Huawei H12-831_V1.0 Practice Test - Questions Answers, Page 2

List of questions
Question 11

Fill in Blanks
by executing___________The command can completely isolate the second and third layer users of different ports on the same LAN and cannot communicate. (Please use English and lowercase letters to complete the command, and the command cannot be abbreviated)
portisolateenable
Question 12

As shown in the figure, an engineer uses 4 routers to test branch network interoperability. Among them, R1, R2, and R3 in branch 1 deploy OSPF to implement network interoperability. R2, R3, and R4 in branch 2 deploy IS-S to implement network interoperability. Now the engineer wants to implement R1 to access the loopback interface address of R4. Which of the following operations can meet this requirement?
existR2ofOSFFprocess neutralizationIS-ISDuring the process, the default route is advertised separately
No configuration required
only atR2ofIS-ISDuring the process, the default route is advertised
only atR2ofOSPFDuring the process, the default route is advertised
Question 13

The IS-IS Level-1 neighbor relationship between R3 and R4 is not established. According to the information in this figure_What is the possible reason?
R3andR4the interconnect interfacecircuit-typeMismatch
R3andR4different area codes
R3andR4ofIS-LevelMismatch
R3andR1ofIIHAuthentication failed
Question 14

SFFv2 is an IGP running on an IPv4 network: 0SPFV3 is an IGP running on an IPv6 network. Compared with 0SPFV2, SPFV3 has a similar LSA type, but has slightly different functions. Which of the following is not included in the LSA type of 0SPFV3?
AS-External-LSA
Router-LSA
ASBR-Summary-LSA
Network-LSA
Question 15

Which of the following operations is not part of the middle stage of dissection?
field defense
cutover implementation
Cutover preparation
business test
Question 16

CutoverThe previous information collection can be used to determine whether the services before and after the cutover are normal.
right
wrong
Question 17

BGP authentication can prevent illegal routers from establishing neighbors with BGP routers. BGP authentication can be divided into ID5 authentication and Keychain authentication. Which of the followingBGP packets will carryBGPKeychain authentication information?
Open
Keepalive
Update
Notification
Question 18

In the topology shown in the figure, the entire network runsOSPFv3agreement inNoIn the case of attracting external routes,R1which type ofLAS?
Intra-Area-Prefix-LSA
Link-LSA
Inter-Area-Router LSA
Inter-Area-Prefix-LSA
Question 19

How many bits are there in the label field of PLS?
1
8
3
20
Question 20

As shown in the figure, SF is enabled on all interfaces of the router, the cost value of the link is marked in the figure, and the Loopback0 interface of R2 is advertised in area 1, then the cost value of R1 reaching 10.0.2.2/32 is?
100
150
50
200
Question