
True False
False
2.an ospf hello message carries a list of known neighbors
True False
True
3.only router-LSAs and Network-LSAs are involved in intra-area route calculations
True False
True
4.only one BGP process can be configured on a router
True False
True
5.an ip-prefix-filter is used to filter ip prefixes and data packets
True False
False
6.RSTP has all functions that STP has and it is backward compatible with STP.
True False
True
7.TO enable an eudemon in routing mode to work like a router,you need to assign ip addresses to interfaces and enable dynamic or static routing protocols on the eudemon.
True False
True
8.The eudemon that is working in transparent mode detects processes data at layer 2.Its interfaces are not configured with ip addresses.
True False
True
9.When an eudemon is working in composite mode,some of its interfaces are configured with ip addresses (Layer 3 interfaces) and the other interfaces are not configured with ip addresses(Layer 2 interafces). To enable dual-system hot backup on an eudemon,you can configure the eudemon to work in composite mode.
True False
True
10.Two Eudemons in dual-system hot backup can be working in active-active mode or active-standby mode.
True False
True
11.The eudemon supports load balancing between multiple uplinks.
True False
True
12.Different virtual firewall instances on an Eudemon must be configured with the same security policy.
True False
False
13.The firewall can be working in routing mode, transparent mode,or composite mode. The default mode is the composite mode.
True False
False
14.Virtual firewalls on the Eudemon are not allowed to access each other by default unless a security policy is specified.
True False
True
15.IP addresses added to the blacklist of the Eudemon cannot be deleted.
True False
False
16.You cannot set an aging time for the blacklist of the Eudemon.
True False
False
17.The Eudemon generates a blacklist upon detecting an attack.
True False
False
18.The Eudemon can control traffic and connections based on IP addresses.
True False
True
19.The firewall does not use security rules to filter packets exchanged between interfaces in the same zone.
True False
True
20.Network address translation (NAT) translates only IP address information.
True False
False
21.IP unnumbered is to borrow an IP address from an interface.If an interface has multiple IP addresses,all its IP addresses will be borrowed and the primary address will continue after these IP addresses are borrowed.
True False
False
22.When two Eudemon are working in dual-system hot backup mode,their session tables are backed up in real time.
True False
True
23.After an interface on a firewall is added to a zone, the interface belongs to the zone.
True False
True
24.Status detection is an advanced communication filtering mechanism.It checks the application layer protocol and monitors the status of the connection-based application layer protocol.For all connections,the status information about each connection is maintained by ASPF and is used to dynamically determine whether to permit or deny data packets to firewalls.
True False
True
25.The NAT multi-instance function on the Eudemon independently maintains a NAT table for each instance to provide address translation services for instances.
True False
True
26.The IPSec function on the Eudemon supports NAT traversal.
True False
True
27.The NAT function enabled on the Eudemon does not greatly affect system performance.
True False
True
28.The Eudemon does not support port mapping.
True False
False
29.In a Land attack,the source address and destination address of an SYN packet are both the IP address of the attacked object or a loopback address.
True False
True
30.The association between the IDS and firewall requires that the IDS be directly connected to the firewall.
True False
False
31.Security policies for the firewall are applied to interzones but not to interfaces.
True False
True
32.The multi-channel protocol is used to establish at least two channels(sessions) for communications or services.
True False
True
33.ICMP packets are sent in a smurf attack and UDP packets are sent in a Fraggle attack.
True False
Trun
34.The urgent pointer in the flag field of an IPv4 packet header is generally used for 00B data transmission.
True False
True
35.A firewall filters packets exchanged between zones but does not filter packets exchanged between intefaces in the same zone.
True False
True
36.Two Eudemon in dual-system hot backup mode can be working in active-active mode or active-standby mode.
True False
True
37.Two Eudemon in dual-system hot backup mode use Huawei Redundancy Protocol(HRP) to back up key information (such as configuration commands and session status) between the active and standby devices.
