You are on page 1of 243

TestInside GB0-183

HuaWei GB0-183
HuaWei-3Com Certificated Network Engineer
Q&A v 3.2








English: www.TestInside.com
BIG5: www.Testinside.net
GB: www.Testinside.cn


Test I nsi de,hel p you pass any I T ex am!

TestInside GB0-183
1. Frame Relay adopts ( ) as the switching method.
A.Routing
B.Circuit switching
C.Fast switching
D.Packet switching
Answer: d


2. A network protocol is a set of rules and conventions that prescribe how network devices inter-communicate.
The communication parties shall understand and abide the protocol. ( )
T.True
F.False
Answer: t


3. Which layer of the OSI reference model implements encryption. ( )
A.Physical layer
B.Transport layer
C.Session layer
D.Presentation layer
Answer: d


4. Both the transport layer and the data link layer perform error check. ( )
T.True
F.False
Answer: t


5. Common routing protocols are ( ).
A.IPX
TestInside GB0-183
B.OSPF
C.RIP
D.IP
Answer: bc


6. To test the gateways that a packet will pass through from the source host to the destination, use the command ( )
in the H3C COMWARE command line.
A.ping
B.tracert
C.show path
D.display path
Answer: b


7. What algorithm is adopted in PPP CHAP authentication? ( )
A.MD5
B.DES
C.RSA
D.SHA
Answer: a


8. Two routers are in back-to-back connection with the following configuration. Can they communicate with each
other? ( )
[Router1] display current-configuration
#
sysname Router1
#
FTP server enable
#
TestInside GB0-183
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode chap
ppp chap user h3c
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
TestInside GB0-183
#
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple 3com
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp authentication-mode chap
ppp chap user h3c
TestInside GB0-183
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b


9. If the user data exceeds the Bc (committed burst ) in a frame relay network, the exceeding data will be dropped.
( )
T.True
F.False
Answer: f


10. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
TestInside GB0-183
#
l2tp domain suffix-separator @
#
fr switching
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
#
interface Serial0/0.1 p2p
fr dlci 20
ip address 10.0.0.1 255.255.255.0
TestInside GB0-183
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
TestInside GB0-183
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
#
interface Serial0/0.1 p2p
fr dlci 20
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


11. The command to save the current configuration on the H3C router COMWARE 3.4 is ( ).
A.write
TestInside GB0-183
B.save
C.copy
D.reset
Answer: b


12. The H3C AR routers can be upgraded in different ways. Which of the following is not supported? ( )
A.Xmodem
B.FTP
C.TFTP
D.HGMP
Answer: d


13. Which of the following is right about OSPF? ( )
A.It is fast in convergence.
B.It is loop-free, and supports variable-length subnet mask.
C.It supports equal-cost multipath and area division.
D.It supports authentication, and the protocol packets sending with multicast.
Answer: abcd


14. RIP adopts ( ) as the transport protocol with the port number 520.
A.TCP
B.UDP
C.IP
D.PPP
Answer: b


15. The types of ACLs are identified with numbers. The range 4000-4999 refers to the ( ).
TestInside GB0-183
A.Interface-based ACL
B.Basic ACL
C.Advanced ACL
D.MAC-based ACL
Answer: d


16. The TFTP port number is ( ).
A.TCP port 68
B.UDP port 68
C.TCP port 69
D.UDP port 69
Answer: d


17. DCC can carry IP or IPX independently, or carry them at the same time. ( )
T.True
F.False
Answer: t


18. Which of the following is a correct description of IP address? ( )
A.Each IP address contains the network address and the host address.
B.The minimum IPv4 address is 0.0.0.0, and the maximum is 255.255.255.255.
C.32-bit binary address is used.
D.The IP address mask and the IP address perform Boolean AND operation. The bits with the result value 0 are
the host bits.
Answer: abc


19. Which of the following is a correct description of subnet mask? ( )
TestInside GB0-183
A.There are two ways to express the subnet mask. One of them uses mask length.
B.It decides which part of the IP address identifies the network, and which part identifies the host.
C.The address mask of Class A addresses is 255.255.0.0.
D.None of the above is right.
Answer: ab


20. Which of the following is an application layer protocol that uses port number 25? ( )
A.FTP
B.TFTP
C.Telnet
D.SMTP
Answer: d


21. In case of congestion on the intermediate equipment, TCP can use the sliding window technology for flow
control. ( )
T.True
F.False
Answer: f


22. Which of the following can be contained in ISDN functional group? ( )
A.Network termination 1 (NT1)
B.Network termination 2 (NT2)
C.Terminal equipment type 1 (TE1)
D.Terminal equipment type 2 (TE2)
E.Terminal adaptor (TA)
Answer: abcde


TestInside GB0-183
23. By default, the delay to switch from using the active interface to using the standby interface is ( ) seconds.
A.0
B.10
C.30
D.A polling period
Answer: a


24. Configure on the router with command standby threshold 50 20. If the bandwidth of the link is 100Mbps, and
the traffic on the active interface is 80Mbps, the system will ( ).
A.Enable the backup interface with higher priority
B.Not enable the backup interface
C.Shutdown the backup interface
D.Shutdown the backup interface permanently
Answer: a


25. Which of the following is right? ( )
A.The IP address whose network address bits are all ones is a broadcast address.
B.The IP address whose network address bits are all zeros means the whole network.
C.The IP address whose network address is 127 is a loopback address.
D.The IP address whose host address bits are all ones means the whole network.
Answer: c


26. LAN consist of ( ).
A.Ethernet
B.Token ring
C.Token bus
D.FDDI
Answer: abcd
TestInside GB0-183


27. CE1 can be divided into 31 logical channels of 64Kbps, with one channel used for synchronization and the
other 30 used for data transmission. ( )
T.True
F.False
Answer: f


28. The length of 802.3 frame varies from 64 bytes to 1518 bytes. In case of 64 bytes, the length of user data is ( ).
A.46 bytes
B.46 bits
C.2408 bits
D.512 bits
Answer: a


29. Xerox Ethernet is very successful. Xerox drafts a 100 Mbps Ethernet standard together with DEC and Intel.
This standard is called DIX, which is the basis of IEEE802.3. ( )
T.True
F.False
Answer: f


30. Which of the following is right about STP? ( )
A.STP is defined in IEEE 802.1D.
B.STP eliminates possible loops through blocking redundant links in the network.
C.The STP algorithm is implemented between STP bridges through transmitting a special message (BPDU).
D.In case of active link failures, STP can resume the blocked redundant link to ensure uninterrupted service.
Answer: abcd

TestInside GB0-183

31. The typical logical topology of Ethernet is ( )
A.Star
B.Bus
C.Ring
D.Mesh
Answer: b


32. The main function of a network is to ( )
A.Expand storage capacity
B.Improve calculation speed
C.Transmit files
D.Share resources
Answer: d


33. The dominating standard of LAN is ( ).
A.IEEE 802.1X
B.IEEE 802.1Q
C.IEEE 802.X
D.TCP/IP
Answer: c


34. The rudiment of todays Internet is ( )
A.IBM SNA
B.TELENET
C.ARPANET
D.CYBERNET
Answer: c
TestInside GB0-183


35. ( ) puts forward the OSI reference model.
A.IEEE
B.ISO
C.ANSI
D.IETF
Answer: b


36. Which of the following functions can a computer network provide? ( )
A.Resource sharing
B.Information transmission and centralized processing
C.Load balancing and distributed processing
D.Integrated information services
Answer: abcd


37. Common cables for LANs include ( ).
A.Optical fiber
B.Twisted-pair cable
C.V.35 cable
D.Coaxial cable
Answer: abd


38. The main parameters of a network interface card include ( ).
A.Bandwidth
B.Delay
C.Bus mode
D.Electrical interface mode
TestInside GB0-183
Answer: acd


39. What functions can an Ethernet switch provide? ( )
A.Data filtering
B.Network segmentation
C.Broadcast control
D.Access control
Answer: abcd


40. A WAN can adopt ( ) as the switching technology.
A.Circuit switching
B.Storage switching
C.Packet switching
D.Fast switching
Answer: ac


