Documente Academic
Documente Profesional
Documente Cultură
Answer: A,B,D
QUESTION NO: 2
m
Which of the following are reason for using layer 3 switches instead of routers in a LAN? ( )
.co
A. Isolate the broadcast domain.
B. Cost less.
C. Enable more route policies. ng
D. Based on the hardware, the packet is forwarded in line-speed.
Ki
Answer: B,D
am
QUESTION NO: 3
Ex
A. Convergence layer
ee
B. Core layer
C. All layers
Fr
D. Access layer
Answer: D
QUESTION NO: 4
A. PPP
B. ATM
C. Ethernet-II
D. LAPB
E. X.25
Answer: A,B,D,E,F
QUESTION NO: 5
A. PPP
B. LAPB
C. X.25
D. ATM
m
E. Frame-Relay
.co
F. Ethernet-II
Answer: A,B,C,D,E
QUESTION NO: 6
ng
Ki
Which of the following are advantage in segmenting the network with layer 2 Ethernet switches? (
am
A. Minimize collisions
B. Prohibit the broadcast packet from being dispatched
Ex
Answer: A,C
Fr
QUESTION NO: 7
Comparing with POS, the implementation of ATM is more complex and expansive. ( )
A. True
B. False
Answer: A
QUESTION NO: 8
Answer: B
QUESTION NO: 9
m
2 VLANs are specified on a layer 2 Ethernet switch. Interface 1, 2 and 6 are assigned to VLAN2
.co
for the engineering department. Interface 3, 4 and 5 are assigned to VLAN3 for the marketing
department. How does the marketing department communicate with the engineering department?
()
Answer: C
Ex
QUESTION NO: 10
ee
A frame relay network can be full-meshed. If there are 6 routers connected to the frame relay
network, the required number of PVCs will be ( ).
Fr
A. 30
B. 6
C. 5
D. 15
Answer: D
QUESTION NO: 11
A. Routing design
Answer: A,B,C,D
QUESTION NO: 12
What are the two ATM cells defined in the B-ISDN network? ( )
A. VCI
B. VPI
m
C. NNI
.co
D. UNI
Answer: A,B
QUESTION NO: 13
ng
Ki
Normally, What equipments are needed for an ISP?
am
A. DNS server
B. Routers
C. RADIUS server
Ex
D. Access server
E. Web server
ee
Answer: A,B,C,D,E
Fr
QUESTION NO: 14
The LAN varies from WAN in many terms. The most significant difference is that LAN which has
only one computer communication network consists of no network layer but two lowest layers. ( )
A. True
B. False
Answer: B
QUESTION NO: 15
A. Broadcast data
B. Frame size
C. Error check mechanism
D. Traffic control policy
Answer: A,B,C,D
QUESTION NO: 16
m
ISDN provides two types of service. Which is the one supported by the BRI interface? ( )
.co
A. 23B+D
B. 2B+D
C. 1B+2D
D. 30B+D ng
Ki
Answer: B
am
QUESTION NO: 17
A. Meshed network
ee
Answer: B,C,D
QUESTION NO: 18
A router running OSPF, an interface of which belongs to Area 0, and another of which belongs to
Area 9. Five static routes are imported. How many LSAs will the router produce at least? ( )
A. 10
B. 5
C. 9
D. 8
Answer: C
QUESTION NO: 19
m
Answer: A
.co
QUESTION NO: 20
Answer: B,C
ee
QUESTION NO: 21
Fr
Which of the following are right description to the range of the subnet IP address in an IP network?
()
A. The IP address unnumbered can be adopted to save the IP address, so the subnet address
range should be smaller than the necessary.
B. All of the above contains something reasonable, but not reasonable enough to be carried out in
practice.
C. The subnet address range should meet the actual requirement, and have the redundancy for
the future extending.
D. The IP address range should be the exponential of 2 for the convenience of policy
implementations.
Answer: C,D
QUESTION NO: 22
A. Central radiation
B. Partial mesh
C. Full mesh
D. Full mesh in use of sub-interfaces
Answer: A,B,C,D
m
.co
QUESTION NO: 23
In a frame relay network, what protocol is used to monitor and control the state of PVC? ( )
A. FECN
B. LMI
ng
Ki
C. BECN
D. DLCI
am
Answer: B
Ex
QUESTION NO: 24
ee
The switch dispatches a BPDU (Bridge protocol data unit) from all its activated interfaces in a
certain amount of time. When the other switches receives the BPDU, they compute with the STA
(Spanning Tree Algorithm) to see whether there is a loop in the network. ( )
Fr
A. False
B. True
Answer: B
QUESTION NO: 25
Multiple mediums can be chosen for LANs. Which has the furthest transmission distance? ( )
Answer: C
QUESTION NO: 26
Suppose that a central station connects to a frame relay network via a serial line. Five virtual
circuits have been defined to communicate with 5 remote stations respectively. Now the remote
station can not receive the route update packet, which by examination is caused by split horizon.
What do you suggest to resolve this problem? ( )
m
A. Specify static routes
.co
B. Modify the metric
C. Enable sub-interfaces
D. Disable the split horizon
E. Filter the route
Answer: A,C,D
ng
Ki
am
QUESTION NO: 27
A. Service availability
ee
Answer: A,B,C,D
QUESTION NO: 28
Which of the following items are the WAN redundancy backup technologies? ( )
A. Router backup
B. All the above items are not the WAN redundancy backup technology.
C. VRRP technology
D. Port backup technology
QUESTION NO: 29
A. One route entry may include multiple network segments by adopting the CIDR technology.
B. VLSM, CIDR and the routing summary technology enable a simpler router configuration.
C. The scale of the routing table is reduced by adopting the CIDR and the routing summary
technology.
D. When multiple routes to the same destination are found in a routing table, adopt the longest
m
match algorithm.
.co
Answer: B
QUESTION NO: 30
ng
Which of the following descriptions of CAR are true? ( )
Ki
A. CAR can be used either in egress or ingress of the network and the service flow can be
am
C. Not colliding with the queue technology, the CAR technology can only be adopted in the
network edge access layer to ensure that the core is not affected by the excessive high priority
service.
ee
D. It is used to restrict the flow of a certain packet, for example, it restricts the bandwidth
proportion occupied by the FTP packet to be less than 50%.
