New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Huawei H31-161 Dumps Questions Answers

Page: 1 / 7
Total 180 questions

HCIE-Carrier IP (Written) Questions and Answers

Question 1

Which message does the pseudo wire emulation edge-to-edge (PWE3) add for LDP signaling

extension compared with Martini VLL?

Options:

A.

Request

B.

Mapping

C.

Withdraw

D.

Release

E.

Notification

Buy Now
Question 2

Which statement about the MPLS LSP Ping is true?

Options:

A.

The LSP Ping Echo request must contain the downstream mapping TLV

B.

A unique Sender's Handle is generated during each LSP Ping operation

C.

A unique sequence number is generated during each LSP Ping operation

D.

The LSP Ping Echo request may contain the FEC stack TLV

Question 3

In the VRP, which of the following authentication modes are supported by the secure shell (SSH)?

Options:

A.

password

B.

Rivest-Shamir-Adleman (RSA)

C.

password-rsa

D.

md5

Question 4

Exhibit.

As shown in the figure, complex traffic classification is configured for RTA’s upstream GigabitEthernet 1/0/0. The QoS is configured as follows:

A tester sends TCP packets from GE 1/1 to GE 1/2 at 40 1.2.2 IF DSCP values of packets GE receives are not 46, what are the possible causes?

Options:

A.

The default mapping from the EF value to the DDCP value is modified

B.

DSCP values of sent packets are not 10.

C.

The qos phb command is enabled on RTA’s GigabitEthernet1/0/0.

D.

STC is disabled at RTA’s GigabitEthernet 1/0/0.

Question 5

Which statement describes the delay requirement of the voice service for the IP bearer network?

Options:

A.

Bearer network delay=50 ms, allowed maximum delay = 100 ms

B.

Bearer network delay=150 ms, allowed maximum delay = 200 ms

C.

Bearer network delay=10s, allowed maximum delay = 20s

D.

No strict requirement.

Question 6

As shown in the figure, CEs connect to users 1 and 2 through access

interfaces or links.

[Quidway-GigabitEthernet1/0/4]portswitch

[Quidway-GigabitEthernet1/0/4]port link-type access

[Quidway-GigabitEthernet1/0/4]port default vlan 1

[Quidway-GigabitEthernet1/0/6]portswitch

[Quidway-GigabitEthernet1/0/6]port link-type access

[Quidway-GigabitEthernet1/0/6]port default vlan 2

[Quidway-GigabitEthernet1/0/3]portswitch

[Quidway-GigabitEthernet1/0/3]port link-type trunk

[Quidway-GigabitEthernet1/0/3]port trunk permit-pass vlan 1 to 2

Users 1 and 2 require different network transmission quality. Which of the following methods are

feasible to configure 802.1p priority 1 for packets of user 1 and 802.1p priority 2 for packets of user

2?

Options:

A.

On a PE, configure Dot1q tunnel interfaces and simple traffic classification (STC) for interfaces on

the private network.

B.

On a PE, configure vlan-mapping and STC for interfaces on the private network for users 1 and 2.

C.

On a PE, configure vlan-stacking and STC for interfaces on the private network for users 1 and 2.

D.

On a CE, configure STC for user VLANs on the user access side.

Question 7

Which statement is false?

Options:

A.

The ASM multicast forwarding model does not allow the receiver to specify a multicast source.

B.

The PIM SSM multicast routing protocol cannot set up shared multicast forwarding trees.

C.

The SSM multicast forwarding model considers an (S,G) entry as one channel.

D.

The IGMP SSM Mapping function is to map a (*,G) Join message reported by the host to an (S,G) Join messag

Question 8

On a metropolitan area network, VIP customers access the network through the MPLS VPN to ensure their security. Which of the following security deployments are required for PEs?

Options:

A.

Configure the CP-CAR on the interface connected to the CE.

B.

Deploy protocol authentication if a router protocol is used between PEs and CEs.

C.

Configure the ACL to filter out data packets with common network viruses at the interface

connected to the CE.

D.

Configure the ACL to filter out IP packets that use the IP address of the CE-connected interface as the destination address.

Question 9

As shown in the figure, IGP is configured on RT 1 and RT 2, and route 193.3.6.0/24 is configured on RT 2. Which of the following statements is correct? Suppose OSPF is used here. Configure an access control list (ACL) on RT 2 in system mode.