41. Common network topologies include ( ).
A.Bus
B.Star
C.Tree
D.Ring
E.Full-mesh
Answer: abcde


42. Two main parameters for network performance evaluation are ( ).
A.Scope
B.Bandwidth
TestInside GB0-183
C.Delivery protocols
D.Delay
Answer: bd


43. Network delay includes ( )
A.Transmission delay
B.Media access delay
C.Exchange delay
D.Queue delay
Answer: abcd


44. Which of the following describes WAN correctly? ( )
A.It runs over a wide geographic area.
B.The network control shall comply with public service rules.
C.Normally access through low-speed serial links is adopted.
D.It provides full-time or part-time connections.
Answer: abcd


45. Modems can work in synchronous or asynchronous mode, which are connected to the synchronous or
asynchronous serial port of a router. Which of the following WAN connections can a synchronous modem be used
in? ( )
A.Lease line
B.Frame Relay
C.PSTN
D.X.25
Answer: abd


TestInside GB0-183
46. Which of the following is the WAN technology? ( )
A.ISDN
B.WLAN
C.PSTN
D.ATM
Answer: acd


47. Which description is wrong about Frame Relay? ( )
A.It is developed on the basis of X.25.
B.It allows certain burst traffic for users in data transmission.
C.It adopts point-to-point topology.
D.Its rate ranges from 256 Kbps to 2.048 Mbps.
Answer: cd


48. A device can communicate with other network devices even if it does not support TCP/IP. ( )
T.True
F.False
Answer: t


49. The leading LAN standard is put forward by the International Organization for Standardization (ISO). ( )
T.True
F.False
Answer: f


50. Routers are used for network interconnection. They provide addressing and packet forwarding for different
networks. ( )
T.True
TestInside GB0-183
F.False
Answer: t


51. The two channels of ISDN BRI can not work for two applications independently. ( )
T.True
F.False
Answer: f


52. The features of LAN are ( ).
A.Short distance
B.Low delay
C.High speed
D.Provision of data communication services in a wide area
Answer: abc


53. Which of the following is a standard for the Wireless LAN (WLAN) ? ( )
A.802.3
B.802.4
C.802.5
D.802.11
Answer: d


54. Computer network is to interconnect computers and special peripheral equipment that are distributed in
different geographic areas through communication links to form a big and powerful network system, so that a
great number of computers can transmit information and share resources conveniently. ( )
T.True
F.False
TestInside GB0-183
Answer: t


55. Computer networks originated in 1970s. The concept of network at that time was host-based low-rate serial
connections, and the network provided remote program execution, remote printing and data services. ( )
T.True
F.False
Answer: f


56. Generally, computer networks fall into Ethernet and LAN according to the geographic coverage. ( )
T.True
F.False
Answer: f


57. LAN is used in limited geographic area. Access of high-bandwidth medium is not allowed in LAN. ( )
T.True
F.False
Answer: f


58. LAN features in short distance, low delay, high rate, and unreliable data transmission. ( )
T.True
F.False
Answer: f


59. For a hub, the average data volume and rate per user (port) is limited by the total number of active users
(ports). ( )
T.True
TestInside GB0-183
F.False
Answer: t


60. The WAN connects LANs that are far away from each other, therefore, its architecture falls into the end
system (a set of users at both ends) and the communication system (intermediate links). ( )
T.True
F.False
Answer: t


61. Routers forward data between segments of WAN and between LANs, but they do not participate in route
generation. ( )
T.True
F.False
Answer: f


62. Network topology is a logic architecture, and it has no strict relationship with physical connections of the
equipments. ( )
T.True
F.False
Answer: t


63. Adopting circuit switching, the PSTN must allocate a specialized voice channel for each call. Messages are
transmitted in the form of digits over the PSTN. ( )
T.True
F.False
Answer: f

TestInside GB0-183

64. Packet switching of WAN adopts store-and-forward switching. It divides the information to be transmitted into
packets of fixed length or variable length, and then stores and forwards in the unit of packet. ( )
T.True
F.False
Answer: t


65. Adopted in the cell switching network, the Asynchronous Transfer Mode (ATM) features in high-rate, low
delay and ensured transmission quality. ( )
T.True
F.False
Answer: t


66. Star topology networks are convenient to install, and easy to design, maintain and change. In addition, it is
easy to diagnose failures. Therefore, star topology is widely used in LANs.
T.True
F.False
Answer: t


67. The main functions of the physical layer includes ( ).
A.Defining physical addresses
B.Establishing end-to-end connections
C.Transmitting bit stream between terminal equipment with voltage, interfaces, cable specifications, and transport
distance defined
D.Transmitting data from one end to another
Answer: c


TestInside GB0-183
68. Which of the following is a device for the data link layer? ( )
A.WAN switch
B.Router
C.Repeater
D.Gateway
Answer: a


69. Headers are added to the packets at the data link layer to form ( ). Then, they are transmitted to the physical
layer, and the bit stream is transmitted on the physical layer.
A.Frames
B.Cells
C.Packets
D.Fragments
Answer: a


70. Bridges work in the ( ) layer of the OSI reference model.
A.1st
B.2nd
C.3rd
D.4th
Answer: b


71. A host communicates with the other hosts in the local area network through ( ) at the data link layer.
A.Port number
B.Hardware address
C.Default gateway
D.Logic network address
Answer: b
TestInside GB0-183


72. IP corresponds to the ( ) layer of the OSI reference model.
A.5th
B.3rd
C.2nd
D.1st
Answer: b


73. The main function of the network layer of the OSI reference model is to ( ).
A.Transmit the original bit stream over the channel
B.Ensure the correctness of information fragments
C.Decide how to route from the source to the destination
D.Strengthen bit stream transmission at the physical layer and perform flow control
Answer: c


74. Data fragmentation is performed at the ( ) of the OSI reference model.
A.Physical layer
B.Network layer
C.Transport layer
D.Access layer
Answer: c


75. When the data unit is in the network layer, we call it ( )
A.Fragment
B.Packet
C.Bit
D.Frame
TestInside GB0-183
Answer: b


76. The ( ) of the OSI reference model provides end-to-end reliable data transmission and flow control.
A.Presentation layer
B.Network layer
C.Transport layer
D.Session layer
Answer: c


77. Which of the following is a TCP-based application? ( )
A.PING
B.TFTP
C.TELNET
D.OSPF
Answer: c


78. TCP, UDP and SPX are protocols of the ( ) layer of the OSI reference model.
A.Network
B.Transport
C.Session
D.Presentation
Answer: b


79. Which of the following is not a function of the transport layer? ( )
A.Maintenance of virtual connection
B.Error check
C.Flow control
TestInside GB0-183
D.Route selection
Answer: d


80. The DNS works at the ( ).
A.Network layer
B.Transport layer
C.Session layer
D.Application layer
Answer: d


81. The SNMP works at the ( ).
A.Network layer
B.Application layer
C.Session layer
D.Presentation layer
Answer: b


82. Layer-3 switches are devices working at the ( ).
A.Network layer
B.Transport layer
C.Session layer
D.Data link layer
Answer: a


83. In internetworking and computer network engineering, the RFCs is the documents published by ( ).
A.ISO
B.IETF
TestInside GB0-183
C.ITU
D.IEEE
Answer: b


84. OSI stands for ( ).
A.Organization for Standards Institute
B.Organization for Internet Standards
C.Open Standards Institute
D.Open Systems Interconnection
Answer: d


85. What layers does the OSI reference model have from the top to the bottom?( )
A.Application layer, transport layer, network layer, and physical layer
B.Application layer, presentation layer, session layer, network layer, transport layer, data link layer, and physical
layer
C.Application layer, presentation layer, session layer, transport layer, network layer, data link layer, and physical
layer
D.Application layer, session layer, transport layer, and physical layer
Answer: c


86. The correct process for data encapsulation is ( ).
A.data fragment ->packet ->frame ->bit stream ->data
B.bit stream ->data fragment ->packet ->frame ->data
C.data ->packet ->data fragment ->frame ->bit stream
D.data ->data fragment ->packet ->frame ->bit stream
Answer: d


TestInside GB0-183
87. Which of the following is a correct description of CSMA/CD network? ( )
A.All the data sent by one node can be detected by every other node.
B.The data of a node is sent to the closest router, which will forward it to the destination.
C.If the source node knows the destination IP and MAC addresses, signals are directly sent to the destination.
D.The data of any node must go through the whole network, and each node receives and checks the data.
Answer: ad