Fr
Answer: A,B,C,D
QUESTION NO: 31
A. Ethernet frames can not be received and sent at the same time.
B. It can be used for the Point-to-Multi-point connection.
C. It can only be used for the Point-to-Point connection.
D. Ethernet frames can be received and sent over the twisted pairs at the same time.
Answer: C,D
QUESTION NO: 32
A. It needs not the signaling for notifying the router before the application program sends out the
packet. And to the Differentiated service, the network need not allocate the state for every flow.
B. It is generally used to provide end-to-end Qos for some important application.
C. It is realized by the CAR or queue technology.
D. It may designate the QoS of the packet in different ways, for example, designating the
precedence, the source address and destination address of the packet.
m
Answer: A,B,C,D
.co
QUESTION NO: 33
ng
Which of the following principles should be observed when implementing the IP address planning?
()
Ki
A. Continuity
am
B. Extendibility
C. Uniqueness
D. Flexibility
Ex
Answer: A,B,C,D
ee
QUESTION NO: 34
Fr
The core layer of a network is responsible for data forwarding with high speed. It ensures the
reachability of every equipment in the network. The equipment for the core layer can filter and
route the packet according to the routing policy. Therefore, we should configure as many routing
policies as possible on the core layer equipment to enable a better performance. ( )
A. True
B. False
Answer: B
QUESTION NO: 35
A. The user in the RTA LAN can have access to the PC in the RTB LAN.
B. The user in the RTA LAN can not have access to the PC in the RTB LAN.
C. The user in the RTB LAN can have access to the PC in the RTA LAN.
D. The user in the RTB LAN can not have access to the PC in the RTA LAN.
m
Answer: B,D
.co
QUESTION NO: 36
ng
Which are right about the collision domain and the broadcast domain? ( )
Answer: A,B,D
ee
QUESTION NO: 37
Fr
If a PVC is defined with CIR=256Kbit/s, and committed rate measure interval Tc10s. What is the
committed burst size(Bc)? ( )
A. 1544Kbps
B. 15440Kbps
C. 10
D. 2560Kbps
E. 256Kbps
Answer: D
For the route from the IBGP peers and with the same destination, the router will choose the route
with the highest local preference. Similarly, for the route from the EBGP peers and with the same
destination, the route will choose the route with the lowest MED.( )
A. False
B. True
Answer: B
QUESTION NO: 39
m
The network designer communicates with the user to get the requirement for the network. What
.co
should be paid attention at this stage? ( )
A. Understand the organization hierarchy of the user and find the appropriate person to consult.
B. List the requirement for the network performance ng
C. Differentiate what requirement are to be fulfilled in practice by the user, what to be fulfilled in
Ki
the design
D. Obtain the investment details
am
Answer: A,B,C,D
Ex
QUESTION NO: 40
ee
You should make a analysis according to the information collected for the network design. Which
of the following should among your consideration for the network with data, voice and video
transmission? ( )
Fr
Answer: A,B,C,D
QUESTION NO: 41
Which of the following technologies can be adopted by BGP4 to aggregate multiple Class C routes
into one route? ( )
Answer: D
QUESTION NO: 42
Which of the following are right description to IP Over SDH and IP Over ATM?( )
m
B. IP Over ATM provides a variety of QoS features.
.co
C. IP Over SDH is usually applied to the Point-to-Point link.
D. IP Over SDH is more adaptable to the status.
Answer: A,B,C,D
ng
Ki
QUESTION NO: 43
am
Which of the following types are the abstract of the topology in OSPF? ( )
C. There is only one router in the network segment to which the interface is connected.
D. The interface is connected to multiple routers via a Point-to-Multipoint network.
ee
Answer: A,B,C,D
Fr
QUESTION NO: 44
Generally we analyze the network security of users from two aspects. One is from the layers of the
network such as the security threat existing in the network layer or the link layer. The other is from
the networking of users. It is recommended that the actual service of the users should be
considered, such as the key trade data. We should remind the users to pay attention to the
security problem like this all the time. These descriptions are true? ( )
A. False
B. True
Answer: B
QUESTION NO: 45
The core layer of a network is responsible for data forwarding with high speed. It ensures the
reachability of every equipment in the network. The equipment for the core layer can filter and
route the packet according to the routing policy. Therefore, we should configure as many routing
policies as possible on the core layer equipment to enable a better performance. ( )
A. False
B. True
Answer: A
m
.co
QUESTION NO: 46
ng
Which of the following descriptions of the INT-SERV service model are true? ( )
A. It can guarantee the bandwidth and delay limit to satisfy the requirement of the application
Ki
program.
B. The signaling RSVP sends the Qos request to the router application program.
am
C. Under this model, the network allocates a status for every traffic and the classification, traffic
policing, queue and dispatching of the packet are performed on the basis of this state to fulfill the
commitment to the application program.
Ex
D. It can provide the controlled-load service: It provides the Controlled-Load service to guarantee
the quasi-non-overload service provided to the packet even in the case of network overload. That
is, the low delay and high passing rate of the application program packet is guaranteed in the case
ee
Answer: A,B,D
Fr
QUESTION NO: 47
Which of the following items are the costs for the network reliability? ( )
QUESTION NO: 48
Which of the following items describe the functions of NAT (Network address translation) ? ( )
A. It may hide the physical address of the interior network and enable the exterior network to get
only its logical address.
B. It may provide the services of WEB, FTP, SMTP and TELNET to the outside. The server put in
the interior network not only guarantees the security but also facilitate the server maintenance.
C. Combining with dial-control-center, it enables users in the LAN to be online easily through a
m
router.
D. It can map the source address+port of the packet sent out by the interior users to be the
.co
address+port of an interface.
Answer: B,C,D
ng
QUESTION NO: 49
Ki
Which of the following items should be considered when implementing the routing protocol
am
design? ( )
Answer: A,B,C,D
Fr
QUESTION NO: 50
Which of the following is right about the defects of the Ethernet and their resolution? ( )
A. The main problem for an Ethernet is collision. But collision is common for every network.
B. Ethernet can lead to collisions. Switches can be used to partition the collision domains to isolate
the collision.
C. The switched Ethernet adopts the star topology physically, but logically is a bus topology, which
enables the traffic can be monitored by each equipment. It is recommended to use the physical
bus topology.
