Topic 1: Exam Pool A
Which information of the data frame is used by the interface to determine whether to forward Layer 2 or Layer 3 forwarding? ()
A.
Source IP
B.
Source MAC
C.
Destination port
D.
Destination MAC
Destination MAC
Network switch A and router A are connected by two links. The two links are aggregated in manual load sharing mode. The aggregated port number is 1, and the aggregated link
needs to carry VLAN TAG100 when forwarding data. The switch When A uses a trunk link,
which of the following configurations need to be used by switch A? ()
A.
4
B.
5
C.
3
5
As shown in the figure, the administrator hopes that all hosts cannot access the Internet
from 8:00 to 17:00 every day. Which ACL rule needs to be bound to traffic-filter outbound in
the interface configuration of G0/0/1? () (Single-choice question)
A.
time-range am9 to pm5 08:00 to 17:00 daily # Acl number 2001 Rule 5 deny time-range am9 to pm5 #
B.
time-range am9 to pm5 07:00 to 18:00 daily # Acl number 2002 Rule 5 permit timerange
am9 to pm5 #
C.
time-range am9 to pm5 08:00 to 17:00 off-day # Acl number 2004 Rule 5 permit timerange
am9 to pm5
time-range am9 to pm5 07:00 to 18:00 daily # Acl number 2002 Rule 5 permit timerange
am9 to pm5 #
The role of the OSPF protocol is
A.
Pass routing information
B.
Transmit MAC information
C.
Pass ARP information
D.
No effect
Pass routing information
NAPT distinguishes the IP addresses of different users through the protocol numbers in
TCP, UDP, or IP packets ()
A.
True
B.
False
False
The network administrator configures the RTA on the Huawei router as shown in the figure.
If a user needs to be authenticated in the authentication domain "huawei", which of the
following descriptions is correct? () (Single-choice question)
(RTA) aaa
(RTA-aaa) domain huawei
(RTA-aaa-doaain huavei) authentication -schene au1
(RTA-aaa-dogairhuavel) authenticIcation-schene au2
A.
Authentication-scheme aul authentication will be used. If "au1 is deleted."au2
authentication will be used
B.
Authentication-scheme au2 authentication will be used. If "au2" is deleted, "aul
authentication will be used
C.
Will use "authentication-scheme au2" authentication
Will use "authentication-scheme au2" authentication
The Backup port in RSIP can replace the failed root port. ()
A.
True
B.
False
False
The network management system can only view the operating status of the device through the SNMP protocol, but cannot issue the configuration ()
A.
True
B.
False
False
The role of the collaboration layer in the SDN architecture is to complete job deployment
based on user intentions. OpenStack belongs to the business collaboration layer ()
A.
True
B.
False
False
By default, the root path cost of the root bridge in the STP protocol must be 0 ()
A.
True
B.
False
True
Page 17 out of 72 Pages |
Previous |