As shown in the figure, the stateful inspection firewall forwards the packet because the packet matches the session status of the firewall.
A Layer 2 switch supports multiple types of Ethernet interfaces. Similar to a trunk interface, a hybrid interface allows data frames from multiple VLANs to pass through. In addition, you can determine whether data frames from a VLAN sent out from a hybrid interface are tagged or untagged.
See the network shown in the following figure.
R1 and R2 run IS-IS and establish an adjacency. IS-IS is enabled on Loopback0 of R2 but disabled on Loopback3 of R2. The configurations shown in the figure are performed in the IS-IS process of R2. Which of the following statements are true?
When a packet passes through a firewall, the firewall creates a session connection for the packet to guide subsequent forwarding of the packet. However, the firewall does not create session entries for all packets. For which of the following packets does the firewall not create session entries when the packet reaches the firewall?
A firewall receives a packet that PC1 sends to PC2. Which of the following statements are true?
By default, if no router ID is configured but multiple loopback interface addresses are configured, BGP selects the largest loopback interface address as the router ID.
On an STP network, the root bridge, root port, and designated port are elected in sequence. The election rules of these ports are different. List the steps for electing the root port in sequence.
In the OSPF protocol, inter-area route calculation involves only Router LSA, Network LSA, and Summary LSA.
On Huawei switches, which of the following planes provides network information and forwarding entries that are mandatory for data plane forwarding?
When a BGP device sends an Open message to establish a peer connection, which of the following information is carried?
A forwarding information database (FIB) can directly guide packet forwarding on a router.
IP multicast effectively conserves network bandwidth and reduces network load. Therefore, it is widely used in network services, such as IPTV, real-time data transmission, and multimedia conferencing.
Which of the following TLVs is used by ISIS to describe the IP address of an interface?
There are two types of routing entries on a PIM network. (S, G) routing entries are used to set up on a PIM network and are applicable to both PIM-DM and PIM-SM networks.
The VRID of the VRRP virtual router is 3 and the virtual IP address is 100.1.1.10. What is the virtual MAC address?
A wide area network (WAN) is a remote network that connects local area networks (LANs) or metropolitan area networks (MANs) in different areas for communication purposes. It is typically used to interconnect campus networks or data center networks.
In IGMPv1, querier selection depends on a multicast routing protocol, such as PIM. In IGMPv2 and IGMPv3, the interface with the largest IP address acts as the querier.
A route-policy consists of one or more nodes. What is the maximum number of nodes in a route-policy?
When deploying BFD, you need to adjust some parameters so that it can better detect the network status. Which of the following statements is false about BFD optimization?
A network entity title consists of an area address and a system ID. It is a special NSAP (the SEL has a fixed value of 00) and is mainly used for route calculation.
Which of the following statements regarding OSPF route summarization commands are true?
Which of the following statements is false, based on the following IGMP information on an interface of RTA?XC
Regarding the route-policy set-cost configuration below, which of the following statements is true?
Preferences of routing protocols determine the sequence In which a router selects a route among routes to the same destination /earned through different routing protocols.
VRF, also called VPN instance, is a network virtualization technology that helps VPN technology to isolate users. In normal cases, multiple VPN instances can be created on a physical device, and each VPN instance has independent entries. Which of the following resources can be independently owned by a VPN instance?
An enterprise office network runs OSPF and is divided into multiple OSPF areas. Enterprise network engineers can configure route summarization on ASBRs to reduce the number of inter-area Type 3 LSAs, which in turn reduces the routing table size and improves device resource utilization.
When an SSH client accesses an SSH server for the first time and the SSH server's public key is not configured on the SSH client, you can enable first-time authentication on the SSH client. This allows the SSH client to access the SSH server and saves the SSH server's public key on the SSH client. In this way, the next time the SSH client accesses the SSH server, the SSH client can use the saved public key to authenticate the SSH server.
On an OSPF network, an algorithm is used to prevent loops within an area, but loops may occur between areas. Therefore, OSPF defines a loop prevention mechanism for inter-area routes. Which of the following statements are true about the loop prevention mechanism?
During routine maintenance, an enterprise administrator runs a command to check VRRP group information. Which of the following statements is false about the command output?
yaml
CopyEdit
Vlanif100 | Virtual Router 1 State: Master
Virtual IP: 10.1.1.100
Master IP: 10.1.1.2
PriorityRun: 120 PriorityConfig: 120
DR: None BDR: None MTU: 0
Preempt: YES Delay Time: 20s
Remain: --
Track: YES Priority Reduced: 20
Auth Type: MD5
BFD-session State: UP
If a router ID is configured in both the system via and the BGP view, BGP uses the router ID configured in the BGP view because the BGP view takes precedence over the system view.
Security policy is the core feature of firewalls. Only valid traffic that complies with security policies can be forwarded by firewalls. Which of the following statements are true about security policy matching rules?
Which of the following statements regarding the firewall zone security level is false?
The native AC function allows an agile switch to integrate AC capabilities, achieving wired and wireless convergence. The agile switch centrally manages wired and wireless service traffic.
In an OSPF routing domain, two routers must be specified as one DR and one BDR in a broadcast or NBMA network with at least two routers.
Which of the following attributes cannot be directly referenced in an apply clause of a route-policy?