D. To resolve the collision, the Ethernet adopts back-off algorithm, thus increases the network
traffic and consumes the bandwidth. Switches can be used to resolve the problems caused by the
back-off algorithm.
"Pass Any Exam. Any Time." - www.FreeExamKing.com 16
Huawei GB0-360: Practice Exam
Answer: B
QUESTION NO: 51
Answer: A,B,C,D
m
.co
QUESTION NO: 52
ng
There is a contradiction presented in most of the network design. A true understanding of it will
help to improve the performance of the network under design. What is the contradiction? ( )
Ki
A. Investment and network scalability
B. Network reliability and response time
am
Answer: C
Ex
ee
QUESTION NO: 53
The core layer of a network is responsible for data forwarding with high speed. It ensures the
Fr
reachability of every equipment in the network. The equipment for the core layer can filter and
route the packet according to the routing policy. Therefore, we should configure as many routing
policies as possible on the core layer equipment to enable a better performance. ( )
A. True
B. False
Answer: B
QUESTION NO: 54
Answer: C
QUESTION NO: 55
The router running BGP will follow some advertising rules for forwarding the route. Which are
wrong about the rules? ( )
m
A. The used routes in its routing table will be advertised only to its IBGP peers.
.co
B. All routes obtained from its IBGP peers will be advertised to its EBGP peers.
C. The used routes in its routing table will be advertised only to its EBGP peers.
D. All routes obtained from its EBGP peers will be advertised to its IBGP peers.
Answer: A,B,C ng
Ki
QUESTION NO: 56
am
A. Network layer
Ex
B. Access layer
C. Core layer
ee
D. Convergence layer
Answer: D
Fr
QUESTION NO: 57
Which of the following types are the abstract of the topology in OSPF? ( )
A. The interface is connected to multiple routers via a broadcast network or a NBMA network.
B. There is only one router in the network segment to which the interface is connected.
C. The interface is connected to multiple routers via a Point-to-Multipoint network.
D. The interface is connected to a router via a Point-to-Point network.
Answer: A,B,C,D
A. 224.0.0.5
B. 202.112.5.0/24
C. 127.32.5.62/24
D. 162.111.111.111/24
Answer: D
QUESTION NO: 59
m
Which of the following are right about RIP V1 and RIP V2? ( )
.co
A. RIP V1 does not support multicast. By default, no subnet information is advertised.
B. In RIP V1, route aggregation can be canceled to advertise the subnet information.
ng
C. RIP V2 by default uses the broadcast. To advertise the RIP message in multicast, use the rip
version 2 multicast command.
Ki
D. RIP V2 does not support multicast. It is OK that no subnet information is advertised.
Answer: A
am
QUESTION NO: 60
Ex
Which of the following route types is adopted for the Stub domain in OSPF network to be
ee
A. Dynamic routing
Fr
Answer: B
QUESTION NO: 61
In the network environment as shown in the figure, which of the routing protocol will generate two
colliding routes to 172.16.0.0 in the router A? ( )
m
.co
A. RIP
B. OSPF
C. BGP
D. IS-IS
Answer: A
ng
Ki
am
QUESTION NO: 62
A. Static route
B. Telnet
ee
Answer: B,C,D
QUESTION NO: 63
A topology has to be chosen for a LAN or a WAN. Which topology has the smallest delay, the
highest reliability but the most complicate management? ( )
A. Ring
B. Star
C. Tree
D. Mesh
QUESTION NO: 64
Which is the bandwidth of one channel of voice data flow pressed by the G.729 in the IP-bore
network? ( )
A. 48Kbps
B. 728Kbps
C. 12kbps
D. 2Kbps
m
Answer: C
.co
QUESTION NO: 65
ng
Which of the following are right about the route aggregation? ( )
Ki
A. Route aggregation can be performed dynamically by the dynamic routing protocol. But the
performance varies with protocols.
am
B. Route aggregation can summarize all routes of IP addresses of an organization into one route
to reduce the entries in the routing table.
C. Route aggregation is meant for the hierarchical structured network, not for the plane (non-
Ex
hierarchical) structured.
D. Route aggregation can hide the internal topology changes to the external.
ee
Answer: A,B,C,D
Fr
QUESTION NO: 66
It should be noted that different topologies enable different fault recovery. Which of the following
topologies have single point fault?
A. Ring topology
B. Mesh topology
C. Star topology
D. Tree topology
Answer: C,D
A qualified network design should be implemented step by step. The next step after the
requirement analysis is ( ).
A. Solution output
B. Choice of equipments
C. Choice of network design model and topology
D. Traffic analysis
Answer: C
m
QUESTION NO: 68
.co
Which of the following should be considered in LAN designing? ( )
A. Security
B. Expansibility
C. Network construction cost
ng
Ki
D. Bandwidth requirement
Answer: A,B,C,D
am
QUESTION NO: 69
Ex
A. 802.1d
B. 802.3u
Fr
C. 802.2
D. 802.5
Answer: A
QUESTION NO: 70
Which of the following descriptions of the BGP routing protocol are true? ( )
A. BGP only calculates the routing increment and is insensitive to the network topology and scale.
In a large-scale network, it has a faster convergence speed than OSPF.
B. BGP suppresses the inter-domain routing oscillation by the means of the routing attenuation to
restrict the routing change in one domain. And the convergence suppression time can be modified.
Answer: A,B,C,D
QUESTION NO: 71
Which of the following descriptions of the BGP routing protocol are true? ( )
m
restrict the routing change in one domain. And the convergence suppression time can be modified.
.co
D. BGP only calculates the routing increment and is insensitive to the network topology and scale.
In a large-scale network, it has a faster convergence speed than OSPF.
