ExamGecko
Home Home / Huawei / H12-811_V1.0

Huawei H12-811_V1.0 Practice Test - Questions Answers, Page 81

Question list
Search
Search

Which of the following BIDs cannot be contained in a configuration BPDU sent by a switch?

A.

0 10-01-02-03-04-05

A.

0 10-01-02-03-04-05

Answers
B.

0 00-01-02-03-04-05

B.

0 00-01-02-03-04-05

Answers
C.

32768 06-01-02-03-04-05

C.

32768 06-01-02-03-04-05

Answers
D.

4096 01-01-02-03-04-05

D.

4096 01-01-02-03-04-05

Answers
Suggested answer: B

Explanation:

Comprehensive In STP (Spanning Tree Protocol), the Bridge ID (BID) is used to uniquely identify a switch in the network. It consists of a bridge priority and a MAC address. A BID with a bridge priority of 0 and a MAC address starting with 00-01 is reserved for special purposes and cannot be used in a configuration BPDU (Bridge Protocol Data Unit) sent by a regular switch. This prevents conflicts with reserved MAC addresses.

As shown in the figure, which of the following ports will be in a blocking state?

A.

G0/0/2 of SWC

A.

G0/0/2 of SWC

Answers
B.

G0/0/3 of SWB

B.

G0/0/3 of SWB

Answers
C.

G0/0/1 of SWC

C.

G0/0/1 of SWC

Answers
D.

G0/0/3 of SWA

D.

G0/0/3 of SWA

Answers
Suggested answer: B

Explanation:

Comprehensive SWA has the lowest Bridge ID and is the root bridge. In this topology, G0/0/2 of SWA and G0/0/1 of SWC are forwarding ports. Since G0/0/3 of SWB provides an alternate path to the root bridge, it will be placed in a blocking state to prevent network loops. The Spanning Tree Protocol ensures that only the most efficient path to the root bridge is active, and alternate paths are blocked until needed.

Which of the following port statuses may exist on an STP-enabled switch?

A.

Discarding

A.

Discarding

Answers
B.

Listening

B.

Listening

Answers
C.

Disabled

C.

Disabled

Answers
D.

Forwarding

D.

Forwarding

Answers
Suggested answer: A, B, D

Explanation:

Comprehensive In STP (Spanning Tree Protocol), ports can be in several states, including:

Discarding: The port is not forwarding traffic, either because it is in a blocking state or not participating in active forwarding.

Listening: The port is processing BPDUs and is preparing to transition to either the learning or forwarding state. No data frames are forwarded during this state.

Forwarding: The port is actively forwarding traffic as part of the active network topology.

The 'Disabled' state is not part of the STP protocol but rather represents a port that is administratively shut down or not participating in the STP process.

Which of the following parameters is used to elect the root bridge in STP?

A.

Bridge ID

A.

Bridge ID

Answers
B.

Port ID

B.

Port ID

Answers
C.

Root path cost

C.

Root path cost

Answers
D.

System name of the switch

D.

System name of the switch

Answers
Suggested answer: A

Explanation:

Comprehensive In STP (Spanning Tree Protocol), the root bridge is elected based on the lowest Bridge ID. The Bridge ID consists of two parts: the bridge priority and the MAC address of the switch. The switch with the lowest Bridge ID is elected as the root bridge. If two switches have the same priority, the switch with the lowest MAC address becomes the root. Other parameters such as Port ID and Root path cost are used in subsequent decisions to determine the best paths to the root bridge, but they are not used in the root bridge election itself.

According to OSI reference model, which layer is responsible for end-to-end error checking and flow control?

A.

Network layer

A.

Network layer

Answers
B.

Physical layer

B.

Physical layer

Answers
C.

Data link layer

C.

Data link layer

Answers
D.

Transport layer

D.

