Nothing Special   »   [go: up one dir, main page]

Dumps Base: Higher Quality Better Service

Download as pdf or txt
Download as pdf or txt
You are on page 1of 150

DUMPS

BASE
QUESTION & ANSWER
HIGHER QUALITY
BETTER SERVICE

Provide One Year Free Update!


https://www.dumpsbase.com
The safer , easier way to help you pass any IT exams.

Exam : H12-891_V1.0-ENU

Title : HCIE-Datacom V1.0

Version : V9.02

1 / 149
The safer , easier way to help you pass any IT exams.

1.According to different network conditions, Layer 2 Portal authentication or Layer 3 Portal1


authentication can be deployed in the network. Which of the following descriptions is wrong?
A. When there is a Layer 2 network between the client and the access device, that is, the client and the
access device are directly connected (or only Layer 2 devices exist between them), then Layer 2 Portal
authentication can be configured.
B. When using Layer 2 authentication, the access device can learn the MAC address of the client, and the
access device can only use the MAC address to identify the user
C. When there is a Layer 3 network between the client and the access device, that is, there is a Layer 3
forwarding device between the client and the access device, you need to configure Layer 3 Portal
authentication.
D. When using Layer 3 authentication, the access device can learn the IP address of the client and use
the IP address to identify the user
Answer: B Correct

2.In the campus VXLAN network, which of the following equipment is used to connect the Fabric and the
external network of the Fabric?
A. Extended
B. Brder
C. Transparent
D. Edge
Answer: B Correct

3.In the scenario of establishing a VXLAN tunnel in the BGP EVPN state, which of the following
descriptions about the role of BGP EVPN Type 3 routes is wrong?
A. If the VTEP IP address carried by the received Type3 route is reachable by the Layer 3 route, a VXLAN
tunnel to the peer will be established.
B. Type3 routing will carry L3 VNI
C. Type3 routing transmits Layer 2 and VTEP IP address information
D. In the case where the VTEP IP address of the Type3 route is reachable at Layer 3, if the peer end is
the same as the local end, a headend replication table is created for subsequent BUM packet forwarding
Answer: B Correct

4.The GRE tunnel supports the MPLS LDP function.


A. TRUE
B. FALSE
Answer: A Correct

5.BIER, as a new forwarding technology, adopts the basic IGP routing protocol and unicast routing
forwarding mechanism, so that there is no need to run IGMP between the multicast receiver and the
multicast router.
A. TRUE
B. FALSE Could be correct
Answer: B Correct

2 / 149
The safer , easier way to help you pass any IT exams.

6.In the process of client SSH login to a server configured with username and password authentication
only, it will not go through the key exchange stage (no key will be generated).
A. TRUE
B. FALSE
Answer: B Correct, always dose KEX

7.As shown in the figure, which of the following descriptions is wrong?


The packet information of VLAN configuration delivered by NETCONF protocol is as follows:

A. The purpose of this NETCONF message is to create VLAN 10 on the device.


B. The <target> tag indicates the configuration library used by the NETCONF message. In this example, it
is the startup configuration library.
C. <edit-config> indicates that the function of the message is to modify, create or delete configuration
data
D. <protocol Vlan xc: operation="merge"> means modify the existing or non-existing target data in the
configuration database, create if the target data does not exist, and modify if the target data exists
Answer: B Correct

8.Which of the following descriptions about BGP/MPLS IP VPN routing interaction is wrong?
A. After receiving the VPNv4 route advertised by the ingress PE, the egress PE filters the VPNv4 routes
according to the RT attribute carried by the route.
B. The egress PE can send IPv4 routes to the remote CE through BGP, IGP or static routes
C. The exchange between PE and CE is IPv4 routing information
D. The ingress PE converts the IPv4 routes received from the CE into VNPv4 routes, and saves them
according to different VPP instances
Answer: A https://www.h3c.com/en/d_202307/1892543_294551_0.htm
https://support.huawei.com/enterprise/en/doc/EDOC1100270080/e68f24ef/understanding-bgp-mpls-ip-vpn#concept5

9.Network slicing technology can divide exclusive network resources in the network to carry high-value
service traffic. Which of the following descriptions about network slicing is wrong?
A. The channelized sub-interface technology adopts single-layer scheduling to realize flexible and refined
management of interface resources and provide bandwidth guarantee

3 / 149
The safer , easier way to help you pass any IT exams.

B. Generally, network slicing can be realized based on the channelized sub-interface FlexE technology
C. The layer used by the network slicing technology is different from that of the SR tunnel, and can be
used at the same time as the SR tunnel
D. FlexE technology divides resources according to TDM time slots, satisfies the requirements of
exclusive resource sharing and isolation, and realizes flexible and refined management of interface
resources
Answer: A Correct, scheduling is hierachical

10.Based on the information given in the figure, which of the following statements is correct?

A. Unable to determine the device type of R3


B. The device type of R3 must be Level-1-2
C. The device type of R3 must be Level-2
D. The device type of R3 must be Level-1
Answer: B Correct

11.Which of the following regular expressions can match only the BGP route entries that pass through
AS300 and then AS200?
A. ^200|^300
B. 200$|300$
C. _200 (200 300) _
D. _200[200 300]_

4 / 149
The safer , easier way to help you pass any IT exams.

Answer: C Correct

12.As shown in the figure, the host implementing the 10.0.1.0/24 network segment accesses 10.0.4.0/25
unidirectionally through virtual system a (vsysa) and virtual system b (vsysb). Which of the following
commands need to be used to configure the route?

A. Configure the following command on virtual execution system b: ip router-static vpn-instance vsysb 10.
0.1.0 255.255. 255.0 vpn-instance vsysa
B. Configure the following command on virtual system a: ip route-static 10.0.1.0 255. 255.255.0 10.1.2.1
C. Configure the following command on virtual system a: ip route-static vpn-instance vsysa 10.0.4.0
255.255.255.0 vpn-instance vsysb
D. Configure the following command on virtual execution system b: ip route-static 10.0.4.0 255. 255.
255.0 10. 0.34.4 The multicast addresses used by OSPFv3 are as follows: FF02::5—This address
represents all SPF routers on the link-local scope; it is equivalent to 224.0. 0.5 in
Answer: C Correct
OSPFv2. FF02::6—This address represents all designated routers (DRs) on the
link-local scope; it is equivalent to 224.0.
13.Which of the following descriptions about the difference between SPFv2 and SPFv3 are correct?
A. Both SPFv2 and SPFv3 support interface authentication, and OSPFv3 authentication is still
implemented based on the fields in the SPF packet header
B. SPFv3 is similar to SPFv2 and uses the multicast address as the destination address of SPF packets
C. SPEv2 and OSPFv3 have the same type of packets: Hello, ODD, LSR, LSU, LSAack, and their packet
formats are the same
D. The protocol number of SPFv2 in the IPv4 header is 89, and the next header number of OSPFv3 in the
IPv6 header is 89 OSPFv2 and OSPFv3 both have the same protocol number of 89, although
Answer: B OSPFv3, being an IPv6 protocol, more accurately has a Next Header value of
B and D are correct i think 89
14.When troubleshooting the BGP neighbor relationship, the network administrator finds that two directly
connected devices use the Loopack port to establish a connection, so run display current-configuration
configuration bgp to check the configuration of peer ebgp-mat-h p h p-c tnt.
Which of the following descriptions about the command is correct?
A. h p-c unt must be greater than 15
B. h p-c unt must be greater than 255
C. h p-c unt must be greater than 12
D. h p-c unt must be greater than 1
Answer: D
Correct

15.When there are multiple redundant links in the IS-IS network, there may be multiple equal-cost routes.
Which of the following descriptions about equal-cost routing in an IS-IS network is wrong?
A. When the number of equal-cost routes in the network is greater than the number configured by the
command, and these routes have the same priority, the route with the larger system ID of the next hop
device is preferred for load balancing
If routes have the same weight, those with small system IDs are selected for load balancing.
5 / 149
The safer , easier way to help you pass any IT exams.

B. If load balancing is configured, the traffic will be evenly distributed to each link
C. After the equal-cost route priority is configured, when the IS-IS device forwards the traffic reaching the
destination network segment, it will not adopt the load balancing method, but forward the traffic to the next
hop with the highest priority
D. For each route in the equal-cost route, a priority can be specified, the route with the highest priority will
be preferred, and the rest will be used as backup routes
Answer: C A is incorrect

16.Which of the following descriptions about traffic policing is correct?


A. Traffic policing can only be used in the inbound direction
B. Traffic policing will cache traffic that exceeds the limit
C. Traffic policing can only be done in the outbound direction
D. Traffic policing will drop traffic that exceeds the limit
Answer: D correct

17.IS-IS is a link-state routing protocol that uses the SPF algorithm for route calculation.
As shown in the figure, a campus deploys both IPv4 and IPv6 and runs IS-IS to achieve network
interconnection. R2 only supports IPv4.

If IS-IS MT is not used, Device A, Device B,


Device C, and Device D consider the IPv4
and IPv6 topologies the same when using the
SPF algorithm for route calculation. The
shortest path from Device A to Device D is
Device A -> Device B- > Device D. Device B
does not support IPv6 and cannot forward
IPv6 packets to Device D.

Which of the following statements about the topology calculation of this network is correct?
A. If you want IPv4 and IPv6 network computation to form the same shortest path tree, you need to run
the ipv6 enable topology ipv6 command to enable the IPv6 capability in the IS-IS process
B. By default, since R2 does not support IPv6, in the shortest path tree formed by IPv6 network
calculation, the path from R1 to R4 is: R1-R3-R4
C. By default, IPv4 and IFv6 networks will be calculated separately to form different shortest path trees
D. By default, in the shortest path tree formed by IFv6 network calculation, the path from R1 to R4 is
R1-R2-R4. Since R2 does not support IFv6, R2 will directly discard IPv6 packets after receiving them,
causing traffic lost
Answer: D correct

18.When the switch is deployed with DHCP option 148, which of the following information will not be
provided by the DHCP server to the switch to be deployed?
A. The IP address of the cloud management platform

6 / 149
The safer , easier way to help you pass any IT exams.

B. The port number of the cloud management platform


C. The port number of the device to be deployed
D. The IP address of the device to be deployed
Answer: D Correct

19.When the user encounters different events during the authentication process, the user is in an
unsuccessful authentication state. At this time, you can configure the authentication event authorization to
meet the needs of these users to access specific network resources.
Which of the following descriptions about authentication event authorization is wrong?
A. If the user's network access rights are not configured when the authentication fails or the authentication
server is Down, after the user authentication fails, the user remains in the pre-connected state and has
the network access rights of the pre-connected user Correct
B. Authentication event authorization can support authorization parameters including VLAN, user group
and business scheme Correct
C. Events that can trigger authentication event authorization include authentication server Down,
authentication server unresponsive, and pre-connection, etc. Authentication failure cannot trigger
authentication event authorization Incorrect, auth failure can trigger event auth
D. Authorization of a non-authentication success state, also known as escape. For different authentication
methods, there are different escape schemes. Some escape schemes are shared, and some escape
schemes are only supported by specific authentication methods. Correct
Answer: C correct

20.In the virtualized campus network deployed through ilMaster NCE-Campus, some key parameters
need to be configured in the authorization rules for access authentication. Which of the following is not
included?
A. Binding authentication rules
B. Access method
C. Bind the authorization result
D. Authorization Rule Name
0x06
Answer: B
0x00
21.Which of the following extended community attributes is used by BGP EVPN to advertise the migration
of connected VMs? 0x0600
A. RT
1536
B. EVPN Router’s MAC Extend Community
C. MAC Mobility EVPN MAC
D. RD Mobility
Answer: B I think its C

Correct i think
22.In the Huawei SD-WAN solution, which of the following routing protocols are used to transmit VPN
routes between CPEs?
A. BGP
B. RIP
C. SPF

7 / 149
The safer , easier way to help you pass any IT exams.

D. IS-IS
Answer: A Correct I think

23.The OSPF-based SR-MPLS function is enabled on all routers in a network. The SREB of each router
is shown in the figure. By default, when R3 forwards a packet whose destination address is 10.0.4.4,
which of the following MFLS labels is carried item?

A. 3
B. 100
C. 40100 https://support.huawei.com/enterprise/de/doc/EDOC1000173015/3ee10304/understand
D. 50100
Answer: D Correct

24.SR-MPLS Policy can use BGP extension to transmit tunnel information, as shown in the figure.

Among them, SR-MPLS Policy is optimized by which of the following parameters?


A. Priority
B. Preference A SID list can have a weight value. After an SR-MPLS TE
C. Weight policy chooses a candidate path with multiple SID lists, the
D. Binding SID
traffic will be load shared among the subpaths based on
weight values.
Answer: C Looks correct

25.The network administrator enters display telemetry subscription on the device to view the Telemetry
subscription information, and the output is as follows. Which of the following descriptions is wrong?

8 / 149
The safer , easier way to help you pass any IT exams.

A. The subscription name is Sub1


B. The device sends sampling data every second
C. The IP address of the device is 192.168.56.1
D. The subscription method is static subscription
Answer: C Correct

26.Which of the following statements about the difference between NSR and NSF is correct?
A. NSF must rely on neighbor routers to complete NSF - F is family and friends
B. Both NSR and NSF require neighbor routers to complete
C. NSF can be done without neighbor routers
D. NSR must rely on neighbor routers to complete
Answer: A Correct

27.The RF function of the BGP protocol can control the routing entries sent by the neighbors.
Which of the following tools does a BGP router need to use for this purpose?
A. Filter-Policy
B. IP Prefix List Prefix-based BGP Outbound Route Filtering
C. ACL
D. Route-Policy
Answer: B Correct

28.In the process of establishing an LDP session, the active party will first send Initialization information to
negotiate parameters. If the passive party does not accept the negotiated parameters, which of the
following messages will be sent?
A. Error Notification Message
B. Initialization Message If LSR_2 rejects the parameters in the Initialization message,
LSR_2 sends a
C. Hell Message
Notification message
D. Keepalive Message to LSR_1 to stop the establishment process.
Answer: A Correct

9 / 149
The safer , easier way to help you pass any IT exams.

29.If the configuration of IS-IS can be found through the display current-configuration command, but the
configuration of IS-IS cannot be found through the display saved-configuration command, which of the
following is the possible reason?
A. The running IS-IS configuration in the memory is not saved to Flash
B. No IS-IS command entered
C. Flash running IS-IS configuration, not saved to memory
D. The running IS-IS configuration in memory has been saved to Flash
Answer: A Correct

30.The IS-IS Level-1 neighbor relationship between R3 and R4 is not established.


[R3] display isis error
Hell packet errors:
... ...
Repeated System ID:0 Bad Circuit Type:0
Bad TLV Length:0 Zer Holding Time:0
Unusable IP Addr:0 Repeated IPV4 Addr:0
Mismatched Area Addr(L1):13 Mismatched Prot:0
SNPA Conflicted(LAN):0 Mismatched Level:0
Mismatched Max Area Addr:0 Bad Authentication:0
... ...
[R3]
Based on the information in this graph, which of the following is the likely cause?
A. The IIH authentication of R3 and R1 failed
B. The circuit-type of the interconnection interface of R3 and R4 does not match
C. The IS-Level of R3 and R4 do not match
D. The area numbers of R3 and R4 are different
Answer: D Correct

31.Which of the following does not belong to the scope of dynamic data collection on the live network
before cutover?
A. Routing Protocol Status
Snapshot before each step. Record the status of all ports, connection
B. ARP entry
marks, protocol status (number of IGP neighbors, number of IGP routes,
C. Port Status number of BGP peers, and number of BGP routes) of the device in the first
D. SNMP version few minutes, and back up the configuration file of the device.
Answer: C
Should be D?

32.The network administrator uses ACL and only wants to match the four routing entries whose Num
numbers are 1, 3, 5, and 7 in the figure. What are minimum numbers of ACL ruler need to be configured
by the network administrator?

10 / 149
The safer , easier way to help you pass any IT exams.

Deny ip 10.0.1.0 0.0.254.0

A. 3
B. 3
C. 1
D. 2
Answer: C
https://support.huawei.com/enterprise/en/doc/EDOC1100127112/
Correct
f3be3db6/centralized-vxlan-gateway-deployment-in-static-mode

33.As shown in the figure, the ARP broadcast suppression function is enabled in the BD20 domain on
VTEP1, and VTEP1 has learned the ARP information of PC2 through the BGP EVPN route. When the
ARP request sent by PC1 for PC2 is forwarded by VIEP1 to VIEP2, which of the following is the
destination MAC address of the inner data frame?

A. MAC C
B. MAC A https://support.huawei.com/enterprise/en/doc/EDOC1100198463/c7801b0d/
arp-broadcast-suppression-on-a-vxlan
C. MAC B
D. MAC D
Answer: D Correct

34.Which of the following statements about choosing an authentication point location in a network is
incorrect?
A. Deploying authentication at the access layer of the network is conducive to fine-grained management
of permissions and high network security
B. After the user authentication point is moved from the access layer to the aggregation layer, the user's
MAC authentication may fail
C. Setting the user authentication point at the access layer has advantages and disadvantages compared
to setting it at the aggregation layer or the core layer. Policy linkage can be used as a solution.

11 / 149
The safer , easier way to help you pass any IT exams.

D. When the user authentication point is moved from the access layer to the aggregation layer and the
core layer, the number of authentication points is greatly reduced, which can effectively relieve the
pressure on the AAA server
Answer: B Probably Correct The any group can be configured only as a destination group
and cannot be configured as a source group.
35.Which of the following descriptions about "security group" and "resource group" is wrong in Business
Travel?
A. The resource group supports static binding of IP addresses or address segments
B. On iMaster NCE-Campus, the UCL group is the security group
C. The any group can be used as both a source group and a destination group
D. The security group supports static binding of IP addresses or address segments
Answer: C correct

36.Compared with traditional networks, SD-WAN can better ensure application experience. Which of the
following is the main reason?
A. SD-WAN can use IPsec technology to realize encrypted transmission of packets
B. SD-WAN can provide different routing strategies and different QoS strategies for different applications
C. SD-WAN can build various networking types such as Full Mesh, Hub-Spoke, Partial Mesh, etc.
D. SD-WAN can realize multi-department business isolation based on VRF
Answer: B correct

37.Assuming that there are 5 segment IDs in the SRH of an SRv6 packet, when the packet reaches the
third router on the forwarding path, the node will set the segment ID numbered by which of the following
as the IPv6 destination address? https://documentation.nokia.com/sr/
A.5 23-3-1/books/7x50-shared/segment-
B.2 routing-pce-user/segment-rout-with-
ipv6-data-plane-srv6.html
C. Not sure
https://support.huawei.com/enterprise/tr/doc/EDOC1000173015/d169625f/
D.3 understanding-segment-routing-ipv6
Answer: D
I think its SID = 2 B

38.Which of the following descriptions about Prefix Segmente is incorrect?


A. On Huawei devices, Prefix Segment ID supports manual configuration and automatic protocol
configuration
B. Prefix Segment is identified by Prefix Segment ID (SID)
C. Prefix Segment is used to identify a destination address prefix in the network
D. Prefix Segment spreads to other network elements through IGP protocol, globally unique
Answer: D An IGP propagates the prefix segment of an NE to the other NEs. The prefix segment is
I think its A visible and takes effect globally.
39.The following is a part of the NETCONF protocol message, <rpc xmlns="urn:ietf:params:xml:ns:netc
nf:base:1.0" message-id="1024">Where is it located in the NETCONF architecture layer?
A. Transport layer
B. Message layer
C. Content Layer
D. Operation layer

12 / 149
The safer , easier way to help you pass any IT exams.

Answer: B

40.There are multiple protocols that can change or obtain network device data. Which of the following
protocols cannot be used to change network device data?
A. SNMP
B. NETCONF
C. RESTC NF
D. IPsec
Answer: D Correct

41.When the client calls the iMaster NCE-Campus login authentication RESTful interface, the method
used is POST, and the request message body format is {"userName": "xxx", "password": "xxx"}
A. TRUE
B. FALSE
Answer: B I think itsTRUE - A

42.BGP-LS (BGP Link State) carries information such as links, nodes and topology prefixes.
A. TRUE
B. FALSE
Answer: A Correct

43.Enterprises can access the Internet through dial-up connection, xDSL, xPON, etc.
A. TRUE
B. FALSE
Answer: B They could but not practicle so proably Correct

44.NVE is a network entity that realizes the function of network virtualization, and can only be a hardware
switch.
A. TRUE
B. FALSE
Answer: B Correct

45.Switch stacking and cross-device link aggregation can be deployed to achieve link reliability in small
and medium-sized campus scenarios.
A. TRUE
B. FALSE
Answer: A
Correct

46.Using BGP EVPN as the control plane of VXLAN can completely avoid traffic flooding in the VXLAN
network, such as ARP broadcast packets.
A. TRUE
B. FALSE
Answer: B Correct

13 / 149
The safer , easier way to help you pass any IT exams.

47.When MPLS is deployed in the network and the network layer protocol is IP, the route corresponding
False, LSR only swaps lable so entry must be in LFIB
to the FEC must exist in the IP routing table of the LSR, otherwise the label forwarding entry of the FEC
will not take effect.
A. TRUE
B. FALSE
Answer: A

48.When there is a relay device between the DHCP client and the server, if the IP address in the global
address pool of the DHCP server is not in the same network segment as the IP address of the VLANIF
interface connected to the client on the relay device, it will cause a DHCP failure.
A. TRUE
The device can select a global address pool based on the primary and secondary IP
B. FALSE
addresses of an interface only in scenarios where the DHCP server and DHCP clients
Answer: A are on the same network segment.
Correct
49.In order to speed up the sensing speed of link failure in IS-IS network, IS-IS can be linked with BFD.
A. TRUE
B. FALSE
Answer: A Correct

50.In the dual-system hot backup scenario of the firewall, the heartbeat interface can be directly
connected physically, or it can be connected through an intermediate device such as a switch or router.
A. TRUE
B. FALSE
Answer: A Correct

51.BGP/MPLS IP VPN can only use LDP to build public network tunnels.
A. TRUE
The LDP can be MPLS LDP or Resource
B. FALSE Reservation Protocol-Traffic Engineering (RSVP-TE).
Answer: B Correct

52.YANG technology originated from netconf but is not only used for netconf.
A. TRUE
B. FALSE
Answer: A Correct

53.For the telemetry side, both json and GPE are supported.
A. TRUE
JSON and GPB - Google Protocol Buffers
B. FALSE
Answer: B Correct
maybe SPR - smart policy routing
54.The SRP technology can flexibly select the egress link based on the link quality.
A. TRUE
B. FALSE
Answer: A Correct

14 / 149
The safer , easier way to help you pass any IT exams.

55.When the Next header is 43, it must be SRH.


A. TRUE
B. FALSE
Answer: B Correct

56.protobus is a language-independent and platform-independent method of serializing structured data,


which pays more attention to efficiency, resulting in poor space, speed, and read and write speeds.
A. TRUE
B. FALSE
Answer: B Correct

57.For telemetry data push, devices and collectors can be based on TLS. If GRPC is used, TLS must be
used. (Optional.) Provides channel encryption and mutual certificate authentication.
A. TRUE
B. FALSE
Answer: B

58.Netconf uses SSL to achieve secure transmission, and uses the mechanism of RPC remote invocation
to achieve client to server communication.
A. TRUE
B. FALSE
Answer: B Correct

59.In the Huawei SD-WAN networking solution, the RR must use an independent device and cannot be
deployed on the same device with the CPE.
A. TRUE
CPEs at the headquarters or large branch sites can function as RRs.
B. FALSE
Answer: B Correct

60.iFIT supports the measurement of end-to-end service packets, so as to obtain performance indicators
such as packet loss rate and delay of real service packets in the IP network.
A. TRUE
B. FALSE
Answer: A Correct

61.In SRv6, every time an SRv6 endpoint node passes through, the Segments Left field is decremented
by 1, and the IPv6 destination address information is converted once.
A. TRUE
B. FALSE
Answer: A Should be FALSE IPv6 DA is changed at each hop

62.The MAC address learning of the static VXLAN channel depends on the exchange of packets between
hosts (such as the exchange of ARP packets).

15 / 149
The safer , easier way to help you pass any IT exams.