True False
True
38.The Eudemon uses the blacklist technology to associate with an NIP IDS.
True False
True
39.Qos provides services of different qualities to meet various application requirements,including dedicated bandwidth, decreased packet loss ratio,short packet transmission delay, and decreased delay and jitter.
True False
True
40.In traffic shaping,the packet whose transmission rate exceeds the rate limit will be discarded or re-marked
True False
False
41.WFQ can effectively control the delay and jitter by means of configuring weights for different services.
True False
True
42.Congestion occurs when a link or node is carrying so much data that its quality of service deteriorates.
True False
True
43.Most fields in IP headers of packets in the same data flow are identical,You can compress these fields to improve the link transmission.
True False
True
44.The variation in packet delay is called jitter.
True False
True
45.The end-to-end delay is the sum of transmission delays,processing delays,and queuing delays along the packet forwarding path.
True False
True
46.The data transmission rate depends on the bandwidth.
True False
True
47.Packet loss occurs only on the packet receiver
True False
False
48.Based on specific rules,traffic classification identifies packets having the same characteristics, Traffic classification is the prerequisite and basis for differentiated services.
True False
True
49.Congestion management provides means to manage and control traffic when traffic congestion occurs.
True False
True
50.The traditional packet loss policy uses the Tail-Drop method.
True False
True
51.The IP packet has a special field to mark the Qos. For example,the last 6 bits in the Tos field of an IPv4 packet mark the DSCP value.
True False
False
52.In traffic shaping, the packet whose transmission rate exceeds the rate limit will be discarded or re-marked.
True False
False
53.WFQ can effectively control the delay and jitter by means of configuring weights for different services.
True False
True
54.Congestion occurs when a link or node is carrying so much data that its quality of service deteriorates.
True False
True
55.Most fields in IP headers of packets in the same data flow are identical. You can compress these fields to improve the link transmission efficiency.
True False
True
56.Complex traffic classification matches packets with rules and then takes actions to matching packets.
True False
True
57.Traffic shaping usually buffers packets that need to be dropped by traffic policing by means of buffer and token bucket.
True False
True
58.In traffic policing using two token buckets,tokens are put into the CBS bucket at the committed information rate(CIR),The peak burst size(PBS) bucket is filled in only after the CBS bucket is full.
True False
True
59.The interface IP address and virtual IP address configured for VRRP must not be identical.
True False
False
60.A VRRP virtual router can have one or more IP addresses.
True False
True
61.The virtual router uses a virtual MAC address but not the actual MAC address of the interface to respond to an ARP request.
True False
True
62.A VRRP backup group is able to track the status of an interface. If the interface configured with a VRRP backup group fails or any interface on the router fails,the VRRP backup group provides
True False
True
63.By using VRRP, the backup router in a VRRP backup group immediately becomes the master router after detecting a fault and instructs its attached hosts to perform a master/slave switchover accordingly. This ensures that services will recover within a short period of time.
True False
False
.The reliability of a product or a system is generally evaluated with the two indicators of Mean time to repair (MTTR) and mean time between failures(MTBF).
True False
True
65.BFD detects the link status immediately after a BFD session is set up .if BFD parameters are modified or deleted at one end of the BFD session,the other end will consider such a modification or deletion as a fault and services will be then affected, Therefore,exercise caution when modifying or deleting BFD parameters.
True False
False
66.One CV packet per second is generated on the ingress LSR of the LSP and receivd by the egress LSR, this generation rate is low and allows no adjustment,hence,the CV packet is usually used for checking the availability of a common LSP.
True False
True
67.BFD packets are classified into control packets and echo packets.
True False
True
68.A BFD session is set up following the three-way handshake during which parameters for the BFD session are negotiated. After the BFD session is set up,modifying the detection time parameters does not take effect.
True False
False
69.The NSF function takes effect only after the GR function is enabled on two directly connected routers that use static routes for communication between users in different network segments.
