option
Questions
ayuda
daypo
search.php
ERASED TEST, YOU MAY BE INTERESTED ON HCIA-Datacom V1.0 - Part1
COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
HCIA-Datacom V1.0 - Part1

Description:
HCIA - Datacom Part1

Author:
ExaCONET
Other tests from this author

Creation Date:
30/01/2024

Category: Others

Number of questions: 75
Share the Test:
New CommentNuevo Comentario
No comments about this test.
Content:
In the network as shown in the figure below, all routers run 0SPF protocol, which device is ABR? Router D Router A Router C Router B.
The IPV6 address 2001:ABEF:224E:FFE2:BCC0:CD00:DDBE:8D58 cannot be abbreviated. True False.
As shown in the following figure, the ports of switch A and switch B connecting to the host belong to VLAN10 and VL.AN 20, respectively. The switch interconnection port type is Trunk. PVID is 10 and 20 respectively. Which of the following statements are correct? Host A and Host B belong to different VLANs and cannot ping each other Host A and Host B can be pinged Do not carry VLAN TAG when forwarding data frames sent by the host between switches The ARP request from host A cannot be forwarded to host B.
The CAPWAP protocol specifies the communication standard between AC and AP. Which of the following statements about the CAPWAP protocol is correct? CAPWAP is an application layer protocol based on TCP transmission AP can encapsulate the user's data message in CAPWAPI and forward it to AC In order to establish a CAPWAP tunnel, FIT AP can only discover AC through broadcast messages In order to reduce the burden on A, CAPWAP uses a tunnel to transmit control messages anddata messages at the same time.
What kind of message does the OSPF protocol use to confirm the received LSU message? LSU LSA LSR LSACK.
When a switch receives a unicast data frame with a VLAN tag, but finds that the destination MAC address of the data frame cannot be queried in its MAC address table, the switch's processing behavior for the data frame is. The switch will broadcast this data frame to all ports (except the receiving port) in the VLAN where the data frame is located The switch will discard this data frame The switch will broadcast the data frame to all ports The switch will broadcast this data frame to all Access ports.
In the following options, the necessary technology to enable a host with an IP address of 10.0.0.1 to access the Internet is. NAT Route import Dynamic routing Static routing.
Which of the following features does the default VLAN in the Layer 2 Ethernet switch have? By default, all ports of the switch are member ports of the default VLAN The default VLAN must be created before it can be assigned a port The IP address configured on the switch will only be applied to the member ports of the default VLAN The default VLAN cannot be deleted manually.
Virtualization is the foundation of NFV. Which of the following statements about the characteristics of virtualization is correct? (3 answers) Partition: Multiple virtual machines can be run on a single physical server at the same time. Isolation: Virtual machines on the same physical server are isolated from each other. Hardware independence: Virtual machines and hardware are decoupled, and virtual machines can be migrated between servers. Encapsulation: All virtual machines share the operating system, and the encapsulation is realized through the namespace.
VRP operating system commands are divided into four levels: access level, monitoring level, configuration level, and management level. Which level can run various business configuration commands but cannot operate the file system? Management Level Monitoring Level Configuration Level Access Level.
In the RSTP protocol, when the edge port receives the configuration BPDU message, it loses the edge port attribute. True False.
In order to ensure that the same data stream is forwarded on the same physical link, which load sharing method does Eth-Trunk use? Load sharing based on application layer information Load sharing based on the inbound interface of the packet Packet-based load sharing Flow-based load sharing.
In the network shown in the figure below, when the 0SPF neighbor status is stable, what is the neighbor status of Router B and Router C? Full 2-way Down Attempt.
Which of the following advantages does stacking and clustering technology have? Simplify device management, just manage one logical device Number of expansion ports Can deploy link aggregation across physical devices Effectively avoid single points of failure.
If the ipv4 address of a host in the LAN is 192.168.1.1/30, which of the following IP addresses will be processed by the host as the destination address? 192.168.1.1 255.255.255.255 192.168.1.2 192.168.1.3.
When Huawei switches run STP, the priority of the switch is () by default. 4096 32768 16384 8192.
Which of the following IPv6 addresses can be abbreviated as 2FFF:DAC:ABEF::CDAA:732? 2FFF:DAC0:ABEF:0000:0000:0000:CDAA:0732 2FFF:0DAC:ABEF:0000:0000:0000:CDAA:7320 2FFF: 0DAC: ABEF: 0000: 0000: CDAA: 0732 2FFF:0DAC:ABEF:0000:0000:0000:CDAA:0732.
Which of the following port states does the RSTP protocol include? Discarding Forwarding Listening Learning.
Which of the following refers to network communication? Download emails from the company's mailbox to your computer Use a computer to visit the company's official website Use instant messaging software (eg, QQ, WeChat) to chat with friends Use computer to watch videos online.
The output information of a certain switch is shown in the figure. Which of the following interfaces can forward data frames with VLAN-ID 40. And it does not carry tags when forwarding? GE0/0/4 GE0/0/5 GE0/0/2 GE0/0/3.
Which of the following statements about static routing is wrong? Manual configuration by the network administrator Cannot automatically adapt to changes in network topology Low system performance requirements Routing information needs to be exchanged between routers.
