This page was exported from Actual Test Materials [ http://blog.actualtests4sure.com ] Export date:Fri Nov 15 23:01:34 2024 / +0000 GMT ___________________________________________________ Title: 2022 Actualtests4sure Huawei H31-161 Dumps and Exam Test Engine [Q86-Q110] --------------------------------------------------- 2022 Actualtests4sure Huawei H31-161 Dumps and Exam Test Engine Huawei H31-161 DUMPS WITH REAL EXAM QUESTIONS NEW QUESTION 86On a router, HQoS parameter are configured for the users. The CURP of user 1 is Mbit/s. The CUR and PIRofuser 2 are 0 Mbit/s and 10 Mbit/s, respectively. The CIR and PR of user 3 are 0 Mbit and 20 Mbit/srespectively. These three users join group with a bandwidth of 10 Mbit/s.Which statements is true?  User 2 is of higher priority than user 1  User 1 is of the highest priority among these users  User 3 is of higher priority than user 2  No user can preempt the bandwidth of the other two users NEW QUESTION 87RTA is a provider edge (PE) router. OSPF is deployed between RTA and a customer edge (CE). Which of thefollowing can be used to avoid routing loops when RTA generate an autonomy system-external (ASE)link-state advertisement (LSA) and sends it to the CE?  Configuring the same VPN route tag on the PE  Configuring Shame Link among PEs  Setting DN-bit in the ASE LSA  Configuring the same domain ID on the PE NEW QUESTION 88Which of the following statements about the VPLS packet forwarding are true?  If a PE receives broadcast packets from a local user, the PE forwards the packets to all other interfacesIn the same VSI and all other PEs.  If the destination MAC address of a packet is not a broadcast address and a PE has not learned the MACaddress, the broadcast this packet in one VSI  If the destination MAC address of a packets is not a broadcast address and a PE has not learned theMAC address, the PE broadcast this packet in on VSI.  If a receive broadcast packet sent a remote PE, it forwards the packet only to the AC interface instead ofother PEs. NEW QUESTION 89Which of the following statements about control words in the L2VPN are true?  When SVC VLL is used, if PEs at two ends of a VC use different control words, the may not become Up.  When Martini VLL is used, if PEs at two ends of a virtual connection (VC) use different control words, the VC may not become Up  The control word can be used to identically the packet sequence.  A control word generally has two bytes and can ne extended to four bytes.  The control word can be used for packet padding For example, when the public network uses Ethernet and the AC uses Peer-to-protocol (PPP), control words can be used to transfer and identify PPP packet with a bytes. NEW QUESTION 90As shown in the figure, one enterprise has VPN A, the other has VPN B, and the two VPNs each have two CEs. The following requirements need to be met.VPNA-CE 1 can interwork with VPNA-CE 2. 2>VPNB-CE 1 can interwork with VPNB-CE 2.The figure shows the types of links between CEs and PEs and the VC IDs used in Martini mode.Which of the following VC ID configurations are correct?  VCID1 = 2, VCID2 = 2, VCID3 = 2, VCID4 = 2  VCID1 = 1, VCID2 = 2, VCID3 = 3, VCID4 = 4  VCID1 = 1, VCID2 = 2, VCID3 = 1, VCID4 = 2  VCID1 = 1, VCID2 = 1, VCID3 = 2, VCID4 = 2 NEW QUESTION 91A gold user and a common user access a carrier network through the MPLS Layer 3 VPN. On the entire MPLS network (from PE to PE), the carrier performs queue scheduling for the gold user by trusting the IP priority of the user and for the common user by using the carrier’s own operation policy. Which of the following is the tunnel mode of the MPLS differentiated service for the gold user and common user, respectively?  pipe; short pipe  short pipe; pipe  uniform; pipe  uniform; short pipe NEW QUESTION 92As shown in the figure, the primary tunnel uses the path RTA -> RTB -> RTC. There are two FRR paths: One protects the link between RTA and RTB and the other one protects the link between RTB and RTC.If a path in the primary tunnel is faulty, which command can be used on RTA to locate the fault?  