Dani K? y Dcit 303 Pasco
Dani K? y Dcit 303 Pasco
1 18 35 52 69 86
2 19 36 53 70 87
3 20 37 54 71 88
4 21 38 55 72 89
5 22 39 56 73 90
6 23 40 57 74 91
7 24 41 58 75 92
8 25 42 59 76 93
9 26 43 60 77 94
10 27 44 61 78 95
11 28 45 62 79 96
12 29 46 63 80 97
13 30 47 64 81 98
14 31 48 65 82 99
15 32 49 66 83 100
16 33 50 67 84
17 34 51 68 85
DANI KY
·.
1. What Network device monitors, restricts, and modifies data flows passing through it to shield
information, structure, and running status of internal networks from the public network?
A. Router
B. Gateway
C. Switch
D. Firewall
A. Ring, monitoring
B. Ring, mismanagement
C. Star, mismanagement
D. Star, monitoring
DANI KY
7. Which layer implements connection-oriented and non-connection-oriented data transmission,
as well as error checking before retransmission?
A. Transport Layer
B. Presentation Layer
C. Data Link Layer
D. Network Layer
10. Which of the following events occur when you access Huawei's official website?
A. The browser invokes HTTP to encapsulate the application layer data.
B. The browser uses TCP to encapsulate the application layer data.
C. The browser transmits the application layer data.
D. The browser parses the application layer data.
DANI KY
13. What does a router do after an IP packet matches a specific route?
A. It forwards the packet
B. It selects the best path
C. It installs the route in its IP routing table
D. It determines the forwarding path
15. How does a router select the optimal route when multiple routes to the same destination have
the same preference?
A. By comparing the metrics of the two routes
B. By selecting the route with the highest preference
C. By selecting the route with the lowest cost
D. By selecting the route with the lowest metric
16. What is the subnet address of a destination host or router when the destination address is
1.l.l.1 and the mask is 255.255.255.0?
A. l.l.l.1
B. 255.255.255.0
C. 0.0.0.0
D. l.l.l.0
17. What is the command used to specify an outbound interface for a static route on a Huawei
device?
A. [Huawei] ip route-static ip-address nexthop-address
B. [Huawei] ip route-static ip-address {mask I mask-length} nexthop-address
C. [Huawei] ip route-static ip-address {mask I mask-length} interface-type interface-
number
D. [Huawei] ip route-static ip-address {mask I mask-length} interface-type interface-
num ber [nexthop-address]
18. What command is used to specify a next-hop IP address for a static route?
A. ip route-static ip-address mask nexthop-address
B. ip route-static nexthop-address mask ip-address
C. ip route-static ip-address mask-length nexthop-address
DANI KY
\ I
20. What is the first step the router takes when selecting the optimal route?
A. Comparing the destinations of specific routes
B. Comparing the metrics of routes
C. Calculating the summarized network address
D. Comparing the preferences of routes
DANI KY
c. 00-00-00-00-00-00
D. 11-11-11-11-11-11
26. What does the eighth bit of the fIrst byte indicate in the QUI of a MAC address?
A. The total length of a data frame
B. The protocol type
C. The address type
D. The MAC address
27. What is the reason for the data frame length of 1518 bytes?
A. To meet the minimum frame length of 64 bytes
B. To achieve a tradeoff between transmission efficiency and transmission reliability
C. To prevent the transmission of data over long distances
D. To enable faster transmission of data
28. What does a Layer 2 switch do ifit finds a matching entry in the MAC address table for a
unicast frame?
A. Discards the frame
B. Floods the frame
C. Forwards the frame
D. Searches the MAC address table
DANI KY
D. Collision domains and MAC address table
31. What happens when the MAC address table of a Layer 2 switch does not contain an entry
corresponding to the destination MAC address of a frame?
A. The frame is forwarded through the outbound interface in the entry.
B. The switch looks up the MAC address table.
C. The switch floods the frame on all interfaces.
D. Each interface belongs to a different collision domain.
32. What is the lifespan of a MAC address table entry?
A. lOs
B. 30s
C. 60s
D. 300s
33. What type of packet does the switch flood when it cannot find the destination MAC address
of the frame in the MAC address table?
A. Unicast Frame
B. Broadcast Frame
C. ARP Request
D. MAC Address Table
34. How does a host obtain the IP address and MAC address of another host?
A. Through the MAC address table
B. Through the IP address table
C. Through the switch
D. Through DHCP
35. What is the initial state of the ARP cache table of Host I?
A. Empty
B. Full
C. Updated
D. Unavailable
DANI KY
'-'"
38. Switchl and Switch2 belong to the network of the same enterprise. What happens ifno
processing is implemented when a frame sent from PC 1 reaches Switch2 through the link
between Switchl and Switch2?