The Tracert diagnostic tool records the () of each ICMP timeout message, so that it can provide the user with the IP address through which the message reaches the destination. Source IP address Destination port Source port Destination IP address.
The wireless access controller (AC, Access Controller) is the overall management and control device in the FIT AP architecture. What is wrong about the role of AC in the following description? AP configuration delivery User access authentication User access control Regardless of the data forwarding method, the user's data packets are forwarded by the AC.
In the broadcast network, which routers will a DRother router exchange link status information with? DR Other BDR All OSPF Neighbours DR.
Which of the following authentication methods do not need to enter a user name and password. authentication-mode none authentication-mode local authentication-mode hwtacacs authorization-mode hwtacacs.
The switch becomes a logical switch after stacking and clustering, and Eth-Trunk across physical devices can be deployed to improve network reliability. True False.
In the network shown in the figure below, assuming that all routers enable OSPF at the same time, which router is the DR in this network? Router A Router B Router C Router D.
Which bridge ID is unlikely to appear in the configuration BPDU sent by the switch? 2048 00-01-02-03-04-CC 8192 00-01-02-03-04-CC 4096 00-01-02-03-04-CC 0 00-01-02-03-04-CC.
Apply the ACL configured as follows in Telnet, only the device with the IP address of 172.16.105.2 is allowed to log in remotely. # acl number 2000 rule 5 permit source 172.16.105.2 0 #. True False.
What is the IEEE802.11 standard corresponding to Wi-Fi6? 802. Ilau 802. 1lat 802. 1ac 802. 1Iax.
Trunk type ports and Hybrid type ports handle the same way when receiving data frames. True False.
Which of the following statements about the Python language is wrong? Python language supports automatic indentation, so you don't need to pay attention when writing code Python generally executes code from beginning to end in order. Pay attention to the use of comments when writing code to help readers understand the code. Comments start with #. The role of print is to output the content in the brackets.
The network structure and OSPF partition are shown in the figure. In the figure, except for RTA, the routers RTB, RTC and RTD are all ABR routers. True False.
The MAC address table of a certain switch is shown in the figure. If the switch receives a data frame with a destination MAC of 5489 9811-0b49 from port Eth0/0/2, which of the following statements is correct? Forward this data frame from port Eth0/0/3 Forward this data frame from the Eth0/0/2 port Discard this data frame Flood out this data frame.
Complete the ACL configuration shown in the figure on the router RTA, the following description is correct. The VRP system will match the rule first in sequence numbering deny source 20.1.1.0 0.0.0.255 The VRP system will not adjust the sequence number, but will first match the rule permit source 20.1.1.0 0.0.0.255( Configuration error, the sequence number of the rules must be configured from small to large The VRP system will adjust the sequence number of the first rule to 5 according to the configuration sequence.
If a windows host is started for the first time, if it uses DHCP to obtain an IP address, what is the source IP address of the first packet sent by this host? 169.254.2.33 0.0.0.0 127.0.0.1 255.255.255.255.
The user cannot configure the VLAN ID to 0. True False.
The administrator finds that the two routers stay in the 2-WAY state when establishing OSP neighbors, then the following description is correct (). The router is configured with the wrong Router ID These two routers are DR0ther routers in the broadcast network The router is configured with the same area ID The router is configured with the same process ID.
Which of the following MAC addresses cannot be used as the MAC address of the host network card? 03-04-05-06-07-08 01-02-03-04-05-06 00-02-03-04-05-06 02-03-04-05-06-07.
In the network shown in the figure below, Router A uses manual mode link aggregation, and adds G0/0/1 and G0/0/2 ports to aggregation group 1. What is wrong about the status of Router A's aggregation port 1? Only disable port G0/0/1 of ROuter B and Eth-Trunk 1 protocol up Turn off the G0/0/1 and G0/0/2 ports of Router B at the same time, and Eth-Trunk 1 protocol down Turn off the G0/0/1 and G0/0/2 ports of Router B at the same time, and Eth-Trunk 1 protocol up Only close the G0/0/2 port of Router B and Eth-Trunk 1 protocol up.
Which of the following cannot be the length of the IPv4 packet header? 20B 32B 64B 60B.
On Huawei AR G3 series routers, which authentication modes does AAA support? HWTACACS 802.1x None Local.
For switches running the STP protocol, the port needs to wait for the forwarding delay in the Learning state before it can be converted to the Forwarding state. True False.
Regarding the conflict domain and the broadcast domain, the correct description is (). Devices connected to all ports on a HUB belong to a conflict domain The devices connected to all ports of a Layer 2 switch with default configuration belong to a conflict domain The devices connected to all ports of a Layer 2 switch with default configuration belong to a broadcast domain The device connected to a router belongs to a broadcast domain.
In the WLAN architecture, the FIT AP cannot work independently. It needs to be managed by AC. Which of the following protocols are used to communicate between FIT AP and AC? IPsec WEP CAPWAP WAP.
Which of the following fields is not included in the HELLO packet of the OSPF protocol? Network Mask Neighbor sysname HelloInterval.
By default, what is the RouterDeadInterval of the OSPF protocol on the broadcast network? 30s 20s 40s 10s.
On the VRP platform, which of the following methods can be used to access the previous history command? Ctrl+U Left cursor Ctrl+P Up cursor.
