Exam4Training

Huawei H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Online Training

Question #1

What is incorrect description about the features of campus business on-the-go cloud migration?

  • A . Policy service, which provides policy configuration capabilities. It mainly configures security groups and access policies between security groups. It integrates AC3.0 and AC1.0 is optional.
  • B . Authentication & Portal service supports serving as an AAA server to provide authentication, authorization, and accounting capabilities. It is integrated in AC3.0 and is optional in AC1.0. Accounting relies on a third party.
  • C . IP-Group synchronization service, as the control plane of IP-Group, provides collection and distribution of correspondence between IP and security groups, and is integrated in AC3.0 and AC1.0
  • D . Policy enforcement points and authentication points can be deployed on different physical devices.

Reveal Solution Hide Solution

Correct Answer: C
Question #2

In the fabric network with dual border node networking in the campus distributed gateway solution, cross-networking is recommended between the core device and the aggregation device, so that L3VXLAN tunnels are created between the two border nodes and the edge node. In this scenario, Regarding the high-reliability design of the traffic model for egress traffic, the incorrect description is:

  • A . The two upstream traffic paths on edge form ecmp load balancing
  • B . Select different main exits for different source network segments.
  • C . Different edge devices select different main exits.
  • D . Select different main exits for different uplink network segments.

Reveal Solution Hide Solution

Correct Answer: B
Question #3

When using the planning and design tool, on which page of the tool should you adjust the board position of the service board in the modular switch?

  • A . BOQ management
  • B . Cabinet layout design
  • C . Network equipment connection design
  • D . Equipment selection

Reveal Solution Hide Solution

Correct Answer: B
Question #4

What is the incorrect description of the intelligent routing strategy of the LAN&WAN integration solution?

  • A . Support setting primary and backup links based on applications/application groups, and intelligently select links for data forwarding
  • B . LTE is only supported as an escape link
  • C . Link intelligent switching condition settings include packet loss, delay, and jitter
  • D . Support bandwidth condition routing

Reveal Solution Hide Solution

Correct Answer: B
Question #5

In the virtualization scenario network architecture, there are multiple node roles. Which of the following nodes can serve as both an L2 gateway and an L3 gateway?

  • A . Router Node
  • B . FW Node
  • C . Border Node
  • D . Edge Node

Reveal Solution Hide Solution

Correct Answer: D
Question #6

Which of the following WLAN delivery strategies is wrong?

  • A . High-density venues: Huawei original factory delivery or original factory supervision delivery (CSP serves as the delivery entity, and Huawei provides engineering survey, planning, and installation training services)
  • B . Wireless Backhaul: CSP Delivery
  • C . Massive indoor/outdoor dispersed site scenario: Demonstration sites (at least 5%) are delivered under the supervision of Huawei’s original factory, and the remaining sites are delivered by CSP
  • D . Campus network: delivered by Huawei original factory/CSP

Reveal Solution Hide Solution

Correct Answer: B
Question #7

Among the following devices, which ones will not cause interference to wireless APs working at 2.4GHz?

  • A . Microwave oven
  • B . Bluetooth headset
  • C . Infrared sensor
  • D . Cordless phones operating in the 2.4G frequency band

Reveal Solution Hide Solution

Correct Answer: C
Question #8

The maximum MCS supported by WIFI6 is:

  • A . MCS7
  • B . MCS9
  • C . MCS11
  • D . MCS13

Reveal Solution Hide Solution

Correct Answer: B
Question #9

Which stage follows the association stage in the STA access process?

  • A . Scanning phase (SCAN)
  • B . Link authentication phase (Authentication)
  • C . Access authentication
  • D . Key agreement

Reveal Solution Hide Solution

Correct Answer: C
Question #10

Which of the following are not features of the CloudCampus cloud management solution?

  • A . Rapid deployment, supporting plug-and-play of tenant devices
  • B . Through the NETCONF protocol, remote operation and maintenance can be achieved
  • C . In the solution, the NCE platform can provide API interfaces to connect with upper-layer applications.
  • D . Huawei equipment cannot be switched between local management and cloud management modes.

Reveal Solution Hide Solution

Correct Answer: D

Question #11

In the CloudCampus solution, which of the following are not external network connection scenarios?

  • A . L3 shared exit
  • B . L3 exclusive export
  • C . L2 shared exit
  • D . L2 exclusive export

Reveal Solution Hide Solution

Correct Answer: D
Question #12

In CloudCampus APP, a maximum of ( ) pictures can be uploaded to a construction site.

  • A . 1
  • B . 2
  • C . 3
  • D . 4

Reveal Solution Hide Solution

Correct Answer: C
Question #13

Configure the main interface of the translation tool, some lines are marked with different background colors for the purpose of:

  • A . Relocation is too boring and the interface is too monotonous. It is purely for decoration and good looks.
  • B . Remind users of points that require special attention, such as those that require manual confirmation and processing and can be discarded.
  • C . To export the configuration, do not use the background color when exporting the configuration.
  • D . has no practical effect

Reveal Solution Hide Solution

Correct Answer: B
Question #14

Regarding planning and design tools, which of the following statements is incorrect?

  • A . The planning and design tool is used for after-sales planning and cannot be used before sales.
  • B . If the device model cannot be used, you can provide feedback in the tool platform
  • C . Tools can ensure the logical consistency and data consistency of the design
  • D . If the networking changes greatly or changes frequently, old projects can be retained and new projects can be designed.