ACL 2000

rule 5 permit source 193.3.6.0 0.0.0.255

Configure a routing policy in system mode:

route-policy t permit node 1

if-match acl 2000

apply backup-nexthop 106.108.4.1

apply backup-interface Ethernet4/0/4

Configure the IP FRR in system mode:

ip frr route-policy tConfigure the ethe4/0/4 interface of RT 2:

ospf cost 100

Configure BFD on RT 2:

Enable BFD on Ethernet4/0/3

bfd b1 bind peer-ip 106.108.3.1 interface Ethernet4/0/3

discriminator local 1

discriminator remote 1

min-tx-interval 10

min-rx-interval 10

process-pst

commit

Configuration on RT 1:

Enable BFD on Ethernet7/0/3

bfd b1 bind peer-ip 106.108.3.2 interface Ethernet7/0/3

discriminator local 1

discriminator remote 1

min-tx-interval 10

min-rx-interval 10

process-pst

commit

Options:

A.

The IP FRR function is enabled for the traffic bound for 193.3.6.0/24 on RT 2. It is unnecessary to configure the ethe4/0/4 interface on RT 2.

B.

Except the entry nexthop:106.108.3.1, a backup forwarding entry nexthop:106.108.3.1 is also generated for the traffic bound for 193.3.6.0/24 in the FIB table.

C.

If apply backup-interface Ethernet4/0/4 is deleted, the backup forwarding entry can also be generated because apply backup-nexthop 106.108.4.1 takes effect.

D.

Use a tester to send traffic from FE5 to FE6 after the BFD session becomes Up, run the undo ip address command in the ethe7/0/3 interface view on RT 1, and calculate the time for switchover based on the number of lost packets and packet receiving rate measured by the tester. The switchover takes less than 50 ms.

Question 10

Exhibit.

As shown in the figure, OSPF process 100 runs on both PEs and CEs, and VPN routers are transmitted between PE 1 and PE 2 through PGB CE 1 enables interface address 43.1.1.0/24 in area 0.A route to 43.1.10/24. However, does not exist in the routing table of CE 2. What are the possible causes?

Options:

A.

The VPN route to 43.1.1.0/24 does not exist in the routing table of PE 2.

B.

The LSDB of PE 1 does not have the type 1 LSA generated by CE 1.

C.

The LSDB of PE 12 does not have the type 1 LSA generated by CE 1.

D.

The public network rout to 43.1.1.0/24 does not exist in the routing table of PE2

.

Question 11

The Huawei router is the last hop DR where the SSM Mapping function is enabled at the interface.

Some IGMPv2 hosts expect to receive (1.0.0.1, 232.1.0.1), (1.0.0.1, 232.1.0.2), and (2.0.0.1,

232.1.3.2) data. How can you satisfy the preceding requirements with the least configurations?

Options:

A.

ssm-mapping 232.1.0.2 32 1.0.0.1

B.

ssm-mapping 232.1.0.1 32 1.0.0.1

C.

ssm-mapping 232.1.0.0 24 1.0.0.1

D.

ssm-mapping 232.1.3.2 16 2.0.0.1

E.

ssm-mapping 232.1.3.1 24 2.0.0.1

F.

ssm-mapping 232.1.3.0 8 2.0.0.1

Question 12

Exhibit.

RTA is an edge route of the MPLS backbone network. It provides the access for users under layer 2 switches and differentiates user by subinterface. User access VALN 100 and has subscribed to the His ViIP , and services. According to 802 1p priorities, the value 0 indicates the HIS service, 1 indicates the VoIp service and 4 indicate the IPTV service. The DiffSerc model is deployed in E-LSP mode on the MPLS network,

And the STC is configured for subinterface on the access side of RTA (the qos phb disable command is not configured). Outgoing on the traffic on the G1/0/0.1 suninterface involves the His VoIP, and services on the access side of RTA. Which statements about EXP about values corresponding to these three services is true?

Options:

A.

At least three EXP values be contained, and the values are uncertain.

B.

Only two EXP values be contains, and the values are certain.

C.

The EXP values must be 0, 1, and 4.

D.

Only one EXP may be contained, and the value is uncertain

Question 13

Which of the following statements about inter-AS VPN Option A are true? (ACE)

Options:

A.

More logical links must be configured between ASBR-PEs when more VPNs are deployed.