A. TRUE
B. FALSE
Answer: A Correct

63.The iMaster NCE-Campus controller connects to various applications through open APIs in the
northbound direction, and delivers configurations to campus network devices through the Telemetry
technology in the southbound direction.
Master NCE-Campus provides a collection of RESTful
A. TRUE APIs. Northbound applications can invoke these APIs
B. FALSE using HTTPS to deliver services to southbound devices
Answer: B Correct and query data.

64.By default, LDP adjacencies will trigger the establishment of LSPs based on IP routes of 32-bit
addresses.
A. TRUE By default, LDP uses IP host routes with 32-bit addresses (excluding host
routes with 32-bit interface addresses) to establish LSPs.
B. FALSE
Answer: B So strictly speaking above is not 100% correct

65.IETF takes advantage of the strong scalability of OSPF to expand the functions of OSPF so that it can
support IPv6 networks. The expanded protocol is called OSPFv3. OSPFv3 is compatible with OSPPv2.
A. TRLE
B. FALSE
Answer: B Correct

66.Traffic shaping can only be used in the outgoing direction, and its function is to control the rate of
outgoing packets.
A. TRLE
B. FALSE
Answer: A Correct

67.When configuring the DHCP Relay function on the device, the VLANTF interface of the relay
connection client must be bound to a DHCP server group, and the bound DHCP server group must be
configured with the IP address of the proxy DHCP server.
A. TRUE IP address of real DHCP server - not proxy server
B. FALSE
Answer: B Correct

68.The following figure shows the MPLS VPN cross-domain Option B solution. In the scenario where an
RR exists within the domain, PE1 and ASBR-PE1 establish a VPNv4 neighbor relationship with RR1. By
default, user traffic must be forwarded through RR1.

16 / 149
The safer , easier way to help you pass any IT exams.

A. TRUE
B. FALSE
Answer: B Assume correct until proven otherwise

69.When deploying BGP/MPLS IP VPN, when two VPNs have a common site, the common site must not
use overlapping address space with other sites of the two VPNs.
A. TRUE VPNs can use overlapped address spaces in the following situations:
B. FALSE Two VPNs do not cover the same site.
Answer: A Two VPNs cover the same site, but devices at the site and devices using addresses in
Correct overlapped address spaces in the VPNs do not access each other.
70.The OPS (Open Programmability System) function of Huawei network equipment provides the open
programmability of network equipment. To facilitate users to write scripts, Huawei provides a Python
script template for the OPS function. The OPSComnection class is created in the script template. Among
them, the member function of creating device resource operation is def post (self, uri, req_data).
A. TRUE
B. FALSE Should be - def create(self, uri, req_data)
Answer: B Correct

71.In the virtualized campus network scenario deployed by iMaster INCE-Canrpus, to realize user mutual
access between different VNs, the administrator can deploy a policy control matrix on the controller.
A. TRUE Correct I think policy matrix is for comms between groups not VNs
imported routes of external networks fr inter VN config
B. FALSE
Answer: B

72.During the process of establishing the SSH connection, the two communicating parties conduct
version negotiation. Which of the following data is not included in the version negotiation packet sent by
both parties?
A. Client Device Type
B. Minor Protocol Version Number
C. Software version number
D. Main agreement version number
Answer: A correct

73.The NETCONF protocol provides a set of mechanisms for managing network devices, which can be
divided into the following layers?

17 / 149
The safer , easier way to help you pass any IT exams.

A. Security transport layer, message layer, operation layer, content layer Secure Transport
Message/RPC
B. Encrypted transport layer, message layer, configuration layer, content layer
Operations
C. Security transport layer, message layer, configuration layer, content layer Content
D. Encrypted transport layer, message layer, operation layer, content layer
Answer: A Correct SMOC

74.The SSH server has been configured and correct. Which of the following Pythom codes can be run on
the SSH client to successfully establish an SSH connection (the private key file is id_rsa, which is in the
same path as the client Python script?
A. import paramiko
client=paramiko.client.SSHClient()
client.connect(hostname='192.168.1.1', username='huawei', key_filename='id_rsa')
B. import paramiko I dont think we need
paramiko.Transport as we
client = paramiko.Transport(('192.168.1.1', 22))
are trying to ssh not build
client.connect(username='huawei', key_filename='id_rsa') an ssh tunnel, that rules
C. import paramiko out B and D :(
client=paramiko.client.SSHClient()
client.connect(hostname='192.168.1.1', username=1 huawei', pkey='idrsa') I think A
D. import paramiko
c as well if it says
key = paramiko.RSAKey.from_private_key_file('id_rsa') pkey=‘id_rsa’
client = paramiko.Transport((192.168.1.1', 22)
client.connect(username=huawei', pkey-key pkey-key
Answer: B
Maybe B will check tomorrow
75.YANG is the data modeling language of NETCONF. The client can compile RPC operations into
XML-formatted messages. XML follows the constraints of the YANG model for communication between
the client and the server.
Which of the following XML content is written against this data model?
A)

B)

18 / 149
The safer , easier way to help you pass any IT exams.

C)

D)

A. Option A
B. Option B
C. Option C

19 / 149
The safer , easier way to help you pass any IT exams.

D. Option D
Answer: C I think D - its the example on
https://support.huawei.com/enterprise/en/doc/EDOC1100270080/ddcce2b6/yang-model
76.Which of the following is the default port number for the northbound API of iMaster NCE-Campus?
A. 18000
B. 18002
C. 18008
D. 18006
Correct
Answer: B

77.In the request header field of the HTTP request message, which of the following fields is used to
identify the MIME type?
A. Content-Type
B. Data-Type
C. Referer
D. MIME-Type
Answer: A Correct

78.The engineer wants to log in to the Huawei device remotely. When writing the SSH Python script, the
Paramiko library is used to write the following code:
Cli=ssh.invoke_shell()
Cli. send(‘screen-length 0 temporary\n')
Which of the following is the role of screen-length 0 temporary?
A. Cancel split screen display
B. Do word wrapping
C. Cancel word wrap
D. Perform split screen display
Answer: A Correct

79.As shown in the figure, the gateway of the PC is located in the aggregation switch. If you want to
realize the load sharing of the gateway device, which of the following descriptions is wrong?

20 / 149
The safer , easier way to help you pass any IT exams.

A. Set different gateway addresses on the PC so that traffic is sent to different gateways in a balanced
manner
B. The VRID parameter only has local significance, so the VRIDs of the two aggregation switches about
the same virtual router can be different
C. It is necessary to configure the priority to make the aggregation switch become the master device of
the two virtual routers respectively
D. Multiple VRRP backup groups need to be configured on the aggregation switch
Answer: B Correct Two devices in a single VRRP backup group must be
configured with the same virtual router ID (VRID)
80.In BGP4+, which of the following descriptions is correct about the content of the next hop network
address field carried by the MP_REACH NLRI attribute in the Update message?
A. Only link-local addresses
B. Can only be a global unicast address
C. Can carry link-local addresses and global unicast addresses at the same time
D. Can be just a link-local address The Next_Hop attribute of BGP4+ is in the format of an IPv6 address,
Answer: C Correct and can be an IPv6 global unicast address or the link-local address of
a next hop.
81.After the interface sticky MAC function is enabled on the device, what is the number of MAC
addresses learned by the interface by default?
A. 5
By default, an interface enabled with the sticky MAC address function
B. 15
can learn only one sticky MAC address.
C. 1
D. 10 correct
Answer: C

82.Which of the following token bucket technologies is used in traffic shaping??


A. Double barrel single speed
single-rate-single-bucket
B. Single barrel double speed
C. Single barrel single speed If others needed
D. Double barrel double speed single-rate-dual-bucket
Answer: C dual-rate-single-bucket

83.In the controller public cloud deployment scenario, if you use the Huawei Registration Query Center to
deploy, you do not need to configure DHCP Option148 on the campus DHCP server.
A. TRUE
If an independent DHCP server is deployed on the campus network, you can configure an
IP address pool and the DHCP Option 148 field on the DHCP server. When the device to
B. FALSE
be deployed obtains an IP address from the DHCP server, it also obtains the IP address/
Answer: B URL and port number of iMaster NCE-Campus to complete the registration and
I think correct onboarding process.
84.In free mobility, if the authentication point device and the policy enforcement point device belong to the
same device, you need to subscribe to the IP-Group entry to view the user IP-Group information.
A. TRUE
B. FALSE The IP-security group entry subscription function is used if Policy
Answer: B enforcement points are deployed on a different device from authentication
control points or if Multiple authentication control points exist
Correct

21 / 149
The safer , easier way to help you pass any IT exams.

85.In the scenario of dynamically establishing a VXLA tunnel through BGP EVPN, BGP EVPN advertises
the host's MAC address information to the remote VTEP through Type 5 routes.
A. TRUE
B. FALSE
Answer: B
Correct

86.View the running configuration in memory through the "display current-configuration" command.
A. TRUE
B. FALSE EVPN Type 1 Ethernet auto-discovery (A-D) route
Answer: A EVPN Type 2 routes, also called MAC/IP advertisement route
EVPN Type 3 routes are used by VTEPs to advertise L2VNIs
and VTEP IP addresses to each other
87.As long as FIT-AP is added in NCE, the AP can go online normally.
A. TRUE
B. FALSE EVPN Type 5 routes, also called IP prefix routes, are used to transmit network segment
Answer: B from Type 2 routes that transmit only 32-bit (IPv4) or 128-bit (IPv6) host routes, Type 5 r
transmit network segment routes with mask lengths ranging from 0 to 32 or 0 to 128 bit
88.In the HUAWEI CLOUD WAN, the controller can plan paths in real time and deliver path information
through PCEP or BGPLS.
A. TRUE
B. FALSE
Answer: A

89.On the premise that the 32-bit host route of the remote host exists on the VXLAN L3 gateway, the L3
gateway can enable the local ARP proxy under the VBDIF interface to reduce the broadcast of ARP
packets. For packets destined for the remote host, the L3 gateway will match the host route for Layer 3
forwarding. BGP-LS is used by the SDN controller to collect network topology information from forwarder.
A. TRUE PCEP is used by the controller to control tunnel paths on forwarders in MPLS network
B. FALSE optimization scenarios
Answer: A I think its false, BGP LS dose not deliver path info, just collects info
Should be B - False
90.The Huawei iMaster NCE-WAN controller delivers the configuration to the CPE through the NETCONF
protocol.
A. TRUE : iMaster NCE-WAN manages CPEs via NETCONF and interconnects
B. FALSE with third-party applications via RESTful APIs
Answer: A
Correct
91.In the virtualized campus network scenario deployed by iMaster NCE-Campus, which of the following
descriptions about configuring network service resources is correct?
A. Network service resources include DHCP server, RADIUS server, Portal server, and other servers, etc.
B. If the scene is selected as "Directly Connected Switch", it means that Border adds the interconnection
port to the interconnection VLAN in an untagged way
C. The interconnection address in the network service resource must belong to the "interconnection IP" in
the "Underlay Automation Resource Pool"
D. Configuring network service resources is to configure the global resource pool of Fabric

22 / 149
The safer , easier way to help you pass any IT exams.

Answer: A

92.How many bits are there in the label field of MPLS?


A. 1
B. 8
C. 20
D. 3
Answer: C

93.In the description of DHCP Snooping, which one is wrong?


A. DHCP Snooping can prevent illegal attacks by setting trusted ports
B. When the DHCP snooping function is enabled in the interface view, the function of assigning all DHCP
packets on the interface will take effect.
C. If DHP Snooping is enabled in VLAN view, the command function of DHCP packets received by all
interfaces of the device belonging to the VLAN will take effect.
D. Enable DHCP Snooping globally, and the device only processes DHCPv4 packets by default without
any post-parameters
Answer: D

94.Which of the following routing types does EVPN use to achieve fast convergence and split horizon?
A. Inclusive Multicast Route
B. MAC/IP Advertisement Route
C. Ethernet Segment Route
D. Ethernet Auto-discovery Route
Answer: D

95.Which of the following is the meaning of the ipv6 enable topology ipv6 command in IS-IS protocol
view?
A. has no meaning
B. SPF calculation is performed separately in the topology of IPv4 and IPv6
C. SFF calculation without IPv6 support
D. IPv4 and IPv6 use the same topology for SPF calculation
Answer: B

96.Which of the following descriptions about the principle of DHCP is wrong?


A. DHCP supports assigning a fixed IP address to a specified terminal. This assignment mechanism is
called DHCP static assignment.
B. When the DHCP client and the DHCP server are on different Layer 3 networks, a DHCP relay needs to
be configured to forward packets between the client and the server
C. The Options field in the DHCP packet adopts a TLV structure, which can carry parameter information
such as the NTP server address, AC address, and log server address.
D. If only the information of the gateway and DNS server needs to be delivered to the DHCP client, the
DHCP Offer packet sent by the DHCP server to the client will not carry the Options field
Answer: D

23 / 149
The safer , easier way to help you pass any IT exams.

97.Which of the following descriptions about the VXLAN gateway is wrong?


A. XLAN Layer 3 gateway is used for cross-subnet communication of VXLAN virtual network and access
to external network (non-VXLA network)
B. VBDIF is a logical interface created based on BD, similar to the concept of VLANIF in traditional
networks
C. Both XLAN Layer 2 and Layer 3 gateways must maintain the VBDIF interface, otherwise users cannot
communicate normally through this interface
D. The XLAN Layer 2 gateway enables traffic to enter the VXLAN virtual network, and can also be used to
implement the same subnet communication within the same VXLAN virtual network
Answer: C

98.In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, for the VTEP peer to
generate BGP EVPN Type 2 routes based on the local terminal ARP information, which of the following
commands needs to be enabled on the VBDIF interface?
A. arp collect host enable
B. arp-proxy enable
C. mac-address xxxx-xxxx-xxxx
D. arp distribute-gateway enable
Answer: A

99.When configuring access authentication, it is necessary to define the contents authorized to the user in
the authorization result, which one of the following is not included?
A. Security Group
B. ACL
C. VLAN
D. IP address
Answer: D

100.In the Huawei SD-WAN solution, which of the following protocols is used for the control channel?
A. Static routing
B. BGP4
C. BGP VPNv4
D. BGP EVPN
Answer: D

101.Which of the following descriptions about SR-MPLS BE and SR-MPLS TE is correct?


A. SR-MPLS BE supports creating a tunnel by specifying Node SID and Adjacency SID at the same time
B. Both SR-MPLS BE and SR-MPLS TE support tunnel creation by specifying the Adjacency SID
C. SR-MPLS TE supports creating a tunnel by specifying Node SID and Adjacency SID at the same time
D. When creating an SR-MPLS BE, you can specify the necessary routers
Answer: C

24 / 149
The safer , easier way to help you pass any IT exams.

102.The network administrator enters display telemetry sensor Sensor1 on the device to view the related
information of the Telemetry sampling sensor Sensor1, and the output is as follows. Which of the
following descriptions is wrong?

A. Telemetry samples CPU information, memory information, and MAC address table
B. The device is configured with three Telemetry sampling paths
C. For the sampling path huawei-mac: mac/macAddrSurmarys/macAddrSurmary, when the capacity of
the mac address table does not reach 40000, the device will continue sampling
D. The device can continue to add Telemetry sampling paths
Answer: B

103.The <config> operation of the NETCONF protocol may contain an optional "operation" attribute, that
is used to specify the operation type "operation" for configuration data that does not include which of the
following?
A. create
B. remove
C. update
D. merge
Answer: C

104.There are various types of northbound interfaces, ranging from SUMP, CORBA, SMP to REST, but
nowadays the northbound interfaces of various devices are gradually evolving to REST interfaces.
Which of the following is NOT a reason to use REST?

25 / 149
The safer , easier way to help you pass any IT exams.

A. REST adopts a stateless design


B. REST standardizes URI naming
C. REST realizes front-end and back-end coupling
D. REST has good cross-platform compatibility
Answer: A

105.Which of the following protocols can be used by the iMaster NCE service open and programmable to
complete the device configuration?
A. BGP
B. CLI/SSH
C. NETCONF
D. SNMP
Answer: C

106.Which of the following descriptions about labels is wrong?


A. The principle to be followed when manually assigning labels is: the value of the outgoing label of the
upstream node is the value of the incoming label of the downstream node
B. Dynamic LSPs are dynamically established through label distribution protocols, such as MP-BGP,
RSVP-TE, LDP
C. LSPs are classified into two types: static LSPs and dynamic LSPs: static LSPs are manually
configured by the administrator, and dynamic LSPs are dynamically established using label protocols.
D. LSPs established by statically assigning labels can also be dynamically adjusted according to network
topology changes without administrator intervention
Answer: D

107.In the data header, which of the following fields cannot be used for simple flow classification?
A. DSCP
B. Protocol
C. EXP
D. 802.1P
Answer: B

108.Which of the following descriptions about the functions of Ping and Tracert is correct?
A. Tracert has the same function as Ping, but the name is different
B. Tracert must be able to trace the IP address of each hop from the source to the destination
C. Ping verifies the reachability from the local end to the peer end, but it does not mean that the peer end
to the local end must be reachable
D. Ping detects the two-way reachability with the peer through the one-way icmp echo request message
Answer: C

109.Which of the following NPLS L3VPN cross-domain solutions does not need to run MPLS between
ASBRs?
A. Option B
B. Option D

26 / 149
The safer , easier way to help you pass any IT exams.

C. Option A
D. Option C
Answer: C

110.When the network administrator tried to access the internal network device through Telnet, it was
found that it could not be accessed.
Which of the following is impossible?
A. The protocol inbound all is configured on the VTY user interface
B. The route is unreachable, and the client and server cannot establish a TCP connection
C. ACL is bound in the VTY user interface
D. The number of users logged into the device has reached the upper limit
Answer: A

111.In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, which of the
following routes is used by BGP EVPN for MAC address advertisement, ARP information advertisement
and IRB route advertisement?
A. Type1
B. Type3
C. Type4
D. Type2
Answer: D

112.A company's headquarters network and branch network are interconnected through the Internet. If
VPN technology is used to realize secure and reliable data transmission between headquarters users and
branch users, which of the following VPN technologies is most suitable?
A. SSL VPN
B. MPLS VPN
C. L2TP VPN
D. IPsec VPN
Answer: D

113.Which of the following descriptions about access control for small and medium-sized campuses is
wrong?
A. iMaster NCE supports directly as an authentication server
B. Cloud AP supports Portal local authentication
C. iMaster NCE supports connection to third-party RADIUS servers
D. iMaster NCE supports as a portal relay device
Answer: D

114.Which of the following descriptions about data encryption methods is wrong?


A. Data encryption methods are divided into symmetric encryption and asymmetric encryption
B. Symmetric encryption algorithms use the same key to encrypt and decrypt data
C. Asymmetric encryption uses public key encryption and private key decryption

27 / 149
The safer , easier way to help you pass any IT exams.

D. The key used by the symmetric encryption algorithm must be exchanged by mail, otherwise there is a
risk of key leakage
Answer: D

115.IPsec SA (Security Association) triple does not include which of the following parameters?
A. Source IP address
B. Security protocol number (AH or ESP)
C. Destination IP address
D. Security Parameter Index SPI (Security Parameter Indez)
Answer: A

116.Which of the following descriptions about GRE tunnels is incorrect?


A. GRE can encapsulate IPv4 unicast packets
B. The implementation mechanism of GRE is simple, and the burden on the devices at both ends of the
tunnel is small.
C. GRE can encapsulate IPv6 unicast packets
D. GRE can encapsulate IPv6 broadcast packets
Answer: D

117.If there are multiple service packets on the same link, in order to give priority to the use of
high-priority applications when the link is congested, and low-priority applications to avoid high-priority
applications when congestion occurs, then you should choose Which of the following is an intelligent
routing strategy?
A. Routing based on link priority
B. Routing based on application priority
C. Routing based on link bandwidth
D. Routing based on link quality
Answer: B

118.SR-MPLS TE distributes MPLS labels through which of the following protocols?


A. RSVP-TE
B. PCEP
C. IGP
D. LDP
Answer: C

119.The deployment of a virtualized campus network is shown in the figure. In this scenario, which
method should be used to interconnect the fabric with the external network?

28 / 149
The safer , easier way to help you pass any IT exams.

A. Layer 2 shared egress


B. Layer 3 Shared Export Mode
C. Layer 2 exclusive export method
D. Layer 3 exclusive export method
Answer: A

120.Which of the following is not a principle that needs to be followed when designing an SR-MPLS Policy
tunnel?
A. The traffic of a single tunnel should not be too large. To facilitate progress in bandwidth tuning
B. Business traffic and tunnel association. Achieve a certain level of path visibility
C. Consider possible future network expansion
D. Increase the number of tunnels as much as possible. The more the number of tunnels, the more
refined the high-level service can be separated and the service quality can be guaranteed
Answer: D

121.The OPS (Open Progrannability System. Open Programmable System) function of Huawei network
equipment uses the HTTP protocol method to access the management objects of network equipment. To
facilitate users to write scripts, Huawei provides Fython script templates for the OPS function. Which of
the following is the content of the header fields "Content-type" and "Ahccept" in the HTTP request
message sent in the Pythorn script template?
A. text/xml, text/json
B. text/json, tcxt/xml
C. text/json. text/json
D. text/xml, text/xsml
Answer: D

122.Which of the following descriptions cannot be the cause of the dual-active failure of the VRRP backup
group?
A. The master device sends 1 notification message per second
B. VRRP backup group IDs on both ends are different
C. The link that transmits VRRP advertisement packets is faulty

29 / 149
The safer , easier way to help you pass any IT exams.

D. The low-priority VRRP backup group discards the received VRRP advertisement packets as illegal
packets
Answer: A

123.MACsec can provide users with secure MAC layer data transmission and reception services.
Which of the following is not a service provided by MACsec?
A. Integrity Check
B. Controllability Check
C. User Data Encryption
D. Data source authenticity verification
Answer: B

124.Which of the following regular expressions can match only the EGP route entries that pass through
AS300 and then AS200?
A. 200$/300$
B. _[200 300]_
C._(200 300)_
D.^200l^300
Answer: B

125.Which of the following descriptions about TTL in MPLS Header is correct?


A. To control label distribution
B. Limiting LSR
C. Similar to the TTL in the IP header, it is used to prevent packet loops
D. Control of upstream equipment for label distribution
Answer: C

126.As shown in the figure, OSPF is enabled on all interfaces of the router. Which of the following
statements is correct?

30 / 149
The safer , easier way to help you pass any IT exams.

A. The Type1 LSA generated by R2 in area 0 contains the routing information of 10.0.2.2/32
B. The Type5 LSA generated by R2 in area 0 contains the routing information of 10.0.2.2/32
C. The Type2 LSA generated by R2 in area 0 contains the routing information of 10.0.2.2/24
D. The Type3 LSA generated by R2 in area 0 contains the routing information of 10.0.2.2/32
Answer: A

127.During HTTP communication, the client only sends one request for each HTTP connection, and once
the server response data is sent, the connection will be released.
To solve this problem, which header field extension is used so that the HTTP session can be maintained
without immediate disconnection?
A. Session
B. Cookie
C. Set-Cookie
D. Connection
Answer: D

128.As shown in the figure, if you want to realize that only legitimate users (users who obtain IP
addresses through a legitimate DHCP server or specific static IP users) are allowed to access the network
in this network, which of the following solutions can be used?

A. DAI +Port Security


B. DHCP Snooping+IPSG
C. DHCP Snooping+DAI
D. DAI+IPSG

31 / 149
The safer , easier way to help you pass any IT exams.

Answer: B

129.In order to enable the VPN instance to advertise IP routes to the BGP-EVPN address family, which of
the following commands needs to be enabled in the BGP view?
A. advertise 12vpn evpn
B. advertise irb
C. advertise vpnv4
D. advertise irbv6
Answer: A

130.An enterprise wants to centrally and securely manage and control Internet traffic. Which of the
following Internet access methods is more appropriate?
A. Internet access by priority
B. Centralized Internet access
C. Hybrid Internet access
D. Local Internet access
Answer: B

131.In the MA network environment, all IS-IS routers enable the SR-MPLS function. Which of the
following descriptions is correct?
A. DIS will collect the SRGB of each device in the MA network and advertise it to other routers
B. If SR-MPLS is enabled, there is no need to elect DIS
C. The LSP generated by DIS will describe all IS-IS routers in the network
D. DIS will generate a special Node ID
Answer: A

132.As shown in the figure, PE1 has enabled the OSPF-based SR-MPLS function. Based on this, it is
inferred that the label when PE1 forwards data packets to 10.0.3.3 is which of the following?

