Exam 5: HCNP-R&S Fast Track (Huawei Certified Network Professional - Routing & Switching Fast Track)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

  On the MSTP network as shown in the figure, what is the role of the switch in MSTID according to the configuration? On the MSTP network as shown in the figure, what is the role of the switch in MSTID according to the configuration?

(Multiple Choice)
4.8/5
(34)

A router receives a data packet, with the destination address being 195.26.17.4. Which subnet is this address in?

(Multiple Choice)
4.9/5
(37)

Which of the following traffic can be mirrored through port mirroring? (Choose all that apply.)

(Multiple Choice)
4.9/5
(45)

Two Eudemons in dual-system hot backup mode use Huawei Redundancy Protocol (HRP) to back up key information (such as configuration commands and session status) between the active and standby devices.

(True/False)
4.9/5
(44)

Which of the following statements about a backup router in a VRRP backup group are true? (Choose three.)

(Multiple Choice)
4.9/5
(37)

Before configuring 802.1x services, you need to determine the configuration roadmap and prepare data. Which are general steps in the configuration roadmap? (Choose three.)

(Multiple Choice)
5.0/5
(36)

Which of the following statements about the link failure detection in STP protocol is not true?

(Multiple Choice)
4.7/5
(31)

An IP-prefix-filter is used to filter IP prefixes and data packets.

(True/False)
4.9/5
(41)

How does a BGP router process the received route whose next hop is unreachable?

(Multiple Choice)
4.8/5
(34)

RSTP has all functions that STP has and it is backward compatible with STP.

(True/False)
4.8/5
(43)

The reliability of a product or a system is generally evaluated with the two indicators of Mean Time to Repair (MTTR) and Mean Time Between Failures (MTBF).

(True/False)
4.8/5
(35)

Which of the following attacks is not the network layer attack?

(Multiple Choice)
4.9/5
(42)

Which of the following attacks are prevented after an IP address and MAC address are bound on the USG? (Choose two.)

(Multiple Choice)
4.9/5
(40)

In Round Robin mode, the device sends packets based on the number of defined bytes of each queue. The bandwidth ratio of each queue is the ratio of the number of defined bytes of the local queue to the total number of defined bytes of all queues.

(True/False)
4.8/5
(35)

Which of the following aspects should be considered for migration risk assessment?

(Multiple Choice)
4.8/5
(39)

What are the functions of route filtering? (Choose three.)

(Multiple Choice)
4.8/5
(42)

OSPF uses SPF algorithm to calculate SPF tree according to topology. Which of the following statements are correct regarding SPF tree node? (Choose two.)

(Multiple Choice)
4.8/5
(39)

Which method is used to establish session between the BGP peers?

(Multiple Choice)
4.9/5
(48)

In PIM-DM, which of the following messages needs to be sent by a downstream interface when the downstream interface recovers to the forwarding state from the prune state?

(Multiple Choice)
4.8/5
(28)

On a switch running GVRP, each interface is considered as a participant. The participants can exchange information.

(True/False)
4.8/5
(48)
Showing 41 - 60 of 733
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)