HCDP认证考试介绍)

合集下载

华为认证实验指导书

华为认证实验指导书

华为认证实验指导书华为认证系列教程HCDP-IENP提升企业级网络性能实验指导书华为技术有限公司版权声明版权所有© 华为技术有限公司。

保留一切权利。

本书所有内容受版权法保护,华为拥有所有版权,但注明引用其它方的内容除外。

未经华为技术有限公司事先书面许可,任何人、任何组织不得将本书的任何内容以任何方式进行复制、经销、翻印、存储于信息检索系统或使用于任何其它任何商业目的。

版权所有侵权必究。

商标声明和其它华为商标均为华为技术有限公司的商标。

本文档提及的其它所有商标或注册商标,由各自的所有人拥有。

华为认证系列教程HCDP-IENP提升企业级网络性能实验指导书第1.6版本华为认证体系介绍依托华为公司雄厚的技术实力和专业的培训体系,华为认证考虑到不同客户对ICT技术不同层次的需求,致力于为客户提供实战性、专业化的技术认证。

根据ICT技术的特点和客户不同层次的需求,华为认证为客户提供面向十三个方向的四级认证体系。

HCDA(Huawei Certified Datacom Associate,华为认证数据通信工程师)主要面向IP网络维护工程师,以及其它希望学习IP网络知识的人士。

HCDA认证在内容上涵盖TCP/IP基础、路由、交换等IP网络通用基础知识以及华为数据通信产品、通用路由平台VRP特点和基本维护。

HCDP-Enterprise (Huawei Certified DatacomProfessional-Enterprise,华为认证数据通信资深工程师-企业级)主要面向企业级网络维护工程师、网络设计工程师以及希望系统深入地掌握路由、交换、网络调整及优化技术的人士。

HCDP-Enterprise包括IESN(Implement Enterprise Switching Network,部署企业级交换网络)、IERN(Implement Enterprise Routing Network,部署企业级路由网络)、IENP(Improving Enterprise Network Performance,提升企业级网络性能)三个部分。

华为独立新推出的认证考试

华为独立新推出的认证考试

华为独立新推出的认证考试,HCDA,HCDP,HCDEHCDA(Huawei Certified Datacom Associate,华为认证数据通信工程师)提供网络技能初级认证,主要面向IP网络维护工程师、转岗工程师、新入职工程师以及其他希望学习IP网络知识的人士。

HCDP(Huawei Certified Datacom Professional,华为认证数据通信资深工程师)提供网络技能中级认证,主要面向IP网络调测工程师、IP网络运维工程师、IP网络设计工程师以及希望系统深入地掌握路由交换接入以及IP承载网技术的人士。

HCDP包括BCRN(Building Carrier Routing Network,构建电信级路由网络)、BCAN(Building Carrier Access Network构建电信级接入网络)、BITN(Building IP Telecom Network,构建IP电信网络)三个部分。

HCDE(Huawei Certified Datacom Expert,华为认证数据通信专家)提供网络技能高级认证,旨在培养能够熟练使用各种IP网络技术和华为产品规划、构建、维护、诊断、优化大型IP 网络的网络专家。

华为公司中英文官方网站提供数通认证所有信息,包括认证体系介绍、认证考试、认证培训认证申请、证书查询、再认证等。

中文网站链接:/cn/products/da...log.do?id=3244英文网站链接:/products/datac...log.do?id=2675华为公司保留在任何时间变更分数线的权利,并不负有将此变更通知应考者的义务。

考试大纲中提到的考试内容仅仅为考生提供一个通用的考试指引,考试大纲中未提到的其他相关内容在考试中也有可能出现。

报名条件目前考生参加华为数据通信认证考试必须使用华为公司提供的Voucher(考试券)进行注册并参加考试,考生需以单位签署合同或个人的形式直接向华为公司报名申请Voucher(考试券)报名时间参加考试需要提前注册、预约考试时间考试时间HCDA认证考试时间为60分钟考试科目HCDA-HNTD (Huawei Certified Datacom Associate-Huawei Networking Technology and Device 华为认证数据通信工程师-华为网络技术与设备)考试题型认证考试题型为单选、多选和判断题,答题必须按顺序进行,选择下一题后将不能回到已经做过的试题做修改。

网络技术职业资格证书种类

网络技术职业资格证书种类

网络技术职业资格证书种类随着互联网技术的发展和普及,网络技术职业资格证书逐渐成为企业招聘和用人的重要指标之一。

持有网络技术职业资格证书的人员具备系统的网络技术知识和实践能力,能够胜任各类网络技术相关工作。

本文将介绍一些常见的网络技术职业资格证书种类。

一、Cisco认证Cisco认证是全球最著名的网络技术职业资格认证之一,由思科公司提供。

Cisco认证包括五个级别,分别是:入门级(Cisco Certified Entry Networking Technician,CCENT)、专业级(Cisco Certified Network Associate,CCNA)、专家级(Cisco Certified Network Professional,CCNP)、专家级(Cisco Certified Internetwork Expert,CCIE)和专家级(Cisco Certified Architect,CCAr)。

持有Cisco认证的人员在相关领域具备较高水平的技术能力。

二、Juniper认证Juniper认证是由美国Juniper Networks公司提供的网络技术职业资格认证。

Juniper认证分为专业级(Juniper Networks Certified Associate,JNCIA)、专业级(Juniper Networks Certified Specialist,JNCIS)、专家级(Juniper Networks Certified Expert,JNCIE)等多个级别。

Juniper认证主要涵盖了网络设备、安全和路由器领域的知识和技能。

三、华为认证华为认证是由中国华为技术有限公司提供的网络技术职业资格认证。

华为认证分为三个级别,分别是:初级(Huawei Certified Datacom Associate,HCDA)、中级(Huawei Certified Datacom Professional,HCDP)和高级(Huawei Certified Datacom Expert,HCDE)。

华为HCDP

华为HCDP

【HCDP课程认证简介】华为认证网络工程师hcdp课程沈阳世贸人才HCDP是华为认证数据通信资深工程师,提供网络技能中级认证。

主要面向IP网络调测工程师、IP网络运维工程师、IP网络设计工程师以及希望系统深入地掌握路由交换接入以及IP承载网技术的人士。

【HCDP分类】包括BCRN(Building Carrier Routing Network,构建电信级路由网络)、BCAN(Building Carrier Access Network构建电信级接入网络)、BITN(Building IP Telecom Network,构建IP电信网络)三个部分。

【培训目标】HCDP 企业网络路由技术课程目标:在华为路由器上配置各种路由协议,掌握高级路由控制HCDP 企业网络交换技术课程目标:在华为交换机上配置各种交换协议,能熟练对交换机进行排障HCDP 企业网络优化技术课程目标:配置华为防火墙,掌握QOS配置【对应证书】HCDP IERN认证【HCDP-FAST认证课程简介】HCDP-FAST是华为专门针对已有友商相关资质证书的人员开发的快速获得华为认证书的认证。

在认证时只需考一门,通过后即可获得华为HCDP证书【HCDP-FAST适用对象】已获得友商相当水平的认证资质证书的人员。

相关有效证书包括:•思科:CCNP 、CCIE 、H3CSE-Routing&Switching、H3CTE、H3CIE- Routing&Switching、JNCIS、JNCIP、JNCIEHCDP-FAST快速认证培训课程对应证书:HCDP证书课程介绍:本课程主要介绍网络的基本概念以及华为路由器、交换机、防火墙产品的安装和配置.参加HCDP-FAST快速认证的条件:•要想进行HCDP-FAST快速考试认证,学员必须已经获得友商相当水平的认证资质证书的人员。

相关有效证书包括(具有下面任何一个证书就可考试):•思科:CCNP 、CCIE 、 H3CSE-Routing&Switching、H3CTE、H3CIE- Routing&Switching 、JNCIS、JNCIP、JNCIE培训目标:配置华为路由器、交换机、防火墙产品在多协议网络环境中运作,•HCDP-FAST是华为专门针对已有友商相关资质证书的人员开发的快速获得华为认证书的认证。

hdcp认证详细过程 -回复

hdcp认证详细过程 -回复

hdcp认证详细过程-回复HDCP(High-bandwidth Digital Content Protection)是一种数字版权保护技术,用于保护高清视频内容的传输和播放。