display mpls te tunnel path  display mpls te tunnel-interface  display mpls lsp verbose  display mpls te tunnel verbose NEW QUESTION 93As shown in the figure, CEs connect to users 1 and 2 through accessinterfaces or links.[Quidway-GigabitEthernet1/0/4]portswitch[Quidway-GigabitEthernet1/0/4]port link-type access[Quidway-GigabitEthernet1/0/4]port default vlan 1[Quidway-GigabitEthernet1/0/6]portswitch[Quidway-GigabitEthernet1/0/6]port link-type access[Quidway-GigabitEthernet1/0/6]port default vlan 2[Quidway-GigabitEthernet1/0/3]portswitch[Quidway-GigabitEthernet1/0/3]port link-type trunk[Quidway-GigabitEthernet1/0/3]port trunk permit-pass vlan 1 to 2Users 1 and 2 require different network transmission quality. Which of the following methods are feasible to configure 802.1p priority 1 for packets of user 1 and 802.1p priority 2 for packets of user2?  On a PE, configure Dot1q tunnel interfaces and simple traffic classification (STC) for interfaces on the private network.  On a PE, configure vlan-mapping and STC for interfaces on the private network for users 1 and 2.  On a PE, configure vlan-stacking and STC for interfaces on the private network for users 1 and 2.  On a CE, configure STC for user VLANs on the user access side. NEW QUESTION 94With the SA, which of the following, option is correct?  KE SA is unidirectional  IKE SA is bidirectional  IPSec SA is unidirectional  IPSec SA is bidirectional NEW QUESTION 95Which statements about the edge access layer is true?  Using the packet technology it provides a comprehensive transport platform that boasts high reliability,quality of service (QoS) assurance, and large capacity.  It implement call control. With the software technology as the core, it completes basic real-time callcontrol and connection control.  It connections users to the network by providing various access means, and converts the format ofinformation can be transmitted on the network.  It process additional value-added service and operation support for established callas. NEW QUESTION 96Which statements about the edge access layer is true?  Using the packet technology it provides a comprehensive transport platform that boasts high reliability, quality of service (QoS) assurance, and large capacity.  It implement call control. With the software technology as the core, it completes basic real-time call control and connection control.  It connections users to the network by providing various access means, and converts the format of information can be transmitted on the network.  It process additional value-added service and operation support for established callas. NEW QUESTION 97Exhibit:As shown in the figure, inter-AS VPN Option A is used. CE 1 and CE 2 belong to the same VPNAS 100 and AS 200 run IGP and LDP, respectively.ASBRs communicate with each other through EBGP. the loopback interface address of CE 1 is 10.1.1.1/24 Suppose VPNs configured on the PE and ASBR are both named vpn-1 and CE 2 can ping CE1. Which command can be ruin on ASBR 2 to find out route 10.1.1.1/24?  Display ip routing-table vpn-instance vpn_1  Display ip routing-table  Display bgp vpnv4 all routing-table NEW QUESTION 98On a router, HQoS parameter are configured for the users. The CURP of user 1 is Mbit/s. The CUR and PIR of user 2 are 0 Mbit/s and 10 Mbit/s, respectively. The CIR and PR of user 3 are 0 Mbit and 20 Mbit/s respectively. These three users join group with a bandwidth of 10 Mbit/s.Which statements is true?  User 2 is of higher priority than user 1  User 1 is of the highest priority among these users  User 3 is of higher priority than user 2  No user can preempt the bandwidth of the other two users NEW QUESTION 99According to the inter-AS VPN Option A, which protocol is used to forward traffic between ASBRs?  