True False
False
70.During the GR of dynamic routing protocols(such as OSPF and BGP)neighbor relationships remain unchanged.
True False
False
71.BFD is a common fast detection technology,It implements the fast switchover function only when collaborating with other fast switchover
True False
True
72.BFD (a fast detection technology) enabled on a device quickly identifies a fault and reports the fault to the appropriate protocol modele after detecting a master/slave switchover on the neighboring devic,this causes the protocol module to quit the GR. AS such,BFD and GR cannot be used together.
True False
False
73.In OSPF,the process of calculating shortest path tree can be divided into two phases,calculate transit node first,then calculate stub network.
True False
False
74.In the process of calculating SPF tree,the cost from a node to root node equals to metric listed in the Router LSA generated by the node.
True False
False
75.BGP is an exterior gateway protocol,which runs among Ass,It focuses on routes control and selection of optimal routes rather than discovery and calculation of routes.
True False
True
76.OSPF supports the combination of a group of network segments.Such a group is also called an area.In other words,an area is a set of network segments.
True False
True
77.The value of ospf dr-priority ranges from 0 to 255 and the default value is .
True False
False
78.A broadcast and an NBMA network.each having two or more routers,must both have a DR and a BDR.
True False
False
79.The vlink-peer command is used to specify a peer IP address for setting up a virtual link.
True False
False
80.Different types of networks cannot establish an adjacency in the Full state.
True False
False
81.Different network segments can be in the same OSPF area and the same network segment can be in different OSPF areas.
True False
False
82.OSPF supports two authentication modes:area authentication and interface authentication.The two authentication modes cannot be configured at the same time.
True False
False
83.Each router running OSPF has a router ID,A router ID is a 32-bit integer and uniquely identifies a router,Hence,even of routers in different Ass,the router IDs must be different.
True False
False
84.The most remarkable characteristic of OSPF is that OSPF supports the link-state algorithm.
True False
True
85.OSPF directly runs over the IP protocol,Its IP protocol number is
True False
True
86.If the Router Priority of a router is set to 0,this router cannot be elected as a DR or a BDR.
True False
True
87.On a non-broadcast network,OSPF has two operating modes:NBMA and P2MP
True False
True
88.By default,the cost of an OSPF interface is related to interface bandwidth.The algorithm for calculating the cost is:
True False
True
.On a broadcast network or an NBMA network,not all neighbors need to set up adjacencies.Therefore,the concept about the adjacency is applicable to only the broadcast network or the NBMA network.
True False
False
90.The NBMA mode requires all the routers in the network to be fully connected:otherwise,it does not function.
True False
False
91.When two routers exchange LSDB information by exchanging DD packets,a master/slave relationship is established between the two routers,The router with a larger router ID is the master.
True False
True
92.If both the ospf cost and bandwidth-reference commands are configured on an interface.the value set in the ospf cost command is used as the cost of the interface.
True False
False
93.The bandwidth-reference parameter is measured in Mbit/s
True False
True
94.The asbr-summary command only contains the not-advertise parameter but not the advertise parameter.
True False
True
95.Each DD packet has a DD sequence number for packet acknowledgment.A DD sequence number is two-byte long.
True False
True
96.On a broadcast network or an NBMA network,a router with a higher Router Priority is elected as a DR.
True False
False
97.The LS Sequence Number field is used to detect expired and duplicate LSAs,This field is a signed 32-bit integer and therefore the minimum LS Sequence Number is 0x80000000
True False
False
98.The LSAs with the same LS Sequence Number and LS age are the same LSA.
True False
False
99.ABRs of a Stub area do not flood type-5 and type-4 LSAs to the stub area.Therefore,the stub area does not have the external AS routing capability.ABRs of the stub area advertise a default route to the stub area to guide packet forwarding to the external of the AS.
True False
True
100.The ABR in a Totally Stubby area will not advertise Type-3,Type-4,and Type-5 LSAs to the Totally Stubby area.Instead,the ABR will advertise a default route to the Totally Stubby area to guide forwarding of packets destined for other areas.
