0% found this document useful (0 votes)
2K views62 pages

Huawei Exam1

HCIA Exams

Uploaded by

Geoffrey Tanui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
2K views62 pages

Huawei Exam1

HCIA Exams

Uploaded by

Geoffrey Tanui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 62
true of false 1/60Qvestion ‘Arrow keys avalble to switch questions 1, As every two nodes in a full-mesh network are connected using cables, each node requires a large number of physical ports and connection cables, resulting in relatively high costs. O me © false Sorry ! Correct Answer : True 2, SNMP is a standards-based network management protocol widely used on TCP/IP networks. It provides a method for managing NEs through a central computer that runs network management software, that is, a network management station (NMS). An SNMP NMS and SNMP agent communicate with each other through the TCP protocol. O Te © false Congratulations! Correct Answer : False 3, Segment routing (SR) can be deployed with or without controllers. © Te O False 4, ACAPWAP tunnel is established between the Fit AP and AC to transmit management traffic and service data traffic. © Tue © false Sorry | Correct Answer : False 5, FTP is a file transfer protocol and works in active or passive mode. © Tue O false ‘Congratulations! Correct Answer : True 6, During IP packet forwarding, the last-hop router forwards packets using the direct route. © Tue O false Congratulations! Correct Answer : True 7, The vlan batch 4 10 command is used to create VLAN 4 and VLAN 10. @ Tue O false Congratulations! Correct Answer : True 8. TFTP uses TCP to transfer files, and the default server port number is 21. © Tre O false Sorry |! Correct Answer : False 9, The precision of telemetry-based traffic statistics collection can be measured in milliseconds. O Tue © False 10, Python can run in both interactive mode and non-interactive (script) mode. © Tue O false 11, Which of the following states indicates that the neighbor relationship is stable between OSPF-enabled DR- other routers on a broadcast network? A.Down B. Full C. Two-way oo 00 D. Loading ‘Congratulations! Correct Answer : C 12, Mastering the basic operations of the file system is crucial for network engineers to efficiently manage the configuration files and VRP system files of devices. Which of the following statements is true about these files? © AApatch file is a type of software compatible with the system software. The common file name extension is zip. © BLAPAF file effectively controls product features and resources. The common file name extension is bin. © C.system software is mandatory for device startup and running. The common file name extension is cfg. © DA configuration file stores configuration commands. The common file name extension is cc. Congratulations! Correct Answer: B 13, Which of the following lists the correct protocol layers of the TCP/IP reference model from bottom to top? © A.Physical layer, data link layer, network layer, transport layer, and application layer ‘© 8B. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer ‘© C. Application layer, transport layer, network layer, data link layer, and physical layer © D. Application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical layer Congratulations! Correct Answer : A 14, A WLAN is constructed using wireless technologies. Which of the following statements about the WLAN networking is false? © A The basic service set identifier (BSSID) identifies a wireless network and is represented using the MAC address of an AP. © B. Abasic service set (BSS) indicates an area covered by an AP. © C.Avirtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID. OD. The service set identifier (SSID) identifies a wireless network and is represented using a character string. Sorry | Correct Answer : C Multiple choice single answer 15/60Question Arrow keys availb le to switch questions 15, Which of the following statements about Fit AP+AC networking is true? © A. After a CAPWAP tunnel is established between the AC and Fit AP, keepalive packets are used to detect the status of the CAPWAP tunnel. © B. The tunnel forwarding mode can reduce the forwarding pressure on the AC. © C. The AP version can be upgraded through HTTP. © D.Adata tunnel and a control tunnel will be established between the AC and Fit AP. Congratulations! Correct Answer : D 16, An IPV6 address is 128 bits long. Typically, an IPv6 address is represented by eight groups of 16-bit hexadecimal values separated by colons (:). Which of the following statements about IPv6 addresses is false? ‘A. Aglobal unicast address (GUA) is globally unique. 