32 / 149
The safer , easier way to help you pass any IT exams.

A. 24003
B. 24004
C. 3
D. 24001
Answer: A

133.MPLS LDP can be used to build BGP/MPLS IP VPN bearer tunnels. Which of the following
descriptions about MPLS LDP is wrong?
A. The default label publishing and management methods adopted by Huawei devices are: downstream
autonomous mode (DU) + ordered label control mode (Ordered) + free label retention mode (Liberal)
B. MPLS LDP tunnels are established based on IP shortest paths, and tunnel forwarding path planning
cannot be performed
C. LDP, RSVP-TE, MP-BGP share the label space of 1024~1048575
D. Due to its relatively simple configuration and maintenance, BGP/MPLS IP VPNs are widely used in
carrier WAN bearer networks and enterprise WAN bearer networks
Answer: B

134.SR-MPLS Policy is one of the current mainstream ways to implement SR-MPLS. Which of the
following descriptions about SR-MPLS Policy is wrong?
A. Common SR-MPLS Policy application scenarios the controller collects information such as network
topology, network bandwidth, link delay, etc., calculates the SR-MPLS Policy tunnel according to service
requirements, and delivers the policy to the head node
B. A candidate path can contain multiple forwarding lists, load balancing based on weights
C. An SR-MPLS Policy is identified by the triplet <headend, color, endpoint>
D. Multiple candidate paths can be defined, and the candidate paths form a master-standby or
load-sharing relationship according to their priorities
Answer: D

33 / 149
The safer , easier way to help you pass any IT exams.

135.The NETCONF protocol provides a mechanism for managing network devices. The operation object
of NETCONF is the configuration library of network devices. Which of the following descriptions of the
configuration library is wrong?
A. <delete-config> is an operation on the startup configuration library
B. The configuration library of network devices can be divided into candidate configuration library, running
configuration library, and startup configuration library
C. <validate> is the operation on the candidate configuration library
D. <commit> will submit the configuration in the startup configuration library as the configuration in the
running configuration library
Answer: D

136.The establishment of an SSH connection needs to go through multiple stages in turn. Which of the
following descriptions is correct?
A. Version negotiation stage, algorithm negotiation stage, key exchange stage, user authentication stage,
session interaction stage
B. Version negotiation phase, user authentication phase, key exchange phase, algorithm negotiation
phase, session interaction phase
C. Version negotiation stage, user authentication stage, algorithm negotiation stage, key exchange stage,
session interaction stage
D. Version negotiation stage, key exchange stage, algorithm negotiation stage, user authentication stage,
session interaction stage
Answer: A

137.Which of the following descriptions about the purpose of configuring LSP fragmentation on IS-IS
equipment is correct?
A. Make the device unable to establish IS-IS neighbors
B. Enable the device to support more IS-IS routing entries
C. Have no practical purpose
D. Prevent the device from learning IS-IS routing information
Answer: B

138.Which of the following tools cannot be used to match BGP routing entries?
A. Community Filter
B. IP Prefix List
C. Basic ACL
D. Advanced ACL
Answer: D

139.Which of the following NAT64 prefixes do not require manual configuration by the administrator?
A. 64:FF9B::/16
B. 64:FF9B::/32
C. 64:FF9B::/64
D. 64:FF9B::/96

34 / 149
The safer , easier way to help you pass any IT exams.

Answer: D

140.In order to advertise IPv6 routes in BGP4+, what fields are added to the Update message?
A. A new path attribute: IPv6_REACH_NLRI
B. A new path attribute: MP_REACH_NLRI
C. A new path attribute: MP_UNREACH_NLRI
D. A new NLR type: IPv6_NLRI, which carries IPv6 NLRI prefix 1ength and IPv6 NLRI prefix
Answer: B

141.In the VXLAN network, which of the following is used to realize cross-subnet communication within
the VXLAN network and access to the external network (non-VXLAN network) from the VXLAN network?
A. VXLAN L2Gateway
B. VLANIF interface
C. NVE interface
D. VXLAN L3 Gateway
Answer: D

142.For scenarios that need to support advanced security functions such as URL filtering, IPS, security
defense, and AV anti-virus, and need to support multi-link uplinks, which one of the following can the
export device choose?
A. AP
B. AR
C. AC
D. FW
Answer: D

143.In the VXLAN network, similar to the traditional network using VLAN to divide the broadcast domain,
VXLAN identifies the broadcast domain locally according to which of the following?
A. VRF
B. BD
C. VNI
D. NVE
Answer: B

144.EVPH supports multiple service modes. In which of the following service modes, an interface can
only be used by a single user?
A. VLAN Based
B. Port Based
C. VLAN Bundle
D. VLAN-Aware Bundle
Answer: A

35 / 149
The safer , easier way to help you pass any IT exams.

145.During the implementation of the Wi-Fi-based location service of iMaster NCE-Campus, the terminal
data is reported to the location service platform by HTTP request. Which of the following HTTP methods
is used for this HTTP request?
A. PUI
B. POST
C. DELETE
D. GET
Answer: D

146.In Huawei's access control solution, which of the following user authentication methods is not
supported by portal authentication?
A. Based on Passcode
B. SMS-based verification code
C. Based on the user's MAC address
D. Username based password
Answer: C

147.Which of the following tunneling technologies is used in Huawei SD-WAN solution to establish data
channels?
A. GRE over IPsec
B. MPLS
C. IPsec
D. Vxlan
Answer: A

148.NCE-campus has some key parameters when configuring access authentication and authorization,
which one of the following is not included?
A. Certification Rules
B. Result name
C. Site binding
D. Authorized Security Groups
Answer: C

149.Which AP is independent, can manage a small number of APs, has low cost, and does not require
high management skills?
A. Leader AP
B. FIT AP+AC
C. FAT AP
D. Agile distribution of AP
Answer: A

150.Before the SSH client uses public key authentication to connect to the SSH server, it needs to create
a key pair in advance. The client uses Git Bash to create a DSS key pair. Which of the following
commands is used to create it?

36 / 149
The safer , easier way to help you pass any IT exams.

A. ssh-keygen -t rsa
B. ssh-keygen -t dss
C. ssh-keygen -t ecc
D. ssh-keygen -t dsa
Answer: B

151.In SD-WAN, after deploying NAT in RR, what kind of features are required?
A. NAT SERVER
B. 1:1 NAT
C. NAT444
D. ALG
Answer: B

152.Which of the NCE-Campus descriptions about the access management configuration is wrong?
A. A template can only have one authentication method
B. NCE device can be used as Radius server or portal server
C. Fabric needs to specify wired or wireless templates
D. Before creating a user template, you must first create a server template
Answer: A

153.When configuring SR-MPLS, which of the following is not mandatory?


A. Enable MPLS
B. Enable SR
C. Configure LSR-ID
D. Link configuration Adj-Sid
Answer: D

154.Traffic monitoring does not include monitoring which of the following?


A. Management plane traffic
B. Control Plane Traffic
C. Monitor plane traffic
D. Data plane traffic
Answer: C

155.There are three roles in strategy linkage. Which of the following is not?
A. Authentication Control Point
B. Terminal
C. Policy enforcement point
D. Certification enforcement point
Answer: C

156.In SD-WAN, CPE is located in the private network area behind the NAT device. NAT technology is
required between CPE. Which technology in SD-WAN enables NAT between CPE?
A. STUN

37 / 149
The safer , easier way to help you pass any IT exams.

B. IPSEC
C.NAT SERVER
D. ALG
Answer: A

157.Engineers often log in to the device remotely to check the status of the device. Now engineers want
to realize automatic remote login through Python script, they can use Python Paramiko library and
telnetlib library to achieve the above requirements. Using telnetlib to achieve remote login is more secure.
A. TRUE
B. FALSE
Answer: B

158.In an MPLS domain, LSR can be divided into Ingress LSR, Transit LSR and gross LSR according to
the different processing methods of LSR for data. For the same FEC, a certain LSR can be the Ingress
LSR of the FEC or the Transit LSR of the FEC.
A. TRUE
B. FALSE
Answer: A

159.The business package (Specific Service Plugin, SSP) implements the mapping by using the jinja2
template. The jinja2 syntax {%...%} contains control structures (ControllStructures), such as for loops.
A. TRUE
B. FALSE
Answer: A

160.When OSPFv2 evolves to OSPFv3, the LSA format and function are exactly the same, but the
network layer address in the LSA is changed from IPv4 to IPv6.
A. TRUE
B. FALSE
Answer: B

161.. Which of the following security protection actions can be performed by a secure MAC address does
not include?
A. Remark
B.Shutdown
C. Restrict
D. Protect
Answer: A

162.In the SSH algorithm negotiation phase, the two parties exchange the list of algorithms they support.
The symmetric encryption algorithm list of the SSH server is: aes256-ctr, aes192-ctr, aes128-ctr,
aes256-cbc.
The list of symmetric encryption algorithms of the SSH client is: aes128-c9-ctr, aes256-ctr, aes256-cbc.
Which of the following is the symmetric encryption algorithm that both parties will use?

38 / 149
The safer , easier way to help you pass any IT exams.

A. aes128-ctr
B. aes192-ctr
C. aes256-cbc
D. aes256-ctr
Answer: A

163.Huawei network equipment provides the OPS function. Which of the following commands can view
the information of the OPS script installed on the network equipment?
A. check ops script
B. display ops file
C. display ops script
D. check ops file
Answer: C

164.Which of the following descriptions about the application scenarios of the 0PS function is wrong?
A. In the scenario of using the OPS function to automatically deploy devices with empty configuration, the
function of the Python script is to obtain the server addresses of software and configuration files, and to
download system software and configuration files
B. The user needs to realize the function of automatically sending the configuration file to the server after
the network device configuration is saved. This can be achieved by creating a timer type trigger condition
through the maintenance assistant and executing the Python script regularly.
C. Using the OPS function can reduce the impact of the network environment in some cases. For
example, when transmitting collected information to the server, the Python script can realize that when
the network is unavailable. The function of temporarily storing the execution result in the device and
transferring it to the server after the network is restored.
D. Using OPS can realize the function of automatically checking the health status of the device.
Answer: B

165.Which of the following protocols does not support SR-MPLS?


A. BGP
B. IS-IS
C. OSPF
D. RSVP-TE
Answer: D

166.Telemetry is a technology that collects data remotely from physical or virtual devices at high speed.
Which of the following is NOT a component of the data layer for a mode that uses gRPC push?
A. Notification message layer
B. Telmetry layer
C. RPC layer
D. Business data layer
Answer: A

39 / 149
The safer , easier way to help you pass any IT exams.

167.In the virtualized campus network deployed through iMaster NCE-Campus, in the "network planning"
stage, which of the following is not an operation that the administrator needs to complete?
A. Deploy Overlay Access Resource Pool
B. Create an authentication template
C. Deploy the Fabric global resource pool
D. Deploy the Underlay automation resource pool
Answer: A

168.In the virtualized campus network design, which of the following descriptions about the Fabric
networking design is wrong?
A. Single/dual Border networking can be selected according to different scenarios, in which the VXLAN
centralized gateway supports single Border or dual Border deployment at the same time.
B. If users in multiple VNs want to access the same external network, and the security policies of each VN
are different, you can configure the VN to connect to the external network through Layer 3 exclusive
egress.
C. If you want to use the original access switches (which do not support VXLAN), you can deploy VXLAN
covering the core layer to the aggregation layer
D. When the terminal scale is small, a centralized gateway network can be selected, in which Border acts
as a gateway to manage the network uniformly.
Answer: A

169.Both SNMP and NETCONF can be used for the management of network devices. Which of the
following descriptions about these two protocols is correct?
A. When Huawei switches need to be managed through NETCONF, the NETCONF parameters of each
switch must be manually configured by default.
B. Both protocols adopt the Client/Server architecture, with NMS as the server and the managed network
device as the client
C. When Huawei switches need to be managed through SNMP, the SNMP parameters of each switch
must be manually configured by default.
D. Both protocols manage different objects through MIB on network devices
Answer: C

170.Which of the following commands can be used to adjust the link cost of the IS-IS interface?
A. isis cost
B. isis timer hello
C. isis circuit-type
D. isis circuit-level
Answer: A

171.Execute the print(r.json()) command in the Python script, and the print output is as follows;
The output contains multiple elements, and now the value of token_id needs to be filtered out and
assigned to the variable id. Which of the following is the correct command?
{'data': {'token_id': 'x-eonsfw', 'expirelate': '2020-07-07-07:30:00' }, 'errcode': '0', 'errmsg': 'get token'
successfully' }

40 / 149
The safer , easier way to help you pass any IT exams.

A. id=r.json()['data']['token_id']
B. id=r.json(){'data'}{'token_id'}
C. id= r.json()('data')('token_id')
D. id = r.json()('token_id')
Answer: A

172.In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, when using BGP
EVPN Type 2 routes for host MAC address advertisement, which of the following descriptions is correct?
A. Will carry specific L2 VNI and L3 VNI values at the same time
B. Will carry the specific L3 VNI value
C. The RT value carried is the Export RT in the IP VPN instance
D. IP Address and IP Address Length fields will not carry specific content
Answer: D

173.In the virtual campus network scenario deployed through iMaster NCE-Campus, after VN are created,
VN interworking needs to be configured.
Which of the following descriptions about configuring VN interworking is correct?
A. Actually, OSPF is deployed for the VPN-Instance corresponding to the VN
B. Actually, a static route is created for the VPN-Instance corresponding to the VN
C. Actually deploying routing strategies
D. Actually deploying traffic filtering
Answer: B

174.In a small and medium-sized cloud-managed campus network scenario based on the HUAWEI
CLOUD campus network solution, which of the following components provides query services for devices
to automatically go online?
A. WLAN Planner
B. Registration Inquiry Center
C. CloudCampus APP
D. iMaster NCE-campusInsight
Answer: C

175.A campus network deploys the Free Mobility function through iMaster NCE-campus, and the
configured policy control matrix is shown in the figure.
Policy Control Matrix:

41 / 149
The safer , easier way to help you pass any IT exams.

Which of the following statements about the policy control matrix is wrong?
A. If the policy enforcement point does not find the security group corresponding to an IP address, the
traffic of the IP address can access the server group
B. The sales group cannot communicate with the guest group
C. The guest group can access the guest group
D. If the server group is a resource group, you can configure the policy source for the server group
Answer: D

176.Man-in-the-middle attacks or IP/MAC spoofing attacks can lead to information leakage and other
hazards, and are more common in intranets. Which of the following configuration methods can be taken
to prevent man-in-the-middle attacks or IP/MAC spoofing attacks?
A. Limit the maximum number of MAC addresses that can be learned on the switch interface
B. Enable DHCP Snooping to check the CHADDR field in the DHCP REQUEST message
C. Configure DHCP Snooping on the switch to associate with DAI or IPSG
D. Configure the Trusted/Untrusted interface
Answer: C

177.In the firewall dual-system hot backup scenario, which protocol is used between the active and
standby devices to implement session table backup?
A. VRRP
B. VCMP
C. HRP
D. BFD
Answer: C

178.When using EVPN to carry VPLS, which of the following descriptions about the advantages of EVPN
is wrong?
A. PE does not need to learn the MAC address of CE
B. Support automatic discovery of PE members
C. EVPN supports CE multi-active access to PE
D. Loop avoidance without hard running STP
Answer: D

42 / 149
The safer , easier way to help you pass any IT exams.

179.Which of the following descriptions about the BGP/MPLS IP VPN network architecture is wrong?
A. In general, CE devices cannot perceive the existence of VPN, and CE devices do not need to support
MPLS, MP-BGP, etc.
B. The P device only needs to have basic MPLS forwarding capabilities and does not maintain
VPN-related information
C. The BGP/MPLS IP VPN network architecture consists of three parts: CE, PE and P. PE and P are
operator equipment, and CE is BGP/MPLS IP VPN user equipment
D. Sites can access each other through VPN, and a site can only belong to one VPN
Answer: D

180.RESTCONF and NETCONF are both protocols used to manage the configuration of network devices.
Which of the following statements about RESTCONF and NETCONF is wrong?
A. The data encoding format of RESTCONF supports XML or JSON
B. RESTCONF uses HTTP operations, stateless, with transaction mechanism, with rollback
C. The operation methods of RESTCONF are GET, POST, PUT, PATCH, DELETE
D. NETCONF operates multiple configuration libraries for devices, with transaction mechanism and
rollback
Answer: B

181.The role of Link-LSA in OSPFv3 does not include which of the following?
A. Advertise the IPv6 prefix list of this interface to other routers on the link
B. Advertise the options set in the Network-LSA originating from this link to other routers on the link
C. Advertise the link-local address of this interface to other routers on the link
D. Advertise the router's interface ID to other routers on the link
Answer: D

182.Which of the following is not part of the operation process in the intermediate stage of cutover?
A. Business testing
B. Cutover Preparation
C. Cutover Implementation
D. Field Defence
Answer: D

183.Which of the following descriptions about the OSPFv3 Router-ID is correct?


A. 100-bit value
B. 64-bit value
C. 128-bit value
D. 32-bit value
Answer: D

184.As shown in the figure, SW1 and SW2 use asymmetric IRB forwarding. When PC1 communicates
with PC2, which of the following is the destination MAC address of the original data frame in the message
sent by VTEP1 to VTEP2?

43 / 149
The safer , easier way to help you pass any IT exams.

A. MAC A
B. MAC D
C. MAC C
D. MAC B
Answer: B

185.As shown in the figure, R1 and R4 establish a GRE tunnel to transmit data sent from PC1 to PC2.
The TTL of the inner header of the packet sent from the GEO/0/1 interface of R1 is 126. Which of the
following is the inner TTL of a packet sent by interface 0/3?

A. 124
B. 125
C. 127
D. 126
Answer: C

186.The figure shows the IPv6 SR-Policy routing information on a router. Which of the following does [10]
mean?

A. distinguisher
B. policycolor
C. Turnnel ID
D. endpoint
Answer: A

44 / 149
The safer , easier way to help you pass any IT exams.

187.The OPS (Open Progranmrability System) function of Huawei network equipment uses the HTTP
protocol method to access the management objects of network equipment. To facilitate users to write
scripts, Huawei provides Python script templates for the OPS function.

The following is the internal call method rest_call of the OPSCornection class in the OPS script template.
Which of the following descriptions is correct?
A. The response.status in the rest_call method is the status code
B. The response.reason in the rest_call method is the reason phrase used to interpret the status code
C. The parameter method in rest_call (self, method, uri, req_data), the value can be DELETE, GET, SET,
CREATE
D. The values of self.host and self.port in the rest_call method are "localhost".80 respectively
Answer: C

188.Based on the information given in the figure, which of the following statements is correct?

A. The IS-IS interface type of the GE0/0/0 interface on R1 is Leve1-1-2


B. IS-IS IPv6 is not enabled on the GE0/0/1 interface of R1
C. IS-IS IPv6 is enabled on the GE0/0/0 interface of R1
D. The IS-IS interface type of the GE0/0/1 interface of R1 is Level-1
Answer: A

189.All routers in a network enable SR-MPLS, and the label information encapsulated by R1 to a data
packet is shown in the figure. At this time, which of the following is the MPLS label carried when the data
packet is sent from R2 to R4?

45 / 149
The safer , easier way to help you pass any IT exams.

A. 2046
B. 2024
C. Unlabeled
D. 2032
Answer: B

190.Huawei provides Python script templates for OPS functions.

The code of the Main method in the script template is as follows. Which item is wrong in the following
description?
A. ops_conn.close() means to close the HTTP connection
B. rsp_data = get_startup_info (ops_corn) means to call the get_startup_infc method, which will send an
HTP request to the device and store the device's response data in rsp_data
C. ops_conn = OPSConnecticn (host) means to create an instance of the OPSC onnection class
ops_cornn
D. When executing the Python script on the local PC, the value of host needs to be set to the IP address
of the network device
Answer: C

46 / 149
The safer , easier way to help you pass any IT exams.

191.A user wrote the clear_start_info method. Use the oPS function to clear the configuration file of the
current network device, the code is as follows:

Which of the following descriptions is wrong?


A. ret is the HTIP status code
B. When ops_corn.create(uri, req_data) is executed, an HTTP request of the "TPUT" operation type is
sent
C. rsp_data is the response data of the system after the request is executed, the format can refer to the
RESTful API of the network device
D. req_data data is stored in the body part of the HTTP request
Answer: C

192.How to deliver the results of topology arrangement in SD-WAN to RR?


A. Flow table
B. NSPF
C. BGP
D. SNMP
Answer: C

193.Which of the following descriptions about Multi-VPN-Instance CE (MCE) is wrong?


A. On the MCE device, you need to create their own routing and forwarding tables for different VPNs and
bind them to the corresponding interfaces
B. Users who are connected to the same MCE but do not belong to a VPN instance cannot access each
other
C. There must be multiple physical links between MCE and PE to achieve isolation between different VPN
instances
D. Devices with MCE function can access multiple VPN instances in BGP/MPLS IP VPN applications,
reducing the investment in user network equipment
Answer: C

194.OSPFv2 is an IGP running on IPv4 networks, and OSPv3 is an IGP running on IPv6 networks. The
basic working mechanism of OSPFv3 is the same as that of OSFv2, such as the election of DR and BDR.
An engineer uses three routers to test IPv6 services. He wants to realize the interconnection of IPv6
networks by running OSPFv3.

47 / 149
The safer , easier way to help you pass any IT exams.

Which of the following descriptions about the DR election for this network is correct?
A. After the network converges, R1 is the DR
B. After the network converges, the engineer changes the priority of R1 to 100, the priority of R2 to 10,
and the default value of R3. When the network converges again, R1 is DR and R2 is BDR
C. After the network converges, a new device R4 is added to the broadcast link, and the priority of R4 is
150. When the network converges again, R4 is DR
D. After the network converges, R1 is powered off and restarted. When the network converges again. R3
is DR
Answer: B

195.Which of the following EVPN route types does not carry MPLS labels?
A. MAC/IP Advertisement Route
B. Ethernet Segment Route
C. Ethernet AD Route
D. Inclusive Multicast Route
Answer: B

196.Which of the following descriptions about configuring user access authentication is wrong?
A. Configure an 802.1X access profile, MAC access profile, Portal access profile or hybrid authentication
profile based on the authentication requirements of the actual networking
B. To implement network access control for users, it is necessary to determine the domain to which the
user belongs and the AAA scheme used
C. The access profile needs to be bound in the authentication profile to confirm the authentication method
of the user, and then the authentication profile needs to be applied to the interface to enable the network
admission control function
D. If authentication needs to be performed through a RADIUS or HWTACACS server, you need to
configure the relevant parameters for connecting with the authentication server in the AAA scheme
Answer: C

48 / 149
The safer , easier way to help you pass any IT exams.

197.802.1X authentication is deployed in the network shown in the figure. Which of the following packets
cannot trigger 802.1X authentication?

A. DHCP
B. ICMP
C. EAPoL
D. ND
Answer: B

198.Which of the following descriptions about AH (Authentication Header, message authentication


header protocol) is wrong?
A. AH provides anti-message replay function
B. AH provides message encryption function
C. AH provides data source verification
D. AH provides data integrity verification
Answer: B

199.Which of the following protocols is used for the management of Huawei iMaster NCE-WAN
controllers?
A. SNMP
B. HIIP/2
C. NETCONF over DTLS
D. NETCONF over SSH
Answer: D

200.In the MA network environment, all IS-IS routers enable the SR-MPLS function. Which of the
following descriptions is correct?
A. If SR-MPLS is enabled, there is no need to elect DIS
B. DIS will generate a special Node ID
C. DIS will collect the SRGB of each device in the MA network and advertise it to other routers
D. The LSP generated by DIS will describe all IS-IS routers in the network
Answer: C

201.If the SRH extension header is carried, the numbers filled in the next-header of IPv6 are:
A.43
B.49
C.50
D.16
Answer: A

202.Regarding the tunnel, which statement is wrong?

49 / 149
The safer , easier way to help you pass any IT exams.

A. The tunnel is a GRE tunnel


B. The destination address of the tunnel is 10.3.3.3
C. The tunnel enables keepalive detection
D. Keyword detection is not enabled for this tunnel
Answer: C

203.Part of the configuration on the device is shown in the figure. In the following description of this
configuration, which one is wrong?

