HWE-SA Flashcards
(308 cards)
*SA
1. Refer to the following AAA configuration on a device. Which of the following statements is true?
[R1-aaa]display this
[V200R003C00]
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user huawei password cipher %$%$m]GrHmJ1mL[7&zCh^XQBUII]%$%$
local-user huawei privilege level 0
local-user huawei service-type telnet
A. The authorization scheme is default and the authorization mode is non-authorization.
B. The huawei user can run the display current-configuration command.
C. The huawei user can log in to the device through SSH.
D. The authentication mode is local authentication.
D. The authentication mode is local authentication.
*SA
2. As shown in the following networking, the interfaces connecting R1, R2, R3, and R4 are running OSPF, and are all in area 0. On R1, a static route to the network segment 10.1.34.0/24 is configured using the ip route-static 10.1.34.0 24 10.1.13.32 command. Which of the following statements is true?
A. The routing table of R1 contains only the static route to the network segment 10.1.34.0/24.
B. The routing table of R1 contains both the static route and OSPF route to the network segment 10.1.34.0/24.
C. The routing table of R1 contains the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.12.21.
D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.
D. The routing table of R1 contains only the OSPF route to the network segment 10.1.34.0/24, and the next hop of the route is 10.1.13.32.
*SA
3. Which of the following is not a valid port role in RSTP?
A. Designated port
B. Backup port
C. Forwarding port
D. Root port
C. Forwarding port
*SA
4. The Network Configuration Protocol (NETCONF) provides a mechanism for managing network devices. Which of the following statements about NETCONF is false?
A. NETCONF supports trial runs and rollback in case of errors.
B. If YANG files are not integrated into a device, the device does not support NETCONF.
C. Yet Another Next Generation (YANG) is a data modeling language that standardizes NETCONF data content.
D. NETCONF messages are formatted using either JSON or XML.
D. NETCONF messages are formatted using either JSON or XML.
*SA
5. Which of the following statements about Fit AP+AC networking is true?
A. The tunnel forwarding mode can reduce the forwarding pressure on the AC.
B. The AP version can be upgraded through HTTP.
C. After a CAPWAP tunnel is established between the AC and Fit AP, keepalive packets are used to detect the status of the CAPWAP tunnel.
D. data tunnel and a control tunnel will be established between the AC and Fit AP.
D. data tunnel and a control tunnel will be established between the AC and Fit AP.
*SA
6. When a ping command is run on a network device to check the network connectivity, which type of packet will be sent by the network device?
A. UDP
B. TCP
C. IGMP
D. ICMP
D. ICMP
*SA
7. Which of the following statements about edge ports is false?
A. If an edge port receives a configuration BPDU, it becomes a common STP port.
B. In normal situations, an edge port cannot receive configuration BPDUs.
C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.
D. In most cases, edge ports are directly connected to user terminals.
C. It takes 15 seconds for an edge port to change from the Disabled state to the Forwarding state.
*SA
8. The Versatile Routing Platform (VRP) uses the file system to manage files and directories on a device. Which of the following commands can be used to check the current directory of a device?
A. display dir
B. dir
C. pwd
D. Is
C. pwd
*SA
9. Which of the following is not a method for an AP to discover an AC address?
A. Broadcast
B. DHCP
C. Static configuration
D. OSPF
E. DNS
D. OSPF
*SA
10. OSPF is configured on RTA, RTB, and RTC. GigabitEthernet 0/0/0 interfaces of these routers belong to area 0 and the network types of these interfaces are broadcast. The router ID of RTA is 1.1.1.1, and the DR priority of GigabitEthernet 0/0/0 on RTA is set to 0. The router ID of RTB is 2.2.2.2, and the DR priority of GigabitEthernet 0/0/0 on RTB is set to 255. The router ID of RTC is 3.3.3.3, and the DR priority of GigabitEthernet 0/0/0 on RTC is the default value. Which of the following statements is true about the DR and BDR on the network?
A. RTB functions as the DR, and RTC as the BDR.
B. RTC functions as the DR, and RTB as the BDR.
C. RTA functions as the DR, and RTB as the BDR.
D. RTB functions as the DR, and RTA as the BDR.
A. RTB functions as the DR, and RTC as the BDR.
SA
11, SNMP is used to manage network devices. Refer to the following SNMP configuration on a Huawei device. Which of the following statements is false?
[-HUAWEI] display current-configuration | include snmp
snmp-agent
snmp-agent local-engineid 800007DB03001974593301 snmp-agent sys-info version v3
snmp-agent mib-view included iso-view iso
snmp-agent group v3 v3group privacy read-view iso-view write-view iso-view notify-view iso-view
snmp-agent usm-user v3 v3user
snmp-agent usm-user v3 v3user group v3group
snmp-agent usm-user v3 v3user authentication-mode sha cipher %^%#&Ygn:NzQw;d>f=2+aJ;;=B\M^”P1Hf/{L$F9UW@%^%# snmp-agent usm-user v3 v3user privacy-mode aes256 cipher %^%#Gc!FAB;vL5_[a#9q9i7:lj;q#<P8MOf8@PJMJ0%^% #
A. SNMPv3 is configured.
B. The v3user user can access nodes in the subtree with iso as the root node.
C. The encryption mode of the v3user user is SHA.
D. SNMP packets will be encrypted using AES256.
C. The encryption mode of the v3user user is SHA.
*SA
12. Mastering the basic operations of the file system is crucial for network engineers to efficiently manage the configuration files and VRP system files of devices. Which of the following statements is true about these files?