B.

Option A provides excellent scalability and supports a great number of VPNs.

C.

The VPN instances on an ASBR-PE can be bound to both physical interfaces and logical interfaces.

D.

ASBR-PEs communicate with each other only through EBGP.

E.

ASBR-PEs communicate with each other through any multi-instance (PE-CE) capable routing protocol.

Question 14

Which of the following statements about IGP Shortcut and FA are true?

Options:

A.

An MPLS TE tunnel is viewed as a link and the MPLS TE tunnel interface is used as the outbound interface of a route.

B.

When IGP Shortcut is enabled, MPLS TE tunnels can be advertised to routers as if they are links.

C.

If FA is enabled on an MPLS TE tunnel, the MPLS TE tunnel can be shared by other routers.

D.

OSPF BFD does not need to be applied to IGP Shortcut-enabled tunnels.

Question 15

RTA is a leaf router that directly connects to host A through interface GigabitEthernet 1/0/0. The

interface is configured as follows:

interface GigabitEthernet1/0/0

undo shutdown

ip address 192.168.4.2 255.255.255.0

pim sm

igmp enable

igmp version 3igmp ssm-mapping enable

igmp static-group 232.1.1.1

Configurations in the IGMP view are as follows:

igmp

ssm-mapping 232.1.1.0 255.255.255.0 10.10.1.1

ssm-mapping 232.1.2.0 255.255.255.0 10.10.1.1

Host A sends an IGMPv2 Report message to group 232.1.2.2. Which entry can be displayed by the

display igmp ssm-mapping group command?

Options:

A.

(10.10.1.1, 232.1.1.1)

B.

(10.10.1.1, 232.1.2.2)

C.

(10.10.1.1, 232.1.1.1) and (10.10.1.1, 232.1.2.2)

D.

No entry

Question 16

Which statement about primary VPN tunnel binding is false?

Options:

A.

Only the data destined for the specific peer device is transmitted through the n=bound primary VPN tunnel Data to other devices is transmitted using the default tunnel policy.

B.

Primary tunnel ensures that data can be transmitted from a VPN t a specific peer device permanently through a dedicate TE tunnel.

C.

Primary VPN tunnel binding means to bind a tunnel to a specific VPN. The bound tunnel is exclusive to the VPN.

D.

The bound primary tunnel can be selected sequentially.

Question 17

On the IP bearer network, different VPN users (VPN A and VPN B) must access the internet through the same egress. Which of the following schemes can achieve security isolation VPNs and have the best scalability?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 18

User A wants to obtain a better network service for business development and signs an SLA with a carrier. User A purchases a bandwidth of 5 Mbit/s to ensure the voice service (requiring short delay), video service, key data services, and other services. If you were the carrier’s network administrator, what would you do on the PE to ensure these services?

Options:

A.

Mark the VoIP service as EF, set the CIR to 1 Mbit/s, and set the PIR to 1 Mbit/s; mark the video service as AF4, set the CIR to 2 Mbit/s, and set the PIR to 2 Mbit/s; mark key data services as AF1, set the CIR to 2 Mbit/s, and the PIR to 5 Mbit/s; mark other services as BE, set the CIR to 0 Mbit/s, and set PIR to 5 Mbit/s.

B.

Mark the VoIP service as AF4, set the CIR to 0 Mbit/s, and set the PIR to 1 Mbit/s; mark the video service as EF and set the CIR and PIR to 5 Mbit/s; mark key data services as AF3, set the CIR to 2 Mbit/s, and the PIR to 5 Mbit/s; mark other services as BE, set the CIR to 0 Mbit/s, and set PIR to 2 Mbit/s.

C.

Mark the VoIP service as EF and set the CIR and PIR to 2 Mbit/s; mark the video service as AF3 and set the CIR and PIR to 2 Mbit/s; mark key data services as AF4, set the CIR to 2 Mbit/s, and the PIR to 5 Mbit/s; mark other services as BE, set the CIR to 0 Mbit/s, and set PIR to 5 Mbit/s.

D.

Mark the VoIP service as EF, set the CIR to 0 Mbit/s, and set the PIR to 1 Mbit/s; mark the video service as AF4 and set the CIR and PIR to 2 Mbit/s; mark key data services as AF3, set the CIR to 1 Mbit/s, and the PIR to 5 Mbit/s; mark other services as AF1, set the CIR to 2 Mbit/s, and set PIR to 5 Mbit/s.