8. The IPV6 address with the prefix FEB0:/10 is a link-local address (LA). . There may be ULA conflicts in a global scope. o 0 8 0 D. Each IPv6 interface must have a unique local address (ULA). Sorry | Correct Answer : D ‘17, What is the network ID for the IP address 192.168.1.1/29? O A 192.168.1.7 © 8.192.168.14 © €.192.168.1.0 © 0. 192.168.1.255 18, In the TCP/IP reference model, network layer protocols are responsible for sending packets from the source host to the destination host. Which of the following protocols is not a network layer protocol? ALICMP 8. PPP C.IGMP 0000 D.IPv4 Sorry | Correct Answer: B 19, Which of the following is not a valid port role in RSTP? © A. Designated port © 8B. Root port © Forwarding port © D. Backup port Sorry | Correct Answer © A The encryption mode of the vuser user is SHA. © _B.SNMP packets will be encrypted using AES256. © C. The v3user user can access nodes in the subtree with iso as the root node. © D.SNMPv3 is configured. Congratulations! Correct Answer: & 20, SNMP is used to manage network devices. Refer to the following SNMP configuration on a Huawei device. Which of the following statements is false? [-HUAWEl] display current-configuration | include snmp snmp-agent snmp-agent local-engineid 800007D803001974593301 snmp-agent sys-info version v3 snmp-agent mib-view included iso-view iso snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view iso-view snmp-agent usm-user v3 v3user snmp-agent usm-user v3 v3user group v3group snmp-agent usm-user v3 v3user authentication-mode sha cipher AGH BYGN:NZQw;d>f=2+a);;=B\IMA"PIHE/{LSFIUW@% % snmp-agent usm-user v3 v3user privacy-mode aes256 cipher %%#Gc!*FABwvLS_[a#9qQi7: system-view {huaweiJuser-interface maximum-vty 7 Which of the following statements is true? © A.Ifauser forgets the system login password, the user will be locked out after seven consecutive failed login attempts. © B. The router allows a maximum of seven users to log in concurrently through Telnet. © C. The router allows a maximum of seven users to log in concurrently through the asynchronous serial port. OD. The router allows a maximum of seven users to log in concurrently through the console port 30, The establishment of an OSPF adjacency between devices involves four steps. Which of the following ‘statements about these steps is true? © A The devices establish bidirectional neighbor relationships, negotiate the master/slave relationship, exchange LSAS, update LSAs, and synchronize their LSDBs. © B. The devices exchange LSAs, negotiate the master/slave relationship, establish bidirectional neighbor relationships, update LSAs, and synchronize their LSDBs. © C. The devices negotiate the master/slave relationship, establish bidirectional neighbor relationships, exchange LSAs, update LSAs, and synchronize their LSDBs. © D. The devices negotiate the master/slave relationship, exchange LSAs, establish bidirectional neighbor relationships, update LSAs, and synchronize their LSDBs. ‘Congratulations! Correct Answer : A 31, What is the length range of an Ethernet frame? O A.46 to 1518 bytes O 8.46 to 1500 bytes O C.64 to 1500 bytes © D.64 to 1518 bytes Congratulations! Correct Answer : D 32, What is the valid VLAN ID range? © A0t0 4095 © B.0to 4094 © C.1to 4095 © Dito 4094 33, In which of the following modes are DHCP Discover messages sent? © A. Broadcast O B.Multicast © C.Unicast O D.Anycast Congratulations! Correct Answer : A |. Which of the following statements about BPDUs in STP is false? ‘A. When the network topology becomes stable, all switches proactively send configuration BPDUs. B. A configuration BPDU contains parameters such as the bridge ID, path cost, and port ID. C.TCN BPDUS are triggered only when the network topology changes. D. BPDUs are classified into configuration BPDUs and TCN BPDUs. 35, Network Address Translation (NAT) translates the IP address in an IP packet header into another IP address. Which of the following is not an advantage of NAT? © A. Implementing accurate identification and control of packet flows on networks to control network access behavior, prevent network attacks, and improve network bandwidth efficiency © B.Allowing the access of intranet hosts to external networks and the access of external hosts to intranets, and enabling ‘communication between intranets and external networks © C.Alleviating the exhaustion of IP addresses © D.Effectively preventing attacks from external networks and greatly improving network security ‘Congratulations! Correct Answer: A o 000 8 . Which of the following is not a method for an AP to discover an AC address? A Static configuration B.ONS C.OSPF D. DHCP E, Broadcast Sorry ! Correct Answer : C 37, Python can be used to implement automatic network deployment, operation, and maintenance, reducing the dependence on human resources. This resolves the problems with traditional network O&M. Which of the