Only one SSID can be bound to an AP radio. True False.
After the network administrator uses the TracertRoute function on the router device, in the data packet sent by the router, the value of the Protocol field in the IPv4 header is? 2 6 1 17.
The CAPWAP control tunnel and data tunnel transmission adopt the same port number. True False.
How many bytes is the length of the basic IPV6 header? 64 40 32 48.
A DHCP server is deployed in the network, but the administrator found that some hosts did not correctly obtain the address specified by the DHCP server. What are the possible reasons? There is another DHP server in the network that works more efficiently Some hosts cannot communicate with the DHCP server normally, and the client systems of these hosts have automatically generated addresses in the range of 169.254.0.0 The address pool of the DHCP server has all been allocated Some hosts cannot communicate with the DHCP server normally, and the client systems of these hosts automatically generate addresses in the range of 127.254.0.0.
Network administrators use Ping to test the connectivity of the network. Which of the following protocols may be used in this process? TCP ICMP ARP UDP.
Which of the following commands can be used to view the CPU usage of the router? display cpu-usage display memory display interface display cpu-state.
The figure shows the routing table of router R1. If R1 sends a packet with a destination IP address of 10.0.2.2, which interface needs to be sent from? Ethernet 0/0/2 Ethernet 0/0/0 Ethernet 0/0/1 GigabitEthernet 0/0/0.
In the broadcast network shown in the figure, OSPF runs on four routers in the same area and on the same network segment. OSPF will automatically elect one DR and multiple BDRs to achieve a better backup effect. True False.
The only way for the STA to discover the wireless network is the beacon frame sent by the AP. True False.
The port in the Discarding state in RSTP will discard the received data frame. However, the MAC address table can be maintained according to the data frames received by the port. True False.
The ACL on AR G3 series routers supports two matching sequences. Configuration order and automatic sorting. True False.
The output information of a certain device is shown in the figure. Which of the following statements is correct? The device name is Huawei The standby main control board of the device is operating normally The VRP operating version of the device is VRP5 The device has been running for 1 minute.
The switch is connected to the host. What is the common port link type of the switch? Hybrid chain link Access link Trunk link.
The router needs to modify the destination IP address in the data packet when forwarding the data packet. True False.
The two switches shown in the figure below have both enabled the STP protocol. Which port will eventually be in the Blocking state? SWA's G0/0/2 port G0/0/2 port of SWB G0/0/3 port of SWA G0/0/3 port of SWB.
Which of the following elements are included in the routing table? Interface Cost Protocol NextHop.
When the switch receives a unicast data frame, it will look up the destination MAC address in the MAC surface. Which of the following statements is wrong? If the MAC address is found, and the port corresponding to the MAC address in the MAC address table is not the port where the frame enters the switch, the switch performs the forwarding operation If the MAC address is found, and the port corresponding to the MAC address in the MAC address table is the port where the frame enters the switch, the switch performs the discard operation If the MAC address cannot be found, the switch performs flooding operation If the MAC address cannot be found, the switch will discard it.
The MAC address table of a certain switch is shown in the figure. If the switch receives a data frame with a destination MAC of 5489-985-18a8 from port Eth0/0/2, which of the following statements is correct? Forward this data frame from port Eth0/0/1 Discard this data frame Forward this data frame from the Eth0/0/2 port Flood out this data frame.
What to do when the Trunk port sends data frames? When the VLAN ID is different from the PVID of the port, replace it with PVID forwarding When the VLAN ID is different from the PVI ID of the port, strip off the TAG for forwarding When VLAN ID is the same as the PVID of the port, and it is the VLAN ID allowed by the port, remove the Tag and send the message When the VLAN ID is different from the P? ID of the port, the data frame is discarded.
What is the value of TPID defined by IEEE802.1Q? 0x7200 0x8100 0x8200 0x9100.
Which of the following commands can be used to check the session status of the PPPoE client? display pppoe-client session packet display ip interface brief display pppoe-client session summary display current-configuration.
What is the total length of the interface identifier of the link-local unicast address in bits? 64bit 48bit 96bit 32bit.
A host must configure a gateway to communicate with other hosts. True False.
The following description of the specified port of the spanning tree is correct. The designated port can forward configuration BPDU packets to the network segment connected to it Each switch has only one designated port The port on the root switch must be a designated port The port on the root switch must not be a designated port.
The two switches shown in the figure below have both enabled the STP protocol. An engineer made the following conclusions on this network. Which conclusion do you think is correct? The G0/0/3 port of SWA is stable in Forwarding state The G0/0/2 vertical port of SWB is stable in Forwarding state Both ports of SWA are designated this port The G0/0/2 port of SWA is stable in the Forwarding state.
Since the TCP protocol uses a three-way handshake mechanism when establishing a connection and closing a connection, TCP supports reliable transmission. True False.
Report abuse