Answer: A,B,C,D
ng
Ki
QUESTION NO: 72
am
The cable for cabled TV signals can be used to provide high bandwidth data transmission. What is
the adopted technology? ( )
A. Cable Modem
Ex
B. ADSL
C. XDSL
ee
D. DSL
Answer: A
Fr
QUESTION NO: 73
For network 172.168.16.0, its subnet mask is 255.255.252.0, then Which of the following can be
the address of the neighboring subnet? ( )
A. 172.168.24.0
B. 172.168.20.0
C. 172.168.32.0
D. 172.168.48.0
Answer: B
QUESTION NO: 74
Generally we analyze the network security of users from two aspects. One is from the layers of the
network such as the security threat existing in the network layer or the link layer. The other is from
the networking of users. It is recommended that the actual service of the users should be
considered, such as the key trade data. We should remind the users to pay attention to the
security problem like this all the time. These descriptions are true? ( )
A. True
B. False
m
Answer: A
.co
QUESTION NO: 75
ng
When making the network reliability design, which of the following items should be considered? ( )
Ki
A. Different security requirements of different layers
B. The interruption times of the specific service because of the network congestion
am
C. Invested cost
D. Benefit/loss
Answer: A,C,D
Ex
ee
QUESTION NO: 76
Order the following in the descending sequence of cost of network topologies. The correct answer
Fr
is ( )
A. Ring>Tree>Star>Mesh
B. Tree>Star>Mesh>Ring
C. Star>Tree>Ring>Mesh
D. Mesh>Ring>Tree>Star
Answer: D
QUESTION NO: 77
Answer: A
QUESTION NO: 78
A. Route aggregation can summarize all routes of IP addresses of an organization into one route
m
to reduce the entries in the routing table.
.co
B. Route aggregation is meant for the hierarchical structured network, not for the plane (non-
hierarchical) structured.
C. Route aggregation can be performed dynamically by the dynamic routing protocol. But the
performance varies with protocols.
ng
D. Route aggregation can hide the internal topology changes to the external.
Ki
Answer: A,B,C,D
am
QUESTION NO: 79
Ex
Which of the following descriptions of AAA (Authentication, Authorization and Accounting) are
true? ( )
ee
A. Authentication: Users (including Login users and PPP access users) must be authenticated
before being permitted to access the network resource. When authenticating, the user database
maintained by the router or by the RADIUS server can be selected
Fr
Answer: A,C,D
QUESTION NO: 80
WAN is the backbone of the Internet. Which of the following is the most important in the WAN
design?
Answer: A
QUESTION NO: 81
The related design documents must accompany with the network solution, such as solution
proposal. ( )
m
A. True
.co
B. False
Answer: A
QUESTION NO: 82
ng
Ki
Which of the following are needed to construct an Enterprise network?( )
am
A. Routers
B. Ethernet switch
C. PCs
Ex
D. Operation system
ee
Answer: A,B,C,D
Fr
QUESTION NO: 83
Network security should be considered when implementing remote access. For every security
protocol adopted by the router, it will reduce the performance of the equipment. ( )
A. True
B. False
Answer: A
QUESTION NO: 84
A. True
B. False
Answer: B
QUESTION NO: 85
which of the following are right about the split horizon in the RIP? ( )
m
A. The split horizon is used to solve the route loop problem. Its main idea is not to forward the
routing information to the neighbor from the interface over which the routing information is
.co
received from the neighbor.
B. The split horizon has some side-effects, sometimes some side effect will deviate the router from
the correct routing information.
ng
C. The split horizon is enabled by default. If necessary, it can be disabled.
D. The split horizon can only solve the route loop between 2 routers. It can not solve the route loop
Ki
between more than 2 routers.
am
Answer: A,B,C,D
Ex
QUESTION NO: 86
For network 172.168.16.0, its subnet mask is 255.255.252.0, then Which of the following can be
ee
A. 172.168.32.0
Fr
B. 172.168.48.0
C. 172.168.24.0
D. 172.168.20.0
Answer: D
QUESTION NO: 87
A router running OSPF, an interface of which belongs to Area 0, and another of which belongs to
Area 9. Five static routes are imported. How many LSAs will the router produce at least? ( )
A. 7
Answer: B
QUESTION NO: 88
QoS provides different quality services to meet different requirements. Which of the following
items are the functions provided by QoS? ( )
m
A. Set the priority of the packet
.co
B. Prevent and manage the network congestion
C. Provide the special bandwidth to users
D. Reduce the loss rate of the packet
Answer: A,B,C,D ng
Ki
QUESTION NO: 89
am
Which of the following should be considered during your requirement collection for mainframe
computer? ( )
Ex
A. Backups
B. Security
ee
C. Usage rate
D. Database
Fr
Answer: A,B,C,D
QUESTION NO: 90
A. Partial mesh
B. Central radiation
C. Full mesh
D. Full mesh in use of sub-interfaces
Answer: A,B,C,D
QUESTION NO: 91
Answer: A,B,C,D
m
.co
QUESTION NO: 92
ng
Which of the following is right about the defects of the Ethernet and their resolution? ( )
A. To resolve the collision, the Ethernet adopts back-off algorithm, thus increases the network
Ki
traffic and consumes the bandwidth. Switches can be used to resolve the problems caused by the
back-off algorithm.
am
B. The main problem for an Ethernet is collision. But collision is common for every network.
C. Ethernet can lead to collisions. Switches can be used to partition the collision domains to
isolate the collision.
Ex
D. The switched Ethernet adopts the star topology physically, but logically is a bus topology, which
enables the traffic can be monitored by each equipment. It is recommended to use the physical
bus topology.
ee
Answer: C
Fr
QUESTION NO: 93
Answer: A,B,C
Answer: C
QUESTION NO: 95
m
Which of the following are right about the LAN? ( )
.co
A. The LAN can adopt multiple transmission mediums, such as twisted pairs cable, optical fibers
or coaxial cable.
ng
B. Compared to the WAN, LAN is more reliable in data transmission, and the error ratio is lower.
C. The most significant difference between LAN and WAN is bandwidth. LAN has a higher
Ki
bandwidth.
D. The most significant difference between LAN and WAN is the scope of area. LAN has a smaller
am
area.
Answer: A,B,D
Ex
QUESTION NO: 96
ee
Which of the following should be provided for each leased line connection? ( )
Fr
A. Node switch
B. A router interface
C. CSU/DSU
D. Physical line
Answer: B,C,D
QUESTION NO: 97
Answer: A,B,C
QUESTION NO: 98
Which of the following items should be considered when making network plan? ( )
m
D. Network equipment deployment
.co
E. Equipment purchase
Answer: A,B,C
QUESTION NO: 99
ng
Ki
As QoS can be described by a series of measurable parameters, which of the following
am
A. Service availability
B. Packet loss rate
Ex
C. Throughout
D. Delay, variable delay
ee
Answer: A,B,C,D
Fr
A. 128Kbps
B. 155Mbps
C. 1.544Mbps
D. 2.048Mbps
Answer: D
In a small LAN, sometimes a 2 layers design model will take the place of the 3 layers design
model. Which of the following can be the reason for it? ( )
Answer: D
m
.co
QUESTION NO: 102
Which of the following is a right description about the route loop in the RIP? ( )
ng
A. The route loop can be resolved through setting the maximal hops.
B. The holder time may result in a slow convergence, but it can solve the route loop problem
Ki
thoroughly.
