If the network administrator assigns the IPv4 address 192.168.1.1/28 to a host on the network, how many hosts can be added to the network where the host resides?
When a host uses the IP address 192.168.1.2 to access the Internet, NAT must be performed.
The Priority field in a VLAN tag can be used to identify the priority of a data frame. What is the value range of the field?
The network administrator performs the configuration shown in the following figure on RTA. If a user needs to be authenticated in the authentication domain named huawei, which of the following statements is true?
Which of the following statements regarding static routing and dynamic routing is incorrect?
By referring to the network structure and OSPF areas shown in the figure, it can be determined that all routers on the network except RTA are ABRs.
When the host accesses the web service of the server, the value of the "Protocol" field at the network layer is 6.
Which SNMP version focuses on two main aspects, namely security and administration? The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.
A Layer 2 ACL can match information such as the source MAC address, destination MAC address, source IP address, and destination IP address.
Which statement is true regarding the following command?
ip route-static 10.0.12.0 255.255.255.0 192.168.1.1
Which of the following MAC addresses cannot be used as the MAC address of host network adapters?
If the transport-layer protocol is UDP, the value of the "Protocol" field at the network layer is 6.
The rules in an ACL may overlap. If packets match the rules with loose conditions, the later ACL rules are not processed. In this case, packets cannot match the rules with strict conditions. Therefore, the rules with strict conditions must be arranged in front lines and those with loose conditions must be arranged towards the end.
Which of the following IPv4 addresses can be directly used by a host to access the Internet?
(Refer to the display startup command output shown in the figure on an AR2200 router. Which of the following statements about the command output is false?)
MainBoard:
Startup system software: sdl:/ar2220-v200r003c00spc200.cc
Next startup system software: sdl:/ar222b-v200r003c00spc200.cc
Backup system software for next startup: null
Startup saved-configuration file: null
Next startup saved-configuration file: null
Startup license file: null
Next startup license file: null
Startup patch package: null
Next startup patch package: null
Startup voice-files: null
Next startup voice-files: null
On VRP, the command lines are classified into four levels in increasing priority: Visit level, Monitoring level, Configuration level, and Management level. At which level, the operator is permitted to configure service but is not permitted to operate the file system?
Which of the following configurations can prevent Host A and Host B from communicating with each other?
What is used as the data link-layer MAC address that identifies each VAP on an AP?
The data link layer uses PPP encapsulation. The IP addresses of the two ends of the link can be in different network segments.
For STP, the Message Age in the configuration BPDUs sent by the root bridge is 0.
Which of the following mask lengths is recommended for device interconnection IP addresses during campus network planning?
Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed. What actions can be taken by the administrator to prevent further changes?
Which of the following is not a common network layer in a midsize campus network?
Refer to the following configuration of a switch interface. Which of the following statements is false?
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 200
port trunk allow-pass vlan 100
The router that runs OSPF first enters the Full state and then synchronizes the LSDB.
(When a network engineer enters a command, the following information is displayed:
Error: Unrecognized command found at 'A' position. Which of the following statements is true about such information?)
(The IPv6 address architecture does not include which of the following address types?)
(Which of the following methods can be used to assign service VLANs during campus network planning?)
It is advised to assign static IP addresses to servers during campus network planning.
When an AP and an AC are located on different Layer 3 networks, which of the following methods is recommended for the AP when discovering the AC?
The users who log on the router through Telnet are not permitted to configure an IP address. What is the possible reason?
In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?
Which of the following statements about static routes on Huawei devices is false?
The following figure shows the configuration of a sub-interface on a router. For which VLAN does the sub-interface receive tagged data frames?
For the Versatile Routing Platform (VRP), the login timeout period can be set only on a VTY interface.
On the network shown in the following figure, assuming that SWA, SWB, and SWC retain factory defaults, which of the following ports will be selected as a designated port?
Which of the following is the default value of the Router Dead Interval field in OSPF Hello packets on a broadcast network?
Which of the following commands sets the data forwarding mode on an AC to direct forwarding?
An administrator wishes to manage the router in the remote branch office, which method can be used?
You can run the user-interface maximum-vty command to configure the maximum number of users who can log in to the device through Telnet simultaneously.
(The administrator performs the configuration shown in the figure on a router, and a host is connected to Gi/0/0 of the router. Which of the following statements is true about the IP address obtained by the host through DHCP?)
Which of the following methods is not supported by the Versatile Routing Platform (VRP) to configure a router?
An ACL rule is as follows. Which of the following IP addresses can be matched by the permit rule?
rule 5 permit ip source 10.0.2.0 0.0.254.255
Refer to the display startup command output shown in the figure. Which of the following statements are true?
When an Ethernet frame is received by an interface on a Layer 2 Ethernet switch, which field is used to generate an entry in the MAC address table?
On the Huawei VRP, what is the default preference of different route types, in descending order?
If Proto of a route displayed in the routing table is OSPF, the preference of the route must be 10.
A network administrator wishes to assign an IP address to a router interface G0/0/0. Which of the following IP addresses can be assigned?
Refer to the following configuration of an interface on a switch. For which VLAN does the interface remove VLAN tags before forwarding data frames?
go
CopyEdit
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 10
port trunk allow-pass vlan 10 20 30 40
On the network shown in the figure, Host A and Host B cannot communicate with each other.
In the following figure, all links are Ethernet links, and all interfaces on the routers are running OSPF. Given this, how many DRs will be elected on this network?
An ACL is essentially a packet filter. An ACL takes effect only after it is applied to a service module.
A Layer 2 switch works at the data link layer. As such, it can identify MAC addresses in data frames, forward data based on MAC addresses, and record mappings between MAC addresses and interface numbers in its MAC address table.
Which of the following states indicates that the OSPF neighbor relationship has been established?
After a switch restarts, static MAC address entries saved on the switch remain in the MAC address table.
If the value of the "Type/Length" field of an Ethernet data frame is 0x0800, the length range of the upper-layer packet header carried by the data frame is from 20B to 60B.
According to the one-armed routing configurations shown in the figure, even if ARP proxy is disabled on the sub-interface of R1, the Administration Dept and Finance Dept can still communicate with each other.