A. Switch2 can identify the VLAN to which the frame belongs
B. Switch2 can determine the local VLAN to which the frame should be sent
C. Switch2 cannot identify the VLAN to which the frame belongs
D. Switch2 can identify the local VLAN to which the frame should be sent
39. What is the purpose of the VLAN tag?
A. To identify the VLAN to which the frame belongs
B. To specify the VLAN to which the frame belongs
C. To identify the switch to which the frame belongs
D. To specify the switch to which the frame belongs
42. What happens if an untagged frame is received by a switch that is using IP subnet-based
assignment?
A. The VLAN tag is added to the frame, mapping the source IP address to the frame.
B. The VLAN tag is added to the frame, mapping the protocol (suite) type to the frame.
C. The frame is discarded.
D. The frame is transmitted in the default VLAN.
DANI KY
",
44. What type of interface is used when VLANs do not need to be differentiated?
A. Access interface
B. Trunk interface
C. Hybrid interface
D. User terminal
D. 802.5Q tag
47. What is the function of the Dotlq VLAN tag termination on a sub-interface?
A. To remove VLAN tags from the received packets before forwarding or processing the
packets
B. To add VLAN tags to the packets before forwarding the packets
C. To enable ARP broadcast on a VLAN tag termination sub-interface
D, To allow a VLAN tag termination sub-interface to forward broadcast packets
DANI KY
49. How can the number of required physical interfaces be determined?
A. By connecting a Layer 2 switch to a Layer 3 interface of a Layer 3 device.
B. By using the interface interface-type interface-number. sub-interface number
command.
C. By setting the interface connecting the switch to the router to a trunk interface.
D. By the quantity of the deployed VLANs.
50. What does the PCI do when it fmds that the destination device PC2 is not on its network
segment?
A. It sends the traffic directly to PC2
B. It sends the traffic to its gateway
C. It sends the traffic to its VLANIF interface
D. It sends the traffic to the Layer 3 switch
52. What does PC I determine when it performs calculations based on its local IP address, local
subnet mask, and destination IP address?
A. Whether the packet needs to be forwarded at Layer 3
B. The MAC address of the destination device
C. Whether the destination device is on its network segment
D. The IP address of the destination device
53. What does the switch do after determining that the packet has reached the last hop?
A. Searches its ARP table for the destination IP address
B. Searches its MAC address table for the destination IP address
C. Sends the packet to the routing module for re-encapsulation
D. Sends the packet to the switching module for re-encapsulation
DANI KY
55. What is the IP address of a VLANIF interface used for?
A. As the gateway IP address of a PC
B. To remove and add VLAN tags
C. To create a VLANIF interface
D. To display the VLANIF interface view
56. What are the advantages of using Eth-Trunk technology?
A. Increased flexibility
B. Time-consuming troubleshooting
C. Complex configuration
D. Improved network bandwidth
57. What is network reliability?
A. The capability of ensuring nonstop network services when a single point or multiple
points of failure occur on a device or link.
B. The capability of ensuring nonstop network security when a single point or multiple
points of failure occur on a link.
e. The capability of ensuring nonstop network services when only multiple points of
failure occur on a device or link.
D. The capability of ensuring data integrity when only a single point of failure occur on
a device or link.
60. What happens if the active uplink or upstream switch fails on a network with device
redundancy design?
A. All downstream networks are interrupted.
B. The links switch to activelbackup mode.
C. The backup link is switched off.
D. The downstream switch is dual-homed to two upstream switches.
DANI KY
" .
61. What is the main disadvantage of using manual mode in LAG?
A. All active links forward data and evenly share traffic.
B. Defects of the Manual Mode are minimized.
C. Devices cannot exchange packets.
D. Devices cannot determine whether the peer interface is working properly.
62. What is the purpose of load balancing in an Eth-Trunk?
A. To forward data frames over different links
B. To ensure data frames arrive at the peer end in the same order
C. To evenly distribute the data flows to different member interfaces
D. To ensure that frames of the same flow are transmitted over the same physical link
63. What is an iStack?
A. A logical device consisting of two switches
B. A physical device consisting of two switches
C. A logical device consisting of two firewalls
D. A physical device consisting of two firewalls
64. What can be used to simplify network management and improve network reliability?
A. STP
B. VRRP
C. Eth-Trunk
D. iStack and CSS
65. What type of aggregation mode is used by LACP?
A. Static
B. Packet negotiation
C. Per-flow
D. Bridge MAC
66. What is the purpose of Access Control Lists (ACLs)?
A. To control network access behaviors
B. To prevent network attacks
C. To improve network bandwidth utilization
D. All the above
67. What are the elements that an ACL can match?
A. Source and destination IP addresses
B. Source and destination port numbers
C. Protocol types in IP datagrams
D. All of the above
DANI KY
,',
68. What is the wildcard used to match the network segment address corresponding to
192.168.1.1/24 ?