HDCP认证是指验证设备是否符合HDCP技术标准,并获得相关认证证书的过程。

在本文中,我们将详细介绍HDCP认证的过程,包括认证要求、测试流程和认证结果的评定等。

首先,让我们了解一下HDCP认证的要求。

HDCP认证是由Digital Content Protection LLC(DCP)负责管理的,该组织是由电视和电影行业的著名厂商组成的。

为了确保设备的兼容性和安全性,HDCP认证要求设备符合一系列技术规范和测试标准。

只有通过了这些测试并符合要求的设备才能获得HDCP认证。

接下来,我们将详细介绍HDCP认证的测试流程。

首先是设备注册阶段。

厂商需要向DCP提交设备的注册申请,包括设备的详细规格和功能描述。

DCP会对注册申请进行审核,并决定是否接受该设备进行HDCP 认证。

一旦设备通过了注册审核,就会进入第二阶段的测试流程。

这个阶段主要包括三个方面的测试:HDCP认证树测试、DVI/HDMI接口测试和HDCP认证功能测试。

HDCP认证树测试是验证设备是否符合HDCP 1.x或2.x版本的标准规范。

测试过程中,设备将接收到一系列来自HDCP测试服务器的测试数据包,并根据指定的HDCP认证树流程进行处理。

设备需要正确地响应这些数据包并返回相应的指令和数据。

DVI/HDMI接口测试是验证设备的DVI或HDMI接口是否符合HDCP 技术标准。

测试过程中,设备的DVI/HDMI接口将连接到HDCP测试设备,通过发送和接收测试信号确保接口的稳定性和兼容性。

最后,HDCP认证功能测试是验证设备的HDCP功能是否正常工作。

在这个测试中,设备将连接到一个HDCP认证服务器,并根据指定的测试用例进行测试。

测试用例基于各种情景和应用场景,包括视频播放、视频切换、分辨率变化等。

dmcp中级认证考试

dmcp中级认证考试

dmcp中级认证考试
DMCP中级认证考试包括4个级别:A级(基础级)、P级(实践级)、M级(专业级)和F级(大师级)。

不同级别证书考试要求不同,只要满足考试条件,可以从任一级别开始考。

考试内容为1门基础考试《数据管理基础》+2门加考科目(7选2)。

7门选修课分别是:主数据与参考数据、数据仓库和商业智能、数据集成与互动操作性、数据建模与设计考试、数据质量考试、元数据考试、数据治理考试。

考试形式为全英文线上考试,线上监考。

注:CDMP的考试监考非常严格,是一对一远程监考,要求摄像头,麦克风都要打开;如果考试过程中头像有偏离都会及时提醒的。

考试题型是100道题单选题,每道题一分。

如果CDMP基础考试已通过,想要考P级,需要基础考试分数达到70分。

如要考M级,基础考试分数需要达到80分。

如果基础考试只是过了60分,没到70分,则需要重新参加基础考试。

HCDP英文版最新版多选题

HCDP英文版最新版多选题

多选题1.Which of the following are characteristics of a high availability network?A Faults seldom occur.B Services can be quickly restored when a fault occurs.C Faults never occur.D Services can only be manually restored when a fault occurs.AB2.Which of the following statements about BFD control packets are true?A BFD control packet is encapsulated in a UDP packet for transmission.B BFD detection is not available in VRP 5.7C Echo packets use UDP destination port number 3784.D Echo packets use UDP destination port number 3785.ABC3.Which of the following statements about the BFD asynchronous mode are true?A The local system regularly send BFD control packets,and the remote system detects theBFD control packets sent from the local system.B The local system detects the BFD control packets sent by itself.C If one system does not receive any BFD packets from its peer within a detection period,itadvertises a session down event.D Each system confirms its connections with other systems in a particular method.After aBFD seeion is set up, BFD control packets are no longer sent .AC4.Which of the following statements about the BFD demand mode are true?A The local system regularly send BFD control packets,and the remote system detects theBFD control packets sent from the local systemB The local system detects the BFD control packets sent by itself.C If one system does not receive any BFD packets from its peer within a detection period,itadvertises a session down event.D Each system confirms its connections with other systems in a particular method.After aBFD seeion is set up, BFD control packets are no longer sent .BD5.Which of the following statements about the BFD echo function are true?A The local system sends a series of BFD Echo packets,and the remote system loops thepackets back through its forwarding channel.B If the local system does not receive several consecutive Echo packets,it advertises asession down event.C The echo function can work together with the asynchronous or demand detection mode.D The echo function can take the place of fault detection by sending BFD control packets. ABCD6.Which of the following statements about a smart link group are true?A Smart link group consists of a maximum of two interfaces,where there are twointerfaces,one is an active interface,and the other a standby interface.B Of the two interface in a smart link group,one is active,and the other is standby.C when an active interface goes down,the Smart link group automatically blocks it andchanges the status of the standby interface to active.D when an active interface recovers,the standby interface is blocked and traffic is switchedback to the active interface.ABC7.Which of the following statements about Flush packets in a smart link group are true?A A smart link group sends flush packets to instruct other devices to update the addresstable.B Flush packets use IEEE 802.3 encapsulation.C The destination MAC address of Fulsh packets is an unknown unicast address,which isused to distinguish protocols.D The destination MAC address of flush packets is a special multicast address,which is usedto distinguish protocols.ABC8.When links are switched in a smart link group, which of the following mechanisms can beused to refresh MAC and ARP entries?A MAC and ARP entries are refreshed automatically with respect to traffic.B The smart link group uses a new link to send flush packets.C MAC entries are refreshed after the aging time expires.D ARP entries are refreshed after the aging time expires.ABC9.Which of the following statements about link aggregation are true?A link aggregation binds a group of physical interfaces together as a logical interface toincrease the bandwidth and reliability.B Link aggregation complies with IEEE 802.3ah.C The logical link formed by bundling multiple physical links together is called a linkaggregation group (LAG) or a trunk.D Active and inactive interfaces exist in link aggregation,Active interfaces forward data,whereas inactive interfaces do not.ABCD10.Which of the following statements about link aggregation are true?A Link aggregation can be performed in manual load balancing or LACP mode.in manualloading balancing mode,LACP is disabled:in LACP mode,LACP is enabled.B In manual load balancing mode,all active member interfaces forward data and performload balancing.C In static LACP mode,the creation of the Eth-Trunk and the addition of member interfacesto the Eth-Trunk are perfaormed pared with link aggregation in manual load balancing mode,active interfaces in static LACP mode are seleted by sending LACP data units(LACPDUs).D Indynamic LACP mode,the creation of the Eth-Trunk,the addition of memberinterfaces,and the selection of active interfaces are performed based on LACP negotiation. ABCD11.Which of the following statements about LACP are true?A It complies with IEEE 802.3ad.B A device enabled with LACP exchanges link Aggregation Control protocol data Units(LACPDUs) with its peer.C Devices at both ends determine the active interface according to the interface priority ofthe active device.ABC12.Which of the following reliability designs are related to routers?A Reliability design of the system and hardwareB Reliability design of the softwareC Reliability test authenticationD Reliability design of the IP networkABCD13.Which of the following can speed up OSPF fast convergence?A Configuring dynamic BFD for OSPFB Adjusting the interval at which OSPF calculation is performedC Configuring the interval at which an LSA are retransmittedD Configuring the maximum number of external LSAs in the LSDBAB14.Which of the following statements about the reliability requirement level are true?A Faults seldom occur in the system software or hardware.B System functions are not affected by faults.C System functions are affected by faults but can rapidly recover.D System functions can be ensured by using redundancy design,switchover policy,and highsuccess rate in switchover.ABCD15.Which of the following are end-to-end link protection modes?A 1:1B M:NC N:1D 1+1ABD16.On a BGP/MPLS IPv4 VPN,OSPF,LDP,and static routes are configured.which of the followingprotocols need to be enabled with GR to achieve NSF on PEs?A OSPFB MPLS LDPC BGPD Static routesABC17.Which of the following statements about BFD are true?A It cannot be used to detect MPLS networks.B It provides low-load and short-duration detection for paths between adjacent forwardingengines.C It provides a unified mechanism for detecting all types of media and BFD-supportingprotocols.D It is a bidirectional detection mechanism.BCD18.Which of the following statements about the setup of a BFD session are true?A A BFD session can be set up in either static or dynamic mode.B A static BFD session is set up by manually configuring BFD session parameters anddelivering requests for setting up a BFD session. BFD session parameters include the local and remote discriminators.C A dynamic BFD session is set up by dynamically allocating local discriminators.D Static and dynamic BFD session are not differentiated.ABC19.Which of the following statements are correct regarding OSPF Router LSA?A Every router running OSPF must generate Router LSA.B In broadcast and NBMA network,only DROther generates Router LSA.C Router LSA describes link states of the router in area.D Router LSA is flooded in the whole AS.AC20.Which of the following statements are correct regarding Network LSA in OSPF network?A Network LSA is generated by ABR.B only the router which connects NBMA or Broadcast Network may generate network LSA.C DR uses network LSA to describe routers that have established adjacency relation with itin the network.D Network LSA is flooded in the whole AS.BC21.Which type of LSA is only used to calculate external route?A Type 1B Type 2C Type 3D Type 4E Type 5DE22.Which of the following are OSPF packet type?A LSAB LS requestC LSPD LS UpdateE LS ackBDE23.Which of the following elements together uniquely identify a LSA?A LS typeB Link state IDC Advertising RouterD LS Sequence numberABC24.Which of the following statements are correct regarding how OSPF detects old and duplicateLSAs?A The smaller the sequence number,the more recent the LSA,B The smaller the LS age,the more recent the LSA.C When router generates a new LSA at the first time,it will use 0x80000001 as thesequence number.D An LSA can be flushed from routing domain by setting its LSA age to Maxage.BCD25.Which of the following statements are correct regarding intra-area route calculation of OSPF?A Every OSPF router only uses one Router LSA to describe local active link state for onearea.B Every OSPF uses more than one Router LSA to describe local active link state for one area.C One Router LSA Only describes one linkD One Router LSA describes more than one linkAD26.In OSPF protocol,which of the following elements are used to describe one link?A Link IDB DataC TypeD MetricABCD27.In OSPF protocol,which of the following elements are used by network LSA to describebroadcast network segment or NBMA network segment?A LINK IDB Net maskC Attached Router listD MetricABC28.Which of the connection types that Router LSA can describe?A Point-to-pointB StubC transitD Virtual linkABCD29.In OSPF, which of the following statements are incorrect regarding Router LSA generated byRouter A?A In point-to-point link type, Data is set to the interface IP address of RouterA.B In TransNet link type,Data is set to the interface IP address of RouterA.C In StubNet link type,Data is set to the interface IP address of RouterA.D In Virtual link type,Data is set to the Router ID of RouterA.CD30.In OSPF protocol,which of the following elements are used by network LSA to describebroadcast network segment or NBMA network segment?A Link IDB Net maskC Attached Router listD MetricABC31.Which of the connection types that Router LSA can describe?A Point-to-pointB StubC TransitD Virtual linkABCD32.In OSPF area,RTA and RTB interconnect through FE interface.which of the followingcommands can be used to configure the link cost between RTA and RTB as 10?A Use commed ospf cost 10 on two routersB Use commed ospf cost 5 on two routersC Use commed bandwidth-reference 500 on two routers to change bandwidth-referencevalueD use command bandwidth-reference 1000 on two routers to change bandwidth-reference AD33.In OSPF protocol,which of the following statements are incorrect regarding link ID of RouterLSA?A in point-to-point link type,link ID is the neighbor’s interface IP address.B In TransNet link type,link ID is the network address of TransNet network segment.C In StubNet link type,link ID is the network address of Stub network.D In virtual link typemlink ID is the neighbor’s Router ID of virtual link.AB34.Which of the following statements are correct regarding how OSPF detects old and duplicateLSAs?A The smaller the sequence number,the more recent the LSA.B The smaller the LS age,the more recent the LSA.C When router generates a new LSA at the first time.it will use 0x80000001 as thesequence number.D An LSA can be flushed from routing domain by setting its LSA age to Maxage.BCD35.OSPF uses SPF algorithm to calculate SPF tree according to topology.which of the followingstatements are correct regarding SPF tree node?A The node on SPF tree indicates router and port.B There are two types of SPF tree node; Transit node and Stub node.C The router node on SPF tree is one type of Stub nodes.D The router node on SPF tree is one type of Transit nodes.BD36.What kind of the BGP attributes does AS-Path attribute belong to ?A MandatoryB TransitiveC OptionalD Non-transitiveAB37.Which of the following statements are correct regarding BGP attribute?A Till now,there are 16 BGP attributesB BGP attribute can be extended to 256 typesC Well-know discretionary attribute may not be included in each BGP update message,suchas Origin attributeD AS_PATH is an Optional Transitive attributeAB38.Which of the following statements belong to BGP COMMUNTY attribute?A NO_EXPORTB NO_ADVIERTISEC LOCAL_EXPORT_SUBCONFEDD NO_BROADCASTABC39.Which of the BGP attributes are Well-known mandatory attributes?A ORIGINB AS_PATHC NEXT_HOPD MEDE LOCAL_PREFF COMMUNITYABC40.Which of the attributes must exist in the BGP Update messages?A LOCAL_PREFB NEXT-HOPC ORIGIND AS_PATHBCD41.Which of the attributes may affect BGP Route Selection?A NEXT_HOPB AS_PATHC LOCAL_PREFD CLUSTER_IDABCD42.Which of the following can be used for BGP route selection?A ACLB IP-PREFIXC AS-PATH-FILTERD COMMUNITY-FILTERABCD43.Which of the following statements about comparison between ACL and IP-PREFIX are true?A Both ACL and IP-PREFIX can be used for route filteringB Both ACL and IP-PREFIX can be used for data packet filteringC ACL can be used for data packet filtering and route filtering,but IP-PREFIX can only beused for route filteringD IP-PREFIX can be used for data packet filtering and route filtering,but ACL can only beused for route filteringAC44.Which of the following statements about ACL type are true?A ACL consists of basic ACL,advanced ACL and interface-based ACLB ACL ranging from 2000 to 2999 belongs to advanced ACLC ACL ranging from 3000 to 3999 belongs to advanced ACLD Advanced ACL can be used to match either destination address or source addressACD45.Which of the following can only be used for BGP route selection?A ACLB IP-PREFIXC AS-PATH-FILTERD COMMUNITY-FILTERCD46.Which of the following statements about VLSM characteristics are true?A VLSM supports both IPv4 and IPv6B VLSM supports overlapped address ranges.C VLSM provides more proper route summarization information in the routing table.D VLSM allows a subnet to be divided into smaller subnets.CD47.Which of the following IP address are network addresses?A 64.104.3.7/28B 192.168.12.64/26C 192.135.12.191/26D 198.18.12.16/28BD48.What are the advantages of subnet division?A Isolating broadcast trafficB Improving network QosC Increasing the IP address usageD Improving network reliabilityAC49.Assume that the subnet mask is 255.255.255.248,which of the following addresses are validhost addresses?A 192.168.200.87B 196.123.142.190C 223.168.210.100D 220.100.100.154BCD50.Which of the following addresses can be used on a public network?A 172.30.0.1/16B 127.254.11.15/16C 172.15.12.7/16D 193.168.10.4/16CD51.Which of the following rules should a network administrator obey when the networkadministrator uses the VLSM technology to plan subnets?A A subnet is composed of all summarized routes.B A subnet can address a host or be further subnetted.C The update message of a routing protocol in use must carry subnet mask information.D The summarized networks must have the same high-order bit.BCD52.Which of the following statements about OSPF authentication are false?A Entering a password in cipher text is allowedB The ospf authentication-mode md5 1 huawei command and the ospfauthentication-mode md5 1 plain Huawei command have the same function.C If passwords are configured for both an area and an interface,the password configuredfor the area is used.D The ospf authentication-mode simple Huawei command and the ospfauthentication-mode simple plain Huawei command have the same function.BC53.Which of the following statements about route summary are true?A advertise is the default parameter of the abr-summary comman,IF neither advertise nornot-advertise is specified in the abr-summary command,advertise is used.B not-advertise is the default parameter of the abr-summary command,If neither advertisenor not-advertise is specified in the abr-summary command,not-advertise is used.C The abr-summary command is run in the OSPF viewD The asbr-summary command is run in the OSPF view.AD54.What are the OSPF message types?A HelloB Database DescriptionC Link state RequestD Link state UpdateE Link state AckABCDE55.What are possible causes for a failure in the establishment of an OSPF neighbor relationship?A Router IDs conflictB Area IDs are mismatchedC Network masks are inconsistentD Authentication types and authentication passwords are inconsistentABCD56.Which statements about OSPF packets are true?A Hello packets can be sent after OSPF is enabled on an interface.B LS Request packets are sent only after an adjacency is established.C LS Update packets contain detailed LSA information for LSDB synchronization.D LS Update packets are sent only after an adjacency is established.ABC57.Which of the following statements about state transition are true?A The neighbor state machine transitions from the loading state to the full state if aloadingdone event occursB The neighbor state machine transitions from the Exstart state to the Full state if aNegotiationdone event occursC The neighbor state machine transitions from the Exchange state to the full state if anExchangedone event occursD The neighbor state machine transitions from the Exchange state to the loading state if anExchangedone event occurs.ACD58.Which of the following statements are true?A The neighbor state machine can transition from the Down state to the attempt stateB The neighbor state machine can transition from the Down state to the init stateC The neighbor state machine can transition from the init state to the Exstart stateD The neighbor state machine can transition from the init state to the 2-way stateABCD59.Which of the following LSAs are flooded within a single area?A Router LSAB Network LSAC Summary LSAD AS External LSAABC60.Which of the following statements about an AS-External-LSA are true?A The Link State ID field specifies the network segment address for an advertiseddestination.B The Advertising Router field specifies the Router ID of an ASBR.C The Net mask field specifies the network mask of an advertised.D The link state ID and Advertising Router fields are used together to uniquely identify anAS-External-LSA.ABC61.Which of the following statements are true?A An LSDB uses a directed graph to show a network topology.The graph contains threeelements:routers,Stub networks,and transit network.B A broadcast network or an NBMA network,each having two or more routers,is a Transitnetwork.C The default value of bandwidth-reference is 10M.D The cost of the route from a Transit network to an attached router is 0.ABD62.Which of the following statements are false?A An ASBR-Summary-LSA describes the route to an ASBR and is flooded within an AS.B An ASE-LSA describes the route to an external AS and is flooded to an external ASC An AS-External-LSA does not belong to any specific area.D The metric of a Type-1 external route is the AS external metric only.ABD63.Which parameters are optional for configuring a BGP peer?A IP addressB DescriptionC PasswordD AS-numberBC64.Which types of packets are supported by BGP?A HelloB NotificationC UpdateD Route-refreshBCD65.Which methods can be used to import local routes to BGP?A Run the network commandB Receive routes from peersC Run the summary automatic commandD Run the import command.AD66.BGP is an inter-AS routing protocol,which statements about BGP are true?A BGP adopts a reliable transmission protocol.B BGP supports automatic peer discovery.C BGP supports incremental route update.D BGP supports various routing policies.ACD67.Which statements about prerequisites to establishing a BGP peer relationship are true?A BGP peers have been manually configured.B A TCP connection has been established between two neighboring routers.C BGP peers have exchanged routing information.D MD5 authentication has been configured on BGP peers.AB68.Which statements about BGP route advertisement are true?A ALL BGP routes learned from BGP peers are advertised to other BGP peers.B Only the routes learned from an IGP are advertised to other BGP peers.C By default,the routes learned from IBGP peers are not advertised to other IBGP peers.D Only the optimal routes are advertised to other BGP peers.CD69.Which of the following conditions must be met for importing routes to BGP by using thenetwork command?A The routes are optimal in the ip routing table.B The routes do not need to match the specified mask length.C The routes match the specified mask lengthD The routes are IGP routes.AC70.Which statements about the AS number range are true?A If 2-byte AS numbers are supported,a private AS number ranges from 32768 to 65535.B IF 2-byte AS numbers are supported,a private AS number ranges from 64512 to 65535.C IF 2-byte AS numbers are supported,an AS number ranges from 1 to 65535.D If 4-byte AS numbers are supported.a 4-byte AS number is in the X.Y format.Here”X”and“y” are integers ranging from 1 to 65535 and 0 to 65535 respectively.BCD71.A notification message with Error Code 2 indicates an error OPEN message.which of thefollowing error sub-codes can be contained in this OPEN message?A 1: indicates that the version number is not supported.B 2: indicates that the AS of the peer is incorrect.C 3: indicates that the BGP identifier is incorrect.D 4: indicates that the Optional parameters filed is not supported.ABCD72.Which parameters are carried in a BGP Open message?A Local AS numberB BGP IDC Keepalive timerD Holder timerE Current peer statusABD73.Which commands are relevant to a BGP route reflector?A peer reflect-clientB reflect between-clientsC reflector cluster-idD rr-filterABCD74.Which statements about the process of establishing a BGP peer relationship are true?A There may by two TCP connections during the establishment of the BGP peerrelationship.B IF two TCP connections are established between BGP peers,one connection functions asthe primary connection,and the other as the backup connection.C IF two TCP connections are established between BGP peers,one TCP connection is torndown.D IF there are multiple TCP connections between BGP peers,BGP keeps the TCP connectioninitiated by the peer with a greater BGP router ID.ACD75.Which statements about BGP route reflection are true?A IBGP peers must be fully connected in absence of a route reflector(RR),The BGP routereflection mechanism is introduced to lower the requirement.B After learning routes from a non-client,a route reflector(RR) advertises these routes to allclients.C After learning routes from a client,an RR advertises these routes to all clients andnon-clients.D After learning routes from an EBGP peer,an RR advertises these routes to all clients andnon-clients.ABCD76.In a route-policy,which BGP attributes can be invoked by if-match clauses?A Local-PreferenceB AS-PathC MEDD CommunityBCD77.In a route-policy,which BGP attributes can be used to define apply clauses?A Local-PreferenceB TagC OriginD AS-PathACD78.Which BGP attributes are optional in a BGP update packet?A OriginB NexthopC Local-PreferenceD MEDCD79.Which statements about BGP well-known mandatory attributes are true?A Well-known mandatory attributes must be identified by all BGP routers.B Well-known mandatory attributes must be transmitted between BGP peers.C Well-known mandatory attributes are optional in an Update packet,and can be carried inan Update packet as needed.D Well-known mandatory attributes must be carried in an Update packet.ABD80.in OSPF,which of the following statements are incorrect regarding Router LSA generated byRouter A?A In point-to-point link type,data is set to the interface IP address of RouterA.B In transNet link type, data is set to the interface IP address of RouterA.C In StubNet link type,data is set to the interface IP address of RouterA.D In Virtual link type, data is set to the Router ID of RouterA.CD81.which attributes are well-known community attributes?A NO_EXPORT (0xFFFFFF01)B NO_ADVERTISE(0xFFFFFF02)C NO_EXPORT_SUBCONFEDD AS(2Byte):Number(2Byte)ABC82.which statements about BGP route selection rules are true?A BGP first ignores routes with unreachable next hops.B A summarized route takes precedence over a non-summarized route.C EBGP routes take precedence over IBGP routes.D IF other conditions of routes are the same,the route with the shortest cluster_list ispreferred.ABCD83.which BGP attributes can be used to prevent routing loops?A originator_IDB AggregatorC Cluster_listD AS-PathACD84.which of the following BGP routing policies can be used to filter routes?A ip-prefixB route-policyC as-path-filerD community-filterABCD85.which attributes meet the following two conditions:(1)A BGP router (Router A)can choosewhether to carry this attribute in an update packet.(2) If a receiving router(Router B )cannot identify this attribute,this router can advertise this attribute to another BGP router (RouterC).Router C may be able to identify and use this attribute.A AggregatorB Local_prefC multi_exit_discD CommunityAD86.which of the following route selection tools can be used only in BGP?A Route-policyB IP-prefixC AS-path-filterD Community-filterCD87.which of the following routing protocols support import-route?A OSPFB RIPC BGPABC88.which of the following routes match this ACL filter? Acl number 2001 rule 0 permit source1.1.1.0 0.0.254.255A 1.1.1.1/32B 1.1.2.1/32C 1.1.3.1/32D 1.1.4.1/32AC89.which of the following route prefixes match this IP-prefix-filter? IP ip-prefix test index 10permit 10.0.0.0 16 greater-equal 24 less-equal 28A 10.0.1.0/23B 10.0.1.0/24C 10.0.1.0/25D 10.0.1.0/28BCD90.one route selection tool may have several Items defined,to which of following tools will thesystem automatically add a deny-any item following all the configured items?A ACLB IP-prefixC AS-path-filterD community-filterABCD91.which of the following methods are supported by OSPF for delivering default routes?A Delivery by an ABRB Delivery by an ASBRC Forcible deliveryD Non-forcible deliveryABCD92.which of the following scenarios can an AS-path-filter be used for?A Filtering the routes received from a BGP peer based on the as-path attributes of theroutes,for example,peer X.X.X.X as-path-filter importB Filtering the routes sent to a BGP peer based on the as-path attributes of the routes,forexample,peer X.X.X.X as-path-filter exportC Apply clauses in a route-policyD IF-match clauses in a route-policyABD93.which of the following protocols support default route advertisement by using commands?A RIPB OSPFC BGPABC94.which of the following as-path attributes match this AS-path-filter? Ip AS-path-filter 1permit 100$|400$A 100B 3100C 1234 1400D 300 400ABCD。