Reveal Solution Hide Solution

Correct Answer: A
Question #15

iMaster NCE-Campus is deployed in a virtualized environment based on Taishan physical servers. The corresponding virtualization software is:

  • A . FusionCompute8.0
  • B . FusionCompute6.5.1
  • C . VMWare vSphere
  • D . FusionInsight

Reveal Solution Hide Solution

Correct Answer: A
Question #16

The user traffic of a certain enterprise’s WLAN is not very large, and there is no traffic bottleneck problem in the network. For the sake of WLAN security, the customer wants to uniformly manage WLAN data. Which of the following networking methods can the customer choose?

  • A . AC bypass data is forwarded directly
  • B . AC bypasses data tunnel forwarding
  • C . Direct forwarding of data in Layer 3 networking
  • D . Layer 2 networking data is forwarded directly

Reveal Solution Hide Solution

Correct Answer: B
Question #17

The maximum channel bandwidth supported by WIFI6 is:

  • A . 80M
  • B . 160M
  • C . 320M
  • D . 640M

Reveal Solution Hide Solution

Correct Answer: B
Question #18

The current controller does not support which of the following authentication methods:

  • A . Portal
  • B . TACACS
  • C . P2P
  • D . 802.1X

Reveal Solution Hide Solution

Correct Answer: C
Question #19

In iMaster NCE-Campus network plane planning, if there is no special isolation requirement, the recommended networking method is:

  • A . Four-plane networking
  • B . Two-plane networking
  • C . Three-plane networking

Reveal Solution Hide Solution

Correct Answer: B
Question #20

Where can I modify the AP icon size and line thickness in the WLAN Planner tool?

  • A . Planned resources
  • B . Global settings
  • C . Set display items
  • D . Scene setting

Reveal Solution Hide Solution

Correct Answer: C

Question #21

In the park scenario, what is correct about the policy linkage function?

  • A . When the authentication point and the group policy execution point are not on the same device, you need to use the policy linkage function.
  • B . In the policy linkage scenario, it is necessary to set the downlink port type of the Edge device to an extended access switch.
  • C . The policy linkage function means that no matter where you go, the permissions to access resources are the same and are decoupled from the IP address.
  • D . When the authentication point, access point, and group policy execution point are all connected to the access device, the policy linkage function must be used.

Reveal Solution Hide Solution

Correct Answer: B
Question #22

Which of the following common obstacles has the smallest signal attenuation ()

  • A . Metal (80mm)
  • B . Brick wall (120mm)
  • C . Bulletproof glass (120mm)
  • D . Wooden door (40mm)

Reveal Solution Hide Solution

Correct Answer: D
Question #23

In the LAN-WAN convergence scenario, which is the wrong description of the RR deployment design principles?

  • A . RR must be configured redundantly, and there must be at least two RR devices in the existing network. Avoid having only one RR device in the entire network. If the RR device fails, the services of the entire network will be interrupted;
  • B . Try to choose an independent RR. In an independent RR scenario, a single device can be deployed;
  • C . Use the RR model recommended in the specification list;
  • D . Edge should be dual uplinked to two RR devices to achieve egress backup;

Reveal Solution Hide Solution

Correct Answer: B
Question #24

In the CloudCampus solution V1R22CO0 version, the incorrect description of the FW synchronization IP-Group feature is:

  • A . NCE-Campus supports the configuration of firewall security group policies.
  • B . When the user is authenticated by NCE-Campus or the permissions change, NCE-Campus synchronizes the username, IP-Group, and IP address information to FW; FW identifies all user groups based on the IP address, user name, and IP-Group mapping relationship. Execute the corresponding security group policy;
  • C . Reuse the current Internet behavior management process, and add IP-Group information to the synchronization information between NCE-Campus and the firewall.
  • D . When users come online and age on the FW, the FW actively queries the NCE-Campus server for online users to maintain synchronization of IP-Group and other information at both ends.

Reveal Solution Hide Solution

Correct Answer: A
Question #25

Campus virtualization solution, the network topology that Underlay routing automation does not support is:

  • A . Core transparent transmission ring networking
  • B . Tree networking
  • C . Convergence ring networking
  • D . Access ring networking

Reveal Solution Hide Solution

Correct Answer: D
Question #26

The incorrect description of the deployment mode of iMaster NCE – Campus V300R022CO0 version is:

  • A . In the LAN management scenario, the minimum cluster requires 3 physical servers; it has a distributed 9-node/17-node deployment mode (nodes refer to the number of virtual machines).
  • B . POL convergence scenario, the minimum cluster requires 3 physical servers; there is no distributed cluster yet.
  • C . LAN-WAN&POL integration scenario, the minimum cluster requires 3 physical servers; it has a distributed cluster deployment mode.
  • D . LAN-WAN integration scenario, the minimum cluster requires 3 physical servers; it has a distributed 6-node/9-node/17-node deployment mode (nodes refer to the number of virtual machines)

Reveal Solution Hide Solution

Correct Answer: C
Question #27

Regarding the NetEngineAR631l device description, the incorrect one is:

  • A . The AR R20 version is launched.
  • B . Support DSVPN features
  • C . Industrial access router.
  • D . Fanless design

Reveal Solution Hide Solution

Correct Answer: A
Question #28

Regarding the description of V300RO22C10 version NetEngine AR6300 SRG33XO series enterprise router, which is incorrect?