88. A V.24 interface works in the asynchronous mode, supports data link layer protocols PPP and SLIP, network
layer protocols IP and IPX, with the transmission rate up to 115200 bps.
T.True
F.False
Answer: t


89. A V.24 interface works in the synchronous mode, supports data link layer protocols X.25, PPP, HDLC and
LAPB, network layer protocols IP and IPX, with the transmission rate up to 115200 bps.
T.True
F.False
Answer: f


90. The transmission rate of V.35 cable (in the synchronous mode) is up to 2048000 bps.
T.True
F.False
Answer: t


91. V.24 is an interface standard between the DTE and DCE that is defined by the ITU-T. ( )
T.True
F.False
TestInside GB0-183
Answer: t


92. EIA/TIA-232, also known as RS-232, is a public physical layer standard. It is used to support unbalanced
circuits with the rate up to 64 kbps. ( )
T.True
F.False
Answer: t


93. To connect two routers through Ethernet interfaces, straight-through cable should be used between the routers.
( )
T.True
F.False
Answer: f


94. The session layer is used for virtual link establishment, error check, duplex negotiations and session
synchronization. ( )
T.True
F.False
Answer: f


95. Multiple application programs can share one link, which is called multiplexing. ( )
T.True
F.False
Answer: t


96. Between the network layer and the LLC sub-layer, Media Access Control (MAC) sub-layer is the management
TestInside GB0-183
layer of the upper layer and the lower layer.
T.True
F.False
Answer: f


97. Transport layer protocols consist of protocols such as TCP, UDP and SPX. UDP and SPX provide unreliable
and connectionless services.
T.True
F.False
Answer: f


98. There are three methods for flow control. They are buffer technology, source quench message, and window
mechanism. The window mechanism adopts positive acknowledgement, therefore, it is reliable. ( )
T.True
F.False
Answer: t


99. Flow control mechanism is implemented at the data link layer. ( )
T.True
F.False
Answer: f


100. Encapsulation means that the network node packets the data to be transmitted with a specific protocol header
before transmission, sometimes it will add some information at the tail of the data unit. ( )
T.True
F.False
Answer: t
TestInside GB0-183


101. Non-shielded twisted-pair cable provides enhanced anti-interference capability, and further transmission
distance than shielded twisted-pair cable.
T.True
F.False
Answer: f


102. Connection-orientated services are reliable packet services, and incur less data loss. ( )
T.True
F.False
Answer: t


103. Connection-orientated services are modeled on the postal system, with each packet carrying a complete
destination address. In addition, each packet is independent of other packets, and is transmitted via the selected
route. ( )
T.True
F.False
Answer: f


104. Which of the following is a network layer protocol? ( )
A.IP
B.ARP
C.ICMP
D.RARP
Answer: abcd


TestInside GB0-183
105. Which of the following is a common cable standard for the Ethernet? ( )
A.10BASE-T
B.100BASE-T
C.100BASE-TX
D.1000BASE-TX
E.10BASE-TX
Answer: abc


106. Which of the following is DTE of the WAN? ( )
A.WAN switch
B.MODEM
C.Terminal host
D.Router
Answer: cd


107. Which of the following is common DCE of WAN? ( )
A.CSU/DSU
B.Router
C.WAN switch
D.MODEM
Answer: acd


108. Which of the following is a correct description of Ethernet MAC address? ( )
A.The MAC address of the equipment is globally unique.
B.The MAC address is composed of 56 binary digits, and we generally use the hex to express it.
C.The preceding six hex digits are allocated by the IEEE, and the subsequent six hex digits are assigned by the
producer.
D.If a computer is configured with two network interface cards, it will have two MAC addresses.
TestInside GB0-183
Answer: acd


109. Which of the following is a correct description about the data link layer of the WAN? ( )
A.Common data link layer protocols of the WAN includes HDLC, PPP, X.25 and frame relay.
B.PPP is the default data link layer encapsulation protocol on the serial port of H3C routers.
C.X.25 accelerate the forwarding rate through the error check mechanism, therefore, it is more efficient than
frame relay.
D.The WAN switch is a common data link layer equipment in the WAN.
Answer: abd


110. Common routed protocols are ( ).
A.IPX
B.OSPF
C.RIP
D.IP
Answer: ad


111. The transport layer functions to ( ).
A.Fragment the data from the application layer to the network layer
B.Setup end-to-end connections, mainly logical connections for data stream transmission
C.Send data fragments from one host to another
D.Some transport layer protocols ensure the correctness of data, such as TCP.
Answer: abcd


112. Common session layer protocols are ( )
A.Structured Query Language (SQL)
B.Network File System (NFS)
TestInside GB0-183
C.Remote Procedure Call (RPC)
D.America Standard Code for International Interchange (ASCII)
Answer: abc


113. Common Presentation layer protocols are ( ).
A.J PEG
B.GIF
C.MPEG
D.MIDI
Answer: abcd


114. Protocol Data Units (PDUs) contained in the OSI reference model include ( ).
A.APDUs
B.BPDUs
C.PPDUs
D.SPDUs
Answer: acd


115. Which of the following is a WAN interface? ( )
A.X.21 interface
B.RS-232 interface
C.V.24 interface
D.V.35 interface
Answer: abcd


116. Which of the following is included in the connection-orientated service? ( )
A.Connection establishment
TestInside GB0-183
B.Data transmission
C.Connection termination
D.Dynamic allocation of resources
Answer: abc


117. The data link layer functions to ( ).
A.Carry the packets of the network layer
B.Manage network topology
C.Check errors
D.Control flows
Answer: abcd


118. What features are defined in the physical layer? ( )
A.Error control in bit steam transmission
B.Mechanical feature
C.Electrical feature
D.Functional feature
Answer: bcd


119. Which of the following is right about the H3C router? ( )
A.The software platform of the H3C router is VSP.
B.The configuration of the H3C router can be implemented through the console interface only.
C.The console interface of the H3C router is RJ 45.
D.The default baudrate of console interface is 9600 bps.
Answer: cd


120. To configure the H3C router using the HyperTerminal application on Windows system, flow control must be
TestInside GB0-183
enabled on the HyperTerminal. ( )
T.True
F.False
Answer: f


121. To clear the configuration of a router, use the ( ) command.
A.reset history-command
B.reset saved-configuration
C.reset current-configuration
D.erase saved-configuration
Answer: b


122. To view the configuration of a H3C router, use the ( ) command.
A.show running-configuration
B.show current-configuration
C.display current-configuration
D.display configuration
Answer: c


123. To enter the system view from user view on a H3C router, use the ( ) command.
A.super
B.system-view
C.system view
D.enable
Answer: b


124. To get all commands and their descriptions in a command view, key in ( ) :
TestInside GB0-183
A.?
B.!
C./
D.\
Answer: a


125. To stop the current command line execution on a H3C router, press ( ).
A.Ctrl+C
B.Ctrl+D
C.Ctrl+N
D.Ctrl+X
Answer: a


126. To check the connectivity of the network, use the command ( ) in the H3C COMWARE command line.
A.ping
B.display ip routing-table
C.show path
D.display path
Answer: a


127. To upgrade a H3C router through TFTP, which of the following statement is true? ( )
A.Upgrade through TFTP can be implemented via the console interface.
B.Only the router can act as the TFTP server.
C.Username and password need to be configured.
D.Upgrade through TFTP is faster than upgrade through Xmodem.
Answer: d


TestInside GB0-183
128. When the NET method is chosen in BOOTROM menu to upgrade an H3C router, the transport protocol is
actually FTP.
T.True
F.False
Answer: f


129. In COMWARE3.4 of H3C router, show history-command can display history commands. ( )
T.True
F.False
Answer: f


130. In COMWARE3.4 of H3C router, run no shutdown can resume the port that has been shut down. ( )
T.True
F.False
Answer: f


131. On a H3C router, what short-cut keys can be used to complete a command?( )
A.Tab
B.?
C.Enter
D.Ctrl+C
Answer: a


132. The default encapsulation protocol on the WAN interface of a H3C router is ( ).
A.HDLC
B.X.25
C.PPP
TestInside GB0-183
D.Frame Relay
Answer: c