MPLS  IP  A or B  None of the above NEW QUESTION 100As shown in the figure. CE 1 and CE 3 belong to VPN-A, and CE 2 CE 2 4 belong to VPN-B VPN-target VPN-A is 111:1 and that of VPN-B is 222:2 users on different VPNs are not allowed to access each other. Configuration principles are as follows:On the backbone network VPNs are not connected to a CE, VPN instance need to be configured on the PE, and an interface on the PE for connecting to the CE must be bounded to a VPN instance. After binding an interface to a VPN instance, you must configure the IP address of the interface Between PEs, IS-IS is configured for PE interworking. MPLS basic capabilities and MPLS LDP are configured for MPLS LSP establishment, and MP-IBGP is configured for VPN route exchange.How to enable CE 1 to learn routes from AS 64430?  Import IS-IS 200 routes in IS-IS process 100  Import IS-IS 100 routes in IS-IS process 100  Import BGP routes in IS-IS process 100  Import BGP routes in IS-IS process 200 NEW QUESTION 101Refer to the exhibit.As shown in the figure, RTA, RTB, RTC, and RTD are connected through a switch. From small to large in order of the MAC address, the four routers are arranged as follows:RTB, RTA, RTD, and RTC. The Level-2 DIS priority is set to 100 on RTB and RTD, and IS-IS BFD is enabled on all these routers. When the links of RTB are down, how should IS-IS BFD sessions be set up?  Level 1 and level 2 IS-IS BFD sessions are set up among RTA, RTC, and RTD.  Level 2 IS-IS BFD sessions are set up among RTA, RTC, and RTD, and a level 1 IS-IS BFD session is set up between RTC and RTD.  Level 2 IS-IS BFD sessions are set up between RTD and RTA as well as between RTD and RTC, and a level 1 IS-IS BFD session is set up between RTC and RTD.  Level 1 and level 2 IS-IS BFD sessions are set up only between RTC and RTD NEW QUESTION 102<Quidway>display igmp groupIGMP interface group report information of VPN-Instance: public netEthernet6/1/1(40.1.1.1):Total 1 IGMP Group reportedGroup: 232.0.0.1Uptime: 00:00:22Expires: offLast reporter: 40.1.1.3Last-member-query-counter: 0Last-member-query-timer-expiry: offGroup mode: includeSource list:Source: 20.1.1.56Uptime: 00:00:22Expires: 00:05:08Last-member-query-counter: 3Last-member-query-timer-expiry: 00:00:01Source: 20.1.1.57Uptime: 00:00:22Expires: 00:00:17Last-member-query-counter: 3Last-member-query-timer-expiry: 00:00:01The preceding information shows the entry states in the IGMP interface table on Ethernet 6/1/1.Which statement is true when IGMP sends source/group query messages?  IGMP sends two messages. In one message, the multicast source is 20.1.1.56 and the S flag is not configured. In the other message, the multicast source is 20.1.1.57 and the S flag is set to 1  IGMP sends two messages. In one message, the multicast source is 20.1.1.56 and the S flag is set to 1. In the other message, the multicast source is 20.1.1.57 and the S flag is not configured.  IGMP sends one message in which the multicast sources are 20.1.1.56 and 20.1.1.57 and the S flag is set to 1.  IGMP sends one message in which the multicast sources are 20.1.1.56 and 20.1.1.57 and the S flag is not configured. NEW QUESTION 103Exhibit.As shown in the figure, OSPF process 100 runs on both PEs and CEs, and VPN routers are transmittedbetween PE 1 and PE 2 through PGB CE 1 enables interface address 43.1.1.0/24 in area 0.A route to43.1.10/24. However, does not exist in the routing table of CE 2. What are the possiblecauses?  The VPN route to 43.1.1.0/24 does not exist in the routing table of PE 2.  The LSDB of PE 1 does not have the type 1 LSA generated by CE 1.  The LSDB of PE 12 does not have the type 1 LSA generated by CE 1.  The public network rout to 43.1.1.0/24 does not exist in the routing table of PE2. NEW QUESTION 104Which statement about the interworking between a VPN and the Internet is false?(D)  For a VPN and the Internet to interwork, the user device used to access the Internet must have a route to the desired address on the Internet and a backhaul route.  A VPN and the Internet can interwork through the PE, Internet gateway, or CE.  A VPN and the Internet can interwork through the CE or PE.  For a VPN and the Internet to interwork, network address translation (NAT) must be performed. NAT can be deployed on the interface of a PE used to connect to the Internet gateway, on the interface of a PE used to connect to a CE, or on the interface of a CE used to connect to a PE. NEW QUESTION 105On the BGP network, which of the following policies can be used to prevent BGP-targeted attacks?  