华为认证考试项目列表

华为认证考试项目列表

UC&C
云计算 传输 接入
目录价格 从VUE网站直接购买价格 150美金 120美金 120美金 120美金 150美金 300美金 8000人民币 200美金 160美金 160美金 160美金 200美金 200美金 160美金 160美金 160美金 200美金 300美金 200美金 300美金 200美金 300美金 200美金 300美金 200美金 200美金 200美金 200美金 200美金
考试代码 HC-012-211-CHS HC-012-221-CHS HC-012-222-CHS HC-012-223-CHS HC-012-224-ENU HC-012-261-ENU HC-711-CHS HC-721-CHS HC-722-CHS HC-723-CHS HC-012-311 HC-611-CHS HC-621-CHS HC-622-CHS HC-623-CHS HC-011-811-CHS HC-812-CHS HC-011-821-CHS HC-822-CHS HC-011-831-CHS HC-832-CHS HC-016-511 HC-016-521 HC-311-CHS HC-031-321-CHS HC-031-331-CHS HC-035-210-CHS HC-035-211-CHS
数通 数通(中级快 数通(高级) 安全(初级) 安全 WLAN 存储 安全(中级) WLAN(初级) 存储(初级) 存储(中级) UC(初级) UC(中级) CC(初级) CC(中级) VC(初级) VC(中级) 云计算(初级) 云计算(中级) 传输(初级) 传输(中级) 接入网(初级) 接入网(中级)
说明: *参加考试条件指在申请相关高级别的认证证书时需要已经具备的认证证书,实际参加考试不受限制。 **HCIE-R&S(Lab+Interview)考试在华为公司举行,考试券需要在华为授权培训中心(HALP)购买; 其它考试在VUE考试平台举行,考试券可直接在VUE官方网站购买(通过美金信用卡)或联系华为授权培训中心购买(可接

华为认证HCDP实验指导书HCDP-IENPv16

华为认证HCDP实验指导书HCDP-IENPv16

华为认证系列教程HCDP-IENP提升企业级网络性能实验指导书华为技术有限公司版权声明版权所有© 华为技术有限公司 2010。

保留一切权利。

本书所有内容受版权法保护,华为拥有所有版权,但注明引用其他方的内容除外。

未经华为技术有限公司事先书面许可,任何人、任何组织不得将本书的任何内容以任何方式进行复制、经销、翻印、存储于信息检索系统或使用于任何其他任何商业目的。

版权所有侵权必究。

商标声明和其他华为商标均为华为技术有限公司的商标。

本文档提及的其他所有商标或注册商标,由各自的所有人拥有。

华为认证系列教程HCDP-IENP提升企业级网络性能实验指导书第1.6版本华为认证体系介绍依托华为公司雄厚的技术实力和专业的培训体系,华为认证考虑到不同客户对ICT技术不同层次的需求,致力于为客户提供实战性、专业化的技术认证。

根据ICT技术的特点和客户不同层次的需求,华为认证为客户提供面向十三个方向的四级认证体系。

HCDA(Huawei Certified Datacom Associate,华为认证数据通信工程师)主要面向IP网络维护工程师,以及其他希望学习IP网络知识的人士。

HCDA认证在内容上涵盖TCP/IP基础、路由、交换等IP网络通用基础知识以及华为数据通信产品、通用路由平台VRP特点和基本维护。

HCDP-Enterprise (Huawei Certified Datacom Professional-Enterprise,华为认证数据通信资深工程师-企业级)主要面向企业级网络维护工程师、网络设计工程师以及希望系统深入地掌握路由、交换、网络调整及优化技术的人士。