133. Which of the following statements is wrong about HDLC? ( )
A.HDLC runs on synchronous serial links.
B.HDLC is a character-orientated data link layer protocol, and the transmitted data must be in the defined
character set.
C.The length of the HDLC address field is one byte.
D.A single HDLC link can only carry a single network layer protocol.
Answer: b


134. Which of the following is right about PPP? ( )
A.PPP is an NCP protocol.
B.PPP can only work on synchronous serial links.
C.PPP and HDLC are both WAN protocols.
D.PPP is a layer-3 protocol.
Answer: c


135. After the LCP negotiation status turns into OPENED, what phase will PPP enter? ( )
A.KeepAlive
B.Network
C.Authenticate
D.Establish
Answer: bc


136. What phases are included in PPP negotiation? ( )
A.Dead
TestInside GB0-183
B.Initial
C.Establish
D.Authenticate
E.KeepAlive
F.Network
G.Terminate
Answer: acdfg


137. There is a/an ( ) handshake in the CHAP authentication of PPP.
A.one-way
B.two-way
C.three-way
D.four-way
Answer: c


138. Which is a wrong statement about CHAP authentication? ( )
A.The authenticating party sends the first authentication packet.
B.The authenticated party sends the first authentication packet.
C.The password will be transmitted during the authentication.
D.No password will be transmitted during the authentication.
Answer: bc


139. Which statement is wrong about Multilink PPP?
A.MP is negotiated in the NCP phase.
B.No authentication can be performed in MP negotiation.
C.PPP channels of different endpoint discriminators can be bound together.
D.MP binding only requires the same username of each PPP channel.
Answer: abcd
TestInside GB0-183


140. In case of PPP PAP authentication failures, which of the following will occur? ( )
A.LCP is up, and NCP is down.
B.LCP is down, and NCP is down.
C.IP can be set up.
D.Both LCP and NCP can be up.
Answer: b


141. Which of the following statements is right about MP? ( )
A.MP does not allow packet fragmentation.
B.Parameters for MP negotiation include MRRU, SSNHF, endpoint discriminator and username.
C.Generally, MP-group binding is recommended.
D.The more MP bindings there are, the better it is.
Answer: c


142. Which of the following statements is true? ( )
A.PAP does not provide as much security as CHAP. Therefore, PAP shall not be used.
B.PPP links will be disconnected after being idle for a certain time.
C.PPP consists of MAC protocol, LCP protocol and NCP protocol.
D.PPP is a data link layer protocol, which provides point-to-point data link layer encapsulation.
Answer: d


143. The status of a PPP link shows:
Serial 1/0 current state : Administratively DOWN
Line protocol current state : DOWN
This means ( ).
A.The physical link has some problem.
TestInside GB0-183
B.The interface was shutdown by the administrator.
C.The parameters are configured incorrectly.
D.Rebooting the router can solve the problem.
Answer: b


144. PPP CHAP/PAP authentication occurs before LCP negotiation. ( )
T.True
F.False
Answer: f


145. Which of the following statement is right about MP? ( )
A.In the MP mode, the MP parameters are negotiated at the NCP phase, instead of the LCP phase.
B.The endpoint discriminator uniquely identifies a network entity. Therefore, the PPP channels in one MP binding
shall not have same endpoint discriminator.
C.A MP link has a DTE party and a DCE party.
D.The MP link allows packet fragmentation. The fragments will be sent to the same destination over multiple
point-to-point links.
Answer: d


146. The encryption algorithm of CHAP authentication is very secure. Therefore, the username and password can
be transmitted over the network.
T.True
F.False
Answer: f


147. MP can be bound to the virtual-template interface only.
T.True
TestInside GB0-183
F.False
Answer: f


148. For CHAP authentication, the authenticating party needs to know the username of itself and that of the
authenticated party, while the authenticated party does not need to know the username of the authenticating party.
T.True
F.False
Answer: t


149. Which of the following is wrong about PAP and CHAP? ( )
A.The authenticating party in CHAP authentication sends a random string to the authenticated party, attaching its
host name at the same time.
B.The authenticated party in PAP authentication sends the username and password to the authenticating party.
C.In PAP authentication, once the authenticated party receives the NAK packet, it will disconnect the link
immediately.
D.After the authenticating party of CHAP receives the response returned by the authenticated party, it will
calculate a result with the locally stored password and the random string, and then compare its own result with the
result in the received response If the two results match, an ACK message will be returned, otherwise, a NAK
message will be returned instead.
Answer: c


150. Which of the following is wrong? ( )
A.Serial 1/0 current state : DOWN; Line protocol current state : DOWN means the interface is not activated or the
physical layer is not up.
B.Serial number is up, line protocol is up(spoofing) means the interface is a dial-up interface, and connection is
established.
C.Serial 1/0 current state : UP; Line protocol current state : UP means the interface is ready for data transmission.
D.Serial 1/0 current state : UP; Line protocol current state : DOWN means the interface is activated, but the data
TestInside GB0-183
link protocol is still under negotiation.
Answer: b


151. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode pap
ip address 10.0.0.1 255.255.255.0
TestInside GB0-183
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
TestInside GB0-183
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b


152. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1] display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
TestInside GB0-183
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode pap
ip address 10.0.0.1 255.255.255.0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2] display current-configuration
#
sysname Router2
#
TestInside GB0-183
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp pap local-user h3c password simple h3c
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
TestInside GB0-183
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b


153. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1] display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
TestInside GB0-183
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode chap
ppp chap user h3c
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
TestInside GB0-183
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp chap user h3c
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


TestInside GB0-183
154. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1] display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode chap
ppp chap user h3c
ip address 10.0.0.1 255.255.255.0
TestInside GB0-183
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
TestInside GB0-183
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp chap user h3c
ip address 10.0.0.2 255.255.255.0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


155. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1] display current-configuration
TestInside GB0-183
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user h3c password simple h3c
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
TestInside GB0-183
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
local-user h3c
#
interface Aux0
async mode flow
TestInside GB0-183
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user h3c password simple h3c
ip address 10.0.0.2 255.255.255.0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


156. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1] display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
TestInside GB0-183
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user h3c password simple 3com
ip address 10.0.0.1 255.255.255.0
#
interface Serial1/0
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
TestInside GB0-183
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple 3com
service-type ppp
#
interface Aux0
async mode flow
#
TestInside GB0-183
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user h3c password simple h3c
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


157. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1] display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
TestInside GB0-183
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user h3c password simple h3c
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
TestInside GB0-183
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user h3c password simple h3c
ip address 10.0.0.2 255.255.255.0
TestInside GB0-183
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


158. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1] display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
TestInside GB0-183
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode chap
ppp chap user h3c
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
TestInside GB0-183
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user h3c
password simple h3c
service-type ppp
#
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp authentication-mode chap
ppp chap user h3c
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
TestInside GB0-183
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


159. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1] display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Virtual-Template1
TestInside GB0-183
ip address 10.0.0.1 255.255.255.0
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp mp Virtual-Template 1
#
interface Serial1/0
link-protocol ppp
ppp mp Virtual-Template 1
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2] display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
TestInside GB0-183
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Virtual-Template1
ip address 10.0.0.2 255.255.255.0
#
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp mp Virtual-Template 1
#
interface Serial1/0
clock DTECLK1
link-protocol ppp
ppp mp Virtual-Template 1
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
TestInside GB0-183
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


160. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
ppp mp user router-b bind Virtual-Template 1
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user router-b
TestInside GB0-183
password simple router-b
service-type ppp
#
interface Virtual-Template1
ip address 10.0.0.1 255.255.255.0
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user router-a password simple router-a
ppp mp
#
interface Serial1/0
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user router-a password simple router-a
ppp mp
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
TestInside GB0-183
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
ppp mp user router-a bind Virtual-Template 1
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user router-a
password simple router-a
service-type ppp
#
interface Virtual-Template1
ip address 10.0.0.2 255.255.255.0
#
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
TestInside GB0-183
ppp authentication-mode pap
ppp pap local-user router-b password simple router-b
ppp mp
#
interface Serial1/0
clock DTECLK1
link-protocol ppp
ppp authentication-mode pap
ppp pap local-user router-b password simple router-b
ppp mp
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


161. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
TestInside GB0-183
#
FTP server enable
#
l2tp domain suffix-separator @
#
ppp mp user router-b bind Virtual-Template 1
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
local-user router-b
password simple router-b
service-type ppp
#
interface Virtual-Template1
ip address 10.0.0.1 255.255.255.0
#
interface Aux0
async mode flow
#
interface Serial0/0
link-protocol ppp
ppp pap local-user router-a password simple router-a
ppp mp
#
TestInside GB0-183
interface Serial1/0
link-protocol ppp
ppp pap local-user router-a password simple router-a
ppp mp
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
ppp mp user router-a bind Virtual-Template 1
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
TestInside GB0-183
level 3
service-type ftp
local-user router-a
password simple router-a
service-type ppp
#
interface Virtual-Template1
ip address 10.0.0.2 255.255.255.0
#
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ppp pap local-user router-b password simple router-b
ppp mp
#
interface Serial1/0
clock DTECLK1
link-protocol ppp
ppp pap local-user router-b password simple router-b
ppp mp
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
TestInside GB0-183
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b


162. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
TestInside GB0-183
interface Serial0/0
link-protocol ppp
ip address 20.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
TestInside GB0-183
interface Aux0
async mode flow
#
interface Serial0/0
clock DTECLK1
link-protocol ppp
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


163. If frame relay PVC switching is enabled on a router, the type of the frame relay interface shall be ( ).
A.DCE
B.DTE
C.NNI
D.UNI
Answer: ac


TestInside GB0-183
164. A full-mesh topology can solve the problem caused by split-horizon in the frame relay network. ( )
T.True
F.False
Answer: t


165. H3C routers support ( ) kinds of LMI protocols.
A.1
B.2
C.3
D.4
Answer: c


166. The general service of frame relay network is ( )..
A.PVC
B.SVC
C.DLCI
D.LMI
Answer: a


167. Which of the following is right about frame relay? ( )
A.It is based on virtual circuits.
B.It can provide multiple virtual circuits in a single physical transmission link.
C.It provides acknowledgement and re-transmission mechanism.
D.It adopts a fast packet switching mechanism.
Answer: abd


168. Which of the following parameters describes the committed rate over PVCs in a frame relay network?
TestInside GB0-183
A.Bc
B.Be
C.CIR
D.Tc
Answer: c


169. If frame relay Inverse ARP is configured on a H3C router, static address mapping must be set manually. ( )
T.True
F.False
Answer: f


170. Inverse ARP mainly functions to ( )
A.Resolve the hardware address through the network address of the equipment.
B.Resolve the network address of the equipment through its hardware address.
C.Resolve the network address of the remote end connected via the virtual circuit in frame relay network.
D.Create the mapping between the local DLCI and the network address of the peer in frame relay network.
E.Resolve the network address of the local equipment connected via the virtual circuit in frame relay network.
Answer: cd


171. Compared with circuit switching, packet switching is lower in delay. ( )
T.True
F.False
Answer: f


172. Which of the following is not a frame relay feature? ( )
A.Fixed cell length
B.Simplification of X.25
TestInside GB0-183
C.Implement statistic multiplexing, transparent transmission of frames and error inspection at the data link layer
D.Provide SVC and PVC services
Answer: a


173. Frame relay works at the ( ) of the OSI reference model.
A.Physical layer and application layer
B.Physical layer and data link layer
C.Data link layer and network layer
D.Data link layer and Presentation layer
Answer: b


174. Which of the following describes frame relay correctly? ( )
A.The SVC is identified with a locally valid DLCI.
B.The SVC is identified with a globally valid DLCI.
C.The PVC is identified with a locally valid DLCI.
D.The PVC is identified with a globally valid DLCI.
Answer: ac


175. In a frame relay network, if static mapping is configured, Inverse ARP messages will not be sent over the
virtual circuit. ( )
T.True
F.False
Answer: t


176. Which of the following is right about DLCI? ( )
A.The DLCI is only valid locally.
B.The DLCI is assigned by the DCE party.
TestInside GB0-183
C.The user DLCI ranges from 1 to 1007
D.Different physical interfaces can be set with the same DLCI.
Answer: abd


177. The available interface types for a frame relay sub-interface are ( ).
A.Point-to-point
B.NBMA
C.Point-to-multipoint
D.Broadcast
Answer: ac


178. Which of the following DLCIs are used by the Frame relay LMI generally? ( )
A.0
B.16
C.1007
D.1023
Answer: ad


179. The point-to-point sub-interface of frame relay can identify the remote end without being configured with
static address mapping. ( )
T.True
F.False
Answer: t


180. Which of the following is the LMI function of frame relay? ( )
A.Maintaining link status
B.Maintaining PVC status
TestInside GB0-183
C.Advertising the adding of PVC
D.Advertising the deletion of PVC
Answer: abcd


181. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
TestInside GB0-183
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr map ip 10.0.0.2 255.255.255.0 20 broadcast
fr dlci 20
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
TestInside GB0-183
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 20 broadcast
fr dlci 20
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
TestInside GB0-183
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


182. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
TestInside GB0-183
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr map ip 10.0.0.2 255.255.255.0 30 broadcast
fr dlci 30
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
TestInside GB0-183
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 20 broadcast
fr dlci 20
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
TestInside GB0-183
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


183. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
TestInside GB0-183
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr map ip 10.0.0.2 255.255.255.0 20 broadcast
fr dlci 20
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
TestInside GB0-183
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 20 broadcast
fr dlci 20
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
TestInside GB0-183
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b


184. Two routers are in direct back-to-back connection with the following configuration. Can they communicate
with each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
TestInside GB0-183
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
TestInside GB0-183
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
TestInside GB0-183
Answer: b


185. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
TestInside GB0-183
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr dlci 20
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
TestInside GB0-183
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a

TestInside GB0-183

186. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
TestInside GB0-183
link-protocol fr
fr interface-type dce
fr map ip 10.0.0.2 255.255.255.0 20 broadcast
fr dlci 30
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
TestInside GB0-183
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 30 broadcast
fr dlci 20
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b
TestInside GB0-183


187. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
fr switching
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
TestInside GB0-183
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type nni
fr dlci 20
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
TestInside GB0-183
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b
TestInside GB0-183


188. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
TestInside GB0-183
interface Serial0/0
link-protocol fr nonstandard
fr interface-type dce
fr dlci 20
ip address 10.0.0.1 255.255.255.0
#
interface Serial1/0
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router1]
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
TestInside GB0-183
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
TestInside GB0-183
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


189. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
TestInside GB0-183
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr lmi type nonstandard
fr dlci 20
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
TestInside GB0-183
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
TestInside GB0-183
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b


190. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
TestInside GB0-183
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr lmi type ansi
fr dlci 20
ip address 10.0.0.1 255.255.255.0
#
interface Serial1/0
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
TestInside GB0-183
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
TestInside GB0-183
clock DTECLK1
link-protocol fr
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: b


191. Two routers are in back-to-back connection with the following configuration. Can they communicate with
each other? ( )
[Router1]display current-configuration
#
sysname Router1
#
FTP server enable
#
l2tp domain suffix-separator @
#
fr switching
#
TestInside GB0-183
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
#
interface Serial0/0.1
fr dlci 20
ip address 10.0.0.1 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
TestInside GB0-183
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[Router2]display current-configuration
#
sysname Router2
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
TestInside GB0-183
#
interface Serial0/0
clock DTECLK1
link-protocol fr
#
interface Serial0/0.1
fr dlci 20
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
Answer: a


192. Three routers are connected as shown in the figure. Can RTA and RTB communicate with each other with the
following configuration? ( )
[RTA]display current-configuration
#
sysname RTA
#
FTP server enable
TestInside GB0-183
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet1/0
ip address dhcp-alloc
#
interface Ethernet1/1
ip address dhcp-alloc
#
interface Serial2/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.2 255.255.255.0 100 broadcast
fr dlci 100
ip address 10.0.0.1 255.255.255.0
#
interface Serial2/1
clock DTECLK1
TestInside GB0-183
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
[FR-SWITCH]display current-configuration
#
sysname FR-SWITCH
#
FTP server enable
#
l2tp domain suffix-separator @
#
fr switching
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
TestInside GB0-183
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr dlci 200
#
interface Serial1/0
link-protocol fr
fr interface-type dce
fr dlci 100
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
fr switch pvc interface Serial0/0 dlci 200 interface Serial1/0 dlci 100
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
TestInside GB0-183
authentication-mode scheme
#
return
[RTB]display current-configuration
#
sysname RTB
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
TestInside GB0-183
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 200 broadcast
fr dlci 200
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.