On an OSPF network, if a router receives an update of an LSA that exists in the local LSDB, the router updates the LSDB and floods the LSA.
On a P2P IS-IS network, after a neighbor relationship is established between R1 and R2, R2 finds that its LSDB is not synchronized. Then, R2 requests corresponding LSPs from R1 for LSDB synchronization. The following figure shows the synchronization process. Drag the following packet types to the steps in which they are used.(Token is reusable)
On an IS-IS network, routers send LSPs to exchange link state information. LSPs are classified into Level-1 LSPs and Level-2 LSPs and have the same format. Which of the following parts constitute the LSP ID in an LSP?
Huawei modular devices have multiple hardware modules that provide different functions. Match the following hardware modules with their functions.
On a WLAN, engineers can use the VLAN pool mechanism to assign access users to different VLANs, which helps reduce the number of broadcast domains and improve network performance. VLAN pools support two VLAN assignment algorithms: even and hash. Drag the advantages and disadvantages to the two algorithms.(Token is reusable)
After BGP initiates a TCP connection, the ConnectRetry timer is disabled if the TCP connection is successfully established. If the TCP connection fails to be established, the device tries to reestablish the TCP connection when the ConnectRetry timer expires.
Which of the following statements is false about the default processing of the next hop address when a BGP device advertises a route?
On an enterprise network, the directly connected interfaces of two OSPF routers are on different network segments and have different masks. To establish an OSPF neighbor relationship between the two interfaces, you can change their network types to which of the following?
The Origin attribute is used to define the origin of BGP path information. There are three types of Origin attributes. Which of the following lists the Origin attributes in descending order of priority?
See the command output of a router below. Which of the following statements is true?
OSPF Process 1 with Router ID 10.0.2.2
Interface: 10.0.12.2 (GigabitEthernet 0/0/0)
Cost: 1 State: BDR Type: Broadcast MTU: 1500
Priority: 1
Designated Router: 10.0.12.1
Backup Designated Router: 10.0.12.2
Timers: Hello 10 , Dead 40 , Poll 120 , Retransmit 5 , Transmit Delay 1
As shown in the figure, SWA, SWB, SWC, and SWD run the Rapid Spanning Tree Protocol (RSTP). Which of the following statements are true?
On the campus OSPF network shown in the following figure, the interfaces connecting the five routers are GE interfaces, and their costs are not changed. The import-route command is run on R1. After the network converges, the route to the server at 192.168.1.0/24 is queried on R2. Which of the following is the cost of this route?
After a BGP peer relationship is established between two ends, changing the router ID of one end resets the BGP peer relationship.
ON a stateful inspection Firewall where there is no session table, when the status detection mechanism is enabled and the second packet (CYN+ACK) of 3-way hadshakes reaches the firewall. Which of the following statements is true?
OSPF supports area authentication and interface authentication. If both authentication modes are configured, Interface authentication takes preference over area authentication.
Link aggregation is a common network technology. Which of the following are advantages of link aggregation?
During BGP route summarization configuration, the keyword can be used to suppress all specific routes so that only the summary route is advertised. The summary route carries the Atomic-aggregate attribute rather than the community attributes of specific routes.
Which of the following methods is usually used by a network administrator to configure a newly purchased device for the first time?
When a routing policy is used to filter routes, which of the following route prefixes will be denied by the IP prefix below?
Without a prior version check, an engineer configures IGMP snooping on a device and the version of IGMP snooping is earlier than the IGMP versions on user hosts. In this case, which of the following situations will occur?
There are two BFD operating modes. In_______mode, the local end sends BFD Control packets at specified intervals, and the remote end checks whether the local end periodically sends BFD Control packets. (Use lowercase letters.)
If the interval for two consecutive packets of a TCP session reaching the firewall is longer than the aging time of the session, the firewall deletes the session information from the session table to ensure network security.
As a next-generation wireless technology, Wi-Fi 6 greatly improves bandwidth rate and performance. Which of the following statements is false about the features of Wi-Fi 6?
On the OSPF network shown in the figure, an adjacency has been established between R1 and R2. An engineer configures the commands in the figure on R2. In this case, which of the following routing entries may exist in the routing table of R2?
On an RSTP network, if a port receives an RST BPDU and finds that its buffered RST BPDU is superior to the received RST BPDU, the port discards the received RST BPDU without responding.
OSPF has five types of packets, which have the same header format. If the Auth Type field in the packet header is 1, which of the following authentication modes is used?
Four routers run IS-IS and have established adjacencies. The area IDs and router levels are marked in the following figure. R1 and R2 are connected through a PPP link, and R3 is the DIS. Which of the following statements are true?
In BGP, Keepalive messages are used to maintain BGP peer relationships. When a BGP router receives a Keepalive message from a peer, the BGP router sets the state of the peer to Established and periodically sends Keepalive messages to maintain the connection. By default, the device sends Keepalive messages every seconds.
Based on IGMP snooping, IGMP snooping proxy enables a switch to act as a substitute for an upstream Layer 3 device to send IGMP Query messages to downstream hosts, and also to act as a substitute for downstream hosts to send IGMP Report/Leave messages to an upstream device. As such, this function conserves bandwidth between the upstream device and the local device.