  • A . The maximum number of XSIC slots available is 4.
  • B . The maximum number of WSIC slots can reach 4.
  • C . 4 SIC slots.
  • D . Dual master control and dual forwarding

Reveal Solution Hide Solution

Correct Answer: A
Question #29

Regarding the description of CloudEngineS8700 switch master control, the incorrect one is ()

  • A . The main control boards of frame 04, frame 06 and frame 10 cannot be shared.
  • B . The main control does not provide service ports
  • C . Main control and switching are integrated, centralized architecture, lower switching delay
  • D . 1:1 active and standby in the frame, packet loss during active and standby switching <5ms

Reveal Solution Hide Solution

Correct Answer: B
Question #30

S switch V200R022 version, which of the following description about the S5X31(S)-S multi-rate switch is wrong?

  • A . Supports 2G large cache to cope with high burst business traffic.
  • B . It can be used as a central switch to support remote modules to achieve minimalist networking.
  • C . Supports advanced features such as VxLAN and MPLS, Telemetry real-time data collection, and network operation and maintenance visualization; it can be widely used in scenarios such as medium-sized campus aggregation and small campus core.
  • D . 3 power supply design, supports N+1 yuan, all ports support full supply of 802.3bt 90W PoE++ power supply, the maximum PoE output power of the whole machine can reach 2268W, adapting to the power supply needs of massive terminals.

Reveal Solution Hide Solution

Correct Answer: A

Question #31

In the WLAN R22 Spruce version, which of the following description about the dual-machine hot standby feature is incorrect?

  • A . HRP backup tunnel replaces the original V5 HSB backup tunnel; supports multiple HRP tunnels, HRP multi-tunnel redundancy and high reliability; supports configuration synchronization.
  • B . HRP supports detecting heartbeat vlanif down and fast switching to achieve second-level switching.
  • C . HRP independently completes the master and backup status negotiation, and the HRP protocol forwarding plane offloads high-priority protection to prevent the master and backup status from oscillating in overload conditions.
  • D . Tunnel-level security encryption supports AES256 tunnel encryption, and business data does not need to be encrypted by yourself.

Reveal Solution Hide Solution

Correct Answer: A
Question #32

Regarding the description of CloudEngineS8700 switch, what is incorrect?

  • A . Available in three product forms: 4-slot, 6-slot, and 10-slot.
  • B . CloudEngineS8700 is a spruce model device.
  • C . It has ultra-high-density GE/10GE/25GE/40GE/100GE full-rate access ports with rich port types.
  • D . Adopt distributed forwarding architecture

Reveal Solution Hide Solution

Correct Answer: D
Question #33

What is incorrect about the new model AirEngine 5762-16W?

  • A . Super wall penetration ability, one AP covers up to four rooms
  • B . Unique built-in butterfly wing smart antenna
  • C . USB expansion external IoT
  • D . Specially designed for multi-partition scenes in dormitories and hotels

Reveal Solution Hide Solution

Correct Answer: A
Question #34

In the SDN-WAN solution, what is the detection technology used for TEHSB and VPN FRR protection solutions?

  • A . Ethoam
  • B . BFD
  • C . Y1731
  • D . NQA

Reveal Solution Hide Solution

Correct Answer: B
Question #35

What is the correct description of the main functions of the configuration translation tool?

  • A . Used in relocation scenarios. This tool can restore the user’s existing network networking status and business feature information.
  • B . Used in relocation scenarios, mainly used to formulate relocation plans, and design the networking structure of new networks
  • C . Used in relocation scenarios, mainly used to batch translate configurations of friends and improve relocation efficiency.
  • D . The above statements are all correct

Reveal Solution Hide Solution

Correct Answer: C
Question #36

When using planning and design tools, which of the following statements about the logical networking of the campus network is incorrect?

  • A . The logical networking initialization diagram is determined by the scenario parameters of the solution.
  • B . Support multi-region and multi-aggregation node design
  • C . The working mode supports stand-alone and stacking
  • D . Cannot be modified manually by dragging and dropping

Reveal Solution Hide Solution

Correct Answer: D
Question #37

Regarding WAC monitoring on the cloud, which one is incorrect?

  • A . To configure wireless features, jump to the web network management of the device on the controller for configuration, and perform all wireless configurations through the web network management.
  • B . AP upgrade, upload the version file to the controller, and the controller directly upgrades the AP
  • C . AP works in fit AP mode, registers to WAC through capwap, and WAC manages fit AP
  • D . The WAC and the controller establish a netconf channel. The AP registers with the controller through the WAC. The controller manages the AP through the WAC and does not directly operate the AP.

Reveal Solution Hide Solution

Correct Answer: B
Question #38

Which of the following protocols does the IMaster NCE-Campus controller use to report device performance data?

  • A . Netconf
  • B . HTTP
  • C . HTTP2.0
  • D . HTTPS

Reveal Solution Hide Solution

Correct Answer: C
Question #39

In WLAN scenario, for requirements collection, which of the following statements is wrong?

  • A . Coverage area: Confirm the key coverage areas required by the customer (such as internal offices, conference rooms, etc.) and general coverage areas (such as stairs, bathrooms, etc.)
  • B . Fulfill the signal field strength requirements in the area, for example, -40dBm~-65dBm in key areas, >-75dBm in ordinary areas
  • C . Number of concurrent users: the total number of access terminals in the current coverage area, and how many people the customer plans to access at the same time in the coverage area.
  • D . Bandwidth requirements: the main business types planned by the customer and the bandwidth requirements for each user

Reveal Solution Hide Solution

Correct Answer: C
Question #40

Which of the following descriptions of business VAP is correct?

  • A . Provide wireless terminal access function
  • B . Establish MESH connection
  • C . Each radio frequency can be configured with multiple configurations, and the number is not limited
  • D . Each radio frequency can be configured with only one

Reveal Solution Hide Solution

Correct Answer: A

Question #41

In the CloudCapmus solution, which Huawei equipment is currently not supported through NETCONF/YANG?