C. Given a topology diagram, the D-V algorithm can be sure to find the shortest path.
am
D. Split horizon can only eliminate the route loop between 2 routers.
Answer: D
Ex
A. PSE
B. None of the above
C. DCE
D. DTE
Answer: D
A. Bridge forwarding is based on the hardware; while switched forwarding is based on the
software.
Answer: B,E
Besides the dual-homing redundancy design, redundancy is also achieved by establishing the link
between the routers on the convergence layer. The difference is that there is only one link
m
between every router of the convergent layer and that of the core layer and the redundant link is
established between the routers in the convergence layer. Which of the following items are the
.co
disadvantages of this design? ( )
A. The redundant link between the routers in the convergent layer may cause the routing flapping
ng
in the convergence layer when the link is unstable. And all the branches of the convergent layer
may get this flapping so that the convergent time is added.
B. The data may be transmitted to the core layer through the redundant path.
Ki
C. The size of the routing table in the core layer is doubled.
D. To reach the router in the convergent layer, the router in the core layer chooses the redundant
am
path of the convergence layer rather than the path of the core layer.
Answer: A,B,D
Ex
ee
Which of the following are suitable for working in the core layer of a large network? ( )
Fr
A. Quidway R4001
B. Quidway NetEngine 16E
C. Quidway R2630
D. Quidway NetEngine 80
Answer: B,D
A. Ethernet frames can not be received and sent at the same time.
Answer: B,D
The related design documents must accompany with the network solution, such as solution
proposal. ( )
A. True
m
B. False
.co
Answer: A
A. PPP--PPPOA--Physical layer
am
B. PPP--PPPOA--ATM--Physical layer
C. PPP--PPPOA--AAL5--ATM--Physical layer
D. PPP--PPPOA--AAL5--Physical layer
Ex
Answer: C
ee
A. True
B. False
Answer: A
It is a better network design to use a work station or a server in the core layer. ( )
A. True
Answer: B
Which of the following items are the WAN redundancy backup technologies? ( )
m
Answer: A,B,D
.co
QUESTION NO: 113
ng
When designing the frame relay network, which is the most economic means to backup PVC? ( )
Ki
A. X.25 technology
B. Use ATM link to backup
am
Answer: C
ee
The full mesh design of the LAN is regarded as the most reliable topology structure since it
provides the maximum redundant possibility. But a big sum of investment is needed for the
excessive links. In addition, the increasing number of routers may need more bandwidth for
message broadcast and powerful CPU. So this design is not applied in the current network. ( )
A. False
B. True
Answer: A
A. Line backup
B. Database synchronous backup
C. Port backup
D. Router backup
Answer: A,D
m
Which of the following are advantage in segmenting the network with layer 2 Ethernet switches? (
.co
)
The traffic in the client/server network has directions. The data flows either from the client to the
server or from the server to the client. ( )
ee
A. True
B. False
Fr
Answer: A
Answer: A
The spanning tree protocol can set the switch ports to 5 status. Which of the following is right
about the blocking status? ( )
A. The data is blocked from forwarding and the port is learning the address.
B. The data is forwarded and the address is learned.
C. The data is blocked from forwarding. The port is listening to the BPDU.
D. The data is blocked from forwarding. The port is not listening to the BPDU.
Answer: C
m
.co
QUESTION NO: 120
ng
Which of the following describe the disadvantage of adopting static routes in the network? ( )
C. The static route must be configured manually. The used static route has to be checked through
a table. That is to say, a great usage of static routes will cost the router CPU a great deal.
D. Once the topology changed, the static route has to be re-configured. The management is
Ex
complicated.
Answer: A,D
ee
Fr
To transmit IP voice, compression algorithm is adopted, such as the frequently used G.729. After
compressed, what is the bandwidth seized by a channel of voice? ( )
A. 8Kbps
B. 12Kbps
C. 64Kbps
D. 75Kbps
Answer: B
Answer: A,C
As IP address segmentation should be considered when designing the campus network, which of
m
the following items must be considered for the subnet segmentation? ( )
.co
A. The future development of the company
B. Size of the network segment
C. Protocol used by the network
D. Server type
E. Network topology
ng
Ki
F. The LAN protocol that is used
G. Amount of hosts
am
Answer: A,B,E,G
Ex
Which of the following can reduce the broadcast traffic between the networks? ( )
A. VLAN
Fr
B. Routers
C. Distance vector routing protocol
D. Shared medium Ethernet
E. Hubs
Answer: A,B
Which of the following principles should be observed when implementing the IP address planning?
()
Answer: A,B,C,D
Which is the reference point between NT1 and NT2 in a ISDN network?( )
A. S
m
B. T
.co
C. R
D. U
Answer: B
ng
Ki
QUESTION NO: 127
am
A. Central radiation
B. Full mesh in use of sub-interfaces
Ex
C. Partial mesh
D. Full mesh
ee
Answer: A,B,C,D
Fr
Answer: A,B,C,D
Which of the following descriptions of the INT-SERV service model are true? ( )
A. The signaling RSVP sends the Qos request to the router application program.
B. It can guarantee the bandwidth and delay limit to satisfy the requirement of the application
program.
C. It can provide the controlled-load service: It provides the Controlled-Load service to guarantee
the quasi-non-overload service provided to the packet even in the case of network overload. That
is, the low delay and high passing rate of the application program packet is guaranteed in the case
of the network congestion.
D. Under this model, the network allocates a status for every traffic and the classification, traffic
m
policing, queue and dispatching of the packet are performed on the basis of this state to fulfill the
commitment to the application program.