Question 19

As shown in the figure, RTA, RTB, RTC are interconnected over IS-IS, RTA,

RTD, RTE, and RTC are interconnected over OSPF. Both IS-IS and OSPF use the default costs. RSVPTE is enabled on all routers and the interfaces between these routers. The Loopback0 interface of RTC is 192.168.0.3/32 and is advertised in both OSPF and ISIS areas. 192.168.0.3/32 is also the LSR ID of MPLS. Configurations of the MPLS and tunnel on RTA:

#

mpls lsr-id 192.168.0.1

mpls

mpls te

mpls rsvp-te

mpls te cspf

interface Tunnel1/0/0

tunnel-protocol mpls te

destination 192.168.0.3

mpls te tunnel-id 1

mpls te path metric-type igp

mpls te igp metric absolute 1

mpls te commit

#

Which path will be selected when the tunnel becomes Up? What is the metric of this tunnel?

Options:

A.

RTA—RTB—RTC; 1

B.

RTA—RTD—RTE—RTC; 1

C.

RTA—RTB—RTC; 20

D.

RTA—RTD—RTE—RTC; 3

Question 20

Which statement about the edge access layer is true?

Options:

A.

It connects users to the network by providing various access means, and converts the format of

information so that the information can be transmitted on the network.

B.

Using the packet technology, it provides a comprehensive transport platform that boasts high

reliability, quality of service (QoS) assurance, and large capacity.

C.

It implements call control. With the softswitch technology as the core, it completes basic realtime call control and connection control.

D.

It provides additional value-added services and operation support for established calls

Question 21

#

pim

c-rp Ethernet6/2/0

timer hello 100

state-refresh-interval 10

state-refresh-ttl 60

Interface Ethernet6/2/0Ip address 20.1.1.3 255.255.255.0

Pim timer hello 45

Pim dm

#

Which of the following statements are false?

Options:

A.

If the PIM-DM is enabled at Ethernet 6/2/0 on a router, the PIM-SM cannot be enabled at other interfaces on the router.

B.

Ethernet 6/2/0 sends a PIM hello message every 100 seconds.

C.

The TTL value is 60 in state-refresh messages sent by the router.

D.

Ethernet 6/2/0 sends a state-refresh message every 10 seconds.

Question 22

As shown in the figure, the bearer network is deployed in full mesh mode. For example, RTA uses the physical interface ATM 1/0/0. The interface is devised into ATM 10/0.2 connect to RTC and RTD, respectively . The GigabiteEthernet 2/0/0 and GigabitEthernet 3/0/0 interface are used to set up a trunk as the VRRP heartbeat cable. The UMG work in active/standby mode. Media interface connected to RTA and RTB belong to VLAN 10. VRRP is enable at the VLAN interface RTA is the master router. The interface is configured as follows:

Which of the following RTA configurations are correct in VLAN 10?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Question 23

Refer to the exhibit.

Eth0 and Eth1 on PE 3 are bound to VRF1 and VRF2, respectively. A valid static route 1.1.1.1/32 is

imported to BGP domains from CE 1, CE 2, and CE 4, respectively. Which of the following

statements are false?

Options:

A.

CE 3 can learn route 1.1.1.1/32 on CE 4.

B.

CE 3 cannot learn route 1.1.1.1/32 on CE 1 because the RD of this route is the same as that of the VRF.

C.

CE 3 cannot learn route 1.1.1.1/32 on CE 2 because the RD of this route is different from that of the VRF.

D.

Local VRFs must use different RDs

Question 24

RTA is a leaf router that directly connects to host A through interface GigabiteEthernet 1/0/0. The interface is configured as follows:

Hos a sends a IGMPv2 Report message to group 2321.2.3. Which entry can be displayed by the displayed by the igmp ssm-mapping group command?

Options:

A.

(10.10.1.1, 232.1.2.2)

B.

(10.10.1.1, 232.1.1.) and (10.10.1., 2321.2.3)

C.

(10.10.1.1, 232.1.1.1)

Question 25

1. On the backbone network , if a PE is connect to a CE, VPN instances need to b reconfigured on the PE, and interface on the PE for connecting to the CE must be bound to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface between PEs, IS-IS configured for PE interworking. PLSA basic capabilities and MPLS LSP are configured for LSP establishment, and MP _IBGP is configured for VPN route exchange VPN routes exchange , LDAP is short for Label Distribution Protocol, and IBGP is short for interior Border gateway protocol.