Answer: a


193. Three routers are connected as shown in the figure. Can RTA and RTB communicate with each other with the
following configuration? ( )
[RTA]display current-configuration
TestInside GB0-183
#
sysname RTA
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet1/0
ip address dhcp-alloc
#
interface Ethernet1/1
ip address dhcp-alloc
#
interface Serial2/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.2 255.255.255.0 100 broadcast
fr dlci 100
TestInside GB0-183
ip address 10.0.0.1 255.255.255.0
#
interface Serial2/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
[FR-SWITCH]display current-configuration
#
sysname FR-SWITCH
#
FTP server enable
#
l2tp domain suffix-separator @
#
fr switching
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
TestInside GB0-183
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr dlci-switch 200 interface Serial1/0 dlci 100
fr dlci 200
#
interface Serial1/0
link-protocol fr
fr interface-type dce
fr dlci-switch 100 interface Serial0/0 dlci 200
fr dlci 100
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
TestInside GB0-183
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
[RTB]display current-configuration
#
sysname RTB
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
TestInside GB0-183
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 200 broadcast
fr dlci 200
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.


Answer: a


TestInside GB0-183
194. Three routers are connected as shown in the figure. Can RTA and RTB communicate with each other with the
following configuration? ( )
[RTA]display current-configuration
#
sysname RTA
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet1/0
ip address dhcp-alloc
#
interface Ethernet1/1
ip address dhcp-alloc
#
interface Serial2/0
clock DTECLK1
TestInside GB0-183
link-protocol fr
fr map ip 10.0.0.2 255.255.255.0 100 broadcast
fr dlci 100
ip address 10.0.0.1 255.255.255.0
#
interface Serial2/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
[FR-SWITCH]display current-configuration
#
sysname FR-SWITCH
#
FTP server enable
#
l2tp domain suffix-separator @
#
fr switching
#
radius scheme system
#
domain system
TestInside GB0-183
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr dlci 200
#
interface Serial1/0
link-protocol fr
fr interface-type dce
fr dlci 100
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
TestInside GB0-183
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
[RTB]display current-configuration
#
sysname RTB
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
TestInside GB0-183
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 200 broadcast
fr dlci 200
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.

Answer: b
TestInside GB0-183


195. Three routers are connected as shown in the figure. Can RTA and RTB communicate with each other with the
following configuration? ( )
[RTA]display current-configuration
#
sysname RTA
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet1/0
ip address dhcp-alloc
#
interface Ethernet1/1
ip address dhcp-alloc
#
TestInside GB0-183
interface Serial2/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.2 255.255.255.0 100 broadcast
fr dlci 100
ip address 10.0.0.1 255.255.255.0
#
interface Serial2/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
[FR-SWITCH]display current-configuration
#
sysname FR-SWITCH
#
FTP server enable
#
l2tp domain suffix-separator @
#
fr switching
#
radius scheme system
TestInside GB0-183
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type nni
fr dlci 200
#
interface Serial1/0
link-protocol fr
fr interface-type nni
fr dlci 100
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
TestInside GB0-183
ip address ppp-negotiate
#
interface NULL0
#
fr switch pvc interface Serial0/0 dlci 200 interface Serial1/0 dlci 100
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
[RTB]display current-configuration
#
sysname RTB
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
TestInside GB0-183
async mode flow
#
interface Ethernet0/0
ip address dhcp-alloc
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 200 broadcast
fr dlci 200
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode scheme
#
return
A.Yes
B.No
C.No decision can be made, for there is not enough information.
TestInside GB0-183

Answer: b


196. Two routers are in back-to-back connection with the following configuration. Which of the following is right?
( )
[RTA]display current-configuration
#
sysname RTA
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
TestInside GB0-183
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address 20.0.0.1 255.255.255.0
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr map ip 10.0.0.2 255.255.255.0 100
fr dlci 100
ip address 10.0.0.1 255.255.255.0
#
interface Serial1/0
link-protocol ppp
ip address ppp-negotiate
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
rip
network 10.0.0.0
network 20.0.0.0
peer 10.0.0.2
TestInside GB0-183
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[RTB]display current-configuration
#
sysname RTB
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address 30.0.0.1 255.255.255.0
TestInside GB0-183
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 100
fr dlci 100
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
rip
network 10.0.0.0
network 30.0.0.0
peer 10.0.0.1
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.The serial ports of the two routers can communicate with each other.
B.The serial ports of the two routers can not communicate with each other.
C.The two routers can learn the routes for the subnets of the Ethernet interfaces from each other.
D.The two routers can not learn the routes for the subnets of the Ethernet interfaces from each other.
TestInside GB0-183

Answer: ac


197. Two routers are in back-to-back connection with the following configuration. Which of the following is right?
( )
[RTA]display current-configuration
#
sysname RTA
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
TestInside GB0-183
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address 20.0.0.1 255.255.255.0
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr map ip 10.0.0.2 255.255.255.0 100
fr dlci 100
ip address 10.0.0.1 255.255.255.0
#
interface Serial1/0
link-protocol ppp
ip address ppp-negotiate
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
rip
network 10.0.0.0
network 20.0.0.0
TestInside GB0-183
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[RTB]display current-configuration
#
sysname RTB
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address 30.0.0.1 255.255.255.0
TestInside GB0-183
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 100
fr dlci 100
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
rip
network 10.0.0.0
network 30.0.0.0
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.The serial ports of the two routers can communicate with each other.
B.The serial ports of the two routers can not communicate with each other.
C.The two routers can learn the routes for the subnets of the Ethernet interfaces from each other.
D.The two routers can not learn the routes for the subnets of the Ethernet interfaces from each other.
TestInside GB0-183

Answer: ad


198. Two routers are in back-to-back connection with the following configuration. Which of the following is right?
( )
[RTA]display current-configuration
#
sysname RTA
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
TestInside GB0-183
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address 20.0.0.1 255.255.255.0
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr map ip 10.0.0.2 255.255.255.0 100
fr dlci 100
ip address 10.0.0.1 255.255.255.0
#
interface Serial1/0
link-protocol ppp
ip address ppp-negotiate
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
ospf 1
peer 10.0.0.2
area 0.0.0.0
TestInside GB0-183
network 10.0.0.0 0.0.0.255
network 20.0.0.0 0.0.0.255

#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[RTB]display current-configuration
#
sysname RTB
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
TestInside GB0-183
#
interface Ethernet0/0
ip address 30.0.0.1 255.255.255.0
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 100
fr dlci 100
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
ospf 1
peer 10.0.0.1
area 0.0.0.0
network 10.0.0.0 0.0.0.255
network 30.0.0.0 0.0.0.255
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.The serial ports of the two routers can communicate with each other.
B.The serial ports of the two routers can not communicate with each other.
TestInside GB0-183
C.The two routers can learn the routes for the subnets of the Ethernet interfaces from each other.
D.The two routers can not learn the routes for the subnets of the Ethernet interfaces from each other.