A. Configure the GigabitEthernet0/0/1 interface as a trusted interface


B. Enabling DHCP Snooping configuration can be used to prevent DHCP Server spoofing
C. Attacks Enabling DHCP Snooping configuration can be used to prevent ARP spoofing attacks
D. If there is no Sub0ptionl information of Option82 in the DHCP request packet received by the
GigabitEthernet0/0/1 interface, the device will generate Option82 and insert it into the packet
Answer: C

204.Which of the following descriptions about MPLS label space is wrong?


A. If the outgoing label value is 0, the router will directly discard the packet
B. Above 1024 is the label space shared by dynamic signaling protocols such as LDP, RSVP-TE,
MP-BGP, etc.
C. When the penultimate LSR performs label switching, if the value of the label after the exchange is
found to be 3, the label will be popped by default and the packet will be sent to the last hop
D. 16~1023 is the label space shared by static LSP and static CR-LSP
Answer: A

205.In free mobility, after the policy enforcement point device receives user traffic.
According to which of the following information carried by the traffic, find the corresponding policy and
execute it, and then forward/discard the traffic?
A. Source/Destination Security Group
B. Source/destination IP address
C. Source/destination port number
D. Source/destination MAC address
Answer: B

206.In the accompanying business travel, which of the following descriptions about "security group" and
"resource group" is correct?
A. When using resource groups, a policy will be generated based on each resource group on the policy
enforcement point device
B. The user IP address of the dynamic security group is not fixed, and the IP address is dynamically
associated with the security group after user authentication

50 / 149
The safer , easier way to help you pass any IT exams.

C. When configuring the policy control matrix, the resource group can be used as the source group and
destination group of the policy
D. For service resources with overlapping IP address sets, they can be distinguished by static security
groups
Answer: B

207.To achieve isolation between different users in the same VLAN, which of the following techniques
can be adopted?
A. IPSG
B. Port isolation
C. Ethernet Port Security
D. Super VLAN
Answer: B

208.A network means that all routers enable SR-MPLS, and the label information encapsulated by R1 for
a data packet is shown in the figure. At this time, which of the following is the forwarding path of the data
packet?

A. R1-R3-R5-R6
B. R1-R2-R3-R5-R6
C. R1-R2-R4-R6
D. R1-R3-R2-R4-R6
Answer: D

209.OSPF supports SR-MPLS through which of the following types of LSA?


A. Type10 opaque LSA
B. Type1 Router L5A
C. Type7 NSSA External LSA
D. Type2 Network LSA
Answer: A

210.As shown in the figure, it is a typical network of "two places and three centers". Which device in the
figure is responsible for branch access to the WAN bearer network?

51 / 149
The safer , easier way to help you pass any IT exams.

A. DC-PE
B. BR-PE
C. BR-CE
D. WAN-P
Answer: C

211.For the following Python code, which description is incorrect?

A. The HTTP request data (message body) is encoded in XML format


B. There are two header fields in the HTTP request, 'Content-Type': 'application/json' and 'Accept':
'application/json'
C. This code implements the sending of HTTP request messages, and the request method is POST
D. The Python code imports the requests library to implement the interaction process of the HTTP
protocol
Answer: A

212.Which of the following is not a principle that needs to be followed when designing an SR-MPLS Policy
tunnel?
A. The traffic of a single tunnel should not be too large to facilitate the progress of bandwidth tuning
B. The service traffic is associated with the tunnel to achieve a certain degree of path visibility
C. Increase the number of tunnels as much as possible. The more tunnels there are, the more refined the
service isolation and service quality can be guaranteed.
D. Consider possible future network expansion
Answer: B

52 / 149
The safer , easier way to help you pass any IT exams.

213.The home broadband service requirements of an operator are as follows: the maximum downlink
bandwidth of the broadband is 100M when it is idle, and the guaranteed downlink available bandwidth is
50M when it is busy. The home broadband service needs to bear the home IP telephone service in
addition to the home Internet service.
Which of the following configurations best matches the business requirement?
A. qos car inbound cir 100000
B. qos car inbound cir 100000 pir 50000
C. qos car inbound cir 50000 pir 100000
D. qos gts cir 100000
Answer: C

214.Assume that the neighbor relationship between BGP routers has been established successfully, and
the configuration on R1 is as shown in the figure.

Which router can the routing entry 10.10.10.0/24 advertised by R1 be delivered to the farthest?
A. R2
B. R1
C. R4
D. R3
Answer: D

215.The number of tunnels established in Huawei SD-WAN solution can be controlled through specific
parameters.

53 / 149
The safer , easier way to help you pass any IT exams.

A network topology is shown in the figure. How many trails can be established in this topology?
A.3
B.4
C.2
D.1
Answer: B

216.According to the configuration information shown in the figure, it can be inferred that how many
interfaces on R4 that are advertised into ISIS?

A. 3
B. 1
C. 0
D. 2
Answer: A

217.In the virtualized campus network scenario deployed by iMaster NCE-Campus, which of the following
descriptions about the access management configuration is wrong?
A. When creating a user authentication template, a template can only contain one authentication method
B. Before creating a user authentication template, you need to create a server template
C. iMaster NCE-Campus can be used as RADIUS server or Portal server
D. The authentication template bound to the wired and wireless access points needs to be specified in the
access management of the Fabric
Answer: A

54 / 149
The safer , easier way to help you pass any IT exams.

218.An engineer uses two routers to test IPv6 services, and simulates the interconnection between the
headquarters and branches by running BGP4+.
As shown in the figure, an engineer captures packets to view the Update packets sent by R1.

Which of the following descriptions about the message information is correct?


A. This packet describes the currently withdrawn IPv6 route
B. The next hop address of the route described in this packet is: 2001:db8:2345:1::1
C. The route described in this packet may be imported through import
D. The routing address prefix and prefix length described in this packet are: 2001:db8:2345:1::1/128
Answer: D

219.Which of the following descriptions about the SP scheduling algorithm is wrong?


A. SP scheduling algorithm prioritizes queues with high priority
B. When using the SP scheduling algorithm to schedule multiple low-priority queues, the packets that
enter the queue first will be forwarded first
C. In order to ensure the quality of key services, the service can be scheduled through the SP algorithm,
and the minimum bandwidth can be set
D. When using the SP scheduling algorithm, if the high priority occupies a lot of bandwidth, it may cause
the low priority queue to death
Answer: B

220.In the firewall dual-system hot backup scenario, each firewall has a VGMP group. By default, which
of the following working states is the VGMP group in?
A. Standy
B. Initialize
C. Active
D. Load Balance
Answer: C

221.In the design of small and medium-sized campus network, when mutual visits are required between
branches and the number of branches is large (over 100), which of the following interconnection
networking models is recommended?
A. Partial-Mesh networking
B. Hub-Spoke Networking

55 / 149
The safer , easier way to help you pass any IT exams.

C. Direct networking
D. Full-Mesh networking
Answer: D

222.Which of the following descriptions about configuring authentication templates is correct?


A. Under the same interface of the same device, all authentications can only be configured with the same
default domain or mandatory domain
B. When multiple access profiles are bound to the authentication profile, the order of triggering
authentication is 802.1X-->Portal-->MAC
C. If the user's mandatory domain is configured, the user will be forced to authenticate in the mandatory
domain regardless of whether the user name carries the domain name or not.
D. The domain that the user accesses by default is the default domain, which cannot be modified by
commands
Answer: C

223.In the VXLAN implementation, which of the following is the mapping relationship between VNI and
BD?
A. 1:1
B. N: 1
C. 1: N
D. N: M
Answer: A

224.Configure ISIS IPv6 cost 50 under the interface, which of the following is the meaning of this
command?
A. The IS-IS IPv6 Level-1 cost of the interface is 50
B. The IS-IS IPv6 Level-1 and Level-2 costs of the interface are both 50
C. The IS-IS IPv6 Level-2 cost of the interface is 50
D. The IS-IS IPv6 Level-1 and Level-2 costs of the interface are both 60
Answer: B

225.Which of the following MPLS L3VPN cross-domain solutions needs to transmit VPNv4 routes
between ASBR?
A. Option D
B. Option B
C. Option A
D. Option C
Answer: B

226.After configuring the VLAN-based MAC address flapping detection function, if the MAC address flaps,
you can configure the actions of the interface as required. Which of the following is NOT a configurable
action?
A. Interface blocking
B. Send an alert

56 / 149
The safer , easier way to help you pass any IT exams.

C. Traffic filtering
D. MAC address blocking
Answer: C

227.The value range of DSCP is 0~63, some of which have proper names.
Which of the following DSCP values represent EF?
A. 46
B. 30
C. 22
D. 38
Answer: A

228.The network administrator executes the display current-configuration command to obtain the
configuration file of the device when troubleshooting MSTP faults. In the following description of the
troubleshooting ideas, which one is the wrong?
A. Check the port configuration to check whether the MSTP-enabled port is enabled with the protocol
packet sending command. Such as bpdu enable
B. Whether the MSTP port connected to the user terminal device is disabled or configured as an edge
port
C. Check whether the device port is added to the correct VLAN
D. No matter whether BPDU Tunnel is configured on the device, it will not affect MSTP
Answer: D

229.All routers in a network enable the OSPF-based SR-MPLS function. The SRGB of each router is as
shown in the figure. By default, when R2 forwards a packet whose destination address is 10.0.4.4, which
of the following MPLS labels are carried?

A. 100
B. 40100
C. 30100
D. 3
Answer: B

230.Python Paramiko implements the SSH protocol. In the Python Paramiko module, which of the
following classes is used to create an SFTP session connection and perform remote file operations?
A. Channel class
B. SFTP Client class
C. Packetizer class
D. Transport class
Answer: B

57 / 149
The safer , easier way to help you pass any IT exams.

231.Which of the following statements about MP-BGP is wrong?


A. When the PE and CE exchange routes through BGP, a BGP process needs to be created on the CE
for each VPN instance
B. MP-BGP advertises VPNv4 routes through MP_REACHNLRI and MP_UREACH NLRI attributes
C. MP-BGP needs to assign private network labels to VPNv4 routes
D. The packet types and VPNv4 route advertisement policies of MP-BGP are the same as those of BGP-4
Answer: A

232.As shown in the figure, the OSPF protocol is running between CE and PE. When CE1 advertises the
route of this site to CE2, which one of the following descriptions is wrong?

A. When PE2 receives the BGP route sent from PE1 with the same Domain ID as the local one, for Type3
LSA, PE2 will generate Type5 LSA
B. The Domain ID configured on PE1 can be used as the BGP extension community attribute and sent to
PE2 along with the route
C. When PE2 receives a BGP route from PE1 with a different Domain ID from the local one, PE2 will
generate Type5 LSA or Type7 LSA for all LSA
D. When PE2 receives the BGP route sent by PE1 and carries the same Domain ID as the local one, for
Type1 LSA and Type2 LSA, PE2 will generate Type3 LSA
Answer: A

233.As shown in the figure is the output information of a network engineer when troubleshooting OSPF
faults. Based on this, which of the following reasons may cause the adjacency relationship to fail to be
established normally?

A. Inconsistency between Hello messages sent

58 / 149
The safer , easier way to help you pass any IT exams.

B. Inconsistent authentication passwords


C. The IP address mask of the interface is inconsistent
D. Inconsistent area types
Answer: C

234.As shown in the figure, the OSPF protocol is enabled on all interfaces of the router, the cost value of
the link is marked in the figure, and the Loopback0 interface of R2 is advertised in area 1.

Based on this, which one of the following is the cost of R1 reaching 10.0.2.2/32?
A. 50
B. 150
C. 200
D. 100
Answer: C

235.In the large and medium-sized virtualized campus network scenario, which of the following
descriptions about the security design of the campus network egress is wrong?
A. Special security devices such as firewalls and intrusion prevention systems can be deployed, and
routers with security functions can also be deployed
B. The exit area can deploy security policies and intrusion prevention to prevent illegal access and attacks
C. Anti-virus and URL filtering can be deployed in the exit area to realize virus detection and URL access
control
D. Security zone division is required, and the Trust zone is usually used to define the zone where the
servers that provide services are located.
Answer: D

236.Which of the following descriptions about Underlay in VXLAN virtualized campus applications is
wrong?
A. The virtualized campus solution uses VXLAN technology and uses MAC in UDP encapsulation to
virtualize a layer of logical network on the traditional IP network
B. When using iMaster NCE-Campus to realize automatic arrangement of two routing domains underlay,
only OSPF routing protocol is supported
C. When using astor NCE-Campus to realize the automatic arrangement of the routing domain of the
underlay network, only the single-area deployment of the routing protocol is supported

59 / 149
The safer , easier way to help you pass any IT exams.

D. Underlay achieves IP reachability with the same network, so that service packets encapsulated by
VXLAN can communicate with each other between VTEP nodes
Answer: C

237.Which of the following is the three-layer logical interface used to implement different VXLAN virtual
network communication on the XLAN L3 Gateway?
A. VBDIF interface
B. Layer 2 sub-interface
C. VLANIF interface
D. NVE interface
Answer: A

238.In the virtual campus network scenario deployed through iMaster NCE-campus, which of the
following statements about "adding devices" is wrong?
A. iMaster NCE-campus supports adding devices in batches
B. iMaster NCE-campus supports adding devices through device roles
C. iMaster NCE-campus supports adding devices through device ESN
D. iMaster NCE-campus supports adding devices by device type
Answer: B

239.When a wireless user passes Portal authentication, which of the following parameters is not
supported to authorize the user?
A. free-rule
B. UCL
C. IP address
D. ACL
Answer: A

240.Which of the following descriptions about the GRE security mechanism is wrong?
A. A GRE tunnel can be established only when the identification keywords set at both ends of the tunnel
are exactly the same
B. If the checksum is configured on the local end but not on the peer end, the local end will not check the
checksum of the received packets, but will check the sent packets.
C. If the key word is configured on the local end of the tunnel but not on the opposite end, the tunnel can
normally forward user packets
D. If the local end is configured with a checksum and the opposite end is configured, the local end checks
the checksum of the packets sent from the opposite end, and does not check the checksum of the sent
packets.
Answer: C

241.Network information collection is a prerequisite for network tuning, including network topology and
interface bandwidth collection, link delay collection, and traffic statistics collection. Which of the following
technologies cannot be used for volume statistics collection?
A. Telemetry

60 / 149
The safer , easier way to help you pass any IT exams.

B. PCEP
C. Netstream
D. SNMP
Answer: B

242.Which of the following technologies does not support SR-MPLS?


A. BGP
B. IS-IS
C. LDP
D. OSPF
Answer: C

243.Which of the following is correct about the meaning of the display current-configuration | include vlan
command?
A. View all configurations that contain the "VLAN" keyword
B. View the IP address of the VLANIF interface
C. View information about physical interfaces bound to each VLAN
D. Check which VLANs are currently created
Answer: A

244.Which of the following statements about VXLAN capabilities is true?


A. VXLAN uses MAC in UDP encapsulation mode.
B. VXLAN is essentially a VPN technology that can be used to build a Layer 2 virtual network over any
network with reachable routes. The VXLAN gateway is used to implement communication within the
VXLAN network and between the VXLAN network and non-VXLAN network.
C. VXLAN is a Layer 2 tunneling technology and cannot implement Layer 3 communication.
D. When using VXLAN on the network, all intermediate devices on the VXLAN channel must support
VXLAN.
Answer: A

245.In the Huawei CloudCampus solution, which of the following onboarding modes does APs support?
A. CloudCampus Application
B. Registration Center Inquiry
C. Network System
D. CLI
Answer: A

246.In a broadcast network, if the DR priority of the interconnecting interface of two routers is both set to 0,
which state will the OSPF neighbor stay in?
A. DOWN
B. Exchange
C.Full
D. 2-way
Answer: D

61 / 149
The safer , easier way to help you pass any IT exams.

247.Assume that the SRH of an SRv6 packet has five segment IDs. When a packet is sent from the third
endpoint, which segment ID will the node use as the IPv6 destination address?
A. 5
B. 3
C. 2
D. 1
Answer: B

248.The Huawei Open Programmable System (OPS) uses HTTP methods to access managed objects to
manage network devices. To facilitate script compilation, Huawei OPS provides Python script templates.
In a Python script template, what are the contents of the Content type and Accept fields in the HTTP
request packet header?
A. text/xml, text/json
B. text/xml, text/xsml
C. text/json, text/json
D. text/json, text/xml
Answer: B

249.Which of the following fields represents the MIME type of the data in the HTTP request header?
A. MIME-Type
B. Content-Type
C. Data-Type
D. Referer
Answer: B

250.Huawei's Open Programmable System (OPS) provides openness and programmability for network
equipment, and users can carry out secondary development to realize customized functions.
Which of the following commands can be used to view information about OPS scripts installed on network
devices?
A. display ops script
B. display ops file
C. check ops script
D. check ops file
Answer: A

251.During the implementation of iMaster NCE Campus Wi-Fi Location Service (LBS), terminal location
data is sent to the LBS platform through HTTP requests.
Which of the following methods is used in this HTTP request?
A. GET
B. PUT
C. POST
D. DELETE
Answer: A

62 / 149
The safer , easier way to help you pass any IT exams.

252.Which of the following scenarios is the SD-WAN solution suitable for?


A. Enterprise branch interconnection
B. Internal interconnection of enterprise data center network
C. Enterprise Campus Wireless Network Deployment
Answer: A

253.When running OSPFv3 on a Huawei router, the OSPFv3 process will automatically select an
interface address as the router ID of the process.
A. True
B. False
Answer: B

254.OSPFv3 adopts the same route advertisement method as OSPFv2: advertise through the network
command in the OSPFv3 area view
A. True
B. False
Answer: B

255.What are the key components of jointly building an IP WAN bearer network solution with Huawei
NetEngine smart routers?
A. iMaster NCE-Fabric
B. iMaster NCE-IP
C. iMaster NCE-Campus
D. iMaster NCE-WAN
Answer: D

256.As shown in the figure, a campus has deployed IPv6 for service testing, and there are 4 routers in the
network. Run OSPFV3 to realize network interconnection.

Which of the following statements is false about the LSA generated by this OSPFV3 network?
A. R1 will generate Router-LSA to describe the device interface information, and will also receive
Router-LSA generated by R2 and R3

63 / 149
The safer , easier way to help you pass any IT exams.

B. There is a Network LSA generated by R3 in the LSDB of R1, indicating that R3 may be the DR of this
link
C. R1 will receive 2 Link-LSAs generated by R2, describing the information of the two links connected by
R2 respectively
D. As an ABR, R2 will generate an Inter-Area-Prefix-LSA describing the IPv6 address prefix of Area 1 and
advertise it to R1 and R3
Answer: C

257.Which of the following is not a preliminary preparation for the cutover plan?
A. Field Defence
B. Cutover target
C. Existing network root description
D. Risk Assessment
Answer: A

258.The dynamic IP address assigned to the client by the DHCP server. Usually there is a certain rental
period, so which is wrong description of the rental period?
A. The lease renewal timer is 50% of the total lease period. When the "lease renewal timer" expires, the
DHCP client must perform an HP-only renewal
B. The rebinding timer is 87.5% of the total lease period
C. If the "rebinding timer" expires but the client has not received a response from the server, it will always
send a DHCPREQUEST message to the DHCP server that has previously assigned an IP address until
the total lease expires
D. During the lease period, if the client receives an OHCP NAK message, the client will immediately stop
using this IP address and return to the initialization state, and Kangxin will apply for a new IP address
Answer: C

259.In a VXLAN campus network, which of the following resources can a virtual network call? (Multiple
Choice)
A. External network
B. Wired Access Port and/or Wireless Access Point
C. End user IP address segment, VANL belonging to the VN
D. Web Services Resources
Answer: ABCD

260.If SRv6 is deployed in a wide area bearer network, which of the following technologies are required?
(Multiple Choice)
A. BGP
B. MPLS
C. IGP
D. BGP-LU
Answer: ACD

64 / 149
The safer , easier way to help you pass any IT exams.

261.The naming of SRv6 instructions follows certain rules, and the function of the instruction can be
quickly judged from the naming combination.
Which of the following descriptions of keywords in SRv6 directive names are correct? (Multiple Choice)
A. M: Query the Layer 2 forwarding table for unicast forwarding
B. X: Specify one or a group of Layer 3 interfaces to forward packets
C. T: Query the routing table and forward the packet
D. V: Look-up table forwarding according to the VPN instance routing table
Answer: BC

262.The Telemetry network model is divided into two types: generalized and chivalrous. What horizontal
blocks are included in generalized Telemetry? (Multiple Choice)
A. Controller
B. Analyzer
C. Equipment
D. Collector
Answer: ABCD

263.The SSH connection protocol multiplexes encrypted session connections into several logical
channels. What types of logical channels can be created based on an SSH session connection? (Multiple
Choice)
A. TCP/IP forwarding channel
B. X11 channel
C. SFTP channel
D. Session channel
Answer: ABD

264.Which of the following are commonly used techniques for the differentiated service model? (Multiple
Choice)
A. Congestion management techniques
B. Flow rate limiting technology
C. WAN Acceleration Technology
D. Congestion Free Technology
Answer: ABD

265.In MPLS VPN, in order to distinguish IPv4 prefixes that use the same address space, the RD value is
added to the IPv4 address. Which of the following statements about RD is correct? (Multiple Choice)
A. On a PE device, each VPN instance corresponds to an RD value. On the same PE device, the RD
value must be unique.
B. RD is encapsulated in the Update message as the extended community attribute of BGP during the
delivery process
C. RD can be used to control the publication of VPN routing information
D. After the PE receives the IPv4 route from the CE, it adds RD to the IPv4 route to convert it into a
globally unique VPN-IPv4 route, and publishes it on the public network
Answer: AD

65 / 149
The safer , easier way to help you pass any IT exams.

266.Which of the following statements about MPLS L3VPN cross-domain solutions are correct? (Multiple
Choice)
A. In the cross-domain potion B solution, ASBR does not need to bind an interface for each VPN instance
B. In the cross-domain potion C solution, two layers of MPLS labels are carried when forwarding user
data between ASBR
C. In the cross-domain potion A solution, MPLS must be enabled on the interfaces interconnected
between ASBRs
D. In the cross-domain potion C solution, VPNv4 routes can be directly transmitted between PEs in
different AS
Answer: ABD

267.Telemetry technology supports specific sampling sensor paths to collect specified data information.
What sampling paths does Telemetry currently support? (Multiple Choice)
A. CPU Information
B. Interface Statistics
C. Memory Information
D. Optical module information on the interface
Answer: ABCD

268.As shown in the figure, the MAC address table of a VXLAN L2 Gateway device is shown. Which of
the following description are correct? (Multiple Choice)

A. The outgoing interface of 5489-922d-77e2 is GE1/0/1.20 and its BD is 20. It can directly communicate
with 5489-9893-48a3 at Layer 2
B. 0000-0000-0010 and 5489-9893-48a3 are both in BD10, they belong to the same Layer 2 broadcast
domain
C. The MAC address entry with the outgoing interface 10.3.3.3 is learned from the remote VTEP through
the VXLAN tunnel
D. The outgoing interface of 5489-9893-48a3 is GE1/0/1.10, and its BD is 10
Answer: BD

269.The channelized sub-interface FlexE technology can be used to implement network slicing, but the
application scenarios of the two technologies are slightly different.

66 / 149
The safer , easier way to help you pass any IT exams.

Which of the following descriptions of these two technologies is correct? (Multiple Choice)
A. It is recommended to use channelized interface technology for resource reservation for interfaces
below 50GE
B. Only network slices based on channelized sub-interfaces can be deployed when cross-domain MSTP
devices are used in the network
C. Only network slicing based on FlexE technology can be deployed when TN devices are deployed in the
network
D. It is recommended to use FlexE technology for resource reservation on 50GE and above interfaces in
the network
Answer: ABD

270.As shown in the figure, R1 and R2 establish a GRE tunnel, and execute "Ping-a 10.1.1.1 10.3.1.1" on
R1. At this time, the description of the ICMP packet sent from the GE0/0/1 interface of R1, which is wrong?
(Multiple Choice)

A. The packet will be encapsulated with GRE, the source IP address of the inner IP header is 10.1.1.1,
and the destination IP address of the inner IP header is 10.0.12.2
B. The packet is not encapsulated by GRE, the source IP address is 10.0.12.1, and the destination IP
address is 10.0.12.2
C. The packet is not encapsulated by GRE, the source IP address is 10.1.1.1, and the destination IP
address is 10.3.1.1
D. The packet will be encapsulated with GRE, the source IP address of the outer IP header is 10.1.12.1,
and the destination IP address of the outer IP header is 10.3.1.1
Answer: ABCD

271.The following descriptions about IKEv1 are summarized, which items are correct? (Multiple Choice)
A. There are two negotiation modes in the first phase of IKE: Main Mode and Aggressive Mode
B. IKE Phase 2 negotiation to establish IPSec SA
C. The first phase of IKE negotiation to establish an IKE SA
D. There are two negotiation modes in the second phase of IKE, fast mode (Quick M de) and slow mode
Answer: AB

67 / 149
The safer , easier way to help you pass any IT exams.