HCDP-Enterprise包括IESN(Implement Enterprise Switching Network,部署企业级交换网络)、IERN(Implement Enterprise Routing Network,部署企业级路由网络)、IENP(Improving Enterprise Network Performance,提升企业级网络性能)三个部分。

HCDP英文版最新单选试题

HCDP英文版最新单选试题

1.what is the maximum bits of a class c address can be used for subnet?A 6B 8C 12D 14A2.what is the function of the peer ignore command?A deletes a BGP peerB retains all configurations of the peer,and maintains the BGP peer relationship with thepeer,but does not receive the routes sent from the peer.C retains all configurations of the peer,and maintains the BGP peer relationship with thepeer,but does not advertise routes to the peer.D retains all configurations of the peer,interrupts the BGP peer relationship with thepeer,and clears all related routing information.D3.which following BGP attribute can used to define a set of prefixes with the samecharacteristics?A OriginB NexthopC CommunityD MEDC4.which of the following character strings matches the regular expression 100$?A 3100B 100C 1008D 100 200B5._ _ _ _ IN IPv4,which of the following is the SSM address range allocated by the IANA?A 232.0.0.0/24B 225.0.0.0/8C 232.0.0.0/8D 239.0.0.0/8D6.which of the following technologies can reduce the scale of broadcast domain?A VLANB TRUNKC RARPD STPA7.Which statement about the trunk interface is true?A A trunk interface is always connected to hosts.B Multiple VLAN IDs can be set on a trunk interface.The VLAN IDs can be the same as ordifferent from the PVID.C The trunk interface cannot have a PVID.D IF the trunk interface receives a packet with a VLAN not in the allowed VLAN list, thetrunk interface broadcast the packet in the VLAN.B8.What is the legal virtual MAC address in VRRP?A 01-01-5E-00-01-01B 01-00-5E-00-01-00C 00-00-5E-00-01-01D 01-01-5E-00-01-01C9.Which of the following statements are correct regarding priority in VRRP?A The ip address owner always uses 255 as its priority regardless its config priority.B The ip address owner always uses 0 as its priority regardless its config priority.C We can configure the priority as 0 to make the router never attend the Master election.D If a VRRP router changes from Master to Slave,it will send out a VRRP message withpriority 0 in the network.A10.Which of the following statements are correct regarding VRRP?A Only Master can process the data packets sending to virtual router.B Only Slave can process the data packets sending to virtual router.C Both Master and Slave can process the data packets sending to the same virtual router torealize load balance.D By default,only Master can process the data packets sending to virtual router:but we cando some configuration to make the Slave Process the data packets sending to virtual router. A11.Which of the following statements are correct regarding the function of VRRP?A VRRP can improve the reliability of default gateway.B VRRP increase the convergence speed of routing protocol.C VRRP is mainly used for traffic balance.D VRRP can provide one default gateway for diffenrent network segments,it simplifies thegateway configuration for PC.A12.Which of the following statements are correct regarding default gateway of PC in thenetwork running VRRP?A Configure only one gateway for the PC which is the IP address of Master.B Configure only one gateway for the PC which is the IP address of virtual router.C Configure two gateways for the PC which are the IP addresses of Master and Slave.D Configure three gateways for the PC which are the IP addresses of Master,Slave andvirtual router.B13.RTA connected to a LAN by e0/0 whose IP address is 10.1.1.251 and network mask is255.255.255.0 .Now create a virtual router with ID 1 and virtual IP address 10.1.1.254 on RTA.which of the following commands are correct?A [RTA-ethernet0/0]vrrp vrid 1 virtual-ip 10.1.1.254B [RTA]vrrp vrid 1 virtual-ip 10.1.1.254C [RTA-ethernet0/0]vrrp vrid 1 virtual-ip 10.1.1.254 mask 255.255.255.0D [RTA]vrrp vrid 1 virtual-ip 10.1.1.254 mask 255.255.255.0A14.Which of the following statements rae correct regarding VRRP advertisement message?A VRRP has two kinds of advertisement message,one is sent by master,the other is sent byslave.B VRRP has two kinds of advertisement message which is sent by masterC VRRP has two kinds of advertisement message which is sent by slaveD VRRP has two kinds of advertisement message,one is used for master election,the otherone is used in stable network after master election.B15.which of the following firewalls is the most popular?A packet filtering firewallB Stateful firewallC proxy firewallD Anti-virus firewallB16.How many user-defined security zones at most are configured on an Eudemon?A 3B 4C 5D 6A17.The TCP SYN flood attack usually occurs during the TCP handshake process. How manyhandshakes are required to set up a TCP connection?A 1B 2C 3D 4C18.How many default zones does the Eudemon supporting multi-instance have?A TwoB ThreeC FourD FiveC19.Which of the following is the priority value of the DMZ on the Eudemon?A 10B 50C 75D 85B20.What is the maximum number of security zones supported by the Eudemon?A 256B 128C 32D 16D21.Which of the following indicators are performance indicators of the Eudemon?A Throughput of large-sized or small-sized packets.B Number of new connections and concurrent connections per secondC VPN performanceD MTU checkB22.In the scenario where packets are sent and received along different paths,which of thefollowing functions needs to be disabled on the firewall?A Status detectionB Attack defenseC Packet filteringD Status backupA23.Assume that the traceroute test is used to detect the packet forwarding path and tracertpackets have passed through the firewall.which of the following attack protection functions needs to be disabled to normally display the tracert result?A ICMP-redirectB ICMP-unreachableC TracertD SmurfC24.What is the recommended minimum delay for HRP preemption on the Eudemon?A 120SB 60SC 10SD 5SB25.Which of the following commands is used to display the detailed information about theEudemon?A display firewall statistic systemB display firewall session table raw both-directionC display firewall session table verboseD display firewall session table detailC26.To provide services of different qualities,you can classify services based on such packetinformation as the packet priority, source IP address,destination IP address,and port number.Which of the following Qos technology can be used to service classification?A Traffic policingB Traffic shapingC Complex traffic classificationD Congestion managementC27.Qos in best-effort service mode uses which of the following queue scheduling technologyA FIFOB WFQC PQD RRA28.Which of the following statement about Qos in diffserv mode is false?A The parameter field in the IP packet header informs devices on the network of the Qosrequirements of the application.B Every device on the packet transmission paths can learn the service request types byanalyzing the IP packet header.C Before sending Packets, the application program needs to confirm that the network hasreserved resources for packet transmission.D DiffServ is a Qos solution based on packets.C29.Which of the following statement about packet marking is false?A Compared with traffic policing, traffic shaping is advanced in terms of caching bursttraffic.B with traffic shaping, packets can be transmitted at an even rate.C Caching packets in the queue increases the packet delay in case of congestion.D In case of congestion, traffic shaping causes the packet loss ratio to increase.D30.Which of the following information in a packet can be marked or re-marked?A IP DSCP,IP precedence, and 802.1P informationB IP source and destination addressesC MAC addressD Any information in the packetA31.Simple traffic classification can be performed based on which of the following information invlan packets?A DSCPB IP precedenceC MPLX EXPD 802.1pD32.Based on the DSCP field (first 6 bits of the Tos field),pakcets can be classified into how manytypes?A 4B 8C 16D 64D33.In addition to traffic rate limit, the CAR can mark packets with colors. If one token bucketone-rate is used in traffic policing and the number of tokens is insufficient, packets are marked with which of the following color?A RedB GressC YellowD BlueA34.In traffic policing using two token buckets two-rate,when the CIR is set to 1 Mbit/s and thePIR is set to 2 Mbit/s, what is the maximum transmission rate for the traffic in green?A 1 Mbit/sB 2 Mbit/sC 3 Mbit/sD 4 Mbit/sA35.Assume that there are four flows a.b.c,and d,the transmission rate of each flow is 50Mbit/s,and the total bandwidth of the interface for flow transmission is 100 Mbit/s,In the case of congestion,WFQ is available for flows a,b,c,and d,with the weight proportion being 1:2:3:4,which of the following statement about the interface bandwidth allocated to each flow is true?A Interface bandwidths allocated to flows a,b,c and d are 10 Mbit/s,20 Mbit/s,30 Mbit/s,and 40 Mbit/s respectively.B Interface bandwidths allocated to flows a,b,c and d are 50 Mbit/s, 50 Mbit/s, 0 Mbit/s,and 0 Mbit/s respectively.C Interface bandwidths allocated to flows a,b,c and d are 40 Mbit/s, 30 Mbit/s, 20 Mbit/s,and 10 Mbit/s respectively.D Flows a,b,c and d are discarded.A36.Assume that congestion occurs on the outbound interface,packet A is cached in the PQ,andpacket B is cached in the WFQ,which of the following statement about packet scheduling is true?A Packet A is scheduled first.B Packet B is scheduled first.C Packets A and B are scheduled at the same time.D Packets A and B are discarded.A37.Assume that the following WRED polcies are used in QoS : The length of the queue for savingDSCP packets with the priority being AF21 ranges from 35 to 40. The length of the queue for saving DSCP packets with the priority being AF22 ranges from 30 to 40. The length of the queue for saving DSCP packets with the priority being AF23 ranges from 25 to 40. In the case of congestion,DSCP packets with which of the following priority value will be discarded first?A AF21B AF22C AF23D ALL the sameC38.Which of the following statements about the device state change is correct after failure inthe intermediate link for transmitting VRRP heartbeats?A The status of the master and salve devices remains unchanged.B Both the master and slave devices enter the Master state.C Both the master and slave devices enter the Slave state.D Both the master and slave devices enter the Initial state.B39.Which of the following statements about the VRRP working process is false?A The router with the highest priority is elected as the master router.B The master router sends gratuitous ARP packets to inform connected devices or hosts ofits virtual MAC address.C IF the master router fails,the backup router witth the highest priority is elected as thenew master router.D To ensure fast convergence,a backup router immediately becomes the master router ifthe priority of the backup router is higher than the priority of the master router.Drouter is 192.168.1.1, which of the following addresses is the virtual MAC address of the virtual router?A 00-00-5E-00-01-64B 00-00-5E-00-01-01C 01-00-5E-00-01-64D 01-00-5E-00-01-01A41.Which of the following addresses is the destination address of VRRP packets?A 224.0.0.18B 224.0.0.19C 224.0.1.18D 224.0.1.19A42.Which of the following numbers is the protocol number of VRRP packets?A 112B 113C 114D 115A43.Which of the following statements about the VRRP authentication is false?A VRRP provides no authentication.B VRRP provides the simple text authentication.C VRRP provides the MD5 authenticationD VRRP provides the pre-shared key authentication.D44.Which of the following is not the BFD fault detection mode?A Asynchronous modeB Demand modeC Echo modeD Peer modeDrouter is 192.168.1.1,which of the following addresses is the virtual MAC address of the virtual router?A 00-00-5E-00-01-64B 00-00-5E-00-01-01C 01-00-5E-00-01-64D 01-00-5E-00-01-61A46.Which LSA is used by OSPF to implement GR?A Type-3 LSAB Type=5 LSAC Type-9 LSAD Type-10 LSAC47.BFD control packets are encapsulated in UDP packets for transmission.which of the followingis the destination port number for single-hop BFD control packets?A 3784B 4784C 5784D 6784A48.Which of the following BFD versions is supported in VRP 5.7?A version 0B version 1C version 2D version 3B49.Which of the following statements about different detection intervals at both ends of a BFDsession is true?A The BFD session can be set up and the greater detection interval is used afternegotiation.B The BFD session can be set up and the smaller detection interval is used afternegotiation.C The BFD session can be set up and each end sends detection packets at ist own interval.D The BFD session cannot be set up.A50.Which of the following statements about the refreshing mechanism in the case of linkswitchover in a Smart link group is false?A MAC and ARP entries are refreshed automatically against traffic.B The Smart link group uses a new link to send Flush packets.C When the active link recovers from a fault, Flush packets are sent to refresh entries.D When recovering from a fault,the active link remains blocked and traffic is not switchedback to it, In this way,traffic keeps stable.C51.Which of the following statements about the monitor link group is false?A A monitor link group has uplink and downlink interfaces.B A monitor link group has one uplink interface and several downlink interfaces.C In a monitor link group.the status of the downlink interface changes in accordance withthe status of the uplink interface.D The smart link group can only serve as a downlink interface.D52.Which of the following modes is selected to associate BFD with TE hot-standby in VRP 5.7?A single-hop BFDB BFD for CR-LSRC BFD for LSPD BFD for TEB53.Which of the following statements about the smart link group is false?A A smart link group has two interfaces at most,the two interfaces if configured are anactive interface and a standby interface.B Among the two interface in a smart link group,one is in the active state and the other onein the standby state in normal situations.C when the active interface goes down,the Smart link group automatically blocks it andchanges the status of the standby interface to avtive.D when the active interface recovers from a fault,traffic will be switched back to itimmediately.D54.How many hosts are available per subnet if apply a/21 mask to the class B network?A 510B 512C 1022D 2046D55.For a network like 175.25.128.0/19,the mask value is?A 255.255.0.0B 255.255.224.0C 255.255.24.0D Different based on the address typeB56.The network 154.27.0.0 without any subnet can support( )hosts?A 254B 1024C 65534D 16777206C57.One class B network 155.16.0.0,the mask is 255.255.255.192. then subnet quantity availableis ( ),the host quantity in every subnet at most is ( )A 512 126B 1024 64C 1024 62D 256 256E 192 254C58.For network segment 192.168.2.16/28,how many hosts it can hold at most?A 16B 8C 15D 14E 7D59.The IP address 0.0.0.0 indicates( )A Network addressB Broadcast address of specially designated network segmentC ALL networksD Broadcast address of all nodes of local network segmentC60.What is the network address for 190.233.27.13/16?A 190.0.0.0B 190.233.0.0C 190.233.27.0D 190.233.27.1B61.Which of the following address types are reserved for multicast use?A Class AB Class BC Class CD Class DD62.Which is the default network mask length of 219.25.23.56?A 8B 16C 24D 32C63.What is the maximum bits of a class B address can be used for subnet?A 8B 14C 16D 22B64.The subnet mask of a class A address is 255.255.240.0,how many bits are used to dividesubnet?A 4B 5C 9D 12D65.What is the maximum bits of a Class C address can be used for subnet?A 6B 8C 12D 14A66.OSPF uses SPF algorithm to calculate SPF tree according to topology.what is the node of theSPF tree?A RouterB Router and network segmentC Port and network segmentD Router and portB67.In transit AS,why do core routers run BGP?A Eliminate route loopsB Ensure data packets can be transmitted to the external destination addressesC Optimize network within an ASD Ensure only one exportB68.Which method is used to establish session between the BGP peers?A TelnetB Send Hello packetC UDPD TCPD69.Which one of the statements describes the relationship between BGP and AS correctly?A BGP only runs between Ass, and can not run within an AS.B BGP is an EGP running between Ass,and IGP runs within an AS such as OSPF,RIP and IS-IS.C BGP builds up network topology by exchanging link-state information among Ass.D BGP can not run between ass.B70.What is private AS number?A 65410-65535B 1-64511C 64512-65535D 64511-65535C71.which TCP port is used by BGP?A 520B 89C 179D 180C72.which of the statements describes the way BGP update routes?A Broadcasts all of the routes periodicallyB Update all of the routes using multicast address periodicallyC Only undate the changed routes and the new routesD Upadate routes when BGP peer requestsC73.which of the following is used to avoid route loops in BGP?A Use ORIGIN attribute to record route originB Use AS_PATH attribute to record all Ass during a route passing from the local area to thedestination in a certain orderC Use NEXT_HOP attribute to record next hop of the routeD Use MED attribute to influence export selection of other ASB74.what is the function of well-known community attribute NO-EXPORT in BGP?A Routes received carrying this value cannot be advertised outside the confederationB Routes received carrying this value cannot be advertised to any BGP peersC Routes recived carrying this value cannot be advertised to any EBGP peersD All above statements are wrongA75.what is the function of well-known community attribute NO_EXPORT_SUBCONFED in BGP?A Routes received carrying this value cannot be advertised outside the confederationB Routes received carrying this value cannot be advertised to any BGP peersC Routes received carrying this value cannot be advertised to any EBGP PeersD ALL above statements are wrongC76.Which of the BGP attributes is Optional transitive attribute?A ORIGINB AS_PATHC NEXT_HOPD MEDE LOCAL_PREFF COMMUNITYF77.Which of the BGP attributes will not be advertised to other neighbor AS?A LOCAL_PREFB AS_PATHC COMMUNITYD ORIGINA78.By default,what are the LOCAL_PREF and PREFERRED-VALUE in VRP system?A 0,32768B 100,0C 255,100D 32768,0B79.How many multicast IP addresses can be represented by the same multicast MAC address?A 1B 23C 32D 24C80.How many bits of the multicast MAC address are used for multicast IP address mapping?A 24B 22C 25D 23D81.Which of the following commands is used to display check information of IGMP enabledinterface?A [Quidway]show ip igmp interfaceB [Quidway]display igmp interfaceC [Quidway]show ip igmpD [Quidway]display ip interfaceB82.Which of the following commands is used to display the IGMP routing table?A display igmp groupB display igmp interfaceC display igmp routing-tableD display igmpC83.Which of the following is the multicast distribution tree maintained by PIM-DM?A SPTB CBTC RPTD STPA84.How many class C networks does the summarized route 192.168.134.0/22 cover?A 2B 4C 8D 16B85.A router receives a data packet,with the destination address being 195.26.17.4 which subnetis this address in ?A 192.26.0.0/21B 195.26.16.0/20C 195.26.8.0/22D 195.26.20.0/22B86.The address space 172.28.100.0/24 is currently used,If the subnet mask 172.28.100.0/30 isused to divide this address space into several suebnets serving WAN links,how many subnet in tonal can the address space be divided into?A 30B 64C 126D 254B87.A Class C network needs to be divided into five subnets and each subnet needs to contain amaximum of 20 hosts,which of the following subnet masks is used?A 255.255.255.192B 255.255.255.240C 255.255.255.224D 255.255.255.248C88.A network administrator needs to construct a small-scale network containing only 22 hostsand the ISP assigns only public IP address as the egress address.which of the following address can be used by the network administrator to plan the network?A 10.11.12.16/28B 172.31.255.128/27C 192.168.1.0/28D 209.165.202.128/27B89.Which of the following network or link type is not the basic network or link type defined inOSPF?A P2PB P2MPC BroadcastD Virtual linkD90.Which of the following statements about a neighbor state machine is true?A The attempt state appears only on an NBMA network or a broadcast network.B The Attempt state appears only on an NBMA network or a P2MP network.C LSR packets can be sent in the Exchange state.D The full state indicates that LSDB synchronization is complete,No LSDB information willbe exchanged.C91.Which statement about OSPF is false?A The router with a higher Router priority also has a higher DR election priority.B When two routers have the same Router Priorities,the router with a larger Router ID hasa higher DR election priority.C If a DR fails,the BDR automatically takes over as the DR and a new BDR is elected.D If a BDR fails,the DR will not take over as the BDR and awaits the fault recovery of theBDR,No new BDR will be elected.D92.Which statement about OSPF is false?A Hello packets are used to discover and maintain neighbor relationships.Ona broadcastnetwork or an NBMA network,Hello packets can also be used to elect a DR and a BDRB DD packets describe summary LSDB information by carrying LSA headers.C The intervals at which two routers send Hello packets must be consistent;otherwise,aneighbor relationship cannot be established between them.D DD packets contain headers of all LSAs for periodic LSDB synchronization between OSPFneighbors.D93.Which of the following statements about stub area is false?A An AS-external-LSA cannot be advertised to a stub area.B The ABR in the stub area generates a default route to guide forwarding of packetsdestined for other areas.C A Transit area cannot be configured as a stub area.D Any area can be configured as a stub area.D94.Which of the following statements about Stub areas is false?A The difference between a stub area and a Totally stubby area is that the Totally Stubbyarea cannot contain summary-LSAs.B The ABR in the Stub area generates a default route to guide forwarding of packetdestined for other area.C A Transit area cannot be configured as a Stub area.D Any Stub area can be configured as a Totally Stubby area.AA A Router-LSA is used to describe the local link status information of a router.B A Network-LSA is used to describe the link status information of a broadcast network oran NBMA network segment.C A virtual link is a virtual adjacency in the backbone area(Area 0).D An AS-External-LSA describes how to reach an ASBR.D96.Which of the following statements is false?A An ABR maintains an LSDB for each area.There are many LSDBs on an ABR.B The metric of an ASE LSA can be specified when an external route is imported.The defaultvalue is 1.C The external routing information carries a Tag label for transmitting additionalinformation of the route.It is commonly used in a routing policy.The default value of the Tag label is 0.D The link state ID in an ASBR-Summary-LSA is the Router ID of the ASBR.C97.Which of the following statements about NSSA commands is false?A If the default-route-advertise parameter is set,a Type-7 default route is generated.B The no-import-route parameter is used to prevent the importing of AS external routes inthe form of Type-7 LSAs into an NSSA.C The no-summary parameter is used to prevent the advertisement of Type-3 and Type-4LSAs in an area.D The set-n-bit parameter indicates that an N-bit will be set in a DD packet.A98.Which of the following statements is false?A Each OSPF router uses only one Router-LSA to describe the status of local links in an ares.B Link types described by a Router-LSA include P2P,P2MP,TransNet,and StubNet.C A Network-summary-LSA describes the metric of the route from an ABR to a destinationnetwork segment.D Routing information can be exchanged between a backbone area and a non-backbonearea but cannot be exchanged between two non-backbone ares.B99.What is the link ID of an ASBR-Summary-LSA?A OSPF Router ID of an LSA’s originatorB Port IP address of the DR on the described network segmentC Address of the destination network segmentD Router ID of the destination ASBRDA The Network Mask field in a received Hello packet must be consistent with the networkmask of the interface receiving the Hello packet.B The HelloInterval field in a received Hello packet must be the same as the Hello intervalconfigured on the interface receiving the Hello packet.C The RouterDeadInterval field in a reveived Hello packet must be the same as theRouterDead interval configured on the interface receiving the Hello packet.D The E-bit in the Options field in a received Hello packet must be the same as the E-bitconfigured for the local OSPF area.A101.Which statement about the OSPF LSA format is false?A The LS age field indicates the time that an LSA has been active,in seconds.B The LS type field indicates the format and function of an LSA.RFC 2328 defines five typesof LSAs.C The Advertising Router field represents the OSPF Router ID of an LSA’s originator.D The LS sequence number field helps determine whether an LSA is a new LSA.D102.Which of the following statements is false?A The metric of a Type-1 external route is the sum of the AS internal metric (metric to reachan ASBR) and the AS external metric (metric from the ASBR to the destination network)B The metric of a Type-2 external route is only the AS external metric.C The metric of an external route is the sum of the AS external metric and the AS internalmetric.D The prerequisite for setting Forwarding Address to a non-zero value is that the next hopof the external route imported into OSPF is within the OSPF routing area.C103.In BGP,which type of message is periodically exchanged between BGP peers to maintain a BGP peer relationship?A OpenB HelloC Route-refreshD KeepaliveD104.In which state have BGP peers not established any connection and not initiated a connection request?A EstablishedB OpenSentC ActiveD IdleD。