True False
True
101.The ABR of an NSSA will not advertise Type-4 and Type-5 LSAs to an NSSA but can import external routes into the NSSA.
True False
True
102.Different from a Stub area,an NSSA supports Type-5 LSAs.
True False
False
103.ABRs advertise link status information about connected non-backbone areas to the backbone area.The backbone area then advertises the routing information about the backbone area cannot be advertised to non-backbone ares.
True False
False
104.Type 2-external routes always take precedence over type 1-external routes
True False
False
105.The import-route limit command is used to set the maximum number of external routers that can be imported into an OSPF process.
True False
True
106.An Autonomous System (AS) is a set of routers under a single technical administration,using the same routing policy.
True False
True
107.BGP peers are automatically discovered by exchanging multicast packets.
True False
False
108.The router ID configured in the system view takes precedence over the router ID configured in the BGP view.
True False
False
109.A failure in establishing a BGP peer relationship can be addressed by checking the TCP connectivity and BGP peer configurations.
True False
True
110.In BGP,performing MD5 authentication between BGP peers can protect them from Dos attacks.
True False
True
111.In the VRP,by default,the routes imported by BGP are not automatically summarized.
True False
True
112.Based on BGP route selection rules,a local route that is automatically summarized takes precedence over a local route that is manually summarized.
True False
False
113.Once a BGP connection is established,a BGP speaker advertises all the optimal routes in the BGP routing table to its BGP peer.
True False
True
114.Whatever changes occur in the BGP routing table,a BGP speaker advertises all the optimal routes in the BGP routing table to its BGP peer
True False
False
115.In the VRP,by default,a BGP router automatically retransmits an Update packet to its BGP peer after the outbound routing policy of the BGP peer changes.
True False
True
116.IGP routes can be installed into the BGP routing table by running either the network or import-route command.
True False
True
117.In the VRP,by default,a BGP router does not automatically send a Refresh to request its BGP peer to retransmit an Update packet after the inbound routing policy of the BGP peer changes.
True False
False
118.Using the peer connect-interface command to establish multiple peer relationships between two routers connected through multiple links is recommended.
True False
True
119.Based on BGP route selection rules,the route with the lowest local-preference is preferred.
True False
False
120.Based on BGP route selection rules,the route with the smallest MED value is preferred.
True False
True
121.The origin attribute of the BGP route that is imported by using the network command is IGP
True False
True
122.The BGP community attribute is a well-known mandatory attribute.
True False
False
123.An ACL is used to match routing information or data packet addresses so as to filter out the unmatched routing information or data packets.
True False
True
124.The system can perform ACL rule matching only based on the configuration order of rules.
True False
False
125.Generally,the performance of an IP-prefix-filter is higher than that of an ACL.
True False
True
126.An AS-path-filter is used to filter as-path attributes of BGP routes.The as-path attribute is actually a character string defined by using a regular expression.
True False
True
127.Default routes between routers are a low-cost solution.this is because using default routes requires less system resources than maintaining a complete routing table.
True False
True
128.An AS-path-filter uses the regular expression[0-9]+$ to indicate all as-path attributes.
True False
False
129.Regular expressions can be used in both the community-filter and AS-path-filter to define the attribute mode used for route filtering
True False
True
130.Route filtering can filter not only routing information but also link-status information.
True False
False
131.For link-status routing protocols,filtering routes in the inbound direction actually cannot block the transmission of link-status information.the filtering effect is that routes cannot be injected into the local routing table but neighbors can still receive complete route status information and calculate complete routes.
True False
True
132.All routing protocols can deliver default routes,supporting both forcible delivery and non-forcible delivery.