272.Which of the following descriptions about the Portal protocol are correct? (Multiple Choice)
A. This protocol describes the protocol interaction between the Portal server and the access device, and
can be used to pass parameters such as username and password
B. The protocol adopts a client/server structure and operates based on UDP
C. The protocol supports CHAP and PAP authentication methods. Compared with PAP, CHAP has higher
security
D. The protocol packet uses TLV format to carry attribute information such as username, password, and
user MAC.
Answer: ABCD

273.View the information as shown in the figure through the command on VTEP1, which one of the
following descriptions is correct? (Multiple Choice)

A. The route must carry L3 VNI information when it is advertised to the outside world
B. This is an EVPN Type 5 route
C. This is an EVPN Type 3 route
D. The route carries both MAC information and host IP information
Answer: ACD

274.As shown in the figure, the network has a loop because STP is not enabled. Which of the following
phenomena may be caused? (Multiple Choice)

68 / 149
The safer , easier way to help you pass any IT exams.

A. MAC address table flapping


B. Host E can receive a large number of broadcast packets
C. Device CPU usage is too high
D. The device will have a loop alarm
Answer: ABCD

275.After completing the project investigation, in order to clarify the project cutover plan, what needs of
the customer for the network need to be understood? (Multiple Choice)
A. Packet Loss Rate
B. Bandwidth Utilization
C. New business carrying capacity
D. QS
Answer: BC

276.In the VXLAN scenario, in order to reduce the flooding of ARP packets between VTEP, which of the
following features can be enabled? (Multiple Choice)
A. Port isolation
B. Host Information Collection
C. APR broadcast suppression
D. Local APR Proxy
Answer: ACD

277.In a virtualized campus network scenario deployed through iMaster NCE-Campus, when creating a
Fabric network service resource, the parameter information that needs to be configured, including which
of the following? (Multiple Choice)
A. Interconnected Information
B. Server Type
C. Scene Selection
D. Server address
Answer: ACD

69 / 149
The safer , easier way to help you pass any IT exams.

278.A campus network deploys the Free Mobility function through iMaster NCE-Campu. Which of the
following information should the administrator pay attention to? (Multiple Choice)
A. Distribution of policies between groups
B. Definition of Security Groups
C. Selection of Policy Enforcement Points
D. Deployment of the Policy Control Matrix
Answer: ABCD

279.A router has the SRv6 function enabled and is configured as shown in the figure.
Which of the following descriptions about the configuration are correct? (Multiple Choice)
[Router-segment-routing ipv6] locator srv6_locator1 ipv6-prefix
2001:DB8:ABCD::64 static 32
A. The l cat r of this node is 2001:DB8:ABCD::
B. The static segment of the node occupies 32 bits
C. The dynamic segment of the node occupies 32 bits
D. The args field of the node occupies 32 bits
Answer: AD

280.The NETC NE content layer is the device configuration data. For the following NETC NEF information,
which description are correct? (Multiple Choice)

A. The configuration adopts the Huawei-YANG method


B. The configuration is to create VLAN 10 on the device
C. The configuration uses the NETCONF <edit-config> operation to load the configuration data into the
startup configuration library
D. <config> contains the "peration" attribute, which is a merge operation
Answer: ABCD

70 / 149
The safer , easier way to help you pass any IT exams.

281.The SSH server has been configured and correct. Which of the following Python codes can be run on
the SSH client to successfully establish an SSH connection (the private key file is id_rsa, which is in the
same path as the client station Python script)? (Multiple Choice)
A. import paramiko
Client-paramiko.client.SSHClient()
Client.connect(hostname='192.168.1.1', username='huawei', key filename='id_rsa')
B. import paramiko
Client-paramiko.client.SSHclient()
Client.connect(hostname='192.168.1.1', username='huawei', pkey='id_rsa)
C. import paramik
Client = paramik.Transp rt(('192.168.1.1', 22))
Client.connect(username='huawei', key_filename='id_rsa')
D. import paramiko
Key=paramiko.RSAKey.from_private_key_file('id_rsa')
Client = paramiko.Transport(('192.168.1.1', 22))
Client.connect(username='huawei', pkey=key))
Answer: BD

282.Engineers need to collect the running status of existing network equipment. Currently, there is a
Huawei CE12800 switch with an SSH server configured on the live network. The authentication method is
username and password authentication. The device information is IP address: 192.168.1.1, SSH
username: huawei, SSH password: 123456, and SSH slogan: 22.
Engineers need SSH to log in to the switch to check the memory usage of the device. Which of the
following Python codes can implement this function? (Multiple Choice)
A. import paramiko
Client = paramiko.client.SSHClient()
Client.connect(hostname='192.168.1.1', username='huawei', password='123456')
stdin, stdout, stderr = client.exec_command('display memory')
print(stdout)
Client.close()
B. import paramiko
Client = paramiko.Transport(('192.168, 1.1', 22)
Client.connect(username='huawei', password='123456')
Cli = client.inv ker_she11()
Cli.send('display memory\n')
Dis = clli.recv(999999).dec de()
Cli.cl se()
C. imp rt paramiko
Client = paramiko.Transp rt(('192.168.1.1', 22)
Client.connect(username='huawei', passw rd='123456')
stdin, stdout, stderr = client.exec_command('display memory')
Result=std ut.resd()
For line in result:
Print(line)

71 / 149
The safer , easier way to help you pass any IT exams.

Ssh.close()
D. import paramiko
Client = paramiko.client.SSHClient()
Client.connect(h stname='192.168.1.1', username='huawei', password='123456')
Cli = client.inv ker_she11()
Cli.send('display memory\n')
Dis = clli.recv(999999).dec de()
Print(dis)
Cli.close()
Answer: CD

283.There is a Linux SSH server on the existing network. The network administrator uses his own PC
SSH to log in to the server for the first time and receives the following information. Which of the following
descriptions are correct?
The authenticity of host'server (192.168.1.1) can't ba establfished.ECDSA key fingerprint is
53:b9:f9:30:67:ec:34:88:e8:bc:2a:a4:6f:3e :97:95.
Are you sure you want to continue conneacting? (Multiple Choice)
A. The client does not save the public key of the Linuk server
B. The prompt information can be skipped through the SSH method in the Python Paramik library,
set_missing_host_key_policy (WarningPolicy()
C. This prompt can be skipped by the SSH method in the Python Paramik library,
set_missing_host_key_policy(Aut AddPolicy())
D. The client does not save the private key of the Linux server
Answer: AC

284.Which of the following reasons may cause BGP neighbor relationship failure? (Multiple Choice)
A. The loopback interface is used to establish an EBGP neighbor without peer ebgp-max-hop configured
B. ACL filters TCP port 179
C. The peer connect-interface is not configured when establishing neighbors through the loopback port
D. Conflict of router ID of neighbors
Answer: ABCD

285.The network administrator wants to use AS-Path Filter to match the routing entries of BGP routing
ASP_PATH[100 200 300]. The network administrator sorts out the four configurations in the figure, which
configurations in the figure can meet the requirements of the network administrator? (Multiple Choice)

A. Method D
B. Method C
C. Method A
D. Method B

72 / 149
The safer , easier way to help you pass any IT exams.

Answer: ACD

286.Please judge according to the information given in the figure, which of the following descriptions are
correct? (Multiple Choice)

A. There is no IS-IS routing entry in R1's IP routing table


B. There are 6 routing entries generated by IS-IS in the IP routing table of R1
C. A route entry with prefix 172.16.1.4/32 exists on R1
D. R1 has no route entry to 172.16.1.4/32
Answer: BC

287.After the client passes 802.1X authentication, which of the following authorization information does
the RADIUS server support? (Multiple Choice)
A. VLAN
B. MAC
C. UCL group
D. ACL
Answer: ACD

288.Which of the following are the intelligent operation and maintenance functions supported by the
Huawei Cloud Campus Network Solution? (Multiple choice)
A. Based on big data + AI, providing predictive intelligent tuning capabilities
B. Based on Telemetry technology, monitor the network quality on the wireless side from three
dimensions: AP, radio, and user
C. Ability to analyze network failures based on individual and group problems
D. Visually monitor network quality through network health
Answer: ABCD

289.IPsec is not a separate protocol, but an open standard technical solution. Which of the following
protocols are included in the IPsec protocol framework? (Multiple choice)
A. PKI
B. AH
C. SSL
D. ESP
Answer: ABD

73 / 149
The safer , easier way to help you pass any IT exams.

290.All routers in a network enable the OSPF-based SR-MPLS TE function, as shown in the figure for the
network diagram of adjacency label assignment. Which of the following adjacency labels are assigned by
router P3? (Multiple choice)

A. 9003
B. 9005
C. 9006
D. 9002
Answer: CD

291.Which of the following descriptions about Prefix Segment and Adjacency Segment are correct?
(Multiple choice)
A. Prefix Segment is used to identify a destination address prefix in the network
B. Adjacency Segment is used to identify an adjacency in the network
C. Prefix SID is a local SID outside the SRGB range
D. Adjacency SID is the offset value within the SRGB range published by the source
Answer: AB

292.Taking the typical networking of "two places and three centers" as an example, which of the following
levels are generally divided into the WAN bearer network? (Multiple choice)
A. Control layer
B. Core layer
C. Aggregation layer
D. Access layer
Answer: BCD

293.What information carried in the packet does simple flow classification support setting the internal
priority of a packet based on? (Multiple choice)

74 / 149
The safer , easier way to help you pass any IT exams.

A. Traffic Class
B. Source or destination IP address
C. MPLS EXP
D. DSCP
Answer: CD

294.Which of the following functional parameter configuration errors will affect the establishment of BGP
neighbors? (Multiple choice)
A. BGP Certification
B. BGP GTSM
C. ebgp max hop
D. BGP route filtering
Answer: ABC

295.Which of the following descriptions about internal priority is wrong? (Multiple choice)
A. The highest internal priority level is EF
B. The highest internal priority level is CS7
C. All external priority garbage can be mapped one-to-one to internal priority
D. There are 8 levels of internal priority
Answer: AC

296.SR MPLS directly uses the forwarding plane of MPLS. Therefore, the MPLS function needs to be
enabled when deploying SR MPLS. When which of the following conditions are met, the interface will
automatically enable the MPLS function? (Multiple choice)
A. Enable Segment Routing in the global view
B. Configure the static adjacency label of the corresponding interface in the Segment Routing view
C. Enable Segment Routing on IGP and enable IGP on the interface
D. Configure SRGB under the IGP process
Answer: AD

297.An enterprise's wide-area bearer network needs to support IPv4 and IPv6 networks, and needs to
deploy SRv6, which of the following parameters need to be planned when planning the IP address of the
network? (Multiple choice)
A. IPv6 address
B. IPv4 address
C. SRv6 Locator
D. SRv6 Function
Answer: ABCD

298.In order to ensure the reliability of Huawei iMlater NCE-WAN controllers, active and standby
controllers can be deployed.
In order to ensure the access of the active and standby controllers, some IP addresses need to be
configured as the same IP. Which of the following addresses need to be configured as the same IP?
(Multiple choice)

75 / 149
The safer , easier way to help you pass any IT exams.

A. Southbound private address


B. Northbound address
C. The controller's southbound public network address
D. The Controller's internal interconnection address
Answer: BC

299.RR rules for advertising routes violate the rules of IBGP split horizon, so it may cause loops in the AS.
What routing attributes does RR use to prevent loops? (Multiple choice)
A. Cluster List
B. Originator ID
C. Nexthop
D. AS-PATH
Answer: AB

300.In a small and medium-sized cloud management campus network scenario based on HUAWEI
CLOUD campus network solution, which of the following devices are supported as Portal authentication
point devices? (Multiple choice)
A. FW
B. SW
C. AR
D. AP
Answer: ABCD

301.NETCONF can flexibly read and edit the configuration library, and realize the distribution, verification
and rollback of the overall configuration. Which of the following configuration libraries does NETCONF
support? (Multiple choice)
A. Startup configuration library <startup>
B. Running Configuration library <running>
C. Candidate configuration library <candidate>
D. Backup configuration library <backup>
Answer: ABC

302.A network runs SR-MPLS, and now R1 wants to access R7, and its label stack is as shown in the
figure.

Which of the following may be the path for R1 to access R7? (Multiple choice)
A. R1-R3-R5-R7

76 / 149
The safer , easier way to help you pass any IT exams.

B. R1-R2-R4-R6-R7
C. R1-R3-R5-R4-R7
D. R1-R2-R4-R5-R7
Answer: BD

303.In an SR-MPLS network, the manually configured Prefix SIDs on different devices may conflict with
labels.
If there are four routes (prefix/mask SID) as shown in the options, which of the following routes will be
preferred in the end according to the conflict handling principle? (Multiple choice)
A. 3.3.3.3/32 1
B. 1.1.1.1/32 2
C. 1.1.1.1/32 1
D. 2.2.2.2/32 3
Answer: CD

304.As shown in the figure, R1 and R2 establish a GRE tunnel. If it is required that the R1 device "Ping -a
10.1.1.1 10.3.1.1" can be successfully pinged, which of the following commands needs to be configured
on R1 or R2? (Multiple choice)

A. Configure the following command on R1, "ip route-static 10.3.1.1 255.255.255.255 10.0.12.2";
Configure the following command on R2, "ip route-static 10.1.1.1 255.255.255.255 Tunnel0/0/0"
B. Configure the following command on R1, "ip route-static 10.3.1.1 255.255.25.255 Tunnel0/0/0";
Configure the following command on R2, "ip route-static 10.1.1.1 255.255.255.255 Tunnel0/0/0"
C. Configure the following command on R1, "ip route-static 10.3.1.1 255.255.255.255 10.0.12.2";
Configure the following command on R2, "ip route-static 10.1.1.1 255.255.255.255 10.0.12.1"
D. Configure the following command on R1, "ip route-static 10.3.1.1 25.255.255.255 Turnel0/0/0";
Configure the following command on R2, "ip route-static 10.1.1.1 255.255.255.255 10.0.12.1"
Answer: ABCD

305.According to the information given in the figure, which of the following descriptions are correct?
(Multiple choice)

77 / 149
The safer , easier way to help you pass any IT exams.

A. R1 does not have routes for 3002::3/128 and 3002::4/128


B. If no routing policy about AS_Path is configured, then 3002::4/128 must not originate from AS 65001
C. If no routing policy about AS_Path is configured, then 3002::4/128 must originate from AS 65001
D. R1 has routes for 3002::3/128 and 3002::4/128
Answer: CD

306.ping -a X -c Y -s Z -vpn-instance M 10.5.16.2, which of the following descriptions of this command is


correct? (Multiple choice)
A. The ping packet belongs to VPN instance M
B. The ping sends Y ICMP requests
C. The source IP address of the ping packet is X
D. The ICMP request of the ping, the packet size is Z (excluding IP and ICMP headers)
Answer: ABCD

307.Which LSAs in OSPFv3 can be flooded within an area? (Multiple choice)


A. Link-LSA
B. Intra-Area-Prefix-LSA
C. Inter-Area-Router-LSA
D. Inter-Area-Prefix-LSA
Answer: BCD

308.Which of the following key technologies need to be used to implement SRv6 Policy based on the
HUAWEI CLOUD WAN solution architecture? (Multiple choice)
A. PCEP
B. NETCONF
C. BGP-LS
D. BGP IPv6 SR Policy
Answer: ACD

78 / 149
The safer , easier way to help you pass any IT exams.

309.Which of the following stages of the SSH session is encrypted transmission? (Multiple choice)
A. Version Negotiation Phase
B. User Authentication Phase
C. Key Exchange Phase
D. Session Interaction Phase
Answer: BCD

310.What are the risks in the communication process of the HTTP protocol? (Multiple choice)
A. Tampering: The third party can modify the content of communications
B. Eavesdropping: The third party can learn the content of communications
C. Losting: communication content may be lost with a small probability during transmission
D. Pretending: the third party can impersonate another person to participate in the communication
Answer: ABD

311.A campus has deployed IPv6 for service testing. There are 4 routers in the network, running OSFv3
to realize the interconnection of IPv6 networks. As shown in the figure, an engineer checked the LSDB of
R2 and intercepted one of the Link-LSAs.

Which of the following statements about the LSA is correct? (Multiple choice)
A. The LSA shows that R2 does not support external routing, but participates in IPv6 routing calculation
B. The link-local address of the R2 interface GE0/0/0 is: FE80::2E0:FCFF:FECD:4F79
C. The router that generated the LSA is R2
D. The IPv6 address prefix of the R2 interface GE0/0/0: 2001:DB8:2345:23::/64
Answer: BCD

312.Which of the following descriptions about the OSPFv3 packet format are correct? (Multiple choice)
A. There is no change in the option field of the Hello message
B. Removed Authentication, Auth Type fields
C. OSPF version number changed from 2 to 3
D. Hello packets no longer contain address information and carry Interface ID
Answer: BCD

313.In the HUAWEI CLOUD campus network solution, which of the following are the deployment

79 / 149
The safer , easier way to help you pass any IT exams.

methods supported by HUAWEI switches? (Multiple choice)


A. WEB interface
B. Based on DHCP Option148
C. Command Line Interface (CLI)
D. Huawei Registration and Inquiry Center
Answer: ABCD

314.According to the information given in the figure, which of the following descriptions are correct?
(Multiple choice)

A. R1 is IBGP neighbor with 3000:FDEA::3


B. The optimal outgoing interface for R1 to access 3000:FDEA::3 is GigabitEthernet0/0/1
C. R1 has a TCP connection with 3000:FDEA::3
D. R1 learned route 3002::3/128 through IBGP
Answer: ACD

315.Which of the following descriptions about 802.1X authentication are correct? (Multiple choice)
A. 802.1X authentication uses EAPoL (Extensible Authentication Protocol over LAN) to realize the
exchange of authentication information between the client, the device and the authentication server
B. EAPoL defines EAP encapsulation on a network using the IEEE 802.3 protocol, and EAPoW is
required to implement EAP encapsulation on a network using the IEEE 802.11 protocol
C. When using EAP relay mode, EAP packets are directly encapsulated into RADIUS packets (EAP over
RADIUS, referred to as EAPoR) by the network access device, and the network access device uses
EAPoR to perform authentication, authorization and accounting with the AAA server. fee
D. When the EAP termination method is used, the EAP packets are terminated at the network access
device and re-encapsulated into RADIUS packets. The standard RADIUS protocol is used to complete
authentication, authorization and accounting between the network access device and the AAA server.
Answer: ABC

80 / 149
The safer , easier way to help you pass any IT exams.

316.In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, run the command
on the VTEP to view the BGP EVPN route, and see the route entry as shown in the figure. Which of the
following descriptions of these route entries are correct? (Multiple choice)

A. These route entries are all Type3 routes. which carries the VTEP IP address
B. These route entries are all Type2 routes. It carries the host IP information
C. These routing entries are all Type 3 routes. If the VTEP IP address carried in them is reachable with a
Layer 3 route, a VXLAN tunnel to the peer will be established.
D. These route entries are all Type3 routes. The local end will create a headend replication list after
receiving it
Answer: ACD

317.Which of the following descriptions about the security protocols used by IPsec are correct? (Multiple
choice)
A. The encryption range of ESP is the entire IP packet
B. ESP is an IP-based transport layer protocol with protocol number 50
C. Both AH and ESP support tunnel mode encapsulation
D. The integrity verification scope of AH is the entire IP packet
Answer: BCD

318.Network traffic optimization solves network congestion through a series of behaviors, which of the
following stages are mainly included? (Multiple choice)
A. Network bandwidth reservation
B. Network Information Collection
C. Network Traffic Tuning Calculations
D. Delivery of tuning results
Answer: ABCD

319.Which of the following descriptions about HTTP messages are correct? (Multiple choice)
A. The body of the HTTP response message is the data that the web server wants to return to the client
B. Header fields are used to supplement additional information about HTTP requests and responses
C. The start line is used to describe the execution result in the HTTP request message, and the operation
to be performed is described in the response message
D. The body of the HTTP request message is the data that the client wants to send to the Web server
Answer: ABCD

81 / 149
The safer , easier way to help you pass any IT exams.

320.Which of the following descriptions about the forwarding of the Ingress node in the MPLS forwarding
process are correct? (Multiple choice)
A. Find the corresponding NHLFE entry according to the Turn1 ID of the ILM table, and associate the
LFIB entry with the NHLFE entry
B. View the NELFE entry, you can get the outgoing interface, next hop, outgoing label and label operation
type, the label operation type is Push
C. After the Ingress node receives the data packet, it will first check the ILM table to find the Tunnel ID
D. Press the obtained label into the IP packet, process EXP according to the QoS policy, and process the
TTL at the same time, and then send the encapsulated MPLS packet to the next hop
Answer: BD

321.Which of the following descriptions about the REST software architecture design concepts and
principles are correct? (Multiple choice)
A. Each resource has a unique resource identifier, and operations on the resource will not change these
identifiers
B. All operations are stateless
C. Everything on the web can be abstracted as resources
D. Use standard methods to operate resources, the core operations are GET, PUI, POST, DELETE
defined by the HTTP specification
Answer: CD

322.Configuring DHCP Snooping can be used to prevent spoofing attacks. Which of the following steps
should be included in the configuration process? (Multiple choice)
A. Enable the global DAI Snooping function
B. Enable the global DHCP function
C. Enable DHCP Snooping on an interface or VLAN
D. Configure the interface trust state
Answer: ABCD

323.Which of the following descriptions about the multicast addresses used by OSFFv3 are correct?
(Multiple choice)
A. The DR router uses FF08::6
B. The DR router uses FF2::6
C. All OSFF Routers use FF02::5
D. All OSPF Routers use FF08:5
Answer: BC

324.A network administrator wants to use ACLs to match specific routing entries. Which of the following
routing entries will be matched by the ACL rules in the figure? (Multiple choice)

82 / 149
The safer , easier way to help you pass any IT exams.

A. 10.0.0.0/24
B. 10.0.2.0/24
C. 10.0.0.1/32
D. 10.0.1.0/24
Answer: AB

325.The following figure shows the MPLS VPN cross-domain Option C solution. In the scenario where RR
exists within the domain, if Option C mode 1 is used, which of the following descriptions about the
neighbor relationship between devices are correct? (Multiple choice)

A. Establish a unicast BGP neighbor relationship between RR1 and RR2


B. Establish a VPNv4 neighbor relationship and a unicast BGP neighbor relationship simultaneously
between PE1 and RR1
C. Establish a VPNv4 neighbor relationship between RR1 and RR2
D. Establish a VPNv4 neighbor relationship and a unicast BGP neighbor relationship between ASBR1
and ASBR2 at the same time
Answer: BC

326.The Discovery message of LDP is used for neighbor discovery, and LDP has different discovery
mechanisms when discovering neighbors, so which of the following descriptions of the Discovery
message in the discovery mechanism are correct? (Multiple choice)
A. This message is encapsulated in a UDP packet, and the destination port number is 646
B. The destination IP address of the message is the multicast IP address 224.0.0.2
C. After the TCP connection is established, the LSR does not continue to send Hello Message
D. The message is sent to the specified LDP Peer
Answer: AB

327.A campus deploys the OSPF protocol to achieve network interoperability, and the LSDB information
of R2 is shown in the figure.

83 / 149
The safer , easier way to help you pass any IT exams.