  • A . CloudEngine S series switches
  • B . Data center CE series switches
  • C . WLAN AP
  • D . AR series routers
  • E . USG series firewall

Reveal Solution Hide Solution

Correct Answer: B
Question #42

AR series routers do not support which of the following deployment methods?

  • A . Registration inquiry center
  • B . Start by scanning the QR code on the APP
  • C . DHCP Option
  • D . Email start

Reveal Solution Hide Solution

Correct Answer: B
Question #43

What kind of business nodes does the cloud management platform controller cluster not include?

  • A . Data processing node Fl
  • B . Authentication node ACA
  • C . Data collection node ACC
  • D . Registration inquiry center
  • E . Device management node ACM

Reveal Solution Hide Solution

Correct Answer: D
Question #44

WLAN R22 version, which of the following description about the air interface slicing enhancement is incorrect?

  • A . Same-AP uses different slots/sub-slots for uplink and downlink slices.
  • B . The multimedia slicing traffic diversion solution is SAC/DFI application identification ACL traffic identification.
  • C . The ordinary slice traffic diversion solution uses IP layer DSCP to map to different queues.
  • D . The highly reliable slice traffic diversion solution is ACL traffic identification.

Reveal Solution Hide Solution

Correct Answer: A
Question #45

iMaster NCE-CampusV300RO22CO0 version, which of the function description about the distributed switch (remote module) scenario is incorrect?

  • A . Operation and maintenance capabilities: Supports restarting distributed switches; supports reporting failure alarms for distributed switch upgrades.
    Control capability: Supports direct delivery of configurations to distributed switches (remote modules).
  • B . Control capability: Supports direct delivery of configurations to distributed switches (remote modules)
  • C . Management capabilities: Supports viewing the information of distributed switches attached to the central switch, including ESN, model, online status, direct connection to the central switch interface, and the port list information of the distributed switch itself.
  • D . Monitoring capabilities: Supports viewing the memory usage, storage space usage, temperature of distributed switches, as well as the operating status, rate, traffic, packet statistics, bandwidth utilization, etc. of distributed switch ports.

Reveal Solution Hide Solution

Correct Answer: B
Question #46

EVPN’s alias function mainly relies on which route?

  • A . per EVIAD route
  • B . per ES AD route
  • C . Inclusive Multicast Ethernet Tag Route
  • D . Ethernet Segment Route

Reveal Solution Hide Solution

Correct Answer: A
Question #47

Regarding end.dt4, decapsulation and specific IPV4 lookup table, which is the wrong statement?

  • A . For L3VPN scenarios, it is required to search in the VPN FIB of the egress PE.
  • B . SID can use the SID anywhere in the segment list
  • C . Check the private network FIB of V4 based on the inner IPv4 DA
  • D . You can use the destination address of IPV6 packets without SRH header

Reveal Solution Hide Solution

Correct Answer: B
Question #48

Endpoint SID representing the PE type, used to identify an IPv4VPN instance in the network:

  • A . End.DX4 SID
  • B . End.X SID
  • C . End.OP SID
  • D . EnDT4 SID

Reveal Solution Hide Solution

Correct Answer: D
Question #49

Regarding the MPLS tuning solution, which of the following descriptions is incorrect?

  • A . It is recommended to deploy a common path for two-way tunnels to facilitate maintenance and make tunnel BFD detection more reliable.
  • B . When optimizing path calculation, prioritize the creation of high-priority tunnels. High-priority tunnels can preempt low-priority tunnel resources.
  • C . RSVP-TE, SR-TE, and LDP tunnels can all be tuned
  • D . When deploying multiple load-sharing tunnels between two PE nodes, it is recommended to deploy a separation group.

Reveal Solution Hide Solution

Correct Answer: C
Question #50

Which of the following is not a reliability technology of the controller server?

  • A . Local hardware redundancy protection
  • B . TE HSB
  • C . Local software protection
  • D . Remote disaster recovery

Reveal Solution Hide Solution

Correct Answer: B

Question #51

Which of the following is not a network reliability protection technology?

  • A . Load sharing
  • B . VPN FRR
  • C . PCEP
  • D . TE HSB

Reveal Solution Hide Solution

Correct Answer: C
Question #52

In the southbound protocol of the controller, the () protocol collects traffic performance data of ports, links, and tunnels (LSP) from PCC, including flow rate and bandwidth utilization, and collects quality detection data;

  • A . BGP-LS
  • B . PCEP
  • C . SNMP
  • D . Netconf

Reveal Solution Hide Solution

Correct Answer: C
Question #53

In NCE-IP deployment, which of the following licenses are optional to load?

  • A . Load Fl License
  • B . Load NCE License
  • C . Load FC License (Virtual Machine) License

Reveal Solution Hide Solution

Correct Answer: A
Question #54

In the SDN-WAN solution, the principles that need to be followed in the ISIS Cost design, which of the following description are incorrectly?

  • A . The COST configuration of the link using the operator’s MSTP in a remote location is larger. It is recommended to configure 1000 to avoid traffic bypassing the wide area link – test error
  • B . The COST of the WDM or bare fiber link in the same city is the next smallest. It is recommended to configure 200 to ensure that the same city link is the second choice in route calculation.
  • C . Set the local link COST value to the minimum. It is recommended to configure 10 to ensure that the local link is given priority in route calculation – test error
  • D . The link COST between the RR and PE equipment is configured with a very large value. It is recommended to configure 10000 to ensure that the RR equipment is only responsible for control plane route reflection and does not forward traffic.