.co
Answer: A,B,C
A. Operation system
B. PCs
C. Ethernet switch
Ex
D. Routers
Answer: A,B,C,D
ee
Answer: A,B,D
A. 8Kbps
B. 12Kbps
C. 64Kbps
D. 75Kbps
Answer: B
m
Can Quidway routers be used as X.25 switches? ( )
.co
A. Yes
B. No
Answer: A ng
Ki
QUESTION NO: 134
am
Which of the following describes the disadvantage to allocate the IP address according to the
network topology? ( )
Ex
A. In a large network, nodes are distributed in a wide area. To assign the IP address according to
the network topology will lead to a dispersion of IP addresses, hence a huge route table.
ee
B. It is the best choice to assign the IP address according to the network topology. It should be
adopted when there is no other interference such
as an authority order.
Fr
C. Changes are often made to the topology of a large IP network. Therefore, IP address can
cause a great trouble for the management.
D. In a large network, nodes are distributed in a wide area. To assign the IP address according to
the network topology will lead to a dispersion of IP addresses, hence a huge route table.
E. The network topology does not always consist with the administration hierarchy. Laying off a
department is simple for the administration, but a great task for the network management.
Answer: E
The router running BGP will follow some advertising rules for forwarding the route. Which are
wrong about the rules? ( )
"Pass Any Exam. Any Time." - www.FreeExamKing.com 41
Huawei GB0-360: Practice Exam
A. The used routes in its routing table will be advertised only to its IBGP peers.
B. All routes obtained from its IBGP peers will be advertised to its EBGP peers.
C. All routes obtained from its EBGP peers will be advertised to its IBGP peers.
D. The used routes in its routing table will be advertised only to its EBGP peers.
Answer: A,B,D
m
B. 30B+D (North American standard)
.co
C. 30B+D (European standard)
D. 23B+D (North American standard)
Answer: C,D
ng
Ki
QUESTION NO: 137
am
Which of the following descriptions of the STP and Trunk technology are true? ( )
A. STP may avoid the link circulation, but may also cause the bandwidth waste.
B. The Trunk technology removes the loops among the point-to-point links by binding the multiple
Ex
structure.
D. All the above descriptions are false.
Fr
Answer: A,B,C
Which of the following describes the disadvantage to allocate the IP address according to the
network topology? ( )
A. Changes are often made to the topology of a large IP network. Therefore, IP address can cause
a great trouble for the management.
B. In a large network, nodes are distributed in a wide area. To assign the IP address according to
the network topology will lead to a dispersion of IP addresses, hence a huge route table.
C. It is the best choice to assign the IP address according to the network topology. It should be
adopted when there is no other interference such as an authority order.
"Pass Any Exam. Any Time." - www.FreeExamKing.com 42
Huawei GB0-360: Practice Exam
D. The network topology does not always consist with the administration hierarchy. Laying off a
department is simple for the administration, but a great task for the network management.
Answer: D
For the route imported by BGP, its origin can be IGP or Incomplete. Because the route with the
Incomplete attribute is imported through the import-route command, it has higher priority. ( )
A. False
B. True
m
Answer: A
.co
QUESTION NO: 140
ng
2 VLANs are specified on a layer 2 Ethernet switch. Interface 1, 2 and 6 are assigned to VLAN2
Ki
for the engineering department. Interface 3, 4 and 5 are assigned to VLAN3 for the marketing
department. How does the marketing department communicate with the engineering department?
am
()
Answer: D
Fr
Which of the following are adopted on the Quidway Ethernet switch S3026 to divide VLAN? ( )
A. MAC
B. IP addresses
C. Network protocols
D. Switch ports
Answer: D
The spanning tree protocol can set the interface of the switch to 5 states. Which of the following is
a right description to the disable state? ( )
A. The data is blocked from forwarding and the interface is learning the address.
B. The data is blocked from forwarding and the interface is not listening to the BPDU.
C. The data is forwarded and no BPDU is transmitted.
D. The data is blocked from forwarding and the interface is listening to the BPDU
Answer: B
m
QUESTION NO: 143
.co
Which of the following principles should be observed when implementing the IP address planning?
()
A. Uniqueness
B. Continuity
ng
Ki
C. Extendibility
D. Flexibility
am
Answer: A,B,C,D
Ex
Which of the following are right description to the range of the subnet IP address in an IP network?
()
Fr
A. All of the above contains something reasonable, but not reasonable enough to be carried out in
practice.
B. The IP address range should be the exponential of 2 for the convenience of policy
implementations.
C. The IP address unnumbered can be adopted to save the IP address, so the subnet address
range should be smaller than the necessary.
D. The subnet address range should meet the actual requirement, and have the redundancy for
the future extending.
Answer: B,D
A. LAPB
B. Ethernet-II
C. Frame-Relay
D. X.25
E. ATM
F. PPP
Answer: A,C,D,E,F
m
QUESTION NO: 146
.co
WAN is the backbone of the Internet. Which of the following is the most important in the WAN
design?
A. Reliability
B. Network delay
C. Cost
ng
Ki
D. Traffic amount
am
Answer: A
Ex
When making network plan, after analyzing the requirement of the customers and planning the
ee
Answer: A
Assume that a work station connects to a WAN via a 256Kbps satellite circuit, over which a variety
of services are transmitted. What the user cares most is transmission rate and cost, and a few
frame loss and retransmission is acceptable for the user. In this case, which is the best solution? (
)
Answer: A
POS is a technology to bear IP and other packets over the SONET/SDH.Which layer is POS
m
defined in the OSI model? ( )
.co
A. Application layer
B. Data link layer
C. Network layer
D. Physical layer
E. Transport layer
ng
Ki
Answer: B
am
Which of the following route types is adopted for the Stub domain in OSPF network to be
connected with the backbone area? ( )
ee
A. Static routing
B. Dynamic routing
C. Floating static routing
Fr
Answer: D
A. 162.111.111.111/24
B. 224.0.0.5
C. 127.32.5.62/24
D. 202.112.5.0/24
Answer: A
m
.co
QUESTION NO: 153
ng
Which of the following can provide power supply redundancy? ( )
A. Quidway NetEngine16
Ki
B. Quidway AR28-80
C. Quidway AR18-20
am
D. Quidway AR18-12
Answer: A
Ex
Answer: A,B,C,D
Which of the following can provide authentication in the link layer protocol?( )
A. LAPB
Answer: B
Under which of the following circumstances can the priority of the routing protocol be changed? ( )
m
C. When the variable length subnet mask(VLSM) is used.
.co
D. When the CIDR technology is adopted
Answer: A,B
A. Security
B. Network compatibility
C. Reliability
Ex
D. Choice of equipments
E. Cable distribution
ee
Answer: A,B,C,D,E
Fr
A. LAN design
B. Routing design
C. Subnet planning
D. WAN design
Answer: A,B,C,D
A frame relay network can be full-meshed. If there are 6 routers connected to the frame relay
network, the required number of PVCs will be ( ).