Which of the following information from this LSDB is correct? (Multiple choice)
A. R2 delivers the default route in the OSPF process
B. R2 converts the default route of Type7 LSA to the default route of Type5 LSA
C. There is no Type3 LSA in Area1, it may be that R2 has filtered the Type3 LSA in the outbound direction
of Area1
D. Area1 is the NSSA area
Answer: AD

328.In the VXLAN scenario, in order to reduce the flooding of ARP packets between VTEPs. Which of the
following features can be enabled? (Multiple choice)
A. ARP broadcast suppression
B. Host Information Collection
C. Local ARP proxy
D. Port isolation
Answer: ABC

84 / 149
The safer , easier way to help you pass any IT exams.

329.Which of the following reasons may cause OSPF neighbors to fail to reach the Full state? (Multiple
choice)
A. The router IDs of the neighbors are the same
B. The link works abnormally
C. The OSPF network types at both ends of the link are inconsistent
D. Interface OSPF MTU configuration are different
Answer: ABCD

330.Which of the following reasons may cause IS-IS neighbor relationship failure? (Multiple choice)
A. The IP addresses of the interfaces at both ends of the storage route are not in the same network
segment
B. The devices on both ends of the link are configured with the same System ID
C. The IS-IS Levels at both ends of the link do not match
D. When an interface establishes an IS-IS Level-1 neighbor relationship, the area numbers of the devices
at both ends of the link do not match.
Answer: BCD

331.Which of the following Commmity attributes can ensure that the propagation scope of EGP routing
entries is only within the AS? (Multiple choice)
A. No_Export_Subconfed
B. No_Export
C. Internet
D. No_Advertise
Answer: AB

332.In an intra-domain MPLS VPN network, when a data packet enters the public network and is
forwarded, it will be encapsulated with two layers of MPLS labels.
Which of the following descriptions about the two-layer label is wrong? (Multiple choice)
A. The outer label is used to correctly send the data packet to the corresponding VPN on the PE device
B. The outer label of MPLS VPN is assigned by LDP or statically, and the inner label is assigned by the
MP-BGP neighbor of the opposite end
C. By default, the outer label is popped before the packet is forwarded to the last hop device
D. The outer label of MPLS VPN is called the private network label, and the inner label is called the public
network label
Answer: AD

333.When configuring an SFTP server on Huawei devices, which of the following commands are not
required (the server uses user Name and password authentication, user name: huawei, password:
123456)? (Multiple choice)
A. [Server] ssh user huawei authentication-type rsa
B. [Server] ssh server enable
C. [Server] aaa
[Server-aaa] local-user huawei password irreversible-cipher 123456
[Server-aaa] 1ocal-user huawei user-group manage-ug

85 / 149
The safer , easier way to help you pass any IT exams.

[Server-aaa] 1ocal-user huawei service-type ssh


[Server-aaa] quit
D. [Server] sftp server enable
Answer: AB

334.Which of the following technologies may be used to improve the reliability of the bearer network?
(Multiple choice)
A. BFD/SBFD
B. PIM-SM
C. Anycast FRR
D. Mirror SID
Answer: ACD

335.In which of the following ways can traffic be introduced into the SR-MPLS TE tunnel? (Multiple
choice)
A. In the execution statement of policy routing, use the SR-MPLS TE tunnel interface as the outgoing
interface
B. Use the SR-MPLS TE tunnel as a logical link to participate in IGP routing calculation
C. By configuring the tunnel policy
D. By configuring a static route, specify the outgoing interface of the static route as the tunnel interface of
SR-MPLS TE
Answer: ABCD

336.In the Huawei SD-WAN solution, which of the following items are included in the information
transmitted using EVPN? (Multiple choice)
A. IPsec SA Information
B. NAT Configuration information
C. TNP routing
D. Business Routing
Answer: ACD

337.A company consists of a head office and two branch offices, and uses MPLS VPN technology to
transmit private network routes. In the Hub&Spoke networking mode, branch offices can only send and
receive routes to and from the head office, and branch offices cannot directly send and receive routes to
each other.
Which of the following RT setup schemes can achieve the above requirements? (Multiple choice)
A. Head Office
Import Target: 12:3 Export Target: 3:12 Branch 1:
Import Target: 3:12 Export Target: 12:3 Branch 2:
Import Target: 3:12 Export Target: 12:3
B. Head Office:
Import Target: 1:1, 2:2 Export Target: 3:3
Branch 1:
Import Target: 3:3 Export Target: 1:1 Branch 2:

86 / 149
The safer , easier way to help you pass any IT exams.

Import Target: 3:3 Export Target: 2:2


C. head office
Import Target: 1:1 Export Target: 3:3 Branch 1:
Import Target: 3:3 Export Target: 1:1 Branch 2:
Import Target: 3:3 Export Target: 2:2
D. Head Office:
Import Target: 2:2 Export Target: 3:3 Branch 1:
Import Target: 3:3 Export Target: 1:1 Branch 2:
Import Target: 3:3 Export Target: 2:2
Answer: AB

338.As shown in the figure, if you want to realize that the network does not allow users to access the
network through statically configured IP addresses, which of the following solutions can be used?
(Multiple choice)

A. DAI+IPSG
B. DHCP Snooping+IPSG
C. DAI+Port Security
D. DHCP Snooping+DAI
Answer: BC

339.A campus network deploys two virtual networks through iMaster NCE-Campus: the R&D VN and the
market VN. The R&D personnel belong to the R&D security group and access the R&D VN, and the sales
personnel belong to the sales security group and access the market VN.

87 / 149
The safer , easier way to help you pass any IT exams.

Now the campus network requires R&D personnel and sales personnel to be able to achieve mutual visits.
For the realization of mutual visit requirements, which of the following tasks should network administrators
complete? (Multiple choice)
A. Deploying an external network
B. Configuring VN Interworking
C. Deployment Policy Control Matrix
D. Configure network service resources
Answer: BC

340.In the accompanying business, which of the following descriptions of authentication points and policy
enforcement points are correct? (Multiple choice)
A. The authentication point device will execute the policy according to the source/destination security
group corresponding to the source/destination IP address of the traffic
B. Authentication point and policy enforcement point can be different devices
C. Authentication point and policy enforcement point must be unified
D. The policy enforcement point is responsible for enforcing inter-group policies based on security groups
Answer: BD

341.As shown in the figure, a VP-BCP neighbor relationship is established between PE1 and PE2 through
the Loopback0 interface. After the configuration is complete, it is found that CE1 and CE2 cannot learn
routes from each other. Which of the following items will cause this problem? (Multiple choice)

A. The PH instance parameters on PE1 or PE2 are incorrectly configured


B. Misconfiguration of routing protocols between PE1 or PE2 and their respective CEs
C. The LSP tunnel between PE1 and PE2 is not established
D. PE1 or PE2 does not have neighbors enabled in the BGP-VPv4 unicast address family view
Answer: ABC

342.As shown in the figure, RI, R, R3, and R4 all belong to OSP area 0, and the cost value of the link is
listed in the figure. The LoopbackO interfaces of R1, R2, R3, and R4 have been advertised into OSPF. R1,
R2, R3, and R4 use Loopback0 as the connection interface to establish an IBGP peer relationship. R1,
R2, and R3 are clients of R4. The directly connected network segment 172.20.1.4/32 of R4 has been
advertised into the BGP protocol.

88 / 149
The safer , easier way to help you pass any IT exams.

Judging from the above information, regarding the traffic trend of R1 accessing 172.20.1.4/32, which of
the following descriptions are correct? (Multiple choice)
A. If R3 is configured with Stub router on-startup, packets will be lost when R3 is powered off, and no
packets will be lost during R3 startup.
B. The preferred route is R1-R2-R4
C. During the two processes of power failure and startup of R3, there will be packet loss
D. The preferred route is R1-R3-R4
Answer: AD

343.A campus has deployed IPv6 for service testing. There are 4 routers (R1, R2, R3, and R4) in the
network, running OSPFv3 to realize the interconnection of IPv6 networks. A new router R5 needs to be
connected to the network for testing. An engineer introduces a direct route into the OSPFv3 process of R4
to enable devices in the campus network to access the CE0/0/1 port address of R5.

Which of the following statements about the scene is correct? (Multiple choice)
A. R2 will generate a Type4 LSA and only flood in Area 0
B. R4 will generate a Type5 LSA and only flood in Area 1
C. R2 will generate a Type4 LSA describing the Router ID of R4
D. R4 will generate a Type5 LSA describing the imported IPv6 routing prefix
Answer: ACD

344.Which of the following items does the Huawei Cloud Campus Network Solution include? (Multiple
choice)
A. NetEngine AR series routers
B. iMaster NCE-Carpus
C. CloudEngine S-Series Switches
D. iMaster NCE-CampusInsight
Answer: ABCD

345.In the campus network, which of the following problems exist when creating static VXLAN tunnels
manually? (Multiple choice)
A. Static VXLAN tunnels also use related protocols on the control plane. Will cause equipment resource
consumption
B. N devices establish static VXLAN tunnels. Then, at most N (N-1)/2 tunnels need to be manually
configured, and the amount of configuration is large.
C. VTEP can only rely on data flooding to learn the remote MAC address

89 / 149
The safer , easier way to help you pass any IT exams.

D. Although the static VXLAN tunnel mode can support distributed gateway application scenarios, the
configuration workload is large and the configuration adjustment is complicated
Answer: BC

346.As shown in the figure, 802.1X authentication is deployed on GE0/0/1 of ST2. Which of the following
descriptions are correct? (Multiple choice)

A. Assuming that SW2 adopts interface-based access control and 802.1x client A passes the
authentication first, if 802.1x client A goes down first, then 802.1x client B will lose the corresponding
network access rights
B. When using interface-based access control, assuming that 802.1X client A is successfully
authenticated, then 802.1X client B can use network resources without authentication
C. When MAC address-based access control is used, both 802.1.x authentication client A and 802.1.x
authentication client B need to be authenticated separately to obtain the corresponding network access
rights
D. Assuming that SW2 adopts MAC-based access control and 802.1X client A passes the authentication
first, if 802.1X client A goes offline first, since the port status has not changed, 802.1X client B will
continue Retain appropriate network access rights
Answer: BCD

347.Which of the following descriptions about the authentication protocol used in the Portal authentication
process are correct? (Multiple choice)
A. When the HTTP/HTTPS protocol is used as the authentication protocol, all devices involved in the
authentication process do not need to support the Portal protocol
B. When the Portal protocol is used as the authentication protocol, the Portal server and access device
only need to support the Portal protocol, and do not need to support the HTTP/HTTPS protocol
C. When the Portal protocol is used as the authentication protocol, the Portal server needs to exchange
authentication information with the access device, and then the access device sends this part of the
information to the authentication server for identity authentication
D. When using HTTP/HTTPS to access the device, the access device sends this part of the information to
the authentication server for identity authentication
Answer: BC

90 / 149
The safer , easier way to help you pass any IT exams.

348.Network tuning calculation is to select an appropriate tuning purpose, apply a corresponding


algorithm, and globally or locally compute an optimized path.
Which of the following constraints can the controller take when calculating the path? (Multiple choice)
A. Explicit path
B. Hop count
C. Priority
D. Bandwidth
Answer: ACD

349.Considering the dimensions of transformation cost, technological advancement and the scope of
impact of transformation, which of the following principles should be followed during IPv6 transformation?
(Multiple choice)
A. Select an appropriate IPv6 upgrade and evolution plan from a global perspective, make reasonable
use of the old, and avoid wasting assets
B. Deploy a dual-stack network to achieve long-term coexistence of IPv4 and IPv6 networks
C. Ensure that existing users are unaware and service migration is smooth
D. Build an advanced next-generation enterprise IPv6 network system architecture to fully support the
long-term development and stable operation of enterprise business systems, and avoid network
re-engineering and repeated investment
Answer: ABCD

350.During the SSH public key authentication process, the server decrypts the digital signature generated
by the client through the public key to complete user authentication.
Which of the following objects need to be involved in the generation of SSH digital signatures? (Multiple
choice)
A. Username
B. Public key
C. Public key algorithm
D. Private key
Answer: ABCD

351.What are the parts of the response message of the HTTP/1.1 protocol? (Multiple choice)
A. Response body
B. Response headers
C. Status line
D. Blank line
Answer: ABCD

352.Which of the following are the deployment methods of iMaster NCE-CampusInsight? (Multiple
choice)
A. MSP self-built cloud CloudCampus deployment
B. Local Standalone Deployment
C. Local CloudCampus Deployment
D. Huawei Public Cloud CloudCampus Deployment

91 / 149
The safer , easier way to help you pass any IT exams.

Answer: ABCD

353.From the perspective of architecture, Huawei SD-WAN solution can be divided into management
layer, control layer and network layer.
Which of the following devices belong to the network layer? (Multiple choice)
A. FW
B. EDGE
C. GW
D. RR
Answer: BC

354.SRv6 has strong network programming ability, which is reflected in those fields of SRH? (Multiple
choice)
A. Each SRv6 SID
B. Flags
C. Segment List
D. Optional TLV
Answer: ACD

355.IFIT implements end-to-end delay and packet loss statistics by inserting packet headers into service
flows to make color markings. Which of the following is correct? (Multiple choice)
A. Whether in MPLS or SRv6 scenarios, IFIT is in-band detection, so it can sense the service flow status
Flags in real time
B. In the IFIT for SRv6 scenario, the Option TLV in the SRH extension header carries the IFIT-related
information Optional TLV
C. The network device reports information to the controller through Telemetry. The controller obtains
information such as delay and packet loss through calculation
D. In the IFIT for SR/MPLS scenario, the IFIT header is indicated by label 12
Answer: BCD

356.Yangon is the data modeling language of NETCONF. Which of the following belongs to the basic
data model of yangon? (Multiple choice)
A. LEAF node
B. LIST node
C. SER node
D. TREE node
Answer: AB

357.Which of the following is not a function provided by MACsec? (Multiple choice)


A. Controllability
B. Authenticity
C. Encryption
D. Integrity
Answer: BCD

92 / 149
The safer , easier way to help you pass any IT exams.

358.In the small and medium-sized campus network, which of the following devices support the
registration center method? (Multiple choice)
A. AP
B. FW
C. AR
D. SW
Answer: ABCD

359.Which of the following protocols does IPsec include? (Multiple choice)


A. PKI
B. SSL
C. AH
D. ESP
Answer: CD

360.Which of the following source node behaviors allow devices to be inserted into the SRH? (Multiple
choice)
A. Insert
B. insert.red
C. encaps
D. encaps.red
Answer: AB

361.In SR-MPLS, the manually configured prefix sid of different devices may conflict, so according to the
conflict handling principle, which of the following will be selected in the end? (Multiple choice)
A. 1.1.1.1/32 1
B. 1.1.1.1/32 2
C. 3.3.3.3/32 1
D. 2.2.2.2/32 3
Answer: AD

362.Which of the following types of SIDs does BGP EPE assign to inter-domain paths? (Multiple choice)
A. peer-prefix
B. peer-set
C. peer-adj
D. peer-node
Answer: BCD

363.Which of the following about IKEv1 is correct? (Multiple choice)


A. Phase 2 Negotiation of IPSec SA
B. The first phase of negotiation to establish an IKE SA
C. Two modes in the first stage: main mode, brutal mode
D. Two modes in the second stage: fast and slow

93 / 149
The safer , easier way to help you pass any IT exams.

Answer: ABC

364.Which of the following descriptions about the label encapsulation format in MPLS is correct? (Multiple
choice)
A. For Ethernet and PPP packets, the label stack is like a "shim" between the Layer 2 header and the data.
When there is a VLAN tag, the MPLS header is placed between the Ethernet header and the VLAN tag
B. The total length of a single MPLS label is 4 bytes
C. The TTL field in the label is similar to the TTL (Time To Live) in the IP packet, and it also has the effect
of preventing loops.
D. The length of the S field in the label is 1 bit, which is used to identify whether the label is the bottom
label of the stack. When the value is 1, it indicates the second-to-last layer label.
Answer: BC

365.For which packets can Huawei equipment perform traffic suppression? (Multiple choice)
A. Broadcast
B. Multicast
C. Unknown Unicast
D. Known Unicast
Answer: BCD

366.Which of the following descriptions about the MPLS header TTL is correct? (Multiple choice)
A. MPLS handles TTL in two ways. One is to copy the IP TTL value of the TTL of the MPLS header when
the IP packet enters the MPLS network; the other is to set the TIL of the MPLS header to 255 at the
ingress LER.
B. It can prevent infinite loop forwarding of messages
C. When copy TTL is prohibited, Tracert can see the LSR of the passing MPLS domain
D. The processing method of copying the IP TTL value hides the LSR of the MPLS domain and plays a
certain security role
Answer: AB

367.DHCP Snooping is a DHCP security feature that can be used to defend against various attacks.
Which of the following about the types of attacks that DHCP Snooping can defend against are correct?
(Multiple choice)
A. A starvation attack where the defense department changes the CHADDR value
B. Defense against man-in-the-middle attacks and IP/MAC spoofing attacks
C. Defense Against DHCP Bogus Attacks
D. Anti-TCP flag attack
Answer: AC

368.In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, which of the
following descriptions about symmetric IRB forwarding are correct? (Multiple choice)
A. Ingress VTEP only performs L2 table lookup
B. The VNI carried in the VXLAN header is L3 VNI when forwarding cross-network segment user
communication packets between VTEPs

94 / 149
The safer , easier way to help you pass any IT exams.

C. Egress VTEP only performs L2 table lookup and forwarding


D. Ingress VTEP and Egress VIEP will perform L3 table lookup and forwarding
Answer: BD

369.Port Security enhances the security of the device by converting part of the MAC address into a
secure MAC address and preventing hosts other than the secure MAC from communicating with the
device through this interface.
Which of the following is a secure MAC? (Multiple choice)
A. Secure Static MAC Address
B. Protected MAC address
C. Sticky MAC address
D. Secure Dynamic MAC Address
Answer: ACD

370.In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, when BGP EVPN
Type 2 routes are used to transmit IRB type routes, which of the following information is carried? (Multiple
choice)
A. Layer 2 VNI
B. Layer 3 VNI
C. Host MAC address
D. Host IP address
Answer: ABCD

371.In the Huawei SD-WAN solution, which of the following routing protocols can be used on the LAN
side to connect to the Layer 3 network? (Multiple choice)
A. RIP
B. IS-IS
C. OSPF
D. BGP
Answer: CD

372.MPLS supports the establishment of LSPs in a static or dynamic manner. In the MPLS TE scenario,
which of the following protocols can establish dynamic LSPs? (Multiple choice)
A. OSPF
B. RSVP-TE
C. BGP
D. IS-IS
Answer: ABD

373.SR-MPLS can use the IGP protocol to advertise topology information, prefix information, SRGB and
label information. In order to complete the above functions, OSPF defines TLVs for SIDs and SR-MPLS
capabilities of network elements.
Which of the following TLVs does OSPF use to advertise the Prefix SID and Adjacency SID of SR-MPLS?
(Multiple choice)

95 / 149
The safer , easier way to help you pass any IT exams.

A. LAN Aaj-SID Sub-TLV


B. SID/Label Sub-TLV
C. Prefix SID Sub-TLV
D. Adj-SID Sub-TLV
Answer: CD

374.Which of the following is included in the SR Policy triple? (Multiple choice)


A. color
B. dscp
C. endpoint
D. headend
Answer: ACD

375.XML is the encoding format of the NETCONF protocol. NETCONF uses text files to represent
complex hierarchical data.
<?xml version="1.0" encoding="UTF-8“?>
<note>
<to>Learners</to>
<from>Huawei</from>
<heading>Reminder</heading>
<body>Don't forget Reading!</body>
</note>
For the following XML file, which of the following descriptions are correct? (Multiple choice)
A. encoding: Indicates the character set encoding format, currently only UTF-8 encoding is supported
B. <?: Indicates the start of an instruction
C. /: Indicates the end of the current label
D. ?>: Indicates the end of an instruction
Answer: ABCD

376.The enterprise wide-area bearer network needs to provide different quality of service guarantees for
various services. At this time, QoS planning can be used to ensure that various services are reasonably
forwarded on the bearer network. Which of the following descriptions about QoS planning principles are
correct? (Multiple choice)
A. Reasonable: Allocate reasonable resources based on the importance of the business
B. Maintainability: Actual business changes rapidly, and QoS policy may need to be adjusted frequently
during routine maintenance. It needs to be easily adjusted and maintained.
C. Scalability: the current QoS policy needs to consider subsequent business expansion
D. Consistency: QoS planning involves business classification, marking, scheduling, speed limiting and
other behaviors, and the entire network needs to be consistent
Answer: ABCD

377.Which of the following location reporting methods does the iMaster NCE-Campus support to
implement Wi-Fi-based location services? (Multiple choice)
A. After the network device is transferred, it is reported to the LBS Server

96 / 149
The safer , easier way to help you pass any IT exams.

B. WLAN AP reports terminal location data through Bluetooth Beacon packets


C. WLAN AP directly reports terminal location data
D. iMaster NCE-Campus relay reports terminal location data
Answer: ABCD

378.Which of the following statement about LDP is correct? (Multiple choice)


A. Relying on hello packets to establish LDP session
B. After receiving the label mapping relationship sent by the other party, the establishment of the LDP
session is completed
C. Maintain LDP sessions by keepalive packets.
D. Negotiate parameters by init message.
Answer: ACD

379.Which of the following sequences can be represented by the regular expression [100200]$? (Multiple
choice)
A. 300 200 100
B. 100 300 200
C. 200 100 300
D. 100 200 300
Answer: CD

380.Part of the configuration of the switch is shown in the figure.

Which of the following descriptions about the configuration on this switch is correct? (Multiple choice)
A. First you need to create a DHCP server group and add a DHCP server to the server group
B. The VLANIF 100 interface will send the received DHCP packets to the external DHCP Server through
the relay
C. Both DHCP server and DHCP Delay must be configured with DHCP enabled globally
D. Specify the DHCP server group for the VLANIF100 interface as dhcp group1
Answer: ABCD

381.According to the information given in the figure, which of the following descriptions are correct?
(Multiple choice)

A. There are 2 equivalent paths for R1 to access 172.16.1.4

97 / 149
The safer , easier way to help you pass any IT exams.

B. There are 4 equivalent paths for R1 to access 172.16.1.4


C. R1 needs to go through a 4-hop router to access 172.16.1.4
D. R1 needs to go through a 2-hop router to access 172.16.1.4
Answer: AD

382.Which of the following description of the MPLS header TTL are correct? (Multiple choice)
A. The processing method of copying the IP TTL value hides the LSR of the MPLS domain and plays a
certain security role
B. MPLS handles TTL in two ways. One is to copy the IP TTL value of the TTL of the MPLS header when
the IP packet enters the MPLS network, and the other is to uniformly set the TTL of the MPLS header to
255 in the ingress LER.
C. When copy TTL is prohibited, Tracert can see the LSR of the passing MPLS domain
D. It can prevent infinite loop forwarding of messages
Answer: BD

383.According to the information given in the figure, which of the following statements are correct?
(Multiple choice)

A. There is a loop when R1 accesses 172.17.1.5


B. R1 has a route between 172.17.1.5
C. R1 has no problem accessing the path of 172.17.1.5
D.R1 has no route to access 172.17.1.5
Answer: AB

98 / 149
The safer , easier way to help you pass any IT exams.

384.In a virtualized network scenario deployed through iMaster NCE-Campus, when creating a fabric, it is
necessary to configure the fabric global resource pool, which of the following items are included? (Multiple
choice)
A. Bridged Broadcast Domain (BD)
B. Interconnecting IP Address Resources
C. XLAN Network Identity (VNI)
D. VLAN resources
Answer: ACD

385.In the Huawei SD-WAN solution, which of the following descriptions of the Hub-Spoke topology are
correct? (Multiple choice)
A. Hub-Spoke topology mode supports dual-Hub site networking
B. Hub-Spoke topology mode supports network-segment-based hub site active-active
C. Hub-Spoke topology mode supports active-active hub site based on Spoke site
D. Hub-Spoke topology mode supports four-Hub site networking
Answer: ABC

386.As shown in the figure, R1 and R2 establish a GRE tunnel. If it is required to successfully ping when
R1 "Ping 10.3.1.1", which of the following commands needs to be configured on R1 or R2? (Multiple
choice)

A. Configure the following command on R2: "ip route-static 10.1.1.1 255.255.255.255 Turnnel0/0/0"
B. Configure the following command on R1: "ip route-static 10.3.1.1 255.255.255.255 10.0.12.2"
C. Configure the following command on R2: "ip route-static 10.1.1.1 255.255.255.255 10.0.12.1"
D. Configure the following command on R1: "ip route-static 10.3.1.1 255.255.255.255 Turnnel0/0/0"
Answer: AD

387.Which of the following descriptions about the SD-WAN resale scenario by operators are correct?
(Multiple choice)
A. Enterprises can realize the connection between SD-WAN network and traditional operator backbone
network through SD-WAN GW
B. Operators provide a unified SD-WAN controller to provide SD-WAN services for multiple enterprises
C. Enterprises can manage and control their own SD-WAN services through the tenant rights assigned by
the operators, or they can be hosted by the operators, and the operators can manage and control the
SD-WAN services of the enterprises

99 / 149
The safer , easier way to help you pass any IT exams.