华为培训认证课程介绍-数通_CN

华为培训认证课程介绍-数通_CN
排除,华为路由交换设备的安装和调试。 通过HCDA认证,将证明您对中小型网络有初步的了解,了解中小型网络的通用技术,并具备协助设计中
小型网络以及使用华为路由交换设备实施设计的能力。 拥有通过HCDA认证的工程师,意味着企业有能力搭建基本的中小型网络,并将基本的语音、无线、云、
安全和存储集成到网络之中,满足各种应用对网络的使用需求。
OSPF协议、PPP和帧中继的基本配臵方法 掌握网络维护和基本故障排除的常用方法 成为一名初级ICT专业技术人员,具备规划、配臵、
运维和管理中小型企业网络的能力
HCDA
考试流程
华为认证考试由VUE(Pearson VUE)考试服务公司代理。华为认证不同级别与方向的认证考试 项目具有不同的考试要求与流程。
培训路径
HCDA Simplified Training (2d) HCDA两天版培训
OEE03 理论授课 上机实践
2天
通过以上相应考试,可获得HCDA认证 考试与HCDA的考试相同
课程安排
HCDA 两天版培训
课程
时长(工作日)
VRP系统与路由配臵
1
交换技术配臵
0.5
广域网与安全配臵
0.5
培训对象
希望从事ICT相关工作的初学者或初级网络技术员
入学要求
具备基本的网络知识 熟悉PC操作系统
培训时长
8个工作日
培训目标
完成该项目培训后,您将能够: 了解以太网的演变过程及相关技术 了解如何选择适合您网络的华为网络设备 理解网络常用协议的原理、功能和相关知识 理解路由器、交换机和防火墙的工作原理 掌握IP地址、掩码和子网划分的知识 掌握VLAN、STP、VRRP、静态路由、RIP协议、

