According to the one-armed routing configurations shown in the figure, even if ARP proxy is disabled on the sub-interface of R1, the Administration Dept and Finance Dept can still communicate with each other.

Refer to the following figure of the ACL configured on a router. Which of the following statements is true?
acl number 2000
rule 5 permit source 192.168.1.1 0
rule 10 deny source 192.168.1.1 0.0.0.255
On the network shown in the figure, the router receives a data packet with the destination IP address 11.0.12.1 from Host A.

After the packet is forwarded by the router, which of the following are the destination MAC address and destination IP address of the data packet?
The following figure shows the MAC address table of a switch.

Assuming that the switch receives a data frame with the destination MAC address 5489-9885-18a8 from Eth0/0/2, which of the following statements is true?
Options:
An ACL rule is as follows. Which of the following IP addresses can be matched by the permit rule?
Rule: rule 5 permit ip source 10.0.2.0 0.0.254.255
Which of the following IPv4 addresses can be directly used by a host to access the Internet?
Which of the following commands is used to configure the country code on an AC?
It is advised to assign static IP addresses to servers during campus network planning.
Which of the following commands is used to display the OSPF neighbor relationship establishment?
Which of the following commands can be used to permanently delete the old device configuration file < config.zip > ?
According to the command output shown in the figure, which of the following statements are true?

You want to check the running configuration on a device by running a Python script to telnet to the device. Which of the following statements is true?
Which of the following advantages is/are provided by inter-VLAN routing in one-arm routing mode?
In the following figure, after the OSPF routers converge, in which state is the OSPF neighbor relationship between Router B and Router C?

As shown in the figure, which of the following ports will be in a blocking state?

On the network shown in the figure, host A logs in to router A through Telnet and obtains the configuration file of router B through FTP on the remote CLI. How many TCP connections exist on router A?

Refer to the following configuration of a switch interface. Which of the following statements is false?
interface GigabitEthernet0/0/1
port link-type trunk
port trunk pvid vlan 200
port trunk allow-pass vlan 100
A Layer 2 ACL can match information such as the source MAC address, destination MAC address, source IP address, and destination IP address.
Refer to the graphic, 00e0-fc99-9999 is a specific host MAC address learned by a switch through ARP, and the host changes the IP address three times.
(When a network engineer enters a command, the following information is displayed:
Error: Unrecognized command found at ' A ' position. Which of the following statements is true about such information?)
When a router is powered on, the router reads the configuration file saved in the default save directory to get itself initialized. If the configuration file does not exist in the default save directory, what does the router use to initialize itself?
When forwarding a data packet, a router needs to change the destination IP address of the packet.
An administrator wishes to manage the router in the remote branch office, which method can be used?
Which of the following packets are exchanged between STAs and an AP to obtain the AP ' s SSID before association with the AP?
On the VRP CLI, files cannot be permanently deleted using the delete or delete /unreserved command. To permanently delete them, you need to delete the files in the recycle bin.
When a host uses the IP address 192.168.1.2 to access the Internet, NAT must be performed.
When an Ethernet frame is received by an interface on a Layer 2 Ethernet switch, which field is used to generate an entry in the MAC address table?
Which of the following WLAN security policies support open link authentication?
On an STP-enabled switch, a port in the Learning state can transition to the Forwarding state only after the Forward Delay timer expires.
Refer to the graphic, after the ping 10.1.1.2 command is executed on R1, LSW1 receives a tagged data frame from VLAN 10 on LSW2.



Refer to the network diagram.

Which of the following statements describes the network shown?
If Spanning Tree Protocol (STP) is disabled on the network consisting of switches, a Layer 2 loop will definitely occur.
In STP, the bridge ID on the switching network is as follows. With which of the following bridge IDs is the switch selected as the root bridge?
Which of the following statements about the routing table shown in the figure are true?
(Which of the following OSPF packets can be used to confirm the received Link State Update (LSU) packets?)
The router ID of the OSPF-enabled router must be the same as the IP address of an interface on the router.
For an STP-enabled switch, a port in any state can transition to the Disabled state.
The LACP priority is shown in the figure. Switch A and Switch B adopt link aggregation in LACP mode, all interfaces are added to the link aggregation group (LAG), and the maximum number of active ports is set to 3.

Which port of Switch A is NOT an active port?
Options:
To enable Router A to communicate with Loopback 0 on Router B on the network shown in the figure, which of the following commands needs to be run on Router A?

By referring to the network structure and OSPF areas shown in the figure, it can be determined that all routers on the network except RTA are ABRs.
As shown in the figure, assume that the MAC address table of SWA is as follows. Host A sends a data frame whose destination MAC address is MAC-B to SWA. Which of the following statements is true?

Answer Choices:
Which of the following DHCP options needs to be configured on the DHCP server to allow Fit APs to obtain the IP address of an AC and establish CAPWAP tunnels?
After an Eth-Trunk in LACP mode is created, devices on both ends send LACPDUs to elect the Actor. Which of the following parameters in LACPDUs determine the Actor election?
In standard STP mode, which of the following ports on non-root switches forward the BPDUs with TC bits set generated by the root switch?
The following figure shows the display interface Eth-Trunk 1 command output on a switch. Which of the following commands can be used to delete Eth-Trunk 1?