D. Enterprises can act as tenants and rent SD-WAN services provided by operators. Enterprise tenants
can control SD-WAN services of all sites within the enterprise, but cannot see SD-WAN services of other
tenants
Answer: ABCD

388.In the scenario of dynamically establishing a VLAN tunnel through BGP EVPN, run commands on the
VTEP to view the detailed information of the BGP EVPN route and see the route information as shown in
the figure. Which of the following descriptions are correct? (Multiple choice)

A. This is an IRB type Type2 route


B. This route contains RT and EVPN Router's MAC Extended Community extended community attributes
C. This is a Type5 route
D. Import RT contains 0:2 or 0:3 VPN instances can learn the host routing information contained in this
route
Answer: AD

389.As shown in the figure, in the scenario of dynamically establishing a VLAN tunnel through BGP EVPN,
VTEP1 transmits a BGP EVPN Type2 route to VTEP2, where the EVPN RT value is 20:1, then which of
the following description about this scenario are wrong? (Multiple choice)

A. VTEP2 will drop the route directly


B. VTEP2 compares the RT value carried by the route, which is different from the IRT value of the EVPN
instance bound to BD20, so VTEP2 will discard the route

100 / 149
The safer , easier way to help you pass any IT exams.

C. VTEP2 compares the RT value carried by the route, which is the same as the IRT value bound to the
IP VPN instance VTEP_VBDIF20, so VTBP2 will learn the IP routing entry carried in the route
advertisement packet into the IP routing table corresponding to the IP VPN instance
D. VTEP2 compares the RT value carried by the route, which is different from the IRT value of the EVPIt
instance bound to R20, so TEP2 will not learn the MAC address entry carried by the route into the MAC
address table of BD20
Answer: BD

390.As shown in the figure, if 802.1x authentication needs to be enabled on the GE0/0/2 and GE0/0/3
interfaces of SW3, the RADIUS server needs to be used for user authentication and authorization
delivery.

Which of the following configuration steps are required? (Multiple choice)


A. Configure the 802.1X access profile
B. Configure certificate horizontal pole
C. Configure the AAA scheme
D. Configure the authentication domain
Answer: ABCD

391.The topology shown in the figure adopts VXLAN distributed gateway, VBDIF10 on SW1 is configured,
and the arp-proxy local enable command is used, which of the following descriptions are correct?
(Multiple choice)

101 / 149
The safer , easier way to help you pass any IT exams.

A. The ARP entry on PC1 is, 172.16.1.2 MAC B


B. The ARP entry on PC1 is, 172.16.1.2 MAC D
C. SW1 receives the message sent from PC1 to PC2, and will perform L2 table lookup and forwarding
D. SW1 receives the message sent by PC1 to PC2, and will perform L3 table lookup and forwarding
Answer: BD

392.As shown in the figure, in the scenario of dynamically establishing a BXLAN tunnel through BGP
EVPN, VTEP1 transmits a BGP EVPN Type2 route about PC1 to VTEP2. Which of the following
descriptions about this scenario are correct? (Multiple Choice)

A. The route is an IRB type route


B. The RT value carried by this route is 10:1
C. The RT value carried by this route is 100:1
D. The RD value carried by the route is 103:1
Answer: ABD

393.Ethernet is a broadcast-enabled network, and once there are loops in the network, this simple
broadcast mechanism can have catastrophic consequences.
Which of the following phenomena may be caused by loops? (Multiple choice)
A. Serious packet loss during network test via ping command
B. CPU usage exceeds 70%

102 / 149
The safer , easier way to help you pass any IT exams.

C. Use the display interfacet command on the device to view interface statistics and find that the interface
receives a large number of broadcast packets
D. The device cannot record remotely
Answer: ABCD

394.In the following description of OSPF Router LSA and Network LSA, which items are wrong? (Multiple
choice)
A. Routers running OSPF must generate Router LSAs
B. There must be both Router LSA and Network LSA in the NSPF network
C. A router running OSPF must generate a Network LSA
D. Network LSA carries both topology and routing information
Answer: BC

395.In the virtualized campus network deployed through iMaster NCE-campus, administrators should
configure the parameters as shown in the figure.

Which of the following statements about this operation is correct? (Multiple choice)
A. The administrator is configuring VN interworking
B. After this step is completed, the controller will deliver the static route corresponding to the
VPN-Instance to the device
C. After this step is completed, the controller will deploy OSPF on the device
D. The administrator is creating the VN
Answer: AB

396.Overlay network topology in Huawei SD-WAN solution system, which of the following items are
included? (Multiple choice)
A. Full-Mesh
B. Hierarchical Topology
C. Partial-Mesh
D. Hub- Spoke
Answer: ABCD

397.In Huawei SD-WAN solution, which of the following items are mainly included in the application
optimization function? (Multiple choice)
A. Application Identification
B. Intelligent routing
C. QoS

103 / 149
The safer , easier way to help you pass any IT exams.

D. Wide-area optimization
Answer: ABCD

398.The NETCONF content layer configures data for the device. Configuration data requires a modeling
language. Which of the following are the content layers currently supported by Huawei devices? (Multiple
choice)
A. ONF-YANG
B. OpenConfig-YANG
C. Huawei-YANG
D. IETF-YAG
Answer: BCD

399.HTTP/1.1 is the mainstream standard today. Regarding the HTTP/1.1 request message, which of the
following request methods are included? (Multiple choice)
A. GET
B. POST
C. PATCH
D. DELETE
Answer: ABCD

400.The unified monitoring and performance management of network equipment is an important function
of the operation and maintenance platform. Which of the following protocols or technologies does the
operation and maintenance platform obtain equipment monitoring data? (Multiple choice)
A. Telemetry
B. Netstream
C. Syslog
D. SNMP
Answer: ABCD

401.Which of the following description about configuring static VXLAN access are correct? (Multiple
choice)
A. An NVE interface can be associated with multiple VNIs. So when there are multiple BDs, only one NVE
interface can be created
B. For a VXLAN tunnel, a corresponding NVE interface needs to be created, in which the source IP
address and destination IP address are clearly specified. Therefore, if there are multiple VXLAN tunnels
on the VIEP, the corresponding number of NVE interfaces must be configured.
C. In the NVE interface, the destination address of the VXLAN tunnel is specified by the address in the
headend replication list. Multiple VXLAN tunnels can create only one NVE interface
D. A BD needs to create an NVE interface when there are multiple BDs. Multiple NVE interfaces must be
created
Answer: AC

402.In the firewall dual-system hot backup scenario, which of the following situations will cause the local
device to actively send VGMP packets? (Multiple choice)

104 / 149
The safer , easier way to help you pass any IT exams.

A. The dual-system hot backup function is enabled


B. Link Detection Packet Timeout
C. Priority increase
D. The dual-system hot-standby function is turned off
Answer: ACD

403.Which of the following are the Features of HTTP? (Multiple choice)


A. Using UDP encapsulation
B. Media independence
C. Stateless
D. No connection
Answer: BCD

404.Which of the following information needs to be planned for network cutover? (Multiple choice)
A. QoS
B. Bandwidth Utilization
C. Packet Loss Rate
D. Business situation
Answer: BD

405.After the port security function is enabled, if the number of MAC addresses learned on the interface
reaches the upper limit, which of the following processing methods may be taken by the port? (Multiple
choice)
A. Discard the message with the new MAC address and report an alarm
B. Discard the message with the new MAC address and do not report an alarm
C. The interface is error-down, and the alarm is reported.
D. The interface is error-down, and the alarm is not reported.
Answer: ABC

406.Which of the following statements about MPLS VPN cross-domain solutions are correct? (Multiple
choice)
A. In the OPTION C scheme, when transferring between ASBRs, carry two layers of labels
B. In the OPTION A scheme, ASBR cannot open MPLS
C. In the OPTION C scheme, PEs can directly exchange VPNv4 routing information
D. In the OPTION B scheme, the intermediate link does not need to process the label information.
Answer: ACD

407.Which of the following statement is correct? (Multiple choice)


A. The next hop of this packet is 2001::xxxxxx
B. This packet only carries one attribute, and multi-protocol cannot reach NLRI
C. The prefix carried by this packet is 2001::xxxxxx
D. This message is used to revoke the relevant routing information.
Answer: BCD

105 / 149
The safer , easier way to help you pass any IT exams.

408.Regarding ISIS equivalent routing, which of the following statements is correct? (Multiple choice)
A. If load balancing is used, the data packets are evenly distributed on each link
B. The priority of an equal-cost route can be adjusted, the route with higher priority is forwarded first, and
the rest of the links are backed up
C. If the priority is the same, the packet will be preferentially forwarded to a certain link according to the
principle that the smaller the system-id, the better
D. If the number of equal-cost routing entries exceeds the number set by the device, the entire load will be
shared.
Answer: ABC

409.Which of the following layers does the telemetry protocol include? (Multiple choice)
A. Transport layer
B. Communication layer
C. Data encoding layer
D. Data Model Layer
Answer: ABCD

410.There are three families in a residential building: A, B, and C.


Family A leases 30M network bandwidth, and purchases voice phone, Internet TV and broadband
Internet access services.
Family B leases 20M of network bandwidth and purchases Internet TV and broadband Internet access
services.
Family C rents 10M network broadband and only purchases broadband Internet access services.
The operator has made the HoS configuration on the access device as shown in the figure below. Which
of the following descriptions are correct? (Multiple choice)

A. The Internet TV service of family A can obtain a maximum bandwidth of 30M, and the broadband
Internet service of family C can obtain a maximum bandwidth of 10M
B. Home A's voice and telephone services can obtain a bandwidth of 30M at most, and home B's Internet
TV service can obtain a maximum bandwidth of 10M
C. Family A's broadband Internet access service can obtain a maximum bandwidth of 30M, and family B's
Internet TV service can obtain a maximum bandwidth of 20M
D. The broadband Internet service of family A can obtain a maximum bandwidth of 10M, and the
broadband Internet service of family C can obtain a maximum bandwidth of 10M
Answer: AC

106 / 149
The safer , easier way to help you pass any IT exams.

411.Which of the following aspects should be considered in the cutover risk assessment? (Multiple
choice)
A. Location of key risk points
B. Losses from Risk
C. Timing of Risk Impact
D. Scope of Risk Impact
Answer: ABCD

412.Which of the following is the key technology for implementing SRv6 strategy based on Huawei Cloud
WAN solution architecture? (Multiple choice)
A. BGP-LS
B. BGP IPv6 SR Policy
C. PCEP
D. Network form
Answer: ABC

413.LDP uses discovery messages to discover neighbors. Which of the following statements about the
basic discovery mechanism is true? (Multiple choice)
A. The destination IP address of the LDP discovery message is the multicast IP address 224.0.0.2.
B. LDP discovery messages are sent to the specified LDP peers.
C. After the TCP connection is established, the LSR no longer sends Hello messages.
D. LDP discovery messages are encapsulated into UDP packets with destination port number 646.
Answer: ACD

414.Ethernet supports broadcasting. In the event of a network loop, this simple broadcast mechanism can
lead to catastrophic consequences.
Which of the following symptoms may be caused by a loop? (Multiple choice)
A. Users cannot log in to the device remotely.
B. The display interface command outputs a large number of broadcast packets received on the display
interface.
C. CPU usage exceeds 70%.
D. During the ping test, many ICMP packets are lost.
Answer: ABCD

415.Regarding forwarding equivalence classes (FEC) in MPLS, which of the following statements is
incorrect? (Multiple choice)
A. Packets with the same FEC are handled differently on MPLS networks.
B. FEC can be flexibly divided according to source IP address, destination IP address, source port,
destination port, protocol type, VPN or any combination of them.
C. MPLS classifies packets with the same forwarding processing mode into one FEC.
D. An FEC is marked with only one unique label.
Answer: AB

107 / 149
The safer , easier way to help you pass any IT exams.

416.Regarding the security protocols used by IPsec, which of the following statements is true? (Multiple
choice)
A. AH performs an integrity check on the entire IP packet.
B. ESP encrypts the entire IP packet.
C. Both AH and ESP support tunnel encapsulation.
D. ESP is an IP-based transport layer protocol with protocol number 50.
Answer: ACD

417.Regarding the hub-and-spoke topology in Huawei SD-WAN solution, which of the following
statements is correct? (Multiple choice)
A. The hub-and-spoke topology mode supports dual hub networks.
B. The hub-and-spoke topology mode supports segment-based active hub sites.
C. The hub-and-spoke topology mode supports active hub sites based on spoke sites.
D. The hub-and-spoke topology mode supports networking with four hub sites.
Answer: ABC

418.Which of the following intelligent operation and maintenance functions does Huawei CloudCampus
solution support? (Multiple choice)
A. Use telemetry to monitor AP, radio, and user wireless network quality.
B. Provide visual monitoring of network quality based on network health.
C. Analyze network failures based on individual and group failures.
D. Provide predictive intelligence optimization capabilities based on big data and artificial intelligence.
Answer: ABCD

419.Huawei CloudCampus solution supports the free mobility function. Which of the following
descriptions about the free mobility function is correct? (Multiple choice)
A. Administrators can centrally manage network-wide policies on the controller and execute business
policies on devices
B. In the free mobility solution, the administrator does not need to repeat the configuration for each device
C. The controller is not only the authentication center in the campus network, but also the management
center of the business policy
D. Administrators do not need to pay attention to users' IP addresses when configuring policies
Answer: ABCD

420.In PIM, which of the following description about DR is correct? (Multiple choice)
A. PIM routers become PIM neighbors by exchanging Hello packets. The Hello packets carry the DR
priority and the interface address of the network segment.
B. On the shared network segment of the connected group members, the DR is responsible for sending a
Register join message to the RP. The DR connected to the group member is called the group member
side DR
C. On the shared network segment connected to the multicast source, the DR is responsible for sending
the Join registration message to the RP. The DR connected to the multicast source is called the source
DR

108 / 149
The safer , easier way to help you pass any IT exams.

D. If the current DR fails, the PIM neighbor relationship will time out, and a new round of DR election will
be triggered between other PIM neighbors
Answer: AD

421.RTA is the source DR router, RTB is the RP router, the multicast source sends multicast data to RTA,
but the multicast source registered to it through the PIM Register message cannot be seen on RTB, what
are the possible reasons? (Multiple choice)
A. There is no unicast route from RTB to RTA, which causes RTB to fail the RPF check of the source
B. The multicast network dynamically elects the RP, but the RTA fails to check the RPF of the BSR
C. RP elected by RTA is not RTB
D. The multicast network is statically configured with RP, but the RTA router is not statically configured
with RP
Answer: ACD

422.Which of the following descriptions about Filter-Policy are correct? (Multiple choice)
A. Filter-Policy can be used on both OSPFv2 and OSPFv3
B. In the distance vector protocol, because routing information is passed between devices, Filter-Policy
can directly
C. Filtering In the link state routing protocol, the routing table is generated by LSDB, so Filter-Policy is
essentially filtering the LSAs in the LSDB
D. In the distance vector protocol, if you want to filter out the route from the upstream device to the
downstream device, you need to configure filter-policy export on the downstream device.
Answer: AB

423.What functions can Huawei iMaster NCE products achieve? (Multiple choice)
A. Devices can be managed across manufacturers
B. Network Automation
C. Provide a variety of open API interfaces
D. Predictive maintenance based on big data and Al
Answer: ABCD

424.In the security assistance of Agile Controller, which of the following description of security linkage
components are correct? (Multiple choice)
A. The log reporting device is undertaken by the network devices, security devices, policy servers,
third-party systems, etc. in the middle of the network. It is mainly responsible for providing network
information and security logs.
B. Client devices are producers of network information and security logs
C. The linkage policy execution device is undertaken by the switch, which is mainly responsible for the
security response of the dark part of the linkage between the devices after the security time occurs.
D. The security defense component of Agile Controller is responsible for log collection and processing,
event correlation, security situation presentation, and security response.
Answer: ACD

109 / 149
The safer , easier way to help you pass any IT exams.

425.In order for the eSight network management to be able to receive and manage devices and report
alarms, what conditions must be met? (Multiple choice)
A. The device is managed by the network management
B. The correct trap parameters are configured on the device side
C. The managed devices on the network management should be configured with the correct SNMP
protocol and parameters
D. The network management and equipment should be connected
Answer: ABCD

426.Which of the following statements about ASPF and Servermap are correct? (Multiple choice)
A. ASPF checks the application layer protocol information and monitors the application layer protocol
status of the connection
B. ASPF determines whether packets pass through the firewall by dynamically generating ACLs
C. Configure NAT Server to generate static Server-map
D. The Servermap table uses a five-tuple to represent a conversation
Answer: AC

427.When congestion occurs, which of the following indicators of Qos are usually affected? (Multiple
choice)
A. Transmission delay
B. Transmission Jitter
C. Transmission bandwidth
D. Transmission distance
Answer: ABC

428.What information of the message can be marked or remarked? (Multiple choice)


A. MAC Address information
B. Any information in the message
C. IP Source, Destination Address, EXP information
D. IP DSCP. IP Precedence, 802.1p.EXP information
Answer: ACD

429.Regarding the statement of ASPF and Server-map, which of the following is correct? (Multiple
choice)
A. Server-map is usually only used to check whether the message after the first message channel is
established or forwarded according to the session table
B. After the channel is established, the message is still forwarded according to the Server-map
C. The server-map entry will be deleted after a certain aging time because there is no packet matching.
This mechanism ensures that the looser channel such as the Server-map entry can be deleted in time; it
ensures the security of the network. When a new data connection is subsequently initiated, the
establishment of the Server-map entry will be re-triggered
D. Only ASPF will generate the Sever-map table
Answer: AC

110 / 149
The safer , easier way to help you pass any IT exams.

430.Which of the following working modes does the interface of the firewall have? (Multiple choice)
A. Exchange Mode
B. Transparent Mode
C. Transmission Mode
D. Routing Mode
Answer: BD

431.LSR retains the received label, and there are several ways to retain it, then which of the following
statement about LDP label retention - free mode is correct? (Multiple choice)
A. Keep all labels sent by neighbors
B. Requires more memory and label space
C. Keep only labels from next-hop neighbors and discard all labels from non-next-hop neighbors
D. Save memory and label space
E. Reduced LSP convergence time when IP route convergence next hop changes
Answer: ABE

432.Which protocol modules can BFD detection be linked with? (Multiple Choice)
A. VRRP
B. OSPF
C. BGP
D. Static routing
Answer: ABCD

433.Which description is correct for the configuration on this switch? (Multiple Choice)
A. By default, both DHCP server and DHCP delay must be enabled to enable DHCP service
B. VLANIF100: The interface will send the received DHCP packets to the external DHCP Server through
the relay
C. Specify the DHCP server group as dhcpgroup for the VLANIF1O0 interface
D. First you need to create a DHCP server group and add a DHCP server to the server group
E. By default, DHCPgroup1 will automatically add a DHCP server in the network
Answer: ABCD

434.By default, the D main ID of each SPF process running on the router is the same as the process ID of
the process, which can be modified through the d main-id command under the process.
A. True
B. False
Answer: B

435.BFD can implement link status detection at the ms (millisecond) level.


A. True
B. False
Answer: A

111 / 149
The safer , easier way to help you pass any IT exams.

436.In the DU label distribution mode, if the Libera1 retention mode is adopted, the device will retain the
labels distributed by all LDP peers, regardless of whether the LDP peer is the optimal next hop to the
destination network segment.
A. True
B. False
Answer: A

437.Traditional BGP-4 can only manage IPv4 unicast routing information. MP-BGP extends BGP-4 in
order to support multiple network layer protocols.
The feature that MP-BGP supports for IPv6 unicast networks is called BGP4+, and BGP4+ carries routing
next-hop address information through the Next_Hop attribute.
A. True
B. False
Answer: B

438.The request header field Accept-Language indicates the language type desired by the client.
A. True
B. False
Answer: A

439.In the MA network, if IS-IS is used to publish the Adjacency SID, since every IS-IS router will publish
the Adjacency SID, it is not necessary to select DIS at this time.
A. True
B. False
Answer: B

440.Node Segments in SR-MPLS must be manually configured.


A. True
B. False
Answer: B

441.The enterprise WAN connects the enterprise headquarters and branches, the enterprise and the
cloud, and also realizes the interconnection between the clouds.
A. True
B. False
Answer: A

442.When configuring an IPsec tunnel on Huawei AR series routers, you must create an IPSec tunnel
interface. Otherwise, user data cannot be encrypted.
A. True
B. False
Answer: B

112 / 149
The safer , easier way to help you pass any IT exams.

443.To isolate the communication between wired user terminals, you can enable port isolation on the
access switch; however, for wireless users, APs cannot implement user isolation.
A. True
B. False
Answer: B

444.As shown in the figure, the SPF protocol is enabled for all classes of the router, the cost of the link is
marked in the figure, and the Lookback class end announcement of R2 is in area 0.

In area 1, both R2 and R3 transmit the routing information of 10.0.2.2/32 in the form of Type3 LSA.
A. True
B. False
Answer: A

445.The down of the BFD session causes the direct link to fail.
A. True
B. False
Answer: B

446.A campus deployed IPv6 for service testing. In the initial stage of deployment, engineers wanted to
implement network interoperability through IPv6 static routes. When creating an IPv6 static route, you can
specify both the outbound interface and the next hop, or you can specify only the outbound interface or
only the next hop.
A. True
B. False
Answer: B

447.When there is a relay between the DHCP client and the DHCP server. If the IP address in the global
address pool of the DHCP server is not in the same network segment as the IP address of the VLANIF
interface connected to the client on the relay device, a DHCP failure will occur.

113 / 149
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: A

448.As shown in the figure, on the R1 router, the network administrator can control the path of the traffic
entering AS100 after modifying the MED value of the routing entry sent to R2 through the routing policy.

A. True
B. False
Answer: A

449.The ipv6 enable topology standard is configured in the IS-IS protocol view. The meaning of this
command is that IPv4 and IPv6 share the same topology.
A. True
B. False
Answer: B

450.SR-MPLS issues labels and reserves bandwidth through the extended IGP, thereby supporting
large-bandwidth services.
A. True
B. False
Answer: B

451.For the same MAC address, manually configured MAC entries have higher priority than automatically
generated entries.
A. True
B. False
Answer: A

452.VXLAN uses VNI to distinguish tenants. A tenant can have one or more VNIs, and the VNI length is
24 bits, so VXLAN supports up to 12 M tenants.
A. True
B. False
Answer: B

453.As shown in the figure, all interfaces of the router enable the SPF protocol, in which R4 and R5 can
establish an OSPF virtual connection.

114 / 149
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: B

454.When deploying a BGP/MPLS VPN, when two VPNs have a common site, the common site must not
use overlapping address spaces with other sites of the two VPNs.
A. True
B. False
Answer: B

455.The traffic shaping technology will temporarily cache the data that exceeds the forwarding threshold.
For the data in the cache, you can use the congestion management technology to discard the data
packets from the cache queue in advance to prevent the cache queue from being full.
A. True
B. False
Answer: A

456.The traffic shaping technology will temporarily cache the data that exceeds the forwarding threshold.
For the data in the cache, you can use the congestion management technology to discard the data
packets from the cache queue in advance to prevent the cache queue from being full.
A. True
B. False
Answer: A

457.In the dual-system hot backup scenario of the firewall, service interfaces need to be added to the
security zone, and heartbeat interfaces do not need to be added to the security zone.
A. True
B. False
Answer: B

458.iMaster NCE-CampusInsight uses SNMP technology to collect performance indicators and log data
of network devices, and discover network anomalies based on real business traffic.
A. True
B. False
Answer: B

115 / 149
The safer , easier way to help you pass any IT exams.