Answer: ac


199. Two routers are in back-to-back connection with the following configuration. Which of the following is right?
( )
[RTA]display current-configuration
#
sysname RTA
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
TestInside GB0-183
service-type ftp
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address 20.0.0.1 255.255.255.0
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
link-protocol fr
fr interface-type dce
fr map ip 10.0.0.2 255.255.255.0 100
fr dlci 100
ip address 10.0.0.1 255.255.255.0
#
interface Serial1/0
link-protocol ppp
ip address ppp-negotiate
#
interface Serial1/1
clock DTECLK1
link-protocol ppp
ip address ppp-negotiate
#
interface NULL0
#
ospf 1
area 0.0.0.0
TestInside GB0-183
network 10.0.0.0 0.0.0.255
network 20.0.0.0 0.0.0.255
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
[RTB]display current-configuration
#
sysname RTB
#
FTP server enable
#
l2tp domain suffix-separator @
#
radius scheme system
#
domain system
#
local-user admin
password cipher .]@USE=B,53Q=^Q`MAF4<<"TX$_S#6.NM(0=0\)*5WWQ=^Q`MAF4<<"TX$_S#6.N
service-type telnet terminal
level 3
service-type ftp
#
interface Aux0
async mode flow
#
TestInside GB0-183
interface Ethernet0/0
ip address 30.0.0.1 255.255.255.0
#
interface Ethernet0/1
ip address dhcp-alloc
#
interface Serial0/0
clock DTECLK1
link-protocol fr
fr map ip 10.0.0.1 255.255.255.0 100
fr dlci 100
ip address 10.0.0.2 255.255.255.0
#
interface NULL0
#
ospf 1
area 0.0.0.0
network 10.0.0.0 0.0.0.255
network 30.0.0.0 0.0.0.255
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
authentication-mode none
user privilege level 3
#
return
A.The serial ports of the two routers can communicate with each other.
B.The serial ports of the two routers can not communicate with each other.
C.The two routers can learn the routes for the subnets of the Ethernet interfaces from each other.
D.The two routers can not learn the routes for the subnets of the Ethernet interfaces from each other.
TestInside GB0-183

Answer: ad


200. The routing function of routers means ( )
A.Routers shall forward packets according to the destination network address of the packet.
B.To implement forwarding, routers shall be able to establish and update the routing table, and forward packets
according to the routing table.
C.To ensure reliable operation of the network, routers shall support active/standby link switchover, and flow
control.
D.Routers shall be able to isolate broadcast domain, and prevent broadcast storms. In addition, flexible and
various packet filter policies shall be implemented to ensure network security.
Answer: b


201. The router maintains a table all the time, and all packets are sent or forwarded from the corresponding port
according to the table. The table is the ( ).
A.MAC table
B.Routing table
C.Address table
D.Link table
Answer: b


TestInside GB0-183
202. Which of the following is an element in the routing table? ( )
A.Source IP address
B.Destination IP address
C.Subnet mask
D.Next hop
Answer: bcd


203. The AR28-31 router provides an AUX port, a console port and an ethernet port. ( )
T.True
F.False
Answer: f


204. The H3C routers can transfer files through Xmodem, FTP and TFTP. Only the FTP mode requires username
and password. ( )
T.True
F.False
Answer: t


205. Using command line, the router can act as a TFTP ( ).
A.Server
B.Client
C.Both A and B
D.None of the above
Answer: b


206. Using command line, the router can act as a FTP ( ).
A.Server
TestInside GB0-183
B.Client
C.Both A and B
D.None of the above
Answer: c


207. To delete the configuration from the flash on the H3C router, use command ( ).
A.write
B.delete
C.copy
D.reset saved-configuration
Answer: d


208. To clear the saved configuration on the H3C router COMWARE3.4, execute the command in the ( ).
A.User view
B.System view
C.Interface view
D.All views
Answer: a


209. To create a local user on the H3C router COMWARE3.4, use command ( ).
A.user
B.user-interface
C.local-user
D.service
Answer: c


210. Key in a string which is followed by a space and "?", all the key words beginning with this string will be
TestInside GB0-183
listed. ( )
T.True
F.False
Answer: f


211. If the super password on the H3C router is forgotten, there is no way to restore the default setting. So, its
necessary to keep a record of it.
T.True
F.False
Answer: f


212. The AUX port of the router is a backup port. Remote user can access the router through a modem connected
to it. ( )
T.True
F.False
Answer: t


213. To view debugging information on a H3C router with COMWARE3.4 using Telnet, what command is
necessary besides debug * *? ( )
A.display debugging
B.terminal monitor
C.terminal debugging
D.user debuging
Answer: bc


214. Username and password are set on a H3C router, but access to the system is denied with the username and
password. The reason could be ( ).
TestInside GB0-183
A.The service type of the user is not set to telnet.
B.The user privilege level is too low.
C.The H3C router can only authenticate users using password, instead of username and password.
D.The user is not enabled.
Answer: a


215. The Ethernet interface of a H3C router is configured with an IP address, but the physical status of the
interface is still down. The reason could be ( ).
A.No cable is connected.
B.The IP address is wrong.
C.The cable is connected, but the remote end powers off.
D.The configured mask is wrong.
Answer: ac


216. To view the CPU usage on a H3C router, use command ( ).
A.display system cpu
B.display process cpu
C.h-b cpu
D.display cpu
Answer: d


217. The bootrom of the H3C AR28-31 router upgrades automatically when COMWARE image being upgraded.
( )
T.True
F.False
Answer: f


TestInside GB0-183
218. The H3C router COMWARE3.4 can memorize history commands. For example, we can trace the command
executed last time with key or keys ( ).
A.ctrl+N
B.ctrl+P
C.ctrl+O
D.ctrl+G
Answer: b


219. How to view the version of the current software on the H3C routers? ( )
A.View the front panel of the equipment.
B.In the command line interface, use display software.
C.In the command line interface, use display version.
D.In the user view of the command line interface, use display Comware-version.
Answer: c


220. To know the uptime from the last rebooting of the router, use ( ).
A.display clock
B.display device
C.display system
D.display version
Answer: d


221. On the H3C router with COMWARE3.4, you can quit to the user view directly with ( ) from any view.
A.ctrl+N
B.ctrl+Z
C.ctrl+O
D.ctrl+G
Answer: b
TestInside GB0-183


222. On the H3C AR28-31 router, there are system and power LEDs on the front panel. If the power LED flashes,
the router works well. If the system LED is solid on, the router also works well. ( )
T.True
F.False
Answer: f


223. What kind of information can be displayed using command display version on a H3C AR router? ( )
A.The product type
B.The uptime of the router
C.The information about the interface cards
D.The COMWARE version of the interface cards
Answer: abc


224. What kind of information can be displayed using command display interface on a H3C AR router? ( )
A.Status of the interfaces
B.IP addresses of the interfaces
C.Statistics of input and output packets on the interfaces
D.Statistics of abnormal input and output packets on the interfaces
Answer: abcd


225. The default MTU on the Ethernet interface of a H3C AR router is ( ).
A.1500
B.1472
C.1518
D.9600
Answer: a
TestInside GB0-183


226. Command Ping is to test whether a network is reachable. If no reply packet is received within a certain time,
the tested host or network is regarded as unreachable..
T.True
F.False
Answer: t


227. The command line interface of the H3C routers provides rich dynamical information of the protocols and
processes to help users diagnose and locate errors. Such function is the ( ).
A.show function
B.monitor function
C.debugging function
D.display function
Answer: c


228. The system will prompt you accordingly if the typed-in commands contain errors. Which of the following
prompt information and its interpretation are correct? ( )
A.Wrong command: The command is wrong.
B.Incorrect command: The system cannot recognize the command.
C.Incomplete command: The command input is not complete.
D.Too many parameters: The command contains too many parameters.
Answer: bcd


229. There are many kinds of memories in the router, such as NVRAM, flash, SDRAM and bootrom. Which
memory is the startup configuration stored in?
A.NVRAM
B.flash
TestInside GB0-183
C.SDRAM
D.bootrom
Answer: b


230. There is a command on the H3C AR router, which is very useful in collecting information in case of failures.
Its functions are actually equal to the functions of many other commands. What is the command? ( )
A.display diagnostic-information
B.display system
C.display information
D.display aggregate-information
Answer: a


231. To upgrade the COMWARE software in the bootrom menu on the H3C router through TFTP, parameter flags
shall be set to ( ).
A.0x00
B.0x69
C.0x80
D.0x45
Answer: c


232. On the H3C AR router, the current configuration cannot be cleared through one command. To clear it, you
should delete the saved configuration, and then restart the machine. Or, you remove the configuration item by item.
( )
T.True
F.False
Answer: t


TestInside GB0-183
233. RIP is featured by ( ).
A.Advertising routing information, instead of link state information
B.It may lead to loop.
C.It takes up more memory and CPU processing time.
D.It is weak in scalability, with the maximum hop count no more than 16.
E.It is weak in scalability, with the maximum hop count no more than 15.
Answer: abd