Reveal Solution Hide Solution

Correct Answer: D
Question #55

When designing BGP in SDN-WAN, it is recommended to divide devices with the same configuration into the same group to simplify configuration and maintenance. Which of the following descriptions is incorrect?

  • A . All backbone P (P) 1 group
  • B . All branches PE (BR-PE) 1 group
  • C . All data center PE (DC-PE) 1 group
  • D . All RR equipment (RR) 1 group

Reveal Solution Hide Solution

Correct Answer: A
Question #56

In QOS design, the incorrect description of traffic scheduling design principles is:

  • A . The scheduling strategy of the entire network should maintain the principle of unity, and try to use templated deployment to facilitate network management.
  • B . LPQ/WFQ scheduling strategy can be used to prevent low-priority services from being unable to obtain bandwidth resources.
  • C . The currently planned QoS strategy needs to consider the subsequent expansion of the network.
  • D . Core services and video and voice services must ensure the absolute priority of forwarding and use PQ scheduling.
  • E . Unless the business has special needs, try to use default values for some parameters of the scheduling policy.
  • F . For TCP-based services, the queue must be configured with WRED discarding to avoid TCP global synchronization.

Reveal Solution Hide Solution

Correct Answer: B
Question #57

The function of the Ethernet Segment Route (Type4) is:

  • A . Multicast tunnel endpoint automatic discovery & multicast type automatic discovery
  • B . ES member automatic discovery
  • C . IP Prefix Announcement
  • D . MAC address learning notification

Reveal Solution Hide Solution

Correct Answer: B
Question #58

segment-routing ipv6 encapsulation source-address 1:1 locator SRv6 locator ipv6-prefix A1:64 static 32 static function allocation range is ()

  • A . A1::1-A1:FFFF:FFFF
  • B . A1::1-A1:-FFFF
  • C . A1:1-A1..FFFF:FFFF:FFF
  • D . A11:0:0-A1:FFFF:FFFF:FFFF:FFFF

Reveal Solution Hide Solution

Correct Answer: A
Question #59

Regarding the description of the design principles of Locator SID, which is incorrect?

  • A . When planning the SRv6 Locator address segment, set an appropriate mask based on the number of IPv6 SIDs that the device may use.
  • B . loatos svW6_locator ipu6-prelix21.DBBABCD:.b4 static 32, Locator is 2001.DB8.ABCD:, length 64 bits, static segment occupies 32 bits, dynamic segment occupies 32 bits and args field occupies O bits. Status segment starting value: 2001:DB8:ABCD:0000:0000:0000:0000:0001
  • C . Locator SID supports static configuration or dynamic allocation. end-op and end-m must be configured statically. Static configuration of end and end.x is also recommended to facilitate network operation and maintenance. Other SIDs can be assigned dynamically.
  • D . Devices at the same site belong to the same large network segment with the same prefix, and different devices are allocated small network segments with the same prefix in the large network segment.

Reveal Solution Hide Solution

Correct Answer: B
Question #60

Regarding the behavior of END, which statement is wrong?

  • A . end.DT4: EVPN VPLS Unicast Meteor
  • B . end.dx2: L2AC interface used to divert traffic to the egress PE
  • C . end.X SID: used to direct traffic to a link of a specific node
  • D . end SID: direct traffic to the node based on the IP routing table

Reveal Solution Hide Solution

Correct Answer: A

Question #61

Policy generated sources do not include:

  • A . IGP
  • B . CLI/Netconf/yang
  • C . BGP
  • D . PCEP

Reveal Solution Hide Solution

Correct Answer: A
Question #62

In the southbound protocol of the controller, the () protocol is the LSP communication protocol between NCE and PCC. PCC reports LSP status information to NCE, and NCE notifies PCC to update the tunnel LSP.

  • A . PCEP
  • B . Netconf
  • C . BGP-LS
  • D . SNMP

Reveal Solution Hide Solution

Correct Answer: A
Question #63

When designing BGP routing control for SDN-WAN, the entire backbone network structure is a dual-plane structure, which increases the reliability of the network. PE equipment on the same plane is preferred when selecting BGP routes. This is achieved through ().

  • A . ORIGIN
  • B . MED
  • C . LocalPre
  • D . AS_PATH

Reveal Solution Hide Solution

Correct Answer: B
Question #64

What type of routing does EVPN use to solve the AC side loop problem?

  • A . Ethernet AD Route (Type 1)
  • B . Ethernet Segment Route (Type4)
  • C . MAC/IP Advertisement Route (Type 2)
  • D . Inclusive Multicast Route (Type 3)

Reveal Solution Hide Solution

Correct Answer: A
Question #65

Regarding the tunnel planning description, which is incorrect?

  • A . SRv6 Policy Group, SRv6 Policy, and SRv6-BE tunnel are all delivered and deployed through iMaster NCE-IP.
  • B . VPN services in the backbone network can be carried using SRv6 Policy Group, SRv6 Policy, and SRv6-BE tunnels.
  • C . For L2EVPN services, the SRv6 Policy tunnel is used first, followed by SRv6-BE for escape.
  • D . For L3EVPN services, it is first recommended to use the SRr6 Policy Group tunnel for DSCP traffic diversion. If the route iteration SRv6 Policy tunnel fails, use the SRv6-BE tunnel for escape.

Reveal Solution Hide Solution

Correct Answer: A
Question #66

Regarding the SRv6 Policy Group tunnel planning description, the incorrect one is ().