HCDP英文版单选试题

HCDP英文版单选试题

1.what is the maximum bits of a class c address can be used for subnet?A 6B 8C 12D 14A2.what is the function of the peer ignore command?A deletes a BGP peerB retains all configurations of the peer,and maintains the BGP peer relationship with thepeer,but does not receive the routes sent from the peer.C retains all configurations of the peer,and maintains the BGP peer relationship with thepeer,but does not advertise routes to the peer.D retains all configurations of the peer,interrupts the BGP peer relationship with thepeer,and clears all related routing information.D3. a notification message with Error code 2 indicates an error open message.which of thefollowing error sub-codes can be contained in this open message?A 1:indicates that the version number is not supported.B 2:indicates that the AS of the peer is incorrectC 3:indicates that the BGP identifier is incorrectD 4:indicates that the optional parameters filed is not supportedABCD4.which following BGP attribute can used to define a set of prefixes with the samecharacteristics?A OriginB NexthopC CommunityD MEDC5.which of the following character strings matches the regular expression 100$?A 3100B 100C 1008D 100 200B6.which of the following as-path attributes match this as-path-filter?_ _ ip as-path-filter 1permit 100$|400$?A 100B 3100C 1234 1400D 300 400ABCD7._ _ _ _ IN IPv4,which of the following is the SSM address range allocated by the IANA?A 232.0.0.0/24B 225.0.0.0/8C 232.0.0.0/8D 239.0.0.0/8D8._ _ _ _ _ which of the following configurations can be performed to implement fast failuredetection on a network?A Reduce the holdtime of Join/Prune messagesB Reduce the interval for an interface to send Hello messages.C Set up a PIM BFD session between network segment neighbors.D Reduce the interval for sending Join/Prune messages.BC9.which of the following technologies can reduce the scale of broadcast domain?A VLANB TRUNKC RARPD STPA10.Which statement about the trunk interface is true?A A trunk interface is always connected to hosts.B Multiple VLAN IDs can be set on a trunk interface.The VLAN IDs can be the same as ordifferent from the PVID.C The trunk interface cannot have a PVID.D IF the trunk interface receives a packet with a VLAN not in the allowed VLAN list, thetrunk interface broadcast the packet in the VLAN.B11.Which of the following are factors that affect QOS?A BandwidthB DelayC JitterD Loss of packetABCD12.IP network can provide various packet forwording service,the service demands that userscare during packet forwarding include.A ThroughputB DelayC JitterD Loss of packetABCD13.IP Oos models include:A Best-EffortB Integrated ServiceC Differentiated ServiceD FIFO ServiceABC14.Qos can provide different quality of service according to different demands,which of thefollowing are functions of Qos?A Providing private bandwidth for usersB Reducing loss of packetC Congestion management and avoidanceD Specifying priority of packetsABCD15.What is the legal virtual MAC address in VRRP?A 01-01-5E-00-01-01B 01-00-5E-00-01-00C 00-00-5E-00-01-01D 01-01-5E-00-01-01C16.Which of the following statements are correct regarding Master in VRRP?A The router with highest priority will become Master.B The router with smallest priority will become Slave.C The router with highest priority may not always be Master.D The router with smallest priority may not always be Slave.CD17.Which of the following statements are correct regarding priority in VRRP?A The ip address owner always uses 255 as its priority regardless its config priority.B The ip address owner always uses 0 as its priority regardless its config priority.C We can configure the priority as 0 to make the router never attend the Master election.D If a VRRP router changes from Master to Slave,it will send out a VRRP message withpriority 0 in the network.A18.Which of the following statements are correct regarding VRRP?A Only Master can process the data packets sending to virtual router.B Only Slave can process the data packets sending to virtual router.C Both Master and Slave can process the data packets sending to the same virtual router torealize load balance.D By default,only Master can process the data packets sending to virtual router:but we cando some configuration to make the Slave Process the data packets sending to virtual router. A19.Which of the following statements are correct regarding the function of VRRP?A VRRP can improve the reliability of default gateway.B VRRP increase the convergence speed of routing protocol.C VRRP is mainly used for traffic balance.D VRRP can provide one default gateway for diffenrent network segments,it simplifies thegateway configuration for PC.A20.Which of the following statements are correct regarding default gateway of PC in thenetwork running VRRP?A Configure only one gateway for the PC which is the IP address of Master.B Configure only one gateway for the PC which is the IP address of virtual router.C Configure two gateways for the PC which are the IP addresses of Master and Slave.D Configure three gateways for the PC which are the IP addresses of Master,Slave andvirtual router.B21.Which of the following authentication modes does VRRP use?A No authenticationB Simple text passwordC MD5D CHAPABC22.Which of the following statements are correct regarding MAC address of VRRP packet?A The destination MAC is broadcast MAC addressB The destination MAC is multicast MAC addressC The source address is virtual MAC address.D The source address is physical MAC address of Master.BC23.RTA connected to a LAN by e0/0 whose IP address is 10.1.1.251 and network mask is255.255.255.0 .Now create a virtual router with ID 1 and virtual IP address 10.1.1.254 on RTA.which of the following commands are correct?A [RTA-ethernet0/0]vrrp vrid 1 virtual-ip 10.1.1.254B [RTA]vrrp vrid 1 virtual-ip 10.1.1.254C [RTA-ethernet0/0]vrrp vrid 1 virtual-ip 10.1.1.254 mask 255.255.255.0D [RTA]vrrp vrid 1 virtual-ip 10.1.1.254 mask 255.255.255.0A24.Which of the following statements rae correct regarding VRRP advertisement message?A VRRP has two kinds of advertisement message,one is sent by master,the other is sent byslave.B VRRP has two kinds of advertisement message which is sent by masterC VRRP has two kinds of advertisement message which is sent by slaveD VRRP has two kinds of advertisement message,one is used for master election,the otherone is used in stable network after master election.B25.Int which of the following modes can the eudemon be working?A Routing modeB Transparent modeC Composite modeD Transfer modeABC26.What are the types of firewalls developed so far?A packet filtering firewallB proxy firewallC Anti-virus firewallD Stateful firewallABD27.which of the following firewalls is the most popular?A packet filtering firewallB Stateful firewallC proxy firewallD Anti-virus firewallB28.How many user-defined security zones at most are configured on an Eudemon?A 3B 4C 5D 6A29.The TCP SYN flood attack usually occurs during the TCP handshake process. How manyhandshakes are required to set up a TCP connection?A 1B 2C 3D 4C30.How many default zones does the Eudemon supporting multi-instance have?A TwoB ThreeC FourD FiveC31.Which of the following is the priority value of the DMZ on the Eudemon?A 10B 50C 75D 85B32.What is the maximum number of security zones supported by the Eudemon?A 256B 128C 32D 161633.Which of the following statements about the security policies for the Eudemon are true?A By default, a user in the Local zone can access other zones.B By default, a user in the Trust zone can access the DMZ.C By default, a user in the Untrust zone cannot access the Trust zone.D By default, a user in a zone of the firewall cannot access any other zone of the firewall. CD34.Which of the following statements about the zone priorities of the Eudemon are true?A The priority of the Local zone is 100B The priority of the Trust zone is 80C The priority of the Untrust zone is 5.D The priority of the DMZ is 50.ACD35.Which of the following statements about the firewall technology are true?A The network gateway of the application layer checks application-layer data carried inpackets passing through the gateway.B The network gateway for session status detection checks session information carried inpackets only at the session layer.C During packet filtering,the session status is checked and the whole data stream isanalyzed.D Address proxy replaces IP addresses and port numbers of hosts within the network withthe IP address and port number of the proxy device or routerABD36.Which of the following data traffic is incoming data traffic on the Eudemon?A Data traffic from a Trust zone to a demilitarized zone (DMZ)B Data traffic from an Untrust zone to a DMZC Data traffic from a Local zone to a Trust zoneD Data traffic from an Untrust zone to a Local zoneBD37.Which of the following attacks are prevented after an IP address and MAC address are boundon the Eudemon?A IP address spoofingB MAC address spoofingC Dos attackD DDos attackAB38.Which of the following solutions effectively defend against ARP attacks?A Binding a MAC address and an IP addressB Enabling the ARP attack protection function on a Huawei switching deviceC Adding network segments to different VLANs on a switchD Enabling IP packet filteringABC39.Which of the following indicators are performance indicators of the Eudemon?A Throughput of large-sized or small-sized packets.B Number of new connections and concurrent connections per secondC VPN performanceD MTU checkB40.In the scenario where packets are sent and received along different paths,which of thefollowing functions needs to be disabled on the firewall?A Status detectionB Attack defenseC Packet filteringD Status backupA41.Assume that the traceroute test is used to detect the packet forwarding path and tracertpackets have passed through the firewall.which of the following attack protection functions needs to be disabled to normally display the tracert result?A ICMP-redirectB ICMP-unreachableC TracertD SmurfC42.What is the recommended minimum delay for HRP preemption on the Eudemon?A 120SB 60SC 10SD 5SB43.Which of the following commands is used to display the detailed information about theEudemon?A display firewall statistic systemB display firewall session table raw both-directionC display firewall session table verboseD display firewall session table detailC44.Which of the following technologies does the Eudemon use to defense against anti-DDosattacks?A TCP agentB Source authentication and detectionC Standard protocol stack identificationD Fingerprint identification(characteristics detection)E Abnormal session detectionF Traffic controlABCDEF45.What are the types of DDos attacks?A Attacks by special packetsB Scanning attackC traffic attackD Application-layer attackABCD46.Which of the following attacks are DDos attacks?A SYN floodB SYB/ACK floodC UDP floodD CC attackE HTTP get floodABCDE47.Which of the following options are performance parameters of the firewall?A ThroughputB Maximum number of connectionsC Number of new connections per secondD Process delayABCD48.By which can an IP-based advanced ACL filter packets?A Soure IP address and its subnet maskB Destination IP address and its subnet maskC Protocol typeD TCP or UDP port numberE Priority of the data packetF Service type of the data packetABCDEF49.Which of the following statements about NAT are true?A NAT is short “network address translation”B Nat,also called address proxy,is used for translation between private and public networkaddresses.C Hosts within the intranet can access the extranet without using NAT.D NAT can effectively resolve the problem of IP address shortage.ABD50.Which of the following NAT functions are supported by the Eudemon?A NAT/PATB NAT ALGC Bidirectional NATD NAT serverABCD51.Which of the following attacks can Eudemon defend against?A SYN-FloodB UDP FloodC Port SeanD Ping-DeathABCD52.Which of the following routing technologies are supported by the Eudemon 200E?A static routeB Policy-based routingC Routing policyD Route iterationABCD53.Which of the following DDos attacks can the Eudemon 1000E defend against?A SYN floodB UDP floodC ICMP flood54.Which of the following high availability (HA) features are supported by the Eudemon 1000E?A Dual-system hot backupB Multi-system hot backupC Dual-system load balancingD Multi-system load balancingAC55.To provide services of different qualities,you can classify services based on such packetinformation as the packet priority, source IP address,destination IP address,and port number.Which of the following Qos technology can be used to service classification?A Traffic policingB Traffic shapingC Complex traffic classificationD Congestion managementC56.Qos in best-effort service mode uses which of the following queue scheduling technologyA FIFOB WFQC PQD RRA57.Which of the following technologies are available for traffic shaping?A GTSB LRC CARD WREDAB58.To provide services of different qualities, you can classify services based on such packetinformation as the packet priority, source IP address, destination IP address, and port number.Which of the following Qos technology can be used to service classification?A Traffic policingB Traffic shapingC Complex traffic classificationD Congestion management59.In case of congestion, which of the following indexes will affect Qos?A Transmission delayB Transmission jitterC Packet loss ratioD Transmission distanceABC60.Which of the following statement about the jitter and delay is falseA The jitter depends on the delayB The variation in packet delay is called jitterC The lower the delay is,the less the jitter is.D The jitter is independent of the delay61.Which of the following statement about Qos in diffserv mode is false?A The parameter field in the IP packet header informs devices on the network of the Qosrequirements of the application.B Every device on the packet transmission paths can learn the service request types byanalyzing the IP packet header.C Before sending Packets, the application program needs to confirm that the network hasreserved resources for packet transmission.D DiffServ is a Qos solution based on packets.C62.Which of the following statement about packet marking is false?A Compared with traffic policing, traffic shaping is advanced in terms of caching bursttraffic.B with traffic shaping, packets can be transmitted at an even rate.C Caching packets in the queue increases the packet delay in case of congestion.D In case of congestion, traffic shaping causes the packet loss ratio to increase.D63.Which of the following information in a packet can be marked or re-marked?A IP DSCP,IP precedence, and 802.1P informationB IP source and destination addressesC MAC addressD Any information in the packetA64.Simple traffic classification can be performed based on which of the following information invlan packets?A DSCPB IP precedenceC MPLX EXPD 802.1pD65.Qos includes which of the following aspects?A Transmission bandwidthB Transmission delay and jitterC Packet loss ratioD Network securityABC66.Qos can be performed in which of the following modes?A Best-effort serviceB Integrated serviceC Differentiated serviceD Assured forwarding serviceABC67.Based on classification rules,traffic classification can be divided into which of the followingtypes?A Simple traffic classificationB Complex traffic classificationC On-demand traffic classificationD Service traffic classificationAB68.Which of the following congestion avoidance mechanisms can be used to avoid global TCPsynchronization?A REDB WREDC FIFOD WFQAB69.Which of the following are popular link efficiency mechanisms?A IPHCB LFIC HDLCD PPPAB70.Based on the DSCP field (first 6 bits of the Tos field),pakcets can be classified into how manytypes?A 4B 8C 16D 64D71.In addition to traffic rate limit, the CAR can mark packets with colors. If one token bucketone-rate is used in traffic policing and the number of tokens is insufficient, packets are marked with which of the following color?A RedB GressC YellowD BlueA72.In traffic policing using two token buckets two-rate,when the CIR is set to 1 Mbit/s and thePIR is set to 2 Mbit/s, what is the maximum transmission rate for the traffic in green?A 1 Mbit/sB 2 Mbit/sC 3 Mbit/sD 4 Mbit/sAplex traffic classification can be performed based on which of the following packetinformation?A packet priorityB source and destination addressesC protocol numberD source and destination port numbersABCD74.Assume that there are four flows a.b.c,and d,the transmission rate of each flow is 50Mbit/s,and the total bandwidth of the interface for flow transmission is 100 Mbit/s,In the case of congestion,WFQ is available for flows a,b,c,and d,with the weight proportion being 1:2:3:4,which of the following statement about the interface bandwidth allocated to each flow is true?A Interface bandwidths allocated to flows a,b,c and d are 10 Mbit/s,20 Mbit/s,30 Mbit/s,and 40 Mbit/s respectively.B Interface bandwidths allocated to flows a,b,c and d are 50 Mbit/s, 50 Mbit/s, 0 Mbit/s,and 0 Mbit/s respectively.C Interface bandwidths allocated to flows a,b,c and d are 40 Mbit/s, 30 Mbit/s, 20 Mbit/s,and 10 Mbit/s respectively.D Flows a,b,c and d are discarded.A75.Assume that congestion occurs on the outbound interface,packet A is cached in the PQ,andpacket B is cached in the WFQ,which of the following statement about packet scheduling is true?A Packet A is scheduled first.B Packet B is scheduled first.C Packets A and B are scheduled at the same time.D Packets A and B are discarded.A76.Assume that the following WRED polcies are used in QoS : The length of the queue for savingDSCP packets with the priority being AF21 ranges from 35 to 40. The length of the queue for saving DSCP packets with the priority being AF22 ranges from 30 to 40. The length of the queue for saving DSCP packets with the priority being AF23 ranges from 25 to 40. In the case of congestion,DSCP packets with which of the following priority value will be discarded first?A AF21B AF22C AF23D ALL the sameC77.Which of the following link efficiency mechanism can be used to compress RTP and TCPpacket headers?A IPHCB LFIC PPPD All of the above78.In traffic policing using two token buckets two-rate. The number of tokens in bucket C is TCand the number of tokens in bucket P is TB. When a packet with the length being B enters,which of the following statements are true?A If TP –B >0 and TC – B>0,the packet is marked green.B If TP – B >0 and TC – B<0,the packet is marked yellow.C If TP – B <0 and TC – B<0,the packet is marked red.D If TP – B >0 and TC – B<0,the packet is marked greenABC79.Assume that there are four flows a,b,c,and d, the transmission rate of each flow is 50Mbit/s,and the total bandwidth of the interface for flow transmission is 100 Mbit/s. In the case of congestion, PQ is available for flow a. WFQ is available for flows b,c,and d, with the weight proportion being 1:2:3:4. Which of the following statement about the interface bandwidth allocated to each flow is true?A The interface bandwidth allocated to flow a is 100 Mbit/s.B The interface bandwidth allocated to flow a is 50 Mbit/sC The interface bandwidth allocated to flows b is 10 Mbit/s and interface bandwidthsallocated to flows c and d are 20 Mbit/s each.D The interface bandwidth allocated to flows b is 25 Mbit/s and interface bandwidthsallocated to flows c and d are 12.5 Mbit/s each.BC80.Assume that the WRED policy for packets with the priority of AF21 is that: the length of thequeue for saving packets ranges from 35 to 40. And the discarding percentage is 50%,when a packet with the priority being AF21 arrives,which of the following statements are true?A IF the average length of the queue is smaller than 35,the packet is added to the queue.B IF the length of the queue ranges between 35 and 40,the packet may be discarded with apossibility of 50%.C IF the average length of the queue is greater than 40, the packet is added to the queue.D IF the average length of the queue is greater than 40,the packet is discarded.ABD81.Which of the following statements about the jitter and delay are true?A The end-to-end delay is the sum of transmission delays,processing delays,and queuingdelays along the packet forwarding path.B The variation in packet delay is called jitter.C The jitter depends on the delay. The lower the delay,the less the jitter.D The jitter is independent of the delay.ABC82.Which of the following PHB types are defined in IETF DiffServ?A Default PHB Class-Selector PHBC Expedited Forwarding PHBD Assured Forwarding PHBABCD83.Which of the following statements about differences among GTS. LR and CAR technologiesare true?A in traffic policing, the CAR technology drops packets that do not comply with specificrules.B In traffic policing, the GTS technology caches packets that do not comply with specificrules in the GTS queue.C In traffic policing, the LR technology caches packets that do not comply with specific rulesin the Qos queue.D GTS, LR, and CAR technologies use the token bucket for traffic policing.ABCD84.Which of the following are queue scheduling technologies?A FIFO:First in first outB RR: Round RobinC WRR: Weighted round robinD PQ: Priority QueuingE CQ:Custom QueuingF. WFQ:weighted fair QueuingABCDEF85.Which of the following are disadvantages of the traditional tail drop mechanism?A TCP global synchronizationB TCP starvationC High delay and high jitterD Packet drop is not based on prioritiedABCD86.Which of the following packet drop policies can be applied to the congestion avoidancemechanism?A Tail-dropB REDC WREDD WFQABC87.Which of the following statements about the device state change is correct after failure inthe intermediate link for transmitting VRRP heartbeats?A The status of the master and salve devices remains unchanged.B Both the master and slave devices enter the Master state.C Both the master and slave devices enter the Slave state.D Both the master and slave devices enter the Initial state.B88.Which of the following statements about the VRRP working process is false?A The router with the highest priority is elected as the master router.B The master router sends gratuitous ARP packets to inform connected devices or hosts ofits virtual MAC address.C IF the master router fails,the backup router witth the highest priority is elected as thenew master router.D To ensure fast convergence,a backup router immediately becomes the master router ifthe priority of the backup router is higher than the priority of the master router.D89.Assume that the VRID of a VRRP virtual router is 100 and the virtual IP address of the virtualrouter is 192.168.1.1, which of the following addresses is the virtual MAC address of the virtual router?A 00-00-5E-00-01-64B 00-00-5E-00-01-01C 01-00-5E-00-01-64D 01-00-5E-00-01-01A90.Which of the following addresses is the destination address of VRRP packets?A 224.0.0.18B 224.0.0.19C 224.0.1.18D 224.0.1.19A91.Which of the following numbers is the protocol number of VRRP packets?A 112B 113C 114D 115A92.Which of the following statements about the VRRP authentication is false?A VRRP provides no authentication.B VRRP provides the simple text authentication.C VRRP provides the MD5 authenticationD VRRP provides the pre-shared key authentication.D93.Which of the following statements about VRRP load balancing is false?A Multiple VRRP backup groups can be created routers on an interface of a router.Therouter can serve as the master router in one VRRP backup group and the backup router in other VRRP backup groups.B VRRP local balancing requires that at least two virtual routers transmit services at thesame time.C To implement load local balancing requires that at least two virtual routers transmitservices at the same time.D When configuring priorities,ensure that the same router serves as the master router inthree VRRP backup groups.ABCD94.Which of the following statements about VRRP are true?A VRRP is a redundancy protocol designed for a multicast- or broadcast-capable LAN suchas the Ethernet. VRRP ensures that traffic is switched to another router when the next-hop router for a host on the LAN fails. This guarantees the reliability and non-stop forwarding of services.B In VRRP,a virtual router ID and a virtual IP address need to be configured on a router togenerate a virtual MAC address. A virtual router is formed.C Hosts on a network can communication with a virtual router without knowing anyinformation about physical routers on the network.D A virtual router consists of a master router and several backup routers.The master routerforwards packets. When the master router fails.a backup router takes over as the master router.ABCD95.Which of the following statements about VRRP are true?A VRRP determines the roles of routers (master or backup) in a virtual router based on theirpriorities.B IF a backup router works in non-preemption mode and has a higher priority than themaster router,it will not become the master router unless the master router fails.C After a backup router in preemption mode receives a VRRP packet from the master router.It compares its priority with the priority carried in the VRRP packet.IF its priority is higher than the priority of the master router,it preempts to be the master router: if not,it remains in the backup state.D If two routers competing for the master router have the same priority,the router with ahigher interface IP address becomes the master router.ABCD96.Which of the following statements about the master router in a VRRP backup group are true?A It regularly sends VRRP packets.B It uses a virtual MAC address to respond to ARP requests sent from a virtual IP address.C It forwards an IP packet whose destination MAC address is a virtual MAC address.D It changes to the Backup state if the priority carried in the received packet is greater thanits own priority.ABCD97.Which of the following statements about a backup router in a VRRP backup group are true?A It receives VRRP packets from the master router and determines whether the masterrouter is functioning properly.B It does not respond to the ARP requests sent from a virtual IP address.C It discards an IP packet whose destination MAC address is a virtual MAC addressD It discards an IP packet whose destination IP address is a virtual IP address.。

