H3C GB0-363English Exam

  • Exam Number/Code : GB0-363English
  • Exam Name : Designing Enterprise-level Networks
  • Questions and Answers : 317 Q&As
  • Update Time: 2010-04-05

 

1. The superiority of OSPF to RIP includes ( ).
A. Variable long subnet mask
B. Multicasting update
C. Protocol packet authentication
D. No routing loop
E. Fast convergence
Answer: DE


2. The common security equipment includes the Firewall, Intrusion Detection System (IDS) and Intrusion Prevention
System (IPS). The IDS serves as the gateway and is deployed on the path of main service traffic, while the Firewall
and IPS are deployed on the bypass.
A. True
B. False
Answer: B


3. Which is the encapsulation format used in ADSL dial-up access initiated from PC? ( )
A. IPoA
B. IPoEoA
C. PPPoA
D. PPPoEoA
Answer: D


4. Which of the following descriptions about dynamic routing protocol is correct? ( )
A. The fundamentals of RIPng are the same as those of RIP, but RIPng speeds up convergence compared with RIP.
B. The packet format of OSPFv3 is the same as that of OSPF, but OSPFv3 can support IPv6.
C. MBGP is the unique EGP routing protocol in the IPv6 network.
D. IS-IS supports multiple protocols so that it can support IPv6 without any modification.
Answer: C


5. Which of the following is/are correct about data link layer backup? ( )
A. The PPP MP can provide automatic backup and load balancing among the links in a bundle.
B. The dial-watch continuously sends ICMP packets to detect whether the peer is reachable.
C. IEEE 802.3ad can provide automatic backup and load balancing among the links in a bundle.
D. The RPR uses the probe packet at the data link layer to realize self-healing in case of link failure.
Answer: AD


6. In a Layer 2 switching network, if only IGMP Snooping is enabled on the switch, what will happen? ( )
A. Multicast fails.
B. Multicast works properly, but IGMP Snooping cannot correctly record the member port information.
C. Multicast works properly, and IGMP Snooping can correctly record the member port information.
D. IGMP Snooping will work properly if IGMP Spoofing is enabled.
Answer: A


7. In an MSTP region, all switches must support the MSTP. There is not such a switch that supports RSTP or STP
only.
A. True
B. False
Answer: A


8. if the data link layer protocol in the OSPF P2P network is PPP, two OSPF routers whose interface addresses are
in different subnets can still establish adjacency and learn the routing information correctly.
A. True
B. False
Answer: A


9. The VPN network security design include ( ).
A. Tunnel and encryption
B. Data authentication
C. User identification & device authentication
D. Intrusion detection & network access control
E. Routing protocol authentication
Answer: ABCD


10. Which of the following descriptions about the network core layer is correct? ( )
A. The core layer serves to exchange data packets.
B. The complex QoS policy must be performed at the core layer.
C. The core layer should use the star topology.
D. Routers at the core layer do not need backup.
Answer: A


11. What advantages does the hierarchical network model have?( ).
A. Easy to expand
B. Easy to troubleshoot
C. Easy to manage
D. Saving cost
Answer: ABCD


12. Which of the following port states is/are defined in both STP and RSTP? ( )
A. Disabled
B. Blocking
C. Listening
D. Learning
E. Forwarding
Answer: DE


13. The security services in the Open System Interconnection security architecture include ( ) and anti-DoS.
1) Authentication
2) Access control
3) Data privacy service
4) Data integrity service
A. 1) and 2)
B. 1), 2) and 3)
C. 2) and 4)
D. 1), 2), 3) and 4)
Answer: D


14. Which of the following descriptions about the BGP route aggregation is correct? ( )
A. It advertises the aggregation route only.
B. It cannot aggregate routes and advertises the original routes only.
C. It can advertise the aggregation route and the original routes.
D. The original AS-Path attribute is changed during route aggregation.
Answer: C


15. PIM-SM may not need RP.
A. True
B. False
Answer: B


16. On the basis of the port-based dynamic NAT, GRE can work properly after NAT traversal.
A. True
B. False
Answer: B


17. To prevent route spoofing, it is preferred to set the OSPF enabled interface that is connected to the users intranet
to the Silent state and enable MD5 authentication.
A. True
B. False
Answer: B


18. The hierarchical network model consists of ( ).
A. Core layer
B. Convergence layer
C. Access layer
D. Network layer
Answer: ABC


19. To transit a SOHO network to IPv6, we should ( ).
A. Choose an appropriate tunnel technology to access the IPv6 Internet according to the access mode provided by
the ISP
B. Use the dual-stack technology to enable all the hosts to access IPv6 and IPv4 network concurrently
C. Use 6to4 technology to access the IPv6 Internet if the ISP does not provide any IPv6 access
D. Use the 6PE technology to access the IPv6 Internet if the ISP provides 6PE access
Answer: AC


20. Which of the following descriptions about QoS is/are correct? ( )
A. Traffic policing can be applied on the inbound or outbound interfaces.
B. Traffic shaping can be applied on the inbound or outbound interfaces.
C. Congestion management and queue scheduling can be applied on the inbound or outbound interfaces.
D. RED and WRED are used to avoid TCP global synchronization.
Answer: AD

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
资源包主要包含以下内容: ASP项目源码:每个资源包中都包含完整的ASP项目源码,这些源码采用了经典的ASP技术开发,结构清晰、注释详细,帮助用户轻松理解整个项目的逻辑和实现方式。通过这些源码,用户可以学习到ASP的基本语法、服务器端脚本编写方法、数据库操作、用户权限管理等关键技术。 数据库设计文件:为了方便用户更好地理解系统的后台逻辑,每个项目中都附带了完整的数据库设计文件。这些文件通常包括数据库结构图、数据表设计文档,以及示例数据SQL脚本。用户可以通过这些文件快速搭建项目所需的数据库环境,并了解各个数据表之间的关系和作用。 详细的开发文档:每个资源包都附有详细的开发文档,文档内容包括项目背景介绍、功能模块说明、系统流程图、用户界面设计以及关键代码解析等。这些文档为用户提供了深入的学习材料,使得即便是从零开始的开发者也能逐步掌握项目开发的全过程。 项目演示与使用指南:为帮助用户更好地理解和使用这些ASP项目,每个资源包中都包含项目的演示文件和使用指南。演示文件通常以视频或图文形式展示项目的主要功能和操作流程,使用指南则详细说明了如何配置开发环境、部署项目以及常见问题的解决方法。 毕业设计参考:对于正在准备毕业设计的学生来说,这些资源包是绝佳的参考材料。每个项目不仅功能完善、结构清晰,还符合常见的毕业设计要求和标准。通过这些项目,学生可以学习到如何从零开始构建一个完整的Web系统,并积累丰富的项目经验。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值