A. 15
B. 6
C. 5
D. 30
Answer: A
m
QUESTION NO: 160
.co
In which layer dividing the logic network segment is implemented? ( )
A. Convergence layer
B. All layers
C. Core layer
ng
Ki
D. Access layer
Answer: D
am
C. Reliability
D. Bandwidth
Answer: A,B,C,D
You should make a analysis according to the information collected for the network design. Which
of the following should among your consideration for the network with data, voice and video
transmission? ( )
A. Network scale
B. WAN connection type to be adopted
Answer: A,B,C,D
A. You can assign a higher preference to the RIP route than the static route on a router.
B. The RIP route can have higher preference than the direct route on a router.
C. By default, the route imported by RIP is invalid.
m
D. The preference of the RIP route can not be manually specified.
.co
Answer: A,C
Answer: D
Fr
The related design documents must accompany with the network solution, such as solution
proposal. ( )
A. True
B. False
Answer: A
[Quidway]acl 4
[Quidway-acl-4]rule permit source 202.38.120.1 0.0.0.255
[Quidway-acl-4]rule deny source 202.38.0.0 0.0.255.255
The ACL is applied to a router interface in the following way:
[Quidway]firewall enable
[Quidway]firewall default permit
[Quidway]int s0
[Quidway-Serial0]firewall packet-filter 4 inbound
The E0 interface of the router is connected to a local LAN, while the S0 interface is connected to
m
the Internet. Choose the right description among the following. ( )
.co
A. The hosts connect to the other interfaces of the router can have unrestricted access to the
internal resource.
B. All external packets can be transferred freely through the serial interface.
ng
C. The internal host can visit any external host with any address.
D. The internal host can not visit the external host prohibited in the ACL.
Ki
Answer: A,D
am
Which of the following descriptions of the private IP address reserved by IANA is false? ( )
A. The private IP address can save the cost and ensure the extensibility of the network.
ee
Answer: B
Which PVCs dose the frame relay LMI protocol take up? ( )
Answer: B,D
In a small LAN, sometimes a 2 layers design model will take the place of the 3 layers design
model. Which of the following can be the reason for it? ( )
m
A. Such a network reduces the fault occurrence.
.co
B. Only the 2 layers design model enables the implementation of the VLAN.
C. Under the 2 layers design model, the equipment for the Convergence layer/Core layer does not
need to interconnect with each physical network.
ng
D. Such a network costs less and is appropriate for a small network.
Answer: D
Ki
am
The traffic in the client/server network has directions. The data flows either from the client to the
Ex
A. False
ee
B. True
Answer: B
Fr
A. PAP/CHAP authentication
B. Access control list (ACL)
C. IPSec encryption
D. NAT technology
E. Routing protocol authentication.
Answer: A,B,C,D,E
In the network environment as shown in the figure, which of the routing protocol will generate two
colliding routes to 172.16.0.0 in the router A? ( )
m
.co
ng
Ki
A. OSPF
am
B. BGP
C. IS-IS
D. RIP
Ex
Answer: D
ee
The core layer of a network is responsible for data forwarding with high speed. It ensures the
reachability of every equipment in the network. The equipment for the core layer can filter and
route the packet according to the routing policy. Therefore, we should configure as many routing
policies as possible on the core layer equipment to enable a better performance. ( )
A. False
B. True
Answer: A
When the remote user uses mobile access, and ISP is distributed in a wide area, VPN can be
used to implement the access to the private network. What are the feature of VPN? ( )
m
Answer: A,B,C,D
.co
QUESTION NO: 179
ng
Which of the following items describe the functions of NAT (Network address translation) ? ( )
Ki
A. Combining with dial-control-center, it enables users in the LAN to be online easily through a
router.
am
B. It may provide the services of WEB, FTP, SMTP and TELNET to the outside. The server put in
the interior network not only guarantees the security but also facilitate the server maintenance.
C. It may hide the physical address of the interior network and enable the exterior network to get
Ex
Answer: A,B,D
Fr
A. LAN design
B. Subnet planning
C. Routing design
D. WAN design
Answer: A,B,C,D
A. Routing design
B. LAN design
C. Subnet planning
D. WAN design
Answer: A,B,C,D
m
Which is mostly used in the frame relay network? ( )
.co
A. DLCI
B. PVC
C. LMI
D. SVC
ng
Ki
Answer: B
am
Which of the following descriptions of the private IP address reserved by IANA is false? ( )
172.16.0.0~172.31.255.255, 192.168.0.0~192.168.255.255
B. The private IP address should be translated to be the public IP address to realize the Internet
Fr
communication, and the NAT technology, agent service and VPN packet encapsulation technology
can be adopted for this.
C. The reserved private IP address range is: 10.0.0.0~10.255.255.255,
172.128.0.0~172.128.255.255, 192.128.0.0~192.128.255.255
D. The private IP address can save the IP address resource
E. The private IP address can save the cost and ensure the extensibility of the network.
Answer: C
Fr
ee
Ex
am
Ki
ng
.co
m
C. Comparing with X.25, frame relay is more adaptable on the un-reliable transmission medium.
D. X.25 is greater in delay time than frame relay.
Answer: A,D
A. The traffic configuration file of the needed servomhe tcLA aonMdt2nTarNf( ) needed servrdtmKing.com
m
.co
ng
Ki
am
Ex
ee
Fr
Answer: A,D
Assume that a work station connects to a WAN via a 256Kbps satellite circuit, over which a variety
of services are transmitted. What the user cares most is transmission rate and cost, and a few
m
.co
ng
Ki
am
Ex
ee
Fr
Huawei GB0-360: Practice Exam
D. Set the priority of the packet
Answer: A,B,C,D
Assume that a user accesses the WAN via the E1 line. The video service seizes 100% of the E1
bandwidth in an irregular time. To ensure a reliable video transmission, what technology should
you recommend to use? ( )