True False
False
133.IF different routing protocols run on different networks and these networks need to share routing information,route importing can be used
True False
True
134.The route selection tool route-policy can filter and set BGP attributes based on pre-defined conditions.therefore,this tool is commonly used to define policies for BGP peers and often used in route
True False
True
135.When importing routes discovered by other routing protocols,a routing protocol may need to import only the routes that meet the conditions and set attributes of the imported routes to meet the requirement of the protocol,In such a case,a route-policy can be created.
True False
True
136.Policy-based routing and routing policy affect the forwarding of data packets in different ways:A routing policy mainly controls packet forwarding,According to the routing policy,packets can be forwarded with no need to use a routing table:policy-based routing mainly controls the importing,advertising,and receiving of routing information so as to affect the forwarding of data packets.
True False
False
137.The unicast and multicast technologies are both outstanding in solving the problem of one source and multiple destinations for efficient P2MP data transmission.
True False
False
138.The IGMP protocol runs between a host and its directly connected multicast router.
True False
True
139.Layer 3 switch has layer 2 capability as well as layer 3 routing capability
True False
True
140.STP distributes configuration message by sending BPDU packet to each other
True False
True
141.A switching network has been enabled with STP protocol.To provide fast access speed to the file server for most of the users,the switch that is directly connected with file server is configured as the root bridge
True False
True
142.IF loop exists and STP is not enabled,the switch will not operate normally
True False
True
143.RSTP adopts fast convergence mechanism,So,there is no forward delay interval in RSTP
True False
False
144.Two switches are directly connected to each other and they are working in full duplex mode.By default,RSTP will consider the link between the switches as point-to-point link
True False
True
145.In RSTP network environment,a port can be set as edge port when it is directly connected with terminal
True False
True
146.In a switching network that runs RSTP,the topology change notification message will not be sent when the switch detects that the Alternate port is faile.
True False
True
147.VLANs isolate broadcast domains,eliminates broadcast storms,and enhances information security
True False
True
148.Before establishing a network,we must create VLANs,the users that do not need to communicate with each other should be added to the same VLAN for isolation
True False
False
149.The port isolation function can isolate the ports on the same switch
True False
True
150.When configuring VLAN mapping,you must set the priority of outer VLAN ID
True False
False
151.On a switch running GVRP,each interface is considered as a participant.the participants can exchange information
True False
True
152.A switching network has been enabled with STP protocol,To provide fast access speed to the file server for most of the users,the switch that is directly connected with file server is configured as the root bridge
True False
True
153.When configuring VLAN mapping,you must set the priority of outer VLAN ID
True False
False
154.QinQ provides a simplified layer 2 VPN tunnel
True False
True
155.The STP protocol cannot prevent MAC address table flapping caused by loops on the layer 2 network
True False
False
156.According to the MSTP protocol,each MST instance calculates an independent spanning tree by using the RSTP algorithm
True False
True
157.The traditional antivirus system prevents viruese on each node separately and may fail to prevent many security threats
True False
True
158.NAC is an end-to-end security solution.it protects network security from user terminals instead of network devices
True False
True
159.If 802.1x authentication is enabled on an interface,MAC address authentication (enabled by the mac-authen enable command) and direct authentication(enabled by the direct-authen enable command) cannot be enabled on the interface
True False
True
160.The option field in DHCP messages uses the CLV mode
True False
True
161.The option field in DHCP messages has a fixed length of four bytes
True False
False
162.If only some devices on a network run MPLS (MPLS domain is encapsulated in the IP packet header),labels are generated only for direct routes of devices running MPLS.labels are not generated for the routes originated from other devices running IP protocols
True False
True
163.The core of the MPLS technology is label switching.
True False
True
1.In MPLS VPN configuration,you can choose from various types of routing protocols to configure between PEs and CEs.any type of routes can be imported to a VPN instance by using the import command
True False
True
165.VRF refers to VPN instance.It is an entity that a PE maintains for its directly connected site
True False
True
166.On an MPLS VPN network,CEs and PEs can use the same routing protocol or different routing protocols to exchange routing information,the routing protocols are independent from one another
True False
True