Enable the BGP authentication function between BGP peers.  Only packets carrying the loopback IP addresses of service routers can pass through the interface, and all other packets are discarded.  At the outbound interface of a router, filter the TCP packets of a non-service router. The ID of the destination interface is 179 at the loopback IP address of the non-service router.  At the inbound interface of a router, filter the TCP packets of a non-service router. The ID of the destination interface is 179 at the loopback IP address of the non-service router NEW QUESTION 106Refer to the exhibit.As shown in the topology, RTB directly connects to RTC through the POSinterface. To implement the TE function, RTB and RTC are configured as follows:Configuration of RTB:mpls lsr-id 2.2.2.2mplsmpls templs rsvp-templs te cspf#isis 1is-level level-2cost-style compatiblenetwork-entity 00.2222.2222.2222.00traffic-eng level-1-2log-peer-change#interface Pos4/1/0clock masterlink-protocol pppip address 22.33.22.33 255.255.0.0isis enable 1mplsmpls templs rsvp-teConfiguration of RTC:#mpls lsr-id 3.3.3.3mplsmpls templs rsvp-templs te cspf#isis 1is-level level-2cost-style widenetwork-entity 00.3333.3333.3333.00traffic-eng level-1-2log-peer-change# #interface Pos5/1/0link-protocol pppip address 22.33.33.22 255.255.0.0isis enable 1mplsmpls templs rsvp-teWhen a neighbor relationship is set up between RTB and RTC and becomes robust, the following information can be found in the LSDB of RTB.Database information for IS-IS(1)——————————–Level-2 Link State DatabaseLSPID Seq Num Checksum Holdtime Length ATT/P/OL2222.2222.2222.00-00* 0x00007191 0x6689 1190 239 0/0/0SOURCE 2222.2222.2222.00NLPID IPV4AREA ADDR 00INTF ADDR 22.33.22.33NBR ID 3333.3333.3333.00 COST: 10+NBR ID 3333.3333.3333.00 COST: 10IP-Internal 22.33.0.0 255.255.0.0 COST: 10+IP-Extended 22.33.0.0 255.255.0.0 COST: 10Router ID 2.2.2.23333.3333.3333.00-00 0x0000001c 0x14a3 1184 188 0/0/0SOURCE 3333.3333.3333.00NLPID IPV4AREA ADDR 00INTF ADDR 22.33.33.22+NBR ID 2222.2222.2222.00 COST: 10+IP-Extended 22.33.0.0 255.255.0.0 COST: 10Router ID 3.3.3.3Two records are generated for the same NBR ID, as shown in bold fonts. Which statement is true?  The cost-style parameter of RTB is compatible. Therefore, two type-length-values (TLVs) (No.2 TLV and No.22 TLV) are generated locally. The two TLVs are the same in size.  The cost-style parameter of RTB is compatible. Therefore, two TLVs (No.2 TLV and No.22 TLV) are generated locally. No.2 TLV is smaller than No.22 TLV.  The cost-style parameter of RTB is compatible. Therefore, two TLVs (No.2 TLV and No.22 TLV) are generated locally. No.2 TLV is larger than No.22 TLV.  It is an error indicating that the NBR TLV of a neighbor is added twice NEW QUESTION 107The RADIUS or Huawei Terminal Access Controller Access Control System (HWTACACS) protocol can be used for authentication during network access. Which of the following statements about these two protocols are false?  The HWTACACS uses TCP to transmit data while the RADIUS uses UDP to transmit data.  Both the HWTACACS and RADIUS encrypt all data in the packet body.  The RADIUS uses the Triple Data Encryption Standard (3Des) to encrypt passwords and some important data packets. The RADIUS provides a higher level of security than the HWTACACS.  The RADIUS implements authentication and authorization separately to improve security NEW QUESTION 108Refer to the exhibit.As shown in the figure, VPN routes are transmitted between PE 1 andPE 2 through BGP. OSPF process 100 runs on both PEs and CEs. The following BGP route exists on PE 2.