Вы находитесь на странице: 1из 5

HCIP-Routing & S witching-IENP V2.

5 mock
exam

1. (Multiple Response) Which of the following LSPs are established in Downstream Unsolicited

(DU) label advertisement mode and ordered label distribution control mode? (  )

A. When the edge node finds a new destination address in its routing table that does not

belong to any existing FEC, the edge node does not create a new FEC for the destination

address.

B. An LSP is established by binding an FEC to a label and advertising the binding relationship to

the neighboring LSR.

C. If the egress node has available labels for distribution, it allocates labels for the FEC and

sends a label mapping message to the upstream node.

D. After receiving a label mapping message, the LSR adds the corresponding entry to the label

forwarding table.

2. (Multiple Response) Which of the following statements regarding the LDP session

establishment process are true? (  )

A. Two LSRs send a Hello message to each other. If the Hello message carries the transport

address, the LSR with a greater transport address initiates a TCP connection.

B. If the Hello Message does not carry the transport address, destination IP addresses of the

Hello Message are used to establish a TCP connection. The LSR with the larger IP address

initiates a TCP connection.

C. The initiator sends an Advertisement message to negotiate parameters for establishing an

LDP session. These parameters include the LDP version, label distribution control mode, value of

the Keepalive timer, maximum length of the PDU, and label space.

D. If the responder accepts negotiated parameters, it sends an Initialization message and then a

Keepalive message to the initiator.

3. (Single Response) MPLS VPN is used to solve some limitations of traditional VPN technology.

Which are the major limitation that MPLS VPN solves? (  )

A. Private routes cannot communicate with each other.

B. Leased lines are expensive.


第 1 页, 共 5 页
HCIP-Routing & S witching-IENP V2.5 mock
exam

C. Bandwidth resources cannot be fully used.

D. The address space is overlapping.

4. (Single Response) A VPN instance is also called a VPN routing and forwarding (VRF) table.

Which of the following statements is false? (  )

A. VPN instances on a PE are independent of each other.

B. Each VPN instance can be regarded as a virtual router, which maintains an independent

address space and has one or more interfaces connected to the VPN.

C. A PE maintains multiple routing and forwarding tables, including a public routing and

forwarding table and one or more VRFs.

D. A VPN instance can be bound to multiple sites. Multiple sites can be bound to one VPN

instance.

5. (Multiple Response) DHCP snooping is a security feature that can be used to defend against

various attacks, including (  )

A. Starvation attacks by changing the CHADDR field value

B. Bogus DHCP server attacks

C. TCP flag attacks

D. Man-in-the-middle attacks and IP/MAC spoofing attacks

6. (Multiple Response) Which of the following are included in the full lifecycle guest

management of the Agile Controller? (  )

A. Account registration

B. Account approval and distribution

C. Account authentication

D. Account audit and deregistration

7. (Multiple Response) Which of the following statements regarding terminal security

management of the Agile Controller are true? (  )


第 2 页, 共 5 页
HCIP-Routing & S witching-IENP V2.5 mock
exam

A. Supports one-click restoration to reduce maintenance costs of terminals.

B. Allows installation of only standard software, implementing desktop office standardization.

C. Forces installation of clients meeting security requirements and prevents terminal data

leaking.

D. Prohibits installation of non-standard software to reduce the virus infection risks.

8. (Multiple Response) What are the mainly methods of data collection? (  )

A. Collection by physical optical splitter

B. Collection through port mirroring

C. Centralized collection by NMS

D. Automatic collection

9. (Multiple Response) Which of the following items can be used as the filtering conditions for

historical alarm query on eSight? (  )

A. Alarm severity

B. First occurrence time

C. Alarm source

D. Alarm name

10. (Single Response) Which information of labels is used for simple traffic classification? (  )

A. DSCP priority

B. IP precedence

C. MPLS EXP priority

D. 802.1p priority

11. (True or False) After add interface GigabitEthernet0/0/1 is configured in the trust zone view

of the USG series firewall, GigabitEthernet0/0/1 does not belong to the local zone anymore. (  )

12. (Single Response) For interzone packet filtering, which traffic is belong to transmitted to
第 3 页, 共 5 页
HCIP-Routing & S witching-IENP V2.5 mock
exam

outbound direction? (  )

A. Trusted zone -> Untrusted zone

B. Untrusted zone -> Trusted zone

C. Untrusted zone -> DMZ

D. Trusted zone -> Local zone

13. (Single Response) Which of the following statements regarding Network Address and Port

Translation (NAPT) and No Port Translation (No-PAT) is true? (  )

A. After NAPT translation, all packets are from the same IP address for external users.

B. In No-PAT mode, only the transport layer protocol port number can be converted.

C. In NAPT mode, only the network layer protocol address can be converted.

D. In No-PAT mode, the network layer protocol address can be converted.

14. (Single Response) Which of the following statements regarding VRRP is false? (  )

A. VRRP determines the device role in the virtual router based on device priorities.

B. If the backup router works in non-preemption mode, the backup router with a higher priority

does not become the master router as long as the master router does not fail.

C. Even if there is the master router, the backup router will preempt to be the master router.

D. When two routers with the same priority preempt to be the master router, the IP addresses

of interfaces are compared. The router with a larger IP address of the interface is selected as the

master router.

15. (Single Response) Which command is used to enable association between BFD and VRRP? ( 

A. vrrp vrid 1 track bfd-session session-name 1 reduced 100

B. bfd-session vrrp vrid 1 track session-name 1 reduced 100

C. track vrrp vrid 1 bfd-session session-name 1 reduced 100

D. vrrp vrid 1 track bfd-session-name 1 reduced 100

第 4 页, 共 5 页
HCIP-Routing & S witching-IENP V2.5 mock
exam

16. (Single Response) In the SDN network architecture, which device is used to calculate the

path and deliver the flow table? (  )

A. Application server

B. Controller

C. Orchestrator

D. Device

17. (True or False) VXLAN is irrelevant to SDN technology. (  )

18. (Single Response) How is OPEX defined? (  )

A. Maintenance cost

B. Total cost of ownership (TCO)

C. Operating cost

D. O&M cost

19. (Single Response) In vAR application scenarios, which functions of the AR Router can be

virtualized on a server? (  )

A. Firewall

B. VoIP

C. NAT

D. VPN

20. (True or False) SDN and NFV are essentially the same concept and both define network

function virtualization. (  )

Answer:1.BCD  2.AD  3.D  4.D  5.ABD  6.ABCD  7.ABCD  8.ABC  9.ABCD  10.C  11.F  12.A  13.D 

14.C  15.A  16.B  17.T  18.C  19.ABCD  20.F


第 5 页, 共 5 页

Вам также может понравиться