following statements about Python is false? function. © A.Amodule is a saved Python file and usually does not have am: ‘© 8. When a method is defined in a class, the method must carry a self keyword. © C.Aclass is a collection of objects with the same attributes and methods. © _D. Two forward slashes (//) can be used to mark a single-line comment. Congratulations! Correct Answer : D If the PVID of a trunk port on a switch is 10 and the port trunk allow-pass vian 7 9 command is configured on the port, which of the following statements is true? © A Data frames of VLANs 1, 7, and 9 can be transmitted on a trunk link. © B. Data frames of VLANs 7, 8, and 9 can be transmitted on a trunk link. © C. Data frames of VLANs 1, 7, 8, and 9 can be transmitted on a trunk link. © D Data frames of VLANs 7, 8, 9, and 10 can be transmitted on a trunk link. Congratulations! Correct Answer : A 39, In the same Ethernet network segment, five routers are running OSPF for interconnection. When the protocol status of all routers is stable, which of the following statements is true? © A. The neighbor relationship between a DR router and another router can be Full or 2-way. © _B. The neighbor status of a router on the network can only be Full or 2-way. © C.The neighbor status of all routers is Full. are in 2-way state on the network. © D. There are routers of which all neighbor relation: ‘Congratulations! Correct Answer : B 40, The Point-to-Point Protocol (PPP) is a common data link layer protocol for wide area networks (WANs). Which of the following statements about PPP is false? A. PPP uses the Link Control Protocol (LCP) to negotiate link control layer parameters. 8. The establishment of a PPP link goes through three phases: link layer negotiation, network layer negotiation, and authentication. . IF PPP uses password authentication mode, negotiation packets are transmitted in plain text, which is insecure. D. PPP supports the Password Authentication Protocol (PAP) and Challenge-Handshake Authentication Protocol (CHAP). ‘Congratulations! Correct Answer : B 41, Refer to the following configuration on the VTY user interface 0. When a user logs in to the system through VTY 0, which of the following statements are true? system-view [HUAWEI] user-interface vty 0 [-HUAWEI-ui-vty0] user privilege level 2 ‘A. The user can use the debugging command to diagnose service faults. B. The user can use service configuration commands, including routing configuration commands. C. The user can use some display commands. § 8 0 0 D. The user can use the ping and tracert commands. Sorry | Correct Answer : BCD 42, As shown in the following networking, the interfaces connecting R1, R2, R3, R4, and R5 are running OSPF, and are all in area 0. The routing table of R1 has two equal-cost routes to the destination 10.1.35.0/24. In order for the forwarding path R1 -> R4 -> R3 to be preferentially selected, which of the following configuration should be performed? ow 8 O Ra A. Run the ospf cost 10 command on GEO/0/3 of R3. B. Run the ospf cost 10 command on GE0/0/1 of R1. C. Run the ospf cost 10 command on GEO/0/3 of R2. D. Run the ospf cost 10 command on GEO/0/1 of R2. Congratulations! Correct Answer : BC 43, The Domain Name System (DNS) protocol is used to resolve domain names to IP addresses. Which of the following elements constitute a complete domain name? & A Second-level domain name &% B. Top-level domain name &% C.Root domain name & D.Host name ‘Congratulations! Correct Answer : ABCD jinguish packets. Which of the following information can be used to define 44, ACLs are used to match and di ACL rules? ‘A. Source and destination IP addresses of IPv4 packets B, Protocol type of Ethemet frames . Source and destination MAC addresses oaoasdg D.VLAN ID Sorry ! Correct Answer : ABCD 45, Which of the following statements about OSPF areas are true? © A.OSPF multi-area improves network scalability and facilitates the construction of large-scale networks. CB. The OSPF multi-area design can reduce the LSA flooding scope. OC. Route summarization can be performed at the border of two OSPF areas to reduce the size of the routing table. © _D.OSPF areas can be classified into backbone areas and non-backbone areas. Sorry | Correct Answer : ABCD 46, Which of the following statements about IP addresses and MAC addresses are true? &% A.MAC addresses are unchangeable. & B.IP addresses are assigned based on the network topology. ©. C.IP addresses are unchangeable. &% D.MAC addresses are assigned based on vendors. Congratulations! Correct Answer : ABD 47, An IPv6 address is 128 bits long. For convenience, IPv6 addresses can be abbreviated. For the IPv6 address 2001:0088:0000:1234:FB00:0000:5000:45FF, which of the following comply with the IPv6 address abbreviation