459.iMaster NCE-Campus control does not support device management through SNMP.
A. True
B. False
Answer: B

460.In the Huawei SD-WAN solution, the CPE needs to establish a control channel before being
managed by the iMaster NCE-WAN controller.
A. True
B. False
Answer: B

461.MPLS LDP sends a large number of packets to maintain the protocol neighbor relationship and path
status.
A. True
B. False
Answer: A

462.NETCONF uses SSL to implement secure transmission, and uses the RPC (Remote Procedure Call)
remote call mechanism to implement the communication between the client and the server.
A. True
B. False
Answer: A

463.As shown in the figure, the operator's BGP/MPLS IP VPN backbone network constructs LSPs
through LDP. If the two sites of user X are to communicate through the BGP/MPLS IP VPN network, PE1
and PE2 must use a 32-bit mask. Loopback interface address to establish MP-IBGP peer relationship.

A. True
B. False
Answer: A

464.In an SR network, if IS-IS is used to transmit the SID, the Node SID advertised by the Level-2 router
is only transmitted within the same area by default.
A. True
B. False
Answer: B

465.The difference between SRv6 and SR-MPLS is that the segment in the SRv6 SRH will not be ejected
after being processed by the node, so the SRv6 header can be used for path backtracking.

116 / 149
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: B

466.When BGP/MPLS IP VPN is deployed, the OSPF VPN Route Tag is not transmitted in the extended
community attribute of MP-BGP, but is only a local concept, only on the PE router that receives MP-BGP
routes and generates OSPF LSA Significant.
A. True
B. False
Answer: B

467.The OPS (Open Programmability System) function of Huawei network equipment enables users to
run Python scripts on the local PC and call the open RESTful API interface of the equipment.
A. True
B. False
Answer: B

468.The path of the SR-MPLS TE tunnel can be calculated by the controller or the tunnel head node.
A. True
B. False
Answer: A

469.In the Huawei SD-WAN solution, the RR is automatically selected after the CPE goes online, and the
iMaster NCE-WAN controller does not need to be involved.
A. True
B. False
Answer: B

470.In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, when a BGP EVPN
route is passed between VTEPs, the BGP EVPN route will be discarded only if the RT value carried by
the route is different from the EVPN IRT and IP VPN IRT.
A. True
B. False
Answer: B

471.When an administrator creates a policy control matrix, when a source security group has policies for
multiple destination groups, the matching order of different policies needs to be distinguished by priority.
A. True
B. False
Answer: A

472.Free Mobility implements policy management and permission control based on the user's VLAN and
IP.
A. True

117 / 149
The safer , easier way to help you pass any IT exams.

B. False
Answer: B

473.Under the distributed gateway, VNI is divided into L2 VNI and L3 VNI. The L2 VNI is a common VNI,
which is mapped to the broadcast domain BD in a 1:1 manner to implement the forwarding of VXLAN
packets on the same subnet; the L3 VNI is associated with the VPN instance. It is used to forward VXLAN
packets across subnets.
A. True
B. False
Answer: A

474.Traffic policing can only be used in the inbound direction. Its function is to monitor the traffic entering
the device to ensure that the upstream device does not abuse network resources.
A. True
B. False
Answer: B

475.When encountering a large-scale network cutover project, it can be divided into several relatively
independent but related small cutovers.
A. True
B. False
Answer: A

476.After snetconf server enable is configured on a Huawei network device, the client can establish a
NETCONF connection with the device through port 830.
A. True
B. False
Answer: B

477.When policy linkage is deployed in the campus network, a CAPWAP (Control And Provisioning of
Wireless Access Points) tunnel is established between the control point and the enforcement point device,
and CAPWAP is used to implement user association, message communication, user authorization policy
issuance, and user services data forwarding, etc.
A. True
B. False
Answer: A

478.The following figure shows the MPLS VPN cross-domain Option B solution. If ASBR-PE1 and
ASBR-PE2 are only responsible for transmitting VPNv4 routes, you can configure the following command
on ASBR-PE1: [ASBR-PE1-bgp-af-vpnv4] undo peer 10.0 .34.4 enable

118 / 149
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: B

479.ESI (Ethernet Segment Identifier) has a total length of 10 bytes and is unique in the entire network.
A. True
B. False
Answer: A

480.As shown in the figure, all routers in the figure run the OSPF protocol.

Because R3 is in the backbone area, there are no three types of LSAs in the LSDB of R3.
A. True
B. False
Answer: B

481.The public key is public and does not need to be kept secret. Private keys are held by individuals and
are not disclosed and disseminated to the public.
A. True
B. False
Answer: A

482.Currently, Huawei uses the TLS protocol as the bearer protocol of the NETCONF protocol.
A. True
B. False
Answer: B

483.In an SRv6 network, a Locator is an identifier of a network node in the network topology, which is
used to route and forward packets to the node. In the SR domain, the Locator of each node must be
unique.

119 / 149
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: A

484.The full name of HTTP is Hypertext Transfer Protocol, which is an application layer protocol for
distributed, collaborative, and hypermedia information systems.
A. True
B. False
Answer: A

485.Segment Routing SR (Segment Routing) is a technical architecture designed to forward data packets
on the network based on the concept of source routing. Segment Routing MPLS refers to SR based on
MPLS label forwarding, referred to as SR-MPLS.
A. True
B. False
Answer: A

486.If network admission control is deployed on the campus network, if a terminal device fails the
admission authentication, the terminal cannot access all network resources.
A. True
B. False
Answer: B

487.LLDP (Link Layer Dizcovary Protocol) is a link discovery protocol defined in IEEE 802.1ab. Because
it works at the data link layer, it cannot obtain the management address of neighbors.
A. True
B. False
Answer: B

488.In the small and medium-sized campus network based on HUAWEI CLOUD campus network
solution, the On-Premise mode is recommended for the controller deployment mode.
A. True
B. False
Answer: A

489.The terminal management of iMaster NCE-Campus provides terminal identification function, which
can display terminal type, operating system, and manufacturer information.
A. True
B. False
Answer: A

490.In a virtualized campus network scenario, all devices in the VXLAN domain must support the VXLAN
feature.
A. True

120 / 149
The safer , easier way to help you pass any IT exams.

B. False
Answer: B

491.The <config> operation of the NETCONF protocol may contain an optional "operation" attribute, if not
specified, the default action is creat.
A. True
B. False
Answer: B

492.The VN on i-master-nce is equivalent to VPN-instance, which plays the role of business isolation.
A. True
B. False
Answer: A

493.After traffic shaping is deployed, congestion avoidance techniques are used in the cache queue to
prevent the cache queue from being filled.
A. True
B. False
Answer: A

494.The function of using the command ipv6 preference in the ISIS process is to adjust the routing priority
of IPv6.
A. True
B. False
Answer: A

495.In 6PE and 6VPE networking scenarios, it is not necessary to enable VPN-instance on PEs.
A. True
B. False
Answer: B

496.In SR-MPLS, segment-NOD must be manually configured


A. True
B. False
Answer: B

497.EVPN's L2VPN and L3VPN use two address clusters.


A. True
B. False
Answer: A

498.In the MPLS L3VPN inter-AS Option C solution, if there is an RR, the RR cannot transmit the VPNv4
route without changing the next hop address when it reflects the VPNv4 route to the neighbor.
A. True

121 / 149
The safer , easier way to help you pass any IT exams.

B. False
Answer: B

499.HTTP/2 is a low-latency Internet transport layer protocol based on UDP.


A. True
B. False
Answer: B

500.Node segments in SR-MPLS must be configured manually.


A. True
B. False
Answer: B

501.The enterprise WAN provides the interconnection between the enterprise headquarters and
branches, between the enterprise and the cloud, and between the cloud.
A. True
B. False
Answer: A

502.BFD can implement millisecond-level link status detection.


A. True
B. False
Answer: A

503.If you run the ipv6 enable topology standard command in the is-is view, then IPv4 and ipv6 share the
same topology.
A. True
B. False
Answer: A

504.Traffic shaping can only be used in the outbound direction. Its purpose is to control the rate of
outgoing packets.
A. True
B. False
Answer: A

505.During the evolution from OSPFv2 to OSPFv3, the format and function of the LSA remain unchanged,
except that the network layer address in the LSA is changed from IPv4 to IPv6.
A. True
B. False
Answer: B

506.In Huawei SD-WAN solution, the topology of different VNs must be the same.
A. True

122 / 149
The safer , easier way to help you pass any IT exams.

B. False
Answer: B

507.iMaster provides terminal identification, displaying terminal type, operating system and manufacturer
information.
A. True
B. False
Answer: A

508.Network admission control can be deployed at different network layers according to actual network
requirements. Deploying it at the access layer enables finer-grained rights management and higher
network security than deploying at the aggregation or core layers.
A. True
B. False
Answer: A

509.When establishing a VXLAN tunnel between VTEPs, it is recommended to use the IP address of the
loopback interface on the VTER instead of the IP address of the physical interface as the VTEP IP
address of the VXLAN tunnel.
A. True
B. False
Answer: A

510.A company purchased private lines from two operators. In order to optimize the lines, the company
used the 6GP protocol to learn the routing entries of the two operators. However, the enterprise found that
after this configuration, the traffic of the egress route increased greatly. After the network engineering
investigation, it was found that the traffic of the two operators was transmitted to each other through the
enterprise egress router.

Therefore, the enterprise intends to use the routing strategy so that the traffic of the packets of different
carriers is no longer transmitted to each other. Is the configuration in the following figure correct?
A. True
B. False

123 / 149
The safer , easier way to help you pass any IT exams.

Answer: A

511.As shown in the figure, OSPF is deployed in a campus, and Area1 is deployed as an NSSA area.

In the case of missing header, R2 will automatically generate the missing header route of Type7 LSA and
flood it in the NSSA area.
A. True
B. False
Answer: A

512.To prevent hackers from attacking user devices or networks through MAC addresses, you can
configure the MAC addresses of untrusted users as black hole MAC addresses to filter out illegal MAC
addresses.
A. True
B. False
Answer: A

513.In an MPLS network, SRs running the DP protocol exchange LDP messages to implement functions
such as neighbor discovery, session establishment and maintenance, and label management. To ensure
the reliability of message delivery, all LDP messages are sent and received based on TCP connections.
A. True
B. False
Answer: B

514.There are two types of stream mirroring: local stream mirroring and remote stream mirroring.
A. True
B. False
Answer: A

515.BFD determines whether a fault occurs by periodically detecting packets. It is a fast fault detection
mechanism that relies on routing protocols.

124 / 149
The safer , easier way to help you pass any IT exams.

A. True
B. False
Answer: B

516.BFD (Bidirectional Forwarding Detection) technology is a fast detection technology, but it is relatively
complex and requires special manufacturer equipment support.
A. True
B. False
Answer: B

517.The traffic of the traditional network is connected to the VXLAN network by the edge node, and the
VXLAN network accesses the VXLAN external network through the ( ) node. (Fill in English, the first letter
is capitalized)
Answer: Border

518.When L3VPNv4 ver SRv6 BE is configured, if RR is used in the SR domain, you need to configure
the () command on the RR to ensure that the PEs at both ends can correctly learn VPNv4 routes. (Please
enter the complete command, no extra spaces, all letters are lowercase)
Answer: display bgp vpnv4 all routing-table

519.DiffServ-based horizontal QS has four major components: traffic classification and marking, traffic
policing and shaping, congestion management and ().
Answer: avoid

520.There are many SR-MPLS TE tunnel protection mechanisms, among which ( ) FRR adopts the
method of constructing a virtual node, converts multiple identical route advertisement nodes into a single
route advertisement node, and then calculates the backup downlink of the virtual node according to the
TT-LFA algorithm. One hop, thus realizing fast switching of traffic when a fault occurs. (Fill in English
terms, capitalize only the first letter)
Answer: Anycast

521.Huawei AR series routers are configured with GRE tunnels and enable keepalive detection. By
default, the interval for sending keepalives is ( ) seconds.
Answer: 5

522.To configure a static VXLAN tunnel, the parameters that need to be manually configured are: ( ),
VTEP IP address, and headend replication list. (All letters capitalized)
Answer: VNI

523.In a campus, SPF is deployed to achieve network interoperability, and SPF is also enabled on the
GE0/0/2 interface of R3.
Among them, Area1 is deployed as an NSSA area, and the addresses of each device are shown in the
figure.

125 / 149
The safer , easier way to help you pass any IT exams.

An engineer configures a static route on R3 to access the loopback interface address of R4, and imports
the static route in the SPF process. At this time, in the Type5 LSA received by R1, the forwarding address
(FA) is: ( ) (please fill in the IP address without mask)
Answer: 10.1.34.4

524.VGMP packets are encapsulated by UDP packet headers and VGMP packet headers. By default, the
UDP port used by VGMP packets is ( ).
Answer: 18514

525.In order to improve network security, a company uses static MAC address binding for all internal
computers. Now buy a new host with MAC address 5489-98FD-7B7F. The network administrator
connects the host to the corporate network by executing the mac-address ( ) 5489-98FD-7B7F
GigabiteEthernet 0/0/1 vlan10 command. (Please use English lowercase letters to complete the
command, and the command cannot be abbreviated)
Answer: static

526.For VXLAN external networks, VTEP transmits network segment routes through Type ( ) BGP EVPN
routes, which are used to instruct VXLAN internal hosts to access external networks. (Arabic numerals)
Answer: 5

126 / 149
The safer , easier way to help you pass any IT exams.

527.In the Vxlan-based virtualized campus network, the Fabric networking can select Vxlan to the access
layer. The nodes in this networking include: Border, transparent node, ( ). (expressed in English, and the
first letter is capitalized)
Answer: Edge

528.The scheduling algorithm used by the LPQ queue is ( ).


Answer: SP

529.The VxLAN network is connected to the external network through the ( ) node.
Answer: border

530.<rpc xm/ns="xxxx" message-id="1024" belongs to layer( ) in netconf.


Answer: message

531.( ) in SRv6 is the identifier of the network node, so in the SR domain, it is necessary to ensure that
this parameter of each node is unique. (The first letter is capitalized, spelled out)
Answer: Segment Identifier

532.There are two subscription methods for telemetry, of which the shorter subscription time is ( ). (full
name)
Answer: Dynamic subscription

533.NCE uses ( ) technology to collect network performance indicators and logs. (Capitalized)
Answer: Telemetry

534.According to different bearer technologies, the bearer modes of traditional wide area bearer networks
can be divided into MPLS bearer modes and ( ) bearer modes. (English terms are used with all capital
letters)
Answer: SDH

535.Ingress VTEP performs L2 and L3 table lookup and forwarding at the same time. The forwarding
mode is _( )_IRB forwarding.
Answer: symmetry

536.As shown in the figure, when PE1 receives an ARP request, PE1 will forward the ARP request to PE4
and carry two layers of label information, in which the label value 201 is defined by the EVPN type ( ).
(only fill in Arabic numerals)

127 / 149
The safer , easier way to help you pass any IT exams.

Answer: 1

537.VxLAN tunnel has several contents that must be configured: ( ), tunnel source address, headend
replication list.
Answer: VNI

538.The Cost value of the loopback0 port from AR5 to AR1 is ( ).

Answer: 3

539.In OSPFv3, the LSA whose propagation range is one area has the ( ) class. (Fill in Arabic only)
Answer: 129

540.IS-IS is a link-state routing protocol that uses the SPF algorithm for route calculation. A campus
deploys both IPv4 and IPv6 and runs IS-IS to achieve network interconnection.
As shown in the figure, the network IPv4 and IPv6 have the same overhead, and R1 and R4 only support
IPv4.

128 / 149
The safer , easier way to help you pass any IT exams.

By default, in the IPv6 shortest path tree formed by calculation, the next hop device for R2 to access R6 is
( ). (Note: The device name must be consistent with the picture, such as: R1)
Answer: R3

541.Please complete the configuration of the following static VXLAN tunnels and drag the corresponding
configuration to the corresponding area.

129 / 149
The safer , easier way to help you pass any IT exams.

Answer:

542.Please match the classification related to the MPLS label of Huawei routers with the default method.

Answer:

543.When encountering network failures, engineers often use the hierarchical failure method. Because all
models follow the same basic premise, when all of a model's lower-level structures work properly, its

130 / 149
The safer , easier way to help you pass any IT exams.

higher-level structures can only work properly. Please match the following check items to the
corresponding levels according to the hierarchical method.

Answer:

544.The network administrator needs to permit or deny some specific routes, but the network
administrator is not proficient in configuration, please help him sort the configuration reasonably so that
the device can permit or deny specific routes according to the requirements in the figure.

131 / 149
The safer , easier way to help you pass any IT exams.

Answer:

545.As shown in the figure, to enable the traffic between Site1 and Site2 to pass through the Hub-CE,
VPN instances on two Spoke-PEs have been configured. Two VPN instances need to be created on the
Hub-PE. The instance VPN_in is used to receive routes from Spoke-PE, and the instance VPN_ut is used
to advertise routes to Spoke-PE. Please select Import RT of VPN_in and Export RT of VPN_ut
respectively.

132 / 149
The safer , easier way to help you pass any IT exams.

Answer:
200:1 ——VPN_in imp rt RT
100:1 —— VPN_ut exp rt RT

546.Please arrange the development process of iMaster NCE business open and programmable in order
1HLD Design
2 Demand analysis
3 Business package development
4 Enter the production environment
5 Network element driver package development
Answer: 2-1-5-3-4

547.NETCONF defines a series of operations, please match NETCONF operations and functions
accordingly.

133 / 149
The safer , easier way to help you pass any IT exams.

Answer:

548.In the network shown in the figure, user access authentication needs to be deployed. Please select
the appropriate authentication method at different authentication points.

134 / 149
The safer , easier way to help you pass any IT exams.

Answer:

549.CE1 and CE2 belong to the same VPN, and the name of the VPN instance is vpna. Through option C
mode 1, CE1 and CE2 can communicate with each other.

To accomplish this, match the following command line with the device number.

135 / 149
The safer , easier way to help you pass any IT exams.

Answer:

550.There is a certain order in the execution of QOS, please sort the following QOS function modules in
the correct order.

136 / 149
The safer , easier way to help you pass any IT exams.

Answer:

551.There are three types of channels in the Huawei SD-WAN solution architecture. Please correspond
the channels and their names in the figure one by one.

137 / 149
The safer , easier way to help you pass any IT exams.

Answer:

552.gRPC is a language-neutral, platform-neutral, open source remote procedure call (RPC) system. The
gRPC protocol stack has five layers, please arrange the gRPC protocol stack in order from the lower layer
to the upper layer.

Answer:

138 / 149
The safer , easier way to help you pass any IT exams.

553.Authentication header AH (Authentication Header, packet authentication header protocol) in IPsec is


an IP-based transport layer protocol, and its IP protocol number is ( ). (fill in Arabic numerals).
Answer: 51

554.As shown in the figure, the entire network of a company uses OSPF to connect the network, but
Router S and Router E cannot establish an OSPF neighbor relationship. When network administrators
detect OSPF faults, they can run the display ospf 100 interface CE0/0/1 ( ) command on RouterS to
obtain error-related information. Users can diagnose OSPF faults based on the information. (Please use
English lowercase letters to complete the command, and the command cannot be abbreviated)

Answer: error

555.As shown in the figure, R1, R2, R3, and R4 are in the same MPLS domain, and LDP is used to
distribute MPLS labels between devices. R4 is the Egress LSR of the FEC 4.4.4.0/24. If R1 wants to
access 4.4.4.0/24, R4 does not need to query the label table but can know the forwarding priority of the
data, then the outgoing label of R3 for the FEC is ( ). (Please fill in the Arabic numerals directly without
symbols).

Answer: 0

556.By executing the ( ) command, users on different ports in the same VLAN can be completely isolated
at Layer 2 and Layer 3 and cannot communicate. (Please use English lowercase letters to complete the
command, and the command cannot be abbreviated)
Answer: port-isolate mode all

557.CE1 and CE2 belong to the same VPN, and the name of the VPN instance is vpna. Through Option C
mode 1, CE 1 and CE 2 can communicate with each other. To meet this requirement, ASBR-PE1 is
configured with two routing policies ( ) for [ASBR-PE1-bgp]peer route-policy policy2 export (only fill in the
IP address).

139 / 149
The safer , easier way to help you pass any IT exams.

Answer:
10.0.34.4/10.0.4.4

558.NCE has five security groups are ( ). (separated with commas)


Answer:
Static security group, dynamic security group, Any security group, escape security group, unknown
security group

559.As shown in the figure, please associate the user authentication result with the corresponding access
authority. (Drag and drop)

Answer:
Before certification 1
Failed certification or failed security check2
Certification passed 3

140 / 149
The safer , easier way to help you pass any IT exams.

560.Please match the following commands to their functions.

Answer:

561.The figure shows an enterprise WAN bearer network. Please plan appropriate metric values for the
four links in the figure.

Answer:

562.The Python script of the OPS (Open Programability System) function of Huawei network equipment
uses the HTTP method to access the management objects of the network equipment. Please drag the
HTTP method to correspond to its function.

141 / 149
The safer , easier way to help you pass any IT exams.

Answer:

563.There are three levels of queues in HQoS: Level1l, Level2, and Level3. Please map the following
queue names to the queue levels one by one. (Drag and drop)

Answer:

564.For VXLAN-based virtualized campus network planning, three main module designs need to be
considered, including underlay network design, fabric design, and overlay network design. Please drag
the module on the left below to the corresponding current module on the right for specific considerations.
(Drag and drop)

142 / 149
The safer , easier way to help you pass any IT exams.

Answer:

565.Please match the following authentication technologies to their applicable scenarios. (Drag and drop)

Answer:

566.As shown in the figure, there is a packet containing a three-layer label header. Please select the
values (decimal) corresponding to the X, Y, and Z fields in the figure.

143 / 149
The safer , easier way to help you pass any IT exams.

Answer:

567.CE1 and CE2 belong to the same WPN, and the name of the VPN instance is vpna. CE1 and CE2
can communicate with each other through OptionC mode 1. To accomplish this, match the following
command line with the device number. (Drag and drop)

144 / 149
The safer , easier way to help you pass any IT exams.

Answer:

568.The virtualized campus network deployed through the iMaster NCE-Campus is shown in the figure,
and the parameters and the positions where the parameters are deployed are in one-to-one
correspondence.

145 / 149
The safer , easier way to help you pass any IT exams.

Answer:
123456
1. Export interconnect vlan
2. Loopback
3. Vxlan tunnel
4. BD
5. Transparent transmission of BPDUs
6. Access vlan

569.The configuration shown in the figure is executed on R2 to filter all the received routes. Suppose
there is a BGP route with the AS_Path attribute of [100 200 300 400] on R1 that needs to be sent to R2.
Please help the network administrator to adjust the route on R1. The order of AS in the AS_Path attribute
ensures that routing entries will not be filtered by R2's routing policy.

100 This space corresponds to the [A] space in the routing policy
200 This space corresponds to the [B] space in the routing policy
300 This space corresponds to the [C] space in the routing policy
400 This space corresponds to the [D] space in the routing policy
Answer:
200 400 100 300

570.As shown in the figure, if the packet describes an IPsec packet in tunnel mode, please insert the
corresponding packet header into the correct position. (Drag and drop)

Answer:
New IP Header 1
AH Header 2
ESP Header 3
Raw IP Header 4

571.During the SSH algorithm negotiation phase, the two parties send SSH packets to each other, and
the packets contain a list of multiple algorithms supported by them. For the composition of the algorithm
list. Please sort them in the order of negotiation (that is, which class algorithm is negotiated first, which
class algorithm is negotiated second, and so on).

146 / 149
The safer , easier way to help you pass any IT exams.

Answer:

572.Please match the OSPFv3 LSA with its delivery range.

Answer:

573.The following is the main process for the controller to issue an SR-MPLS Policy. Please sort the
processes in order.

147 / 149
The safer , easier way to help you pass any IT exams.

Answer:

574.VGMP defines multiple packet types. Please match the packet type and function.

Answer:

575.Please sort the traffic categories: marking, policing, shaping, congestion management, congestion
avoidance:
A. Policing

148 / 149
The safer , easier way to help you pass any IT exams.

B. Marking
C. Congestion Avoidance
D. Congestion Management
E. Shaping
Answer: BACDE

149 / 149

You might also like