[PE 2]display bgp vpnv4 vpn-instance red routing-table 43.1.1.0BGP local router ID: 194.1.1.1Local AS number: 100Paths: 1 available, 1 bestBGP routing table entry information of 43.1.1.0/24:Label information (Received/Applied): 15362/NULLFrom: 1.1.1.1 (192.2.1.1)Relay Nexthop: 0.0.0.0Original nexthop: 1.1.1.1Ext-Community: RT <100: 1>, <555: 0>, <0.0.0.0: 256>, <111.1.1.1: 0>Convergence Priority: 0AS-path Nil, origin incomplete, MED 7, localpref 100, pref-val 0, valid, intern al, best, pre 255 Not advertised to any peer yet If the domain ID configured on PE 2 is 555, which statement is true?  The domain ID in the BGP route is the same as that configured on PE 2 and the route type is specified by a Type 1 LSA. Therefore, PE 2 needs to generate a Type 1 LSA and send it to CE 2.  The domain ID in the BGP route is the same as that configured on PE 2 and the route type is specified by a Type 1 LSA. Therefore, PE 2 needs to generate a Type 3 LSA and send it to CE 2.  The domain ID in the BGP route is the same as that configured on PE 2 and the route type is specified by a Type 1 LSA. Therefore, PE 2 needs to generate a Type 5 LSA and send it to CE 2.  The domain ID in the BGP route is different from that configured on PE 2 and the route type is specified by a Type 1 LSA. Therefore, PE 2 needs to generate a Type 5 LSA and send it to CE 2. NEW QUESTION 1091.Onthe backbone network , if a PE is connect to a CE, VPN instances need to breconfiguredon the PE, andinterface on the PE for connecting to the CE must be bound to a VPN instance. After binding an interface to aVPN instance, you must configure the IP address of the interface between PEs, IS-IS configured for PEinterworking. PLSA basic capabilities and MPLS LSP are configured for LSP establishment, and MP _IBGPis configured for VPN route exchange VPN routesexchange , LDAP is short for Label Distribution Protocol,and IBGP is short for interior Border gateway protocol.2. A CE exchange route exchange routers with a PE over External Border gateway Protocol (EBGP.Configure interior gateway protocol (IGP) on the IS-IS+MPLS backbone networking toachievetheinterworking between PEs and IP routers.  -4  -3  -2  -5  -1 NEW QUESTION 110Which of the followingstatementsabout the merits of the HoVPN networking are true?  If the UPE are SPE are separated by an IP/IPMLS network, they can be connected through a genericrouting encapsulation (GRE) or LSP runnel . A hierarchical MPLS VPN provides good scalability.  The SPE and UP exchange routes and advertise labels through MP-BGP. Each UPE runs only one –BGP peer, reducing system overheads and simplifying configuration.  The BGP/MPLS VPN can be deployed layers by layer. When the performance of a super strum provideredge (SPE) is insufficient, a user-end provider edge (UPE) can be added and the SPE moved to a lowerlayer. When the access capability of a UPE is insufficient, and SPE can be added.  Packets are forwarded between a UPE and an SPE after being label. The UPE and SPE are connectedthrough an interface (or a subinterface), helping reduce the usage of limited interface resources.  Only local VPN routes need to be maintained on an SPE and remote routes on the SPE are representedby a default route or an aggregate route, reducing the load of the SPE.  Loading … Huawei H31-161 Exam Syllabus Topics: TopicDetailsTopic 1MPLS VPN features, SR and EVPN features Network and technology evolution directionTopic 2Demonstrate the systematic understanding and good command of the in-depth principles Plan network and technology evolutionTopic 3High reliability technologies, QoS technologies Typical MAN and backbone networks of carriersTopic 4BRAS user access, IP MAN, IP backbone network, and mobile bearer network architecture MPLS TE features, multicast advanced featuresTopic 5Capability of independently maintaining typical network of carriers Maintain large-scale IP networks   2022 New Actualtests4sure H31-161 PDF Recently Updated Questions: https://www.actualtests4sure.com/H31-161-test-questions.html --------------------------------------------------- Images: https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif https://blog.actualtests4sure.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-05-09 02:36:06 Post date GMT: 2022-05-09 02:36:06 Post modified date: 2022-05-09 02:36:06 Post modified date GMT: 2022-05-09 02:36:06