  • A . Establish an SRv6 Policy Group tunnel group for local and remote devices on the same plane.
  • B . The minimum color of the SRv6 Policy Group tunnel group is 1000000. The colors of different VPN services and planes do not need to be distinguished and can be the same.
  • C . A VPN service is configured with an SRv6 Policy Group tunnel group.
  • D . Multiple Policy tunnels can be planned within the Group according to the actual needs of users.

Reveal Solution Hide Solution

Correct Answer: B
Question #67

SDN-WAN solution government affairs unified construction mode, the incorrect description of SRv6 tunnel design is ().

  • A . Business slicing must use SRv6 Policy tunnel, which can be a strict explicit path or a loose path.
  • B . The entire network uses NCE-P to calculate paths for the sliced network based on affinity attributes to ensure optimal paths throughout the network and make full use of link bandwidth while ensuring service quality.
  • C . Deploy SRv6 Policy tunnels vertically between district, county, city, and provincial wide area cores to optimize traffic, improve bandwidth utilization, and ensure service quality.
  • D . The SRO6fPolicy tunnel can be carried in the default slice network or in the non-default slice network. For default slices, the SRv6BE mode is preferred. Services with special requirements can also be carried using SRv6 Policy tunnels.

Reveal Solution Hide Solution

Correct Answer: A
Question #68

In the government affairs scenario of the SDN-WAN solution, which of the design description of the business VPN into the network slicing solution is incorrect?

  • A . Deploy a VRF instance for each slice.
  • B . Each VRF instance configures a routing policy to dye a specific Color.
  • C . The SRv6 Policy tunnels in the slice are set to different colors. After the head node matches the Color, the VRF instance iterates to the SRv6 Policy tunnel in the corresponding slice.
  • D . In the network, FLEX-E technology is recommended for resource reservation for interfaces below 50GE, and channelized interface technology is recommended for resource reservation for interfaces of 50GE and above.

Reveal Solution Hide Solution

Correct Answer: D
Question #69

Which of the following statements about MAC routing is incorrect?

  • A . The Flag value of the migration attribute in the MAC route is 1, indicating a static MAC. At this time, migration processing will not be performed. Static MAC is preferred.
  • B . When a MAC route is migrated, the one with a larger sequence number in the MAC migration attribute will be preferred.
  • C . Only IRB and IRB6 type routes in MAC routes will fill in two labels (that is, both mpls label1 and mpls label2 in the message will be filled with valid values)
  • D . The Route Distinguisher value (RD value) of the MAC route is generated by the value configured in evpn source-address

Reveal Solution Hide Solution

Correct Answer: D
Question #70

Which of the following interface protocols is not required by the MPLS tuning solution?

  • A . BGP-LS
  • B . Netstream
  • C . PCEP
  • D . Telemetry

Reveal Solution Hide Solution

Correct Answer: B

Question #71

The incorrect opcode parameter description in the SRv6 basic data plan is ().

  • A . Static Opcode needs to be configured within the static segment range to prevent conflict with Opcode dynamically allocated by the IGP protocol. The static segment length range is determined by the static static-length parameter of the locator command.
  • B . end-op and end-m require static configuration
  • C . end, end-x, end-dt4, end-dt6, end-dx2 can be dynamically allocated or statically configured
  • D . The SRv6 SID format is Locator: Function: Args, where the Args field is also called Opcode

Reveal Solution Hide Solution

Correct Answer: D
Question #72

In the southbound protocol of the controller, the () protocol collects topology information in real time.

  • A . PCEP
  • B . BGP-LS
  • C . Netconf
  • D . Telemetry

Reveal Solution Hide Solution

Correct Answer: B
Question #73

In VXLAN access scenarios, the maximum number of (  ) stacked access devices is recommended.

  • A . 1
  • B . 2
  • C . 3
  • D . 4

Reveal Solution Hide Solution

Correct Answer: D
Question #74

In the WLAN Planner tool, under what circumstances will it not prompt whether to enter roaming mode when walking on a 3D floor?

  • A . The number of AP is greater than 50 or equal to 0
  • B . The number of APs is greater than 100 or equal to 0
  • C . When the signal strength on the floor is too low
  • D . When there are insulating obstacles

Reveal Solution Hide Solution

Correct Answer: D
Question #75

Regarding the user requirements for configuring translation tools, which of the following statements is correct?

  • A . You already have the tools and you can completely trust them. No special skills are required. Everything is fine.
  • B . I have a relatively high degree of education and can solve problems myself; I can use.
  • C . The tool is simple, and I already have two years of work experience, so there is no problem in using it.
  • D . Have systematic and professional data communication network knowledge, and have more than two years of experience in data communication equipment startup and maintenance.

Reveal Solution Hide Solution

Correct Answer: D
Question #76

When using planning and design tools, which of the following statements is wrong regarding the layout of campus network cabinets?

  • A . A has two views: logical cabinet and physical cabinet.
  • B . Drag and drop to adjust the device position
  • C . Modular switches support board location design
  • D . The server cannot be placed in the cabinet.

Reveal Solution Hide Solution

Correct Answer: D
Question #77

Which of the following protocols does the IMaster NCE Campus controller use to register devices online and deliver configurations?

  • A . Netconf
  • B . HTTP
  • C . HTTP2.0
  • D . HTTPS

Reveal Solution Hide Solution

Correct Answer: A
Question #78

The types of cloud devices that the cloud management solution supports to manage are not included:

  • A . FW
  • B . S switch
  • C . AR router
  • D . CE switch
  • E . AP

Reveal Solution Hide Solution

Correct Answer: D
Question #79

Which of the following does not belong to the planning and design of a virtual network?