On the VRP platform, which of the following parameters can be used together with the " ping " command to specify the source address of an echo request message?
A routing entry contains multiple fields. Which of the following statements about these fields is false?
Refer to the following configuration of an interface on a switch. For which VLAN does the interface transmit tagged data frames?
interface GigabitEthernet0/0/1
port hybrid tagged vlan 2 to 3 100
port hybrid untagged vlan 4 6
A switch receives a unicast data frame with a VLAN tag but cannot find the destination MAC address of the data frame in its MAC address table. In this case, which action will the switch take?
In which state does OSPF determine the master/slave relationship of DD packets?
A company applies for a class C IP address for subnetting. It has eight branches, and the largest branch has a subnet that should support at least 14 hosts. What would be an appropriate subnet mask?
The following figure shows the display stp command output on an STP-enabled port — Ethernet 0/0/1. Which of the following statements about the command output is false?
On a broadcast network, both the DR (Designated Router) and BDR (Backup Designated Router) use the multicast address 224.0.0.6 to receive Link State Update (LSU) packets.
Which of the following configurations can prevent Host A and Host B from communicating with each other?

What is used as the data link-layer MAC address that identifies each VAP on an AP?
(Refer to the display startup command output shown in the figure on an AR2200 router. Which of the following statements about the command output is false?)
< Huawei > display startup
MainBoard:
Startup system software: sdl:/ar2220-v200r003c00spc200.cc
Next startup system software: sdl:/ar222b-v200r003c00spc200.cc
Backup system software for next startup: null
Startup saved-configuration file: null
Next startup saved-configuration file: null
Startup license file: null
Next startup license file: null
Startup patch package: null
Next startup patch package: null
Startup voice-files: null
Next startup voice-files: null
For STP, the Message Age in the configuration BPDUs sent by the root bridge is 0.
UDP does not guarantee data transmission reliability and does not provide packet sorting and traffic control functions. It is suitable for the traffic that has low requirements for data transmission reliability, but high requirements for the transmission speed and delay.
Which of the following statements are true about the shortcut keys of the Versatile Routing Platform (VRP)?
While inspecting packets in the network, a network administrator discovers a frame with the destination MAC address of 01-00-5E-A0-B1-C3. What can the administrator determine from this?
Refer to the following IP routing table on the router R1. If R1 sends a data packet with the destination IP address 10.0.2.2, which of the following interfaces will R1 use to send the packet?

If the application-layer protocol is Telnet, what is the value of the " Protocol " field in the IPv4 header?
As shown in the figure, all switches run STP. Assume that the path cost of all ports is 200. What is the root path cost contained in the configuration BPDU received by G0/0/4 on SWD?

(The IPv6 address architecture does not include which of the following address types?)
Which of the following statements about the commands shown in the figure is true?
< Huawei > sys t ei»-vi cv
[Huawei]user-interface console 0
[Huawei-ui-console0]history-command max-size 20
Refer to the following MAC address table of a switch. Which of the following statements is true?

When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.
On a network running STP, the root switch is elected only by comparing switch priorities. On a network running RSTP, both the priorities and MAC addresses of switches will be compared for electing the root switch.
When an AP and an AC are located on different Layer 3 networks, which of the following methods is recommended for the AP when discovering the AC?
On Huawei VRP platform, which of the following can be used to invoke the history command saved by the command line interface?
The ARP protocol can resolve the MAC address of a destination device from the corresponding destination IP address, mapping the MAC address and IP address.
Which of the following statements is true about the Forward Delay timer of STP?
Which of the following port states are included in Rapid Spanning Tree Protocol (RSTP)?
Link aggregation and stacking technologies can be used to enhance network reliability on a campus network.
By default, all SNMP versions (SNMPv1, SNMPv2c, and SNMPv3) are supported on Huawei AR G3 series routers.
On the network shown in the figure, HOST A and HOST B are required to communicate with each other across VLANs through one-armed routing. To satisfy this requirement, which of the
following commands needs to be performed on G0/0/1.1 of RTA?

Which of the following percentage does the lease time of a DHCP client ' s IP address reach to trigger the DHCP client to send a lease renewal packet for the first time?
During STP calculation, the port cost is associated with the port bandwidth by default. Which of the following statements about the relationship between port cost and port bandwidth is true?
According to the VTY user interface configuration shown in the following figure, the user level is set to 3.
As shown in the figure, RTA uses NAT and has an address pool configured to implement many-to-many non-NAPT address translation, so that hosts on the private network can access the public network. Assume that the address pool has only two public IP addresses, which are translated for Host A and Host B. If Host C wants to access the public network, which of the following statements is true?

Which SNMP version focuses on two main aspects, namely security and administration. The security aspect is addressed by offering both strong authentication and data encryption for privacy. The administration aspect is focused on two parts, namely notification originators and proxy forwarders.
If the network administrator assigns the IPv4 address 192.168.1.1/28 to a host on the network, how many hosts can be added to the network where the host resides?