A. 0.0.0.0
B. 0.0.0.255
C. 0.0.0.1
D. 0.0.0.254
69. Which type of ACL can be identified using a name and number?
A. Basic ACL
B. Advanced ACL
C. NamedACL
D. User ACL
70. What is the difference between a network mask and a wildcard?
A. A network mask is used to match an IP address, while a wildcard is used to match an
IP address.
DANI KY
,',
74. What is the difference between "auto" and "config" matching orders?
A. Auto is simpler and config is more complicated
B. Auto matches packets against rules in ascending order of rule ID and config matches
packets against rules in descending order of precision
C. Config matches packets against rules in ascending order of rule ID and auto matches
packets against rules in descending order of precision
D. Auto matches packets against rules in descending order of precision and config
matches packets against rules in ascending order of rule ID
DANI KY
,',
83. What is the last step of the message exchange process between the RADIUS server and
client?
A. User initiates a connection request.
B. RADIUS client sends an authentication request to the RADIUS server.
C. RADIUS server sends an Accounting-Response (Stop) packet.
D. User sends a logout request.
84. In local authentication and authorization, what happens when the authentication succeeds on
the Router?
A. The user is granted Internet access permission
B. The Router sends the username and password to the RADIUS server
C. The network administrator is granted certain permissions
D. The RADIUS server records the user's network resource utilization
DANI KY
86. What command is used to bind the authentication scheme to the domain?
A. [Huawei-aaa] authentication-scheme authentication-scheme-name
B. [Huawei-aaa] domain domain-name
C. [Huawei-aaa] local-user user-name service-type
D. [Huawei-aaa] local-user user-name privilege level
87. What is the main benefit of using NAT at the network egress?
A. To improve public IP address utilization
B. To enable hosts on an external network to access an internal network
C. To improve the security of the internal network
D. To reduce the number of required public IPv4 addresses
89. What must be configured on the network egress device if a host that uses a private IP address
needs to access the Internet?
A. NAT
B. A route-forwarding protocol
C. A public IP address
D. A software application
90. What type of NAT is used when a private IP address is mapped to a fixed public IP address?
A. Static NAT
B. Dynamic NAT
C. Network Address and Port Translation (NAPT)
D. Easy IP
91. What type of NA T is used when an internal server is mapped to a public network through a
one-to-one mapping between a [public IP address:port number] and a [private IP address:port
number]?
A. Static NAT
B. Dynamic NAT
C. Network Address and Port Translation (NAPT)
D. NAT Server
DANI KY
92. What is the difference between Dynamic NAT and NAPT?
A. Dynamic NAT does not translate port numbers, while NAPT does.
B. Dynamic NAT does not involve address pools, while NAPT does.
C. Dynamic NAT translates both IP addresses and port numbers, while NAPT does not.
D. Dynamic NAT uses an interface address as a public address, while NAPT does not.
93. What is the default port number for the FTP server?
A. 1024
B. 20
C. 21
D. 80
94. How does the FTP server respond to the PORT command from the FTP client in active
mode?
A. It opens port P to notify the FTP client.
B. It sends a connection request from port 20 to port P of the FTP client.
C. It sets up a control connection with the FTP client.
D. It sends a connection request from port 21 to a random port of the FTP client.
97. What does the server do when a URL is entered in the address box of a browser?
A. Obtain the IP address corresponding to the domain name
B. Parse and render the received HTML file
C. Find the locally stored page file
D. Send the page file to the client
DANI KY
- "
98. What is the difference between the recursive query and the iterative query?
A. The recursive query queries other DNS servers and returns the query result to the
DNS client, whereas the iterative query informs the DNS client of the IP address of
another DNS server.
B. The recursive query queries other DNS servers and returns the query result to the
DNS client, whereas the iterative query stores the mappings between domain names
and IP addresses.
C. The recursive query stores the mappings between domain names and IP addresses,
whereas the iterative query queries other DNS servers and returns the query result to
the DNS client.
D. The recursive query informs the DNS client of the IP address of another DNS server,
whereas the iterative query queries other DNS servers and returns the query result to
the DNS client.
99. What is the purpose of clocks being synchronized on the backup server and clients?
A. To ensure a proper sequence of implementation
B. To know the time when users log in to the system
C. To analyze logs or debug messages
D. To ensure incremental backup between backup server and clients
DANI KY