  • A . VN planning and design
  • B . Strategy design
  • C . Automated design of start-up

Reveal Solution Hide Solution

Correct Answer: C
Question #80

In virtualization scenarios, when using a unified access policy for different VNs, we recommend using () external network design.

  • A . L3 shared exit
  • B . L3 exclusive export
  • C . L2 shared exit
  • D . L2 exclusive export

Reveal Solution Hide Solution

Correct Answer: A

Question #81

In solution C1R19C10, which of the following functions cannot be automatically deployed through underlay?

  • A . Physical stacking
  • B . Internet address
  • C . Routing interoperability
  • D . Divide routing areas

Reveal Solution Hide Solution

Correct Answer: A
Question #82

In WLAN scenario, among the four service flows in EDCA, ( ) have the highest priority:

  • A . AC_Vl
  • B . AC_bk
  • C . AC_BE
  • D . AC_vo

Reveal Solution Hide Solution

Correct Answer: D
Question #83

What should the customers do if they want to delete a configuration delivered to the device through NCE-Campus and manually delete the command line on the device?

  • A . Just delete it directly on NCE-Campus
  • B . Add the command line on the device and delete it through NCE-Campus
  • C . No other operations are required, NCE-Campus will perform reconciliation

Reveal Solution Hide Solution

Correct Answer: B
Question #84

If the device suddenly goes offline during the configuration delivery process, what error message may be displayed in the configuration results?

  • A . Configuration service exception.Contact maintenance engineer (netconf communication failed)
  • B . Service process failed
  • C . The service is abormal
  • D . Unrecongnizeinformation

Reveal Solution Hide Solution

Correct Answer: A
Question #85

Regarding the description of the dual-Border and WAC interconnection design of the campus distributed gateway, which is incorrect?

  • A . In the Overlay interworking solution, it is recommended to run VRRP on Vbdif between the two Borders, and the VRRP virtual address serves as the gateway for wireless users;
  • B . When wireless centralized forwarding is used, management IP interoperability and service VLAN interoperability are required between WAC and Border, that is, Underlay and Overlay need to be opened;
  • C . When performing wireless local forwarding, only the management IP needs to be communicated between WAC and Border, that is, Underlay is connected;
  • D . Supported networking: WAC dual-machine hot backup (VRRP dual-machine hot backup or dual-link hot backup), and dual-Border port sub-type networking, dual-machine VRRP hot backup is recommended; in multi-campus interconnection LAN-WAN integration scenarios, refer to the following topology

Reveal Solution Hide Solution

Correct Answer: A
Question #86

In a multi-campus interconnection LANWAN scenario, refer to the following topology campus topology. Which of the descriptions about the design and deployment of the dual-gateway Interlink solution is incorrect?

  • A . Interlink serves as the interconnection port of dual gateway devices and provides forwarding of business (VPN) traffic between devices through sub-interfaces.
  • B . Complete the synchronization of dual-gateway device information through the Interlink control sub-interface: such as synchronization and backup of application identification results, synchronization and backup of overlay connection information and connection quality information, etc.
  • C . Interlink can be interconnected using direct links. When the site business traffic is large and the CPE port resources are sufficient, it is recommended that Interlink adopts Eth-trunk link.
  • D . Interlink cannot borrow the Layer 2 service interface on the CPE LAN side

Reveal Solution Hide Solution

Correct Answer: D
Question #87

Regarding the statements about campus NCE user access authentication, which is incorrect?

  • A . The authentication method supports Portal authentication, MAC authentication, and 802.1X authentication.
  • B . Portal page customization is not supported, but docking with third-party Portal servers is supported.
  • C . Authentication data is transmitted using HTTP2.0 and Radius protocols, and configuration data is transmitted using Netconf protocol.
  • D . Support docking with social media such as WeChat

Reveal Solution Hide Solution

Correct Answer: B
Question #88

S switch V600R022 version, regarding the IPV6 RGuard implementation description, the incorrect one is ().

  • A . RA messages can carry a lot of network configuration information, including key network configuration information such as the default router, network prefix list, and whether to use a DHCPv6 server for stateful address allocation. The attacker modifies the network configuration of the user’s host by sending forged RA messages, making it impossible for legitimate users to communicate normally. IPv6 RGuard provides a defense mechanism against RA message attacks, which can effectively prevent such network attacks.
  • B . Configure the user (host) or router (router) role for the interface, and the device then chooses to forward or discard RA messages based on the interface role.
  • C . If it is determined that the interface is connected to a user host, configure the interface role as user (host); if it is determined that the interface is connected to a router, the administrator can configure the interface role as router (router) according to the interface in the network. Version 22.0 also supports policy-based filtering of ND packets.
  • D . Version 22.0 also supports policy-based filtering of nd packets.

Reveal Solution Hide Solution

Correct Answer: D
Question #89

Regarding the description of the WLAN network planning solution for the one-to-two scenario of a dormitory/hotel with a bathroom at the door, the correct one is ().

  • A . Select the butterfly wing wave AP wall-mounted installation in the bathroom corner, with a height of 2.2~2.5m. A single AP covers the left and right rooms.
  • B . The AP fixes the radio frequency power and configures the maximum EIRP value to improve downlink coverage in the wall-through room. The worst 5G downlink RSSI is -65dBm, and the worst uplink RSSI is -80dBm.
  • C . Separately deploy indoor omnidirectional APs (2*2 models such as 5761-11) in the corridor to ensure roaming continuity. The bathroom relies on 5G for coverage and turns off 2.4G.
  • D . The bathroom relies on 5G for coverage and turns off 2.4G

Reveal Solution Hide Solution

Correct Answer: D
Question #90

In the campus SDN solution, which statement is wrong about the distributed gateway solution?

