HC-224 - Huawei Certified Datacom Professional - Fast Certification Exam

Go back to Huawei

Example Questions

In traffic policing using two token buckets, tokens are put into the CBS bucket at the committed information rate (CIR) . The peak burst size (PBS) bucket is filled in only after the CBS bucket is full. Which of the following statements about VRRP are true? Which of the following standards defines STP? The IPSec function on the Eudemon supports NAT traversal. Which statement about VLAN is false? Which of the following statements about the jitter and delay are true? What is the network address for 190. 233. 27. 13/16? TRUE/FALSE: The system can perform ACL rule matching only based on the configuration order of rules. Which of the following commands is used to display the detailed information about the Eudemon? In a switching network that has been enabled with STP protocol, the priorities of all the switches are the same. The MAC address of switch1 is 00-e0-fc-00-00-40, MAC address of switch2 is 00-e0-fc-00-00-10, MAC address of switch3 is 00-e0-fc-00-00-20, and MAC address of switch4 is 00-e0-fc-00-00-80. Which of the switches will be elected as the Root Bridge? Which of the following technologies can reduce the scale of broadcast domain? TRUE/FALSE: The NBMA mode requires all the routers in the network to be fully connected; otherwise, it does not function. Two Eudemons in dual-system hot backup mode can be working in Active-Active mode or Active-Standby mode. Which of the following character strings matches the regular expression 100$? As shown in the figure, when the STP network runs properly, which device does the designated port of LAV C reside ( ) TRUE/FALSE: VLANs isolate broadcast domains, criminates broadcast storms, and enhances information security. Based on classification rules, traffic classification can be divided into which of the following types? Which of the following reliability designs are related to routers? Which LSA is used by OSPF to implement GR? Assume that the VRID of a VRRP virtual router is 100 and the virtual IP address of the virtual router is, which of the following addresses is the virtual MAC address of the virtual router? Which of the followings can only be used for BGP route selection? Which of the following route entries matches ACL 2001 that is defined below? 1. 0. 0. 0/8, 1. 2. 0. 0/16,1.2. 3. 0/24,1. 2. 4. 0/24,1.2. 5. 0/24,1. 2. 6. 0/24, 1. 2. 7. 0/24,1.2. 8. 0/24 ACL 2001: Basic ACL 2001, 1 rule Acl's step is 5 rule o permit source l. 2. 1.0 0. 0. 254. 255 The ip as-path-filter as-path-filter-number {deny | permit} regular-expression command is used to configure an AS-path-filter. In this command, several clauses can be configured for one as-path-filter-number. What is the relationship between these clauses? What is the maximum bits of a Class B address can be used for subnet ? In STP, BPDL packet is carried by ( ) Which messages are sent from the client to the server? TRLE/FALSE: Different from a Stub area, an NSSA supports Type-5 LSAs. An NAC component functions as the security policy implementation point on an enterprise campus network, authenticates access users, isolates invalid terminals, and provides network services for authorized users. What is the NAC component? What is private AS number? TRUE/FALSE: using the peer connect-interface command to establish multiple peer relationships between two routers connected through multiple links is recommended. What does the IP-prefix-filter "ip ip-prefix test index 10 deny 0. 0. 0. 0 0 less-equal 32" mean? One CV packet per second is generated on the ingress LSR of the LSP and received by the egress LSR. This generation rate is low and allows no adjustment. Hence, the CV packet is usually used for checking the availability of a common LSP. Which of the following route prefixes match this IP-prefix-filter? "ip ip-prefix test index 10 permit 10. 0. 0. 0 16 greater-equal 24 less-equal 28" What are the types of DDoS attacks? Which VLAN assignment methods are supported by the Huawei S9300? Which of the following addresses can be used on a public network? The association between the IDS and firewall requires that the IDS be directly connected to the firewall. The GVRP message is encapsulated in the IEEE 802 format, that is | DASA | Length | DSAP | SSAP| Ctrl | PDU | FCS. What is the meaning of the Length field? Which of the following are disadvantages of the traditional tail drop mechanism? Which commands are relevant to a BGP route reflector? Which AS_Path can match the ip as-path-filter l permit 12.*874$command? Which of the following statements about the link failure detection in STP protocol is not true? When the GR Restarter performs the active/standby switchover, the neighbor performs which of the following operations when detecting that a TCP disconnection? TRUE/FALSE: The port isolation function can isolate the ports on the same switch. TRUE/FALSE: The value of ospf dr-priority ranges from o t0 205 and the default value is 64. The Eudemon does not support port mapping A switching network has been enabled with STP protocol. To provide fast access speed to the file server for most of the users, the switch that is directly connected with file server is configured as the root bridge. QoS includes which of the following aspects? In a route-policy, which BGP attributes can be invoked by if-match clauses? Which of the following statements about different detection intervals at both ends or a BFD session is true?