAC address. Does not reply to an ARP request carrying the virtual IP Address with the virtual MAC address. Forwards IP packers whose destination MAC addresses are the virtual MAC address. Discards IP packets whose destination MAC addresses are the virtual MAC address. FD control packets are encapsulated in UDP packets for transmission. What is the destination port number of multi-hop BFD control packets?. 4784. 3784. 5784. 2784. There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.). As shown in the following figure, a new AP is deployed In dual link MSB networking (load balancing mode). Which AC will the connect to?. AC1. Random Access. None. AC2. An engineer sets the CAPWAP heartbeat detection interval to 20 of the active link before an active/standby switchover occurs?. 75s. 20s. 60s. 90s. What is the correct procedure for a VLAN pool to assign terminals to VLANs. The STA accesses the network through the assigned VLAN. The VLAN pool bound to the VAP is determined, and the VLAN assignment algorithm is specified. The STA accesses a VAP. The STA is assigned to a VLAN based on the specified algorithm. Which of the following statements about WLAN roaming are true?. APs for roaming do not need to have overlapping signal coverage. APs for roaming must be in the same extended service set (ESS). APs for roaming must have overlapping signal coverage. APs for roaming must be in the same basic service set (BSS). Which Of the following IEEE 802.11 standards is also known as Wi-Fi 6?. 802.11ac. 802.11n. 802.11ax. 802.11b. |