Transport layer

Answers
Suggested answer: D

Explanation:

Comprehensive The Transport layer (Layer 4) in the OSI model is responsible for end-to-end error checking, flow control, and reliable data transmission. It ensures that data is properly sequenced, without errors, and flow-controlled between the sender and receiver. Protocols such as TCP (Transmission Control Protocol) operate at this layer, providing mechanisms for retransmitting lost packets and maintaining the reliability of a session

Huawei Support

Which of the following commands can switch a view from the system view to the user view?

A.

System-view

A.

System-view

Answers
B.

User-view

B.

User-view

Answers
C.

Quit

C.

Quit

Answers
D.

Router

D.

Router

Answers
Suggested answer: C

Explanation:

Comprehensive The quit command is used to return from the system view to the user view in Huawei's VRP (Versatile Routing Platform). This command allows users to exit the current configuration mode and revert to the default user view. For example, when you are in the system view and you want to return to the user view, typing quit takes you back to the initial prompt without saving the current configuration.

Refer to the display startup command output shown in the figure. Which of the following statements are true?

A.

The current VRP configuration file is different from that used for next startup.

A.

The current VRP configuration file is different from that used for next startup.

Answers
B.

The current VRP configuration file is the same as that used for next startup.

B.

The current VRP configuration file is the same as that used for next startup.

Answers
C.

The current VRP version file is different from that used for next startup.

C.

The current VRP version file is different from that used for next startup.

Answers
D.

The current VRP version file is the same as that used for next startup.

D.

The current VRP version file is the same as that used for next startup.

Answers
Suggested answer: A

Explanation:

Comprehensive The output shows that the current and next startup configurations are different. Specifically, the startup saved-configuration file is flash:/vrpcfg.zip, and the next startup saved-configuration file is flash:/backup.zip, indicating that changes have been made and the system will use a different configuration file at the next reboot

Which of the following methods is not used for logging in to the VRP system?

A.

Telnet

A.

Telnet

Answers
B.

Netstream

B.

Netstream

Answers
C.

Web

C.

Web

Answers
D.

SSH

D.

SSH

Answers
Suggested answer: B

Explanation:

Comprehensive Netstream is a protocol for flow-based network traffic analysis, not a method for logging into a VRP system. The valid methods for accessing the VRP system include Telnet, Web, and SSH, which are used for remote management and configuration of network devices

Which of the following statements about encapsulation and decapsulation are true?

A.

Encapsulation and decapsulation can locate network faults.

A.

Encapsulation and decapsulation can locate network faults.

Answers
B.

Encapsulation and decapsulation shorten the packet length.

B.

Encapsulation and decapsulation shorten the packet length.

Answers
C.

Encapsulation and decapsulation participate in achieving different network protocol functions.

C.

Encapsulation and decapsulation participate in achieving different network protocol functions.

Answers
D.

Encapsulation and decapsulation can implement network communication.

D.

Encapsulation and decapsulation can implement network communication.

Answers
Suggested answer: A, C, D

Explanation:

Encapsulation is the process of adding headers and trailers to data at each layer of the OSI model as the data moves from the application layer to the physical layer. Decapsulation is the reverse process when data is received. These processes are critical in implementing network communication, ensuring the proper function of protocols, and assisting in locating faults during data transmission. They do not, however, shorten packet length

On the network shown in the figure, the router receives a data packet with the destination IP address 11.0.12.1 from Host A.

After the packet is forwarded by the router, which of the following are the destination MAC address and destination IP address of the data packet?

A.

MAC-C, 11.0.12.1

A.

MAC-C, 11.0.12.1

Answers
B.

MAC-D, 11.0.12.1

B.

MAC-D, 11.0.12.1

Answers
C.

MAC-B, 11.0.12.1

C.

MAC-B, 11.0.12.1

Answers
D.

MAC-D, 10.0.12.2

D.

MAC-D, 10.0.12.2

Answers
Suggested answer: C

Explanation:

Comprehensive When Router A forwards the packet to Router B, the destination IP address (11.0.12.1) remains unchanged as it is still meant for Host B. However, the destination MAC address changes to MAC-B, which belongs to Host B, since MAC addresses are only used for local network hops

Total 869 questions
Go to page: of 87