GB0-802-MOCK

    17-05-2024

1. Among the following descriptions of the networking and application scenarios of IS-IS and OSPF, which are correct? ______

A. The backbone area of OSPF must be directly connected. Its direct connection can be ensured by using virtual connection.

B. The backbone area of IS-IS consists of all Level-2 and Level-1-2 systems. As there is no virtual connection, they are required to be physically consecutive.

C. The format of IS-IS protocol packets is TLV, which can be easily extended and supports various network protocols, such as IPv6. OSPFv2 protocol packets are based on IP and are too closely combined with IPv4. Therefore, it's difficult to extend the packets for support of IPv6.

D. Although both support large-scale hierarchal networks, OSPF is more widely applied in enterprise-grade networks.

2. Assume that router RTA receives a BGP route 10.10.10.0/24 from an iBGP neighbor, and the route does not carry the AS_PATH attribute. How should RTA process this BGP route?

A. The lack of the AS_PATH attribute indicates that the route was initiated by the local autonomous system. The BGP route is valid.

B. None of the routes learned from iBGP neighbors carry AS_PATH. The route is valid.

C. The iBGP neighbor of RTA has configured a routing policy for the outbound direction to delete AS_PATH. This BGP route is valid.

D. Due to the lack of the AS_PATH attribute, this BGP route is invalid.

3.Among the following descriptions of confederations, which is correct?

A. A fully-meshed iBGP neighbor relationship must be established inside sub-autonomous systems of a confederation, and route reflectors cannot be used.

B. An eBGP neighbor relationship is established between sub-autonomous systems of a confederation, so LP cannot be transmitted across sub-autonomous systems.

C. The ID of a sub-autonomous system of a confederation can be the same as that of the primary autonomous system.

D. All BGP routers inside a confederation need to support the confederation function.

4.Level-2 routes exist ______.

A. between ES and IS

B. between ISs in the same Area

C. between different Areas

D. between different Domains

5. Which of the following addresses is not an IPv4 multicast address?

A. 232.255.255.255

B. 240.0.0.5

C. 239.255.255.255

D. 224.0.0.13

6.The following route is configured on a router:

[MSR]ip route-static 0.0.0.0 0.0.0.0 Serial1/0.

However, after the display ip routing-table command is executed to query the routing table, it is found that this route is not displayed in the routing table. Based on this information, what can be the possible causes? ______ (Select one or multiple options.)

A. The configuration is incorrect. You need to exit to the system view and configure the route, in order for the route to take effect.

B. The configuration is incorrect. For the next hop of the route, you should enter the peer IP address, instead of the interface name S1/0.

C. Interface S1/0 has been shut down.

D. Interface S1/0 has no IP address.

7.The default multicast destination MAC address used by BPDU Tunnel packets is ______. (Select one or multiple options.)

A. 010F-E200-0003

B. 0100-0CCD-CDD0

C. 0100-0CCD-CDD1

D. 0100-0CCD-CDD2

8.Among the following descriptions of the basic concept of MSTP, which are correct? ______

A. An IST is a segment of the CIST in an MST domain. The IST root is the highest-priority bridge in the MST domain.

B. The IST root is the bridge in the IST closest to the CIST root.

C. One MST domain can contain multiple MSTI instances, and different MST domains can contain different MSTI instances.

D. One MSTI instance can be mapped to multiple VLANs, and in different MST domains, the VLAN mappings can be different.

9.A client's LAN switch SWA is connected to switches SWB and SWC in dual uplink mode. Smart Link is used to ensure link reliability. If the MAC address of SWA is 000f-e269-42d1, that of SWB is 000f-e269-42d2, and that of SWC is 000f-e269-42d3, then it can be inferred from the above information that ______.

A. When the line connecting SWA with SWB is faulty, the destination MAC address of Flush packets sent by SWA is 000f-e269-42d1.

B. When the line connecting SWA with SWB is faulty, the destination MAC address of Flush packets sent by SWA is 000f-e269-42d2.

C. When the line connecting SWA with SWB is faulty, the destination MAC address of Flush packets sent by SWA is 000f-e269-42d3.

D. The other answers are incorrect.

10.Two routers RTA and RTB are connected via the LAN to form a VRRP backup group. The IP address of HostA in the LAN is 192.168.0.1, and the gateway MAC address learned by HostA is 0000-5e00-0105. It can be inferred from the above information that ______.

A. The backup group uses the real MAC mode.

B. The backup group uses the virtual MAC mode.

C. The backup group vrid is 4.

D. The backup group vrid is 5.

11.If a device adopts a non-burst token bucket algorithm to measure traffic, assuming that at a certain moment, a packet of 400 bytes arrives, and the token quantity in the CBS token bucket is 300 bytes, then after being evaluated, the packet will be marked as ______.

A. within the committed rate

B. within the peak rate

C. above the committed rate

D. above the peak rate

12.

The following command is configured on an MSR router:
acl basic 2003
rule 0 permit source 192.168.0.0 0.0.0.255
#
traffic classifier 1 operator and
if-match not acl 2003
#
traffic behavior 1
filter deny
#
qos policy 1
classifier 1 behavior 1
#
interface GigabitEthernet0/1
port link-mode route
ip address 192.168.1.1 255.255.255.0
qos apply policy 1 outbound

In this case, when outbound packets from the source addresses of 192.168.2.2 and 192.168.0.2 are forwarded through port G0/1, which of the following statements are correct? ______

A. Packets from the source address of 192.168.0.2 are forwarded normally.

B. Packets from the source address of 192.168.2.2 are forwarded normally.

C. The forwarding of packets from the source address of 192.168.0.2 is blocked.

D. The forwarding of packets from the source address of 192.168.2.2 is blocked.

13.Among the following descriptions of IPSec VPN NAT traversal, which are correct? ______ (Select one or multiple options.)

A. After IPSec VPN enables NAT traversal, only the AH protocol can be adopted.

B. After IPSec VPN enables NAT traversal, only the ESP protocol can be adopted.

C. After IPSec VPN configures NAT traversal and detects the NAT environment, it will adopt UDP packet encapsulation.

D. Port 51 is used for packet encapsulation for IPSec VPN NAT traversal.

E. Port 500 or 4500 is used for packet encapsulation for IPSec VPN NAT traversal.

14.Among the following descriptions of GRE VPN and BGP/MPLS VPN, which is correct? ______

A. They can both separate address spaces.

B. They are both point-to-point tunnels.

C. GRE VPN cannot separate address spaces, and BGP/MPLS VPN can separate address spaces.

D. GRE VPN can provide advanced security such as data encryption, and BGP/MPLS VPN cannot provide such security.

15.In the NTP client and server mode, which of the following NTP verification combinations can be successfully synchronized?

A. Both the NTP client and server enable verification.

B. Neither the NTP client nor server enables verification.

C. The NTP client enables verification, and the server does not enable verification.

D. The NTP client does not enable verification, and the server enables verification.

新华三官网