A. patch file is a type of software compatible with the system software. The common file name extension is .zip.
B. configuration file stores configuration commands. The common file name extension is .cc.
C. PAF file effectively controls product features and resources. The common file name extension is .bin.
D. System software is mandatory for device startup and running. The common file name extension is .cfg.
C. PAF file effectively controls product features and resources. The common file name extension is .bin.
*SA
13. What is the valid VLAN ID range?
A. 1 to 4095
B. 0 to 4094
C. 1 to 4094
D. 0 to 4095
C. 1 to 4094
*SA
14. Refer to the following ACL configuration on a device. Which of the following statements is true?
time-range satime 08:00 to 17:30 working-day
acl number 3002
rule 5 permit ip source 10.164.2.0 0.0.0.255 destination 10.164.9.9 0.0.0.255 time-range satime
A. This ACL is a user ACL according to the ACL classification rules.
B. The ACL rule takes effect only on working days.
C. This ACL is a basic ACL according to the ACL classification rules.
D. All packets with the source IP addresses on the network segment 10.164.2.0/24 will be permitted by the device.
B. The ACL rule takes effect only on working days.
*SA
15. Which of the following states indicates that the neighbor relationship is stable between OSPF-enabled DR-other routers on a broadcast network?
A. Full
B. Loading
C. Down
D. Two-way
D. Two-way
*SA
16. A WLAN is constructed using wireless technologies. Which of the following statements about the WLAN networking is false?
A. basic service set (BSS) indicates an area covered by an AP.
B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.
C. The basic service set identifier (BSSID) identifies a wireless network and is represented using the MAC address of an AP.
D. The service set identifier (SSID) identifies a wireless network and is represented using a character string.
B. virtual access point (VAP) is a service entity virtualized on an AP. All VAPS virtualized on the same AP has the same BSSID.
*SA
17. In the same Ethernet network segment, five routers are running OSPF for interconnection. When the protocol status of all routers is stable, which of the following statements is true?
A. The neighbor status of all routers is Full.
B. The neighbor status of a router on the network can only be Full or 2-way.
C. There are routers of which all neighbor relationships are in 2-way state on the network.
D. The neighbor relationship between a DR router and another router can be Full or 2-way.
B. The neighbor status of a router on the network can only be Full or 2-way.
*SA
18. What is the network ID for the IP address 192.168.1.1/29?
A. 192.168.1.0
B. 192.168.1.255
C. 192.168.1.4
D. 192.168.1.7
A. 192.168.1.0
*SA
19. Python can be used to implement automatic network deployment, operation, and maintenance, reducing the dependence on human resources. This resolves the problems with traditional network O&M. Which of the following statements about Python is false?
A. Two forward slashes (//) can be used to mark a single-line comment.
B. When a method is defined in a class, the method must carry a self keyword.
C. class is a collection of objects with the same attributes and methods.
D. module is a saved Python file and usually does not have a main function.
A. Two forward slashes (//) can be used to mark a single-line comment.
*SA
20. Refer to the following configuration on a Huawei router.
<huawei>system-view
[huawei]user-interface maximum-vty 7
Which of the following statements is true?
A. The router allows a maximum of seven users to log in concurrently through the console port.
B. The router allows a maximum of seven users to log in concurrently through Telnet.
C. The router allows a maximum of seven users to log in concurrently through the asynchronous serial port.
D. If a user forgets the system login password, the user will be locked out after seven consecutive failed login attempts.
</huawei>
B. The router allows a maximum of seven users to log in concurrently through Telnet.
*SA
21. Which is the most widely used VLAN assignment method?
A. Interface-based VLAN assignment
B. Protocol-based VLAN assignment
C. MAC address-based VLAN assignment
D. IP subnet-based VLAN assignment
A. Interface-based VLAN assignment
*SA
22. A router has the following four specific routes:
ip route-static 10.1.20.0 24 12.1.1.2 ip route-static 10.1.21.0 24 12.1.1.2 ip route-static 10.1.22.0 24 12.11.2
ip route-static 10.1.23.0 24 12.1.1.2
To summarize these specific routes, which of the following commands should be run?
A. ip route-static 10.1.20.0 22 12.1.1.2
B. ip route-static 10.1.0.0 16 12.1.1.2
C. ip route-static 10.1.20.0 23 12.1.1.2
D. ip route-static 10.1.16.0 21 12.1.1.2
A. ip route-static 10.1.20.0 22 12.1.1.2
*SA
23. An AC manages and controls APs in a centralized manner through CAPWAP tunnels. An AP sends a Discovery Request packet to find an available AC. Which of the following methods cannot be used by an AP to discover an AC?
A. DHCP
B. DNS
C. Multicast
D. Static configuration (manually specifying an AC)
C. Multicast
- In which of the following modes are DHCP Discover messages sent?
A. Broadcast
B. Unicast
C. Anycast
D. Multicast
A. Broadcast