rules? OA. 2001:088:0:1234:FB00:5:45FF & B.2001:088:1234:FB00.0:5000:45FF & C. 2001:0D88:0:1234:FB00:0:5000:45FF © D. 2001:D88:0:1234:FB00::5000:45FF Congratulations! Correct Answer : BCD 48, A host at 192.168.1.1/24 on an intranet wants to access a server at 160.131.20.1 on a public network. Refer to the following configuration on a gateway router: [RTAlinterface GigabitEthernet 0/0/0 [RTA-GigabitEthernet0/0/0]nat outbound 2000 Which of the following statements are true? © A The administrator configures the NAT Server. CB. The address 192.168.1.1 will be translated into a public IP address in a public address pool. interface Gigabitéthernet 0/0/0 on the & C.The address 192.168.1.1 will be translated into the public network address of th gateway router. OD. The administrator configures Easy IP. Sorry | Correct Answer : CD 49, 8 Ss S & Which of the following statements about collision domains and broadcast domains are true? A. Each port of a switch connects to a collision domain. B. All devices connected to the same hub belong to the same collision domain. C. The Ethernet uses CSMA/CD to avoid collisions in collision domains. D. Each port of a router connects to a broadcast domain. Congratulations! Correct Answer : ABCD. 50, A WLAN is a network that uses wireless signals such as radio waves, lasers, and infrared rays to replace the traditional media used for transmission on a wired LAN. Which of the following devices are commonly used ona WLAN? © A.cloud AP & _B. Wireless access controller (AC) ©& CFatar & OFILAP Sorry ! Correct Answer : ABCD 51, Which of the following are advantages of switch stacking and clustering? @ A. Simplifies network structure. OB. Improves network reliability. & C.Simplifies network management. © _D. Improves the performance of single switches. 9aaaq , Network Address Translation (NAT) translates the IP address in an IP packet header into another IP address. Which of the following methods can implement NAT? A Easy IP B. Static NAT/NAPT C. Dynamic NAT D.NAT Server ‘Congratulations! Correct Answer : ABCD 53, In OSPF, which of the following network types require the election of a DR and BDR? & ANBMA O 8.P2MP & CBMA © opap 54, An administrator wants to allocate IP addresses in the network segment 172.16.4.32/29 to hosts. Which of the following IP addresses can be allocated to hosts? & A172.16.4.35 255.255.255.248 & B.172.16.4.33 255.255.255.248 OO €.172,16.4.32 255.255.255.240 % D.172.16.4.34 255.255.255.240 Sorry ! Correct Answer: AB \g statements about OSPF default 55, Arouter can advertise default routes in an OSPF area. Which of the folloy route advertisement are false? GA The defautt-route-advertise command can be used to advertise a default route in an OSPF area only when the default route exists on the local device. & B.After learning the default route advertised by the router, other routers in the same OSPF area as the router must add this route to their routing tables. © C.lfthere is no default route on the local device, the default-route-advertise always command can be run to advertise a default route in an OSPF area & D. The preference of the advertised default route in the routing table is 10. Congratulations! Correct Answer : BD 56, Which of the following IP addresses are private IP addresses? A192.168.1.1/30 &% B.172.16.1.1/30 & €.10.0.1.1/30 OG .172.33.1.1/30 57, Refer to the following configuration: [huaweilinterface eth-trunk 1 (huawei-Eth-Trunk1]undo portswitch Which of the following statements about the undo portswitch command are true? OA. This command enables a router to support Layer 2 link aggregation. _B. This command enables a router to support Layer 3 link aggregation. © C. This command enables a Layer 3 switch to support Layer 3 link aggregation. GD. This command enables a Layer 3 switch to support Layer 2 link aggregation. Congratulations! Correct Answer : BC @@aoag,g . Which of the following are valid MAC address types? A. Unicast MAC address 8. Anycast MAC address C. Broadcast MAC address D. Multicast MAC address ‘Congratulations! Correct Answer : ACD ), For the IPv6 address 2000:002A:0000:0000:0000:000A:020:023D, which of the following comply with the IPV6 address abbreviation rules? ‘A. 2000:2A:0:0:0:A:2C:23D 1, 2000:2A::20€:23D ‘Congratulations! Correct Answer : CD 60, The route preference is an indicator used by a router to compare routes of different routing protocols. Which of the following statements are true about the default preference of common routes? A. The default preference of an OSPF external route is 255. GB. The default preference of an OSPF internal route is 10. & C. The default preference of a static route is 60. & D. The default preference of a direct route is 0. Sorry ! Correct Answer : BCD

You might also like