  • A . In distributed gateway-VxLAN to access, independent AC scenarios, local forwarding mode deployment is not recommended for wireless traffic.
  • B . Distributed gateway-VxLAN to access, independent AC scenario, enter VN from edge, execute business mobility policy on edge (edge needs to subscribe to IP-Group service), the current solution supports automated deployment.
  • C . The VTEP device is both an L2 gateway and an L3 gateway. Non-gateway nodes are not aware of VXLAN tunnels and only serve as forwarding nodes for VXLAN packets.
  • D . In the distributed gateway-VxLAN to aggregation, on-board AC scenario, the accompanying policy for wireless traffic services is executed on the edge, and tunnel forwarding is recommended.

Reveal Solution Hide Solution

Correct Answer: B

Question #91

In the sales strategy of campus network products, when the number of APs in a single project exceeds () units, after-sales network planning services must be provided.

  • A . 100
  • B . 200
  • C . 300
  • D . 400

Reveal Solution Hide Solution

Correct Answer: A
Question #92

What is the correct description about the scenario channel configuration template of the configuration generation tool?

  • A . Channel templates are available to all channel providers
  • B . Channel templates are available to all users
  • C . Channel templates are only available to users of this channel, but cannot be modified.
  • D . Channel templates are only available to users of this channel and can be modified.

Reveal Solution Hide Solution

Correct Answer: D
Question #93

When using the planning and design tool, the files that cannot be output currently are:

  • A . ZIP file
  • B . LLD file
  • C . Configuration script
  • D . Project acceptance documents

Reveal Solution Hide Solution

Correct Answer: D
Question #94

In A.C3.0, when deploying Fabric network, which of the following operations is not an operation in Fabric network deployment?

  • A . Configure access management
  • B . Configure policy template
  • C . Create an external network
  • D . Create Fabric network

Reveal Solution Hide Solution

Correct Answer: B
Question #94

In A.C3.0, when deploying Fabric network, which of the following operations is not an operation in Fabric network deployment?

  • A . Configure access management
  • B . Configure policy template
  • C . Create an external network
  • D . Create Fabric network

Reveal Solution Hide Solution

Correct Answer: B
Question #94

In A.C3.0, when deploying Fabric network, which of the following operations is not an operation in Fabric network deployment?

  • A . Configure access management
  • B . Configure policy template
  • C . Create an external network
  • D . Create Fabric network

Reveal Solution Hide Solution

Correct Answer: B
Question #94

In A.C3.0, when deploying Fabric network, which of the following operations is not an operation in Fabric network deployment?

  • A . Configure access management
  • B . Configure policy template
  • C . Create an external network
  • D . Create Fabric network

Reveal Solution Hide Solution

Correct Answer: B
Question #94

In A.C3.0, when deploying Fabric network, which of the following operations is not an operation in Fabric network deployment?

  • A . Configure access management
  • B . Configure policy template
  • C . Create an external network
  • D . Create Fabric network

Reveal Solution Hide Solution

Correct Answer: B
Question #94

In A.C3.0, when deploying Fabric network, which of the following operations is not an operation in Fabric network deployment?

  • A . Configure access management
  • B . Configure policy template
  • C . Create an external network
  • D . Create Fabric network

Reveal Solution Hide Solution

Correct Answer: B
Question #94

In A.C3.0, when deploying Fabric network, which of the following operations is not an operation in Fabric network deployment?

  • A . Configure access management
  • B . Configure policy template
  • C . Create an external network
  • D . Create Fabric network

Reveal Solution Hide Solution

Correct Answer: B

Question #101

New construction

  • A . 12 3456
  • B . 65 1 2 3 4
  • C . 25 3 4 16
  • D . 651243

Reveal Solution Hide Solution

Correct Answer: B
Question #102

To quickly recover when configuration is lost, which of the following operations is recommended?

  • A . Periodically manually save the device configuration on the controller
  • B . Develop regular configuration file backup tasks

Reveal Solution Hide Solution

Correct Answer: B
Question #103

Which of the following information cannot be identified through the smart terminal function?

  • A . Terminal type
  • B . Operation and unity
  • C . Manufacturer
  • D . Network card type

Reveal Solution Hide Solution

Correct Answer: D
Question #104

For channel delivery projects, which of the following cannot be used as a basis for recognition of channel WLAN delivery capabilities?

  • A . WLAN product delivery qualifications, such as HCIA or HCIP engineer
  • B . Huawei WLAN project delivery experience
  • C . Friendly merchants’ non-WLAN project delivery experience
  • D . Friends’ WLAN project delivery qualifications and experience

Reveal Solution Hide Solution

Correct Answer: C
Question #105

Which external data for identity data source docking does not be supported by the NCE-Campus controller?

  • A . LDAP
  • B . Radius Token
  • C . Social media
  • D . SMS gateway

Reveal Solution Hide Solution

Correct Answer: D
Question #106

What is the correct description of the main functions of the configuration generation tool?

  • A . This tool can be used to restore the user’s live network networking status and business feature information.
  • B . Mainly used to generate configuration scripts in batches
  • C . Mainly used to specify relocation plans and design the networking structure of new networks
  • D . All the above statements are correct

Reveal Solution Hide Solution

Correct Answer: B
Exit mobile version