H3C GB0-363English Exam

  • Exam Number/Code : GB0-363English
  • Exam Name : Designing Enterprise-level Networks
  • Questions and Answers : 317 Q&As
  • Update Time: 2010-04-05

 

1. The superiority of OSPF to RIP includes ( ).
A. Variable long subnet mask
B. Multicasting update
C. Protocol packet authentication
D. No routing loop
E. Fast convergence
Answer: DE


2. The common security equipment includes the Firewall, Intrusion Detection System (IDS) and Intrusion Prevention
System (IPS). The IDS serves as the gateway and is deployed on the path of main service traffic, while the Firewall
and IPS are deployed on the bypass.
A. True
B. False
Answer: B


3. Which is the encapsulation format used in ADSL dial-up access initiated from PC? ( )
A. IPoA
B. IPoEoA
C. PPPoA
D. PPPoEoA
Answer: D


4. Which of the following descriptions about dynamic routing protocol is correct? ( )
A. The fundamentals of RIPng are the same as those of RIP, but RIPng speeds up convergence compared with RIP.
B. The packet format of OSPFv3 is the same as that of OSPF, but OSPFv3 can support IPv6.
C. MBGP is the unique EGP routing protocol in the IPv6 network.
D. IS-IS supports multiple protocols so that it can support IPv6 without any modification.
Answer: C


5. Which of the following is/are correct about data link layer backup? ( )
A. The PPP MP can provide automatic backup and load balancing among the links in a bundle.
B. The dial-watch continuously sends ICMP packets to detect whether the peer is reachable.
C. IEEE 802.3ad can provide automatic backup and load balancing among the links in a bundle.
D. The RPR uses the probe packet at the data link layer to realize self-healing in case of link failure.
Answer: AD


6. In a Layer 2 switching network, if only IGMP Snooping is enabled on the switch, what will happen? ( )
A. Multicast fails.
B. Multicast works properly, but IGMP Snooping cannot correctly record the member port information.
C. Multicast works properly, and IGMP Snooping can correctly record the member port information.
D. IGMP Snooping will work properly if IGMP Spoofing is enabled.
Answer: A


7. In an MSTP region, all switches must support the MSTP. There is not such a switch that supports RSTP or STP
only.
A. True
B. False
Answer: A


8. if the data link layer protocol in the OSPF P2P network is PPP, two OSPF routers whose interface addresses are
in different subnets can still establish adjacency and learn the routing information correctly.
A. True
B. False
Answer: A


9. The VPN network security design include ( ).
A. Tunnel and encryption
B. Data authentication
C. User identification & device authentication
D. Intrusion detection & network access control
E. Routing protocol authentication
Answer: ABCD


10. Which of the following descriptions about the network core layer is correct? ( )
A. The core layer serves to exchange data packets.
B. The complex QoS policy must be performed at the core layer.
C. The core layer should use the star topology.
D. Routers at the core layer do not need backup.
Answer: A


11. What advantages does the hierarchical network model have?( ).
A. Easy to expand
B. Easy to troubleshoot
C. Easy to manage
D. Saving cost
Answer: ABCD


12. Which of the following port states is/are defined in both STP and RSTP? ( )
A. Disabled
B. Blocking
C. Listening
D. Learning
E. Forwarding
Answer: DE


13. The security services in the Open System Interconnection security architecture include ( ) and anti-DoS.
1) Authentication
2) Access control
3) Data privacy service
4) Data integrity service
A. 1) and 2)
B. 1), 2) and 3)
C. 2) and 4)
D. 1), 2), 3) and 4)
Answer: D


14. Which of the following descriptions about the BGP route aggregation is correct? ( )
A. It advertises the aggregation route only.
B. It cannot aggregate routes and advertises the original routes only.
C. It can advertise the aggregation route and the original routes.
D. The original AS-Path attribute is changed during route aggregation.
Answer: C


15. PIM-SM may not need RP.
A. True
B. False
Answer: B


16. On the basis of the port-based dynamic NAT, GRE can work properly after NAT traversal.
A. True
B. False
Answer: B


17. To prevent route spoofing, it is preferred to set the OSPF enabled interface that is connected to the users intranet
to the Silent state and enable MD5 authentication.
A. True
B. False
Answer: B


18. The hierarchical network model consists of ( ).
A. Core layer
B. Convergence layer
C. Access layer
D. Network layer
Answer: ABC


19. To transit a SOHO network to IPv6, we should ( ).
A. Choose an appropriate tunnel technology to access the IPv6 Internet according to the access mode provided by
the ISP
B. Use the dual-stack technology to enable all the hosts to access IPv6 and IPv4 network concurrently
C. Use 6to4 technology to access the IPv6 Internet if the ISP does not provide any IPv6 access
D. Use the 6PE technology to access the IPv6 Internet if the ISP provides 6PE access
Answer: AC


20. Which of the following descriptions about QoS is/are correct? ( )
A. Traffic policing can be applied on the inbound or outbound interfaces.
B. Traffic shaping can be applied on the inbound or outbound interfaces.
C. Congestion management and queue scheduling can be applied on the inbound or outbound interfaces.
D. RED and WRED are used to avoid TCP global synchronization.
Answer: AD

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值