华为认证培训介绍

华为认证培训介绍

华为认证培训体系发展简介2001年,华为推出认证培训体系。

2003年11月,华为技术有限公司与美国3Com公司在杭州合资成立华为3Com,华为认证培训体系及其相关所有业务由华为3Com培训中心负责,华为认证品牌名称更改为华为3Com认证。

2006年11月,华为以8.82亿美元价格向3Com出售所有剩余49%股权,退出合资公司,从而重新推出专属于华为技术有限公司的华为认证培训体系,并与全球知名的美国Pearson VUE考试公司合作,由后者代理考试服务。

到现在,经过近几年精心发展布局,华为认证培训体系已经成为业界唯一的ICT全技术领域认证体系。

架构介绍针对ICT从业者,基于IP、IT、CT以及ICT融合技术领域,提供了工程师级别、资深工程师级别和专家级别三类技术认证等级,为ICT从业人员提供层次化的培训认证,同时依托华为对行业的深刻理解推出针对运营商、电力、政府及公共事业、金融、能源、交通、企业等体现行业特点的能力提升解决方案。

针对华为渠道合作伙伴,以职业认证为基础,以专业认证为牵引,提供销售专家、售前专家、解决方案专家、售后专家、二次开发专家五类岗位认证,为华为渠道合作伙伴提供完整的能力提升解决方案。