2. A CE exchange route exchange routers with a PE over External Border gateway Protocol (EBGP.

Configure interior gateway protocol (IGP) on the IS-IS+MPLS backbone networking to achieve the interworking between PEs and IP routers.

Options:

A.

-4

B.

-3

C.

-2

D.

-5

E.

-1

Question 26

As shown in the figure, the costs of paths from RTA to RT 11, RT 12, RT

13, RT 14, and RT 15 are all 10 and the available bandwidth is 200 Mbit/s.

The costs of paths from RTB to RT 31, RT 32, RT 33, RT 34, and RT 35 are all 10 and the available bandwidth is 200 Mbit/s.

The costs of paths from RT 11 to RT 21 and from RT 21 to RT 31 are both 5. The available bandwidth is 200 Mbit/s.

The cost of the path from RT 12 to RT 32 is 5 and the available bandwidth is 120 Mbit/s. The cost of the path from RT 13 to RT 33 is 10 and the available bandwidth is 80 Mbit/s.

The cost of the path from RT 14 to RT 34 is 10 and the available bandwidth is 100 Mbit/s.

The cost of the path from RT 15 to RT 35 is 10 and the available bandwidth is 100 Mbit/s.

The load balancing rule of Constraint Shortest Path First (CSPF) is set to Random on RTA.

Which path will a 100 Mbit/s tunnel from RTA to RTB take?

Options:

A.

RTA-RT11-RT21-RT31-RTB

B.

RTA-RT12-RT32-RTB

C.

RTA-RT13-RT33-RTB

D.

RTA-RT14-RT34-RTB

E.

RTA-RT15-RT35-RTB

Question 27

All nodes in the topology belong to the same IGP area. They can learn routers from each other and have the TE capability. The tunnels configured below can be Up. Refer to the following configuration of RTA,Which of the following statements are true?

#

mpls lsr-id 1.1.1.1

mpls

mpls te

mpls rsvp-te

mpls te cspf

#

explicit-path pri-path

next hop 3.1.1.2

next hop 4.1.1.2

next hop 5.1.1.2

#

explicit-path bypass-1

next hop 2.1.1.2next hop 6.1.1.1

#

explicit-path bypass-2

next hop 2.1.1.2

next hop 7.1.1.2

#

explicit-path bypass-3

next hop 8.1.1.2

next hop 9.1.1.2

#

interface Tunnel1/0/0

ip address unnumbered interface LoopBack0

tunnel-protocol mpls te

destination 4.4.4.4

mpls te tunnel-id 100

mpls te record-route label

mpls te path explicit-path pri-path

mpls te fast-reroute

mpls te commit

#

interface Tunnel2/0/0

ip address unnumbered interface LoopBack0

tunnel-protocol mpls te

destination 2.2.2.2

mpls te tunnel-id 101

mpls te record-route label

mpls te path explicit-path bypass-1

mpls te bypass-tunnel

mpls te protected-interface GigabitEthernet 3/0/0

mpls te commit

#

interface Tunnel2/0/1

ip address unnumbered interface LoopBack0

tunnel-protocol mpls te

destination 3.3.3.3

mpls te tunnel-id 102

mpls te record-route label

mpls te path explicit-path bypass-2

mpls te bypass-tunnel

mpls te protected-interface GigabitEthernet 3/0/0

mpls te commit

#

interface Tunnel2/0/2ip address unnumbered interface LoopBack0

tunnel-protocol mpls te

destination 4.4.4.4

mpls te tunnel-id 103

mpls te record-route label

mpls te path explicit-path bypass-3

mpls te bypass-tunnel

mpls te protected-interface GigabitEthernet 3/0/0

mpls te commit

#

Options:

A.

TE FRR link protection can be enabled on Tunnel2/0/0 to protect Tunnel1/0/0.

B.

TE FRR node protection can be enabled on Tunnel2/0/1 to protect Tunnel1/0/0.

C.

TE FRR node protection can be enabled on Tunnel2/0/2 to protect Tunnel1/0/0.

D.

TE FRR cannot be enabled on any tunnels.

Page: 1 / 7
Total 180 questions