A. X.25
B. None of the above
m
C. Frame relay
.co
D. Leased line
E. Switched circuit
Answer: D
ng
Ki
QUESTION NO: 202
am
A. No
B. Yes
Ex
Answer: B
ee
A. Expansibility
B. Bandwidth requirement
C. Network construction cost
D. Security
Answer: A,B,C,D
A. True
B. False
Answer: B
m
B. They both deploy the IP protocol to bear the routing information.
C. They are both dynamical routing protocols.
.co
D. Both support VLSM.
Answer: B
ng
Ki
QUESTION NO: 206
In a small LAN, sometimes a 2 layers design model will take the place of the 3 layers design
am
B. Only the 2 layers design model enables the implementation of the VLAN.
C. Under the 2 layers design model, the equipment for the Convergence layer/Core layer does not
ee
Answer: A
The spanning tree protocol can set the interface of the switch to 5 states. Which of the following is
a right description to the disable state? ( )
Answer: B
A. The standard rate of ATM can reach to 155Mbps, so it can handle services from low speed
audio to high speed video.
B. In use of ATM, IP services can be transmitted over the WAN. Therefore, ATM works in layer 2
as PPP, providing no function of the layer 3 and 4 in the OSI model.
C. ATM is developed on the basis of improved transmission quality and capacity.
D. ATM combines the advantages of packet switching and circuit switching.
m
Answer: C,D
.co
QUESTION NO: 209
ng
Which of the following items are the WAN redundancy backup technologies? ( )
Ki
A. VRRP technology
B. Port backup technology
am
C. Router backup
D. All the above items are not the WAN redundancy backup technology.
Answer: A,B,C
Ex
ee
Which are right description to the difference between OSPF and RIP?( )
Fr
Answer: A,C,D
2 VLANs are specified on a layer 2 Ethernet switch. Interface 1, 2 and 6 are assigned to VLAN2
for the engineering department. Interface 3, 4 and 5 are assigned to VLAN3 for the marketing
Answer: C
m
Which of the following descriptions of the spanning tree algorithm are true? ( )
.co
A. The principle of the spanning tree algorithm is to generate a tree in the network and then
transmit the data from the root to various nodes.
B. There may be multiple spanning trees in one LAN.
ng
C. If loops exist in the network, the spanning tree algorithm can remove some loops by blocking
some links.
Ki
D. The root of the spanning tree can be controlled manually.
am
Answer: B,C,D
Ex
Which of the following are right about the route aggregation in the RIP?
ee
A. When implementing Rip V2, you can choose to disable the route aggregation on the Quidway
series routers.
Fr
B. Rip V1 supports route aggregation by default. You can disable the aggregation when
necessary.
C. Rip V2 does not support subnet routes to be aggregated.
D. Rip V1 does not support subnet routes to be aggregated.
Answer: A,D
Which of the following are right about the route aggregation in the RIP?
A. Rip V1 supports route aggregation by default. You can disable the aggregation when
necessary.
Answer: B,D
Suppose that a central station connects to a frame relay network via a serial line. Five virtual
circuits have been defined to communicate with 5 remote stations respectively. Now the remote
m
station can not receive the route update packet, which by examination is caused by split horizon.
What do you suggest to resolve this problem? ( )
.co
A. Modify the metric
B. Specify static routes
C. Filter the route
D. Disable the split horizon
ng
E. Enable sub-interfaces
Ki
Answer: B,D,E
am
A. An special area is defined as the backbone area to resolve the route loop occurred when the
routing information is transmitted between areas. All other areas must connect to the backbone
area.
Fr
B. OSPF can not prevent route loop among the imported routes.
C. The link state algorithm adopted by OSPF decides that it has no route loop problem.
D. Actually, it is impossible for the route advertised by any router running OSPF to result in route
loop.
Answer: A,B,C
A. The frame relay switch sends DLCI number automatically to the router through InverARP.
Answer: A,B,D
Which of the following items can be used to select the path of the network layer? ( )
m
A. STP(Spanning tree protocol)
.co
B. Frame relay protocol
C. Routing protocol
D. Routed protocol
Answer: C ng
Ki
QUESTION NO: 219
am
For the network segments: 172.128.12.0, 172.128.17.0, 172.128.18.0, 172.128.19.0, which of the
following network segments can be adopted to realize the route aggregation? ( )
Ex
A. 172.128.20.0/21
B. 172.128.0.0/18
ee
C. 172.128.17.0/19
D. 172.128.12.0/20
Fr
Answer: B
Which of the following is the serial link encapsulation protocol for the SNA environment? ( )
A. SDLC
B. HDLC
C. LAPB
D. PPP
Answer: A
The core layer router for the Internet should guarantee the reachability of each Internet address.
However, it is obviously impossible for each router to keep track of the route of every potential
subnet. Which of the following measures you can take to prevent an excessive huge routing table?
()
A. Lay out the addresses to aggregate the route entries to the greatest extent
B. Configure on some core layer routers in such a way that they mutually take the destination of
one another as the default route to achieve load sharing between their route entries
m
C. Choose VLSM-supported dynamic routing protocol to summarize those valid routes
D. Adopt IPV6 to reduce the mandatory reachable subnets of the core layer router
.co
Answer: A,C
subnet. Which of the following measures you can take to prevent an excessive huge routing table?
()
Ex
one another as the default route to achieve load sharing between their route entries
D. Adopt IPV6 to reduce the mandatory reachable subnets of the core layer router
Fr
Answer: A,B
As IP address segmentation should be considered when designing the campus network, which of
the following items must be considered for the subnet segmentation? ( )
A. Server type
B. Protocol used by the network
C. Amount of hosts
D. The future development of the company
E. Network topology
Answer: C,D,E,G
m
D. Packet switched node
.co
Answer: A,B,C,D
D. IEEE 802.1Q
ee
Answer: D
Fr
Which of the following principle you should adhere to in the LAN designing? ( )
A. Adopt a layered model to make the network more extendable and manageable.
B. Understand the bandwidth of the physical link.
C. Understand the distribution of the applications and traffics to allocate the resource effectively.
D. Scheme as much network redundancy as possible, and balance the link loading the network.
Answer: A,B,C,D