职业认证认证模型包括三层,为满足不同层次人才(从新员工到技术专家)的需要,量身定制了不同的认证。

HCNA工程师级认证:入门级认证,基本上是针对新入职员工或初级工程师,目的是增强职位所需的基础知识和技能。

HCNA系列认证是华为职业认证中用于标识个人能力在某一技术领域达到工程师级别的证明。

HCNP高级工程师级认证:针对高级工程师的中级认证,目的是增强不同技术领域的专业知识和专业技能。

HCNP系列认证是华为职业认证中用于标识个人能力在某一技术领域达到资深工程师级别的证明。

HCIE专家级认证:高级认证,主要针对技术专家,目的是学习复杂技术和增强解决方案的设计能力。

HCIE系列认证是华为职业认证中用于标识个人能力在某一技术领域达到专家级别的证明。

华为hcda认证培训考试知识点与复习教材资料

华为hcda认证培训考试知识点与复习教材资料

华为HCDA认证培训考试知识点与复习教材资料1、一个完整的数据通信系统由报文、发送方、接收方、介质和协议五个部分组成。

2、单工(键盘、显示器)、半双工(对讲机)、全双工(电话网络)3、常见的网络拓扑结构:总线、星型、树型、环型和网型。

4、局域网的特点:距离短、延迟小、数据速率高、传输可靠。

5、局域网的常用网络设备:线缆、网卡、集线器、交换机、路由器、ATM交换机。

6、广域网的分类:综合业务数字网ISDN、数字数据网DDN、X.25分组交换网、帧中继Frame Relay、异步传输模式ATM。

7、广域网的常用设备:Modem、路由器、广域网交换机、接入服务器。

8、标准化组织:国际标准化组织(ISO International Organization for Standardization),电子电器工程师协会(IEEE Institute of Electronics Engineers),美国国家标准局(ANSI American National Standards Institute),电子工业协会(EIA/TIA Electronic Industries Association/Telecomm Industries Association),国际电信联盟(ITU International Telecomm Union),INTERNET工程任务委员会(IETF Internet Engineering Task Force)。

9、一个完整的IP网络分为:骨干网、城域网和接入网(和局域网)。

城域网一般可分为核心层、汇聚层和接入层。

10、常见的Internet接入方式有ADSL接入、以太网接入和专线接入。

11、BGP/MPLS VPN模型由三个部分组成:CE、PE和P。

12、对IP骨干网的要求:高靠性、灵活性和可扩展性、扁平化、QoS合理规划、可运营管理。

13、骨干网的网络结构:平面分层结构、平面+空间分层结构。

华为认证考试流程指导(考生)HCDA

华为认证考试流程指导(考生)HCDA

华为认证考试流程指导目前华为认证的考试流程为:先获得考试券,然后在考点参加上机考试,当场获取成绩单,根据成绩单上的提示三个工作日后在华为网址申请证书,机关收到申请后进行证书制作及邮寄。

全球统一。

1.如何获得考试券?1.1HCDA可直接在考点缴费参加考试;(全球)全国考点查询:/vtclocator-it-search.aspx厂商查询:请选择“其他IT考场”考点查询:选择你所需要的城市HCDP-Carrier IP 考试券找华为购买,具体购买流程请咨询certification@;HCDP-Enterprise IP考试券找华为授权培训中心购买,详情请访问:/cn/training/join/search_training_agency/index.htm (国内)1.2考试券价格:/cn/training/tool-case/exam-fee/index.htm?node= 4&child=2(国内)/en/training/tool-case/exam-fee/index.htm?node= 4&child=2(海外)2.注册考试2.1访问在线注册选择考点预约考试:2.2或者去考点找工作人员帮忙注册,全国考点查询:/vtclocator-it-search.aspx厂商查询:请选择“其他IT考场”考点查询:选择你所需要的城市3.考试形式、时长及通过分数和总分HCDA和HCDP均为上机考试考试时长和分数:/cn/training/training/certification/hw-u_135506.htm 4.申请证书考试后当场获取成绩单,根据成绩单上的提示三个工作日后在华为网址申请证书,中文证书申请网址:/cn/training/training/certificate_apply/index.htm英文证书申请网址:/en/training/training/certificate_apply/index.htm申请过程中遇到问题请联系certification@5.发放证书机关收到证书申请,审核信息后制作并邮寄证书,并将邮寄单号信息发至考生所填写的邮箱。

华为HCNP-R&S-IERN认证考试大纲H12-221 --TOGOGO腾科

华为HCNP-R&S-IERN认证考试大纲H12-221 --TOGOGO腾科

HCNP1.华为H12-221 HCNP-R&S-IERN认证考试本文主要介绍H12-221 HCNP-R&S-IERN考试大纲,其它考试大纲可参考相应的培训教材或通过华为在线培训学习平台获取。

认证项目考试代码考试名称考试时长通过分数/总分HCNP-R&S H12-221 HCNP-R&S-IERN(Huawei Certified NetworkProfessional-Implementing Enterprise RoutingNetwork)90 min 600/10002.H12-221 HCNP-R&S(HCDP)-IERN考试大纲2.1 考试内容HCNP-R&S-IERN考试内容覆盖IPv4地址规划、OSPF、IS-IS、BGP路由协议、路由的控制与选择、组播路由协议;华为路由器产品介绍和组网运用。

2.2 知识点IP基础1.IPv4地址规划:无类别IP地址规划,无类别域间路由OSPF路由协议1.链路状态路由协议基本原理2.OSPF协议基本原理与配置实现:邻居与邻接关系,协议报文与LSA,数据库同步,区域内路由的计算,区域间路由计算,外部路由计算3.OSPF特殊区域原理与配置:Stub区域,Totally Stub区域,NSSA区域4.OSPF基本故障诊断方法IS-IS路由协议1.IS-IS基本原理和配置实现:协议基本概念,邻接关系,数据库同步,路由计算2.IS-IS基本故障诊断方法BGP路由协议1.BGP基本原理:AS,BGP邻居,路由发布方法,路由通告原则2.BGP路径选择3.BGP路由聚合4.BGP路由策略:BGP路由常用属性和路由策略5.BGP反射与联盟基本原理与配置6.BGP多归属7.BGP故障诊断方法路由控制与路由选择1.使用ACL,Route Policy,IP-prefix,AS-PA TH等过滤工具进行路由过滤2.路由协议之间的相互引入,缺省路由的发布3.策略路由组播协议1.IGMPv1/v2/v3,IGMP Snooping基本原理和配置2.PIM-DM,PIM-SM基本原理和配置NE系列路由器1.NE系列路由器硬件结构、工作原理2.NE系列路由器VRP软件特性2.3 参考书籍华为认证资深网络工程师系列教程——HCNP-R&S(HCDP) 《IERN 部署企业级路由网络V ol.Ⅰ》华为认证资深网络工程师系列教程——HCNP-R&S(HCDP) 《IERN 部署企业级路由网络V ol.Ⅱ》华为认证资深网络工程师系列教程——HCNP-R&S(HCDP) 《IERN 部署企业级路由网络实验指导》《VRP 配置指南》《VRP 故障处理》《VRP 特性描述》《华为各路由器产品手册》2.4 推荐培训腾科HCNP-R&S(HCDP)-IERN培训。

华为HCDP

华为HCDP

【HCDP课程认证简介】华为认证网络工程师hcdp课程沈阳世贸人才HCDP是华为认证数据通信资深工程师,提供网络技能中级认证。

主要面向IP网络调测工程师、IP网络运维工程师、IP网络设计工程师以及希望系统深入地掌握路由交换接入以及IP承载网技术的人士。

【HCDP分类】包括BCRN(Building Carrier Routing Network,构建电信级路由网络)、BCAN(Building Carrier Access Network构建电信级接入网络)、BITN(Building IP Telecom Network,构建IP电信网络)三个部分。

【培训目标】HCDP 企业网络路由技术课程目标:在华为路由器上配置各种路由协议,掌握高级路由控制HCDP 企业网络交换技术课程目标:在华为交换机上配置各种交换协议,能熟练对交换机进行排障HCDP 企业网络优化技术课程目标:配置华为防火墙,掌握QOS配置【对应证书】HCDP IERN认证【HCDP-FAST认证课程简介】HCDP-FAST是华为专门针对已有友商相关资质证书的人员开发的快速获得华为认证书的认证。

在认证时只需考一门,通过后即可获得华为HCDP证书【HCDP-FAST适用对象】已获得友商相当水平的认证资质证书的人员。

相关有效证书包括:•思科:CCNP 、CCIE 、H3CSE-Routing&Switching、H3CTE、H3CIE- Routing&Switching、JNCIS、JNCIP、JNCIEHCDP-FAST快速认证培训课程对应证书:HCDP证书课程介绍:本课程主要介绍网络的基本概念以及华为路由器、交换机、防火墙产品的安装和配置.参加HCDP-FAST快速认证的条件:•要想进行HCDP-FAST快速考试认证,学员必须已经获得友商相当水平的认证资质证书的人员。

相关有效证书包括(具有下面任何一个证书就可考试):•思科:CCNP 、CCIE 、 H3CSE-Routing&Switching、H3CTE、H3CIE- Routing&Switching 、JNCIS、JNCIP、JNCIE培训目标:配置华为路由器、交换机、防火墙产品在多协议网络环境中运作,•HCDP-FAST是华为专门针对已有友商相关资质证书的人员开发的快速获得华为认证书的认证。

华为培训认证体系介绍

华为培训认证体系介绍

培训认证体系介绍华为认证是华为凭借多年信息通信技术人才培养经验及对行业发展的深刻理解,基于ICT产业链人才个人职业发展生命周期,以层次化的职业技术认证为指引,搭载华为“云-管-端”融合技术,推出的覆盖IP、IT、CT以及ICT融合技术领域的认证体系;是业界唯一的ICT全技术领域认证体系。

华为认证架构:针对ICT从业者,基于IP、IT、CT以及ICT融合技术领域,提供了工程师级别、资深工程师级别和专家级别三类技术认证等级,为ICT从业人员提供层次化的培训认证,同时依托华为对行业的深刻理解推出针对运营商、电力、政府及公共事业、金融、能源、交通、企业等体现行业特点的能力提升解决方案。

针对华为渠道合作伙伴,以职业认证为基础,以专业认证为牵引,提供销售专家、解决方案专家、售后专家三类岗位认证,为华为渠道合作伙伴提供完整的能力提升解决方案。

华为认证项目:华为认证覆盖路由交换、无线局域网、无线、传送网、安全、统一通信、视讯、云计算、服务器、存储以及ICT融合设计等11个技术领域。

名词介绍:ICT:Information Communication Technology HCNA:Huawei Certified Network Associate HCDA:Huawei Certified Datacom Associate HCNP:Huawei Certified Network Professional HCDP:Huawei Certified Datacom Professional HCIE:Huawei Certified Internetwork Expert HCAr:Huawei Certified Architect1、路由交换领域认证项目1)HCNA(HCDA)认证HCNA(HCDA)认证定位于中小型网络的基本配置和维护。

HCNA(HCDA)认证包括但不限于:网络基础知识,流行网络的基本连接方法,基本的网络建造,基本的网络故障排除,华为路由交换设备的安装和调试。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

HCDP认证考试介绍
HCDP(Huawei Certified Datacom Professional,华为认证数据通信资深工程师)提供网络技能中级认证,主要面向IP网络调测工程师、IP网络维护工程师、IP网络设计工程师以及希望系统深入地掌握路由、交换、网络调整以及优化的人士。

培训目标
HCDP一共3门课,分别是IERN IESN IENP, 完成该项目培训后,学员将能够:
描述OSPF、ISIS、BGP、MP-BGP、IGMP、PIM-SM、PIM-DM的工作原理。

配置基于VRP平台的OSPF、ISIS实现大型路由网络的IP连通性。

配置基于VRP平台的BGP、MP-BGP并采用BGP路由属性和路由策略根据需求在大型企业网络上选择和过滤路由。

描述BGP反射、联盟的作用和基本原理。

描述BGP多归属的基本概念和应用场景。

配置基于VRP平台的IGMP、PIM-SM、PIM-DM实现组播业务。

在大型网络的构建和业务部署中根据性能和业务需求选择合适的华为中高端路由器。

应用各路由协议的故障处理方法针对大型网络中出现的路由类故障进行定位和排除。

描述VLAN、GVRP、QinQ、STP、RSTP、MSTP、工作原理。

配置基于VRP平台的VLAN、GVRP、QinQ、STP、RSTP、MSTP。

描述在交换网络中应用VLAN、GVRP、QinQ等技术实现用户隔离和业务透传。

描述在接入网络中应用STP、RSTP、MSTP避免环路。

描述MPLS、BGP MPLS VPN原理
配置基于VRP平台的BGP MPLS VPN。

配置大型IP网单域BGP MPLS VPN业务并实现私网用户访问Inernet。

选择合适的华为交换机设备构建各种类型的交换接入网络
描述网络安全的基础知识。

描述Eudemon防火墙产品的技术原理及功能特性。

描述HA的基本概念。

描述BFD(Bidirectional Forwarding Detection)原理。

描述IP Reroute、IP FRR、LDP FRR、VPN FRR、TE FRR基本原理。

描述RPR基本原理,NSF, MPLS OAM原理与应用。

描述IP Qos模型,区分服务模型。

描述分类和标记、监管和整形、拥塞管理、拥塞避免、链路效率机制基本原理。

基于类的Qos基本原理。

相关文档
最新文档