234. The indices to evaluate the performance of the routing protocol are ( ).
A.Accuracy
B.Fast convergence
C.Low overhead
D.Security
E.Wide adaptation
Answer: abcde


235. The solutions to prevent loops in the distance-vector routing protocol are ( ).
A.Split horizon
B.Poison reverse
C.Trigger update
D.Garbage-collection time
Answer: abcd


236. Which of the following is right about RIP? ( )
A.It is a distance-vector routing protocol.
B.It is a link state routing protocol.
C.It has two versions, RIPv1 and RIPv2.
D.Both RIPv1 and RIPv2 advertise through broadcast and support authentication and VLSM.
TestInside GB0-183
Answer: ac


237. RIP packets are encapsulated in the ( ).
A.TCP
B.UDP
C.IP
D.PPP
Answer: b


238. Which of the following statements is right about RIP? ( )
A.RIPv1 transmits the protocol packets through broadcast, while RIPv2 through two methods, broadcast or
multicast.
B.The multicast address of RIPv2 is 224.0.0.9.
C.The multicast address of RIPv2 is 224.0.0.10.
D.By default, an interface running RIPv1 can only receive and transmit RIPv1 packets.
Answer: ab


239. OSPF abstracts link topologies into ( ).
A.Stub networks
B.Point-to-point
C.Broadcast
D.Point-to-multipoint
E.NBMA
Answer: abcd


240. In OSPF protocol packets, ( ) is used to describe the summary information of the local LSDB.
A.Hello
TestInside GB0-183
B.DD
C.LSR
D.LSU
E.LSAck
Answer: b


241. In OSPF protocol packets, ( ) can be used to elect the DR and BDR.
A.Hello
B.DD
C.LSR
D.LSU
E.LSAck
Answer: a


242. In OSPF protocol packets, ( ) can be used to solicit the new LSAs and the LSAs which need to be updated
from the peer.
A.Hello
B.DD
C.LSR
D.LSU
E.LSAck
Answer: c


243. In OSPF protocol packets, ( ) can be used to send the requested LSAs to the peer router.
A.Hello
B.DD
C.LSR
D.LSU
TestInside GB0-183
E.LSAck
Answer: d


244. ( ) provide a mechanism to interconnect heterogeneous networks and transmit packets from a network to
another.
A.Routers
B.Switches
C.Hubs
D.Bridges
Answer: a


245. Generally routers select a proper path only according to the ( ) of the packet header.
A.Source IP address
B.Destination IP address
C.Source MAC address
D.Destination MAC address
Answer: b


246. According to the destination addresses, routes fall into ( ).
A.Subnet routes
B.Host routes
C.Dynamic routes
D.Static routes
Answer: ab


247. According to whether the destination is connected directly to the router, routes fall into ( ).
A.Subnet routes
TestInside GB0-183
B.Host routes
C.Directly connected routes
D.Indirectly connected routes
Answer: cd


248. Route is one of the most important element for packet forwarding, whose origins includes ( ).
A.the routes discovered by the data link layer protocol
B.the static routes configured manually
C.the routes discovered by the dynamic routing protocol
D.the routes resolved by the DNS
Answer: abc


249. The sequence (from low to high) of the default routing protocols preference on H3C routers is ( ).
A.OSPF, DIRECT, STATIC, BGP, RIP, OSPF_ASE, UNKNOWN
B.BGP, RIP, STATIC, OSPF, DIRECT, OSPF_ASE, UNKNOWN
C.DIRECT, OSPF, STATIC, RIP, OSPF_ASE, UNKNOWN, BGP
D.RIP, DIRECT, STATIC, OSPF, OSPF_ASE, BGP, UNKNOWN
Answer: c


250. Route cost refers to the cost for the route to reach the destination. Which of the following factors may affect
the cost? ( )
A.Delay
B.Bandwidth
C.Link utilization and reliability
D.Hop count
E.Maximum transmission unit
Answer: abcde

TestInside GB0-183

251. When static routes to a destination are defined with keyword ( ), all IP packets to the destination will be
dropped, and no response message is sent to the source address.
A.Reject
B.Blackhole
C.Static
D.Silence
Answer: b


252. When a router cannot find a specific matching entry for a packet in its routing table, it will forward the
packet based on the ( ).
A.Default route
B.Static route
C.First route in the routing table
D.Last route in the routing table
Answer: a


253. OSPF directly encapsulate the protocol packets into ( ).
A.TCP
B.UDP
C.IP
D.PPP
Answer: c


254. BGP adopts TCP as the transport protocol to provide reliability. The TCP port number of BGP is ( ).
A.89
B.179
C.520
TestInside GB0-183
D.171
Answer: b


255. Common internal gateway protocols include ( ).
A.Dynamic routing protocol
B.RIP
C.OSPF
D.IS-IS
E.BGP
Answer: bcd


256. RIP is based on the ( ) algorithm.
A.D-V
B.Bellman-Ford
C.Guassian
D.RSTP
Answer: ab


257. To filter the packets received on an interface by applying ACL, use keyword ( ).
A.outbound
B.inbound
C.both
D.none
Answer: b


258. To filter packets received on Serial0/0 by applying ACL 3000 , use command ( ) in the interface view of
Serial0/0.
TestInside GB0-183
A.packet-filter 3000 inbound
B.packet-filter 3000 outbound
C.firewall packet-filter 3000 inbound
D.firewall packet-filter 3000 outbound
Answer: c


259. To put the ACL into effect on a H3C router, you shall apply the ACL in the ( ).
A.User view
B.Global view
C.System view
D.Interface view
Answer: d


260. On a H3C router, multiple time ranges can be set under the same name for time-range-based filtering. These
time ranges are in logic ( ) relationship.
A.AND
B.OR
C.NON
D.None of the above
Answer: b


261. For time-range-based filtering, use command ( ) to create a time range.
A.range-timer
B.timer-range
C.range-time
D.time-range
Answer: d

TestInside GB0-183

262. For time-range-based filtering, to apply the configured time range to all days, you shall use the parameter ( )
A.days
B.off-day
C.daily
D.working-day
E.all-days
Answer: c


263. The core technology to implement packet filtering is ( ).
A.QoS
B.ACL
C.Route
D.Switching
Answer: b


264. In address translation, ( ) is used to define what packets need to be translated.
A.Online user table
B.MAC address table
C.ACL
D.Routing table
Answer: c


265. To allow the hosts in network 202.38.0.0/16 to access 129.10.10.1 through HTTP, which of the following
ACL should be defined? ( )
A.acl number 2000
rule permit tcp source 202.38.0.0 0.0.255.255 destination 129.10.10.1 0 destination-port eq www.
B.acl number 3000
TestInside GB0-183
rule permit tcp source 129.10.10.1 0 destination 202.38.0.0 0.0.255.255 destination-port eq www.
C.acl number 2000
rule permit tcp source 129.10.10.1 0 destination 202.38.0.0 0.0.255.255 destination-port eq www.
D.acl number 3000
rule permit tcp source 202.38.0.0 0.0.255.255 destination 129.10.10.1 0 destination-port eq www.
Answer: d


266. To prohibit all the access from 202.110.0.0/16, which of the following ACL should be defined? ( )
A.rule permit ip destination 202.110.0.0 0.0.255.255
B.rule deny ip destination 202.110.0.0 0.0.255.255
C.rule permit ip source 202.110.0.0 0.0.255.255
D.rule deny ip source 202.110.0.0 0.0.255.255
Answer: d


267. To disable Telnet login from all hosts, which of the following ACL should be defined? ( )
A.acl number 2000
rule deny tcp source any destination any destination-port eq telnet
B.acl number 2000
rule permit tcp source any destination any destination-port eq telnet
C.acl number 3000
rule deny tcp source any destination any destination-port eq telnet
D.acl number 3000
rule permit tcp source any destination any destination-port eq telnet
Answer: c


268. To allow host 10.0.0.1/16 to send emails through SMTP with all other hosts prohibited, which of the
following ACL should be defined? ( )
A.acl number 2001
TestInside GB0-183
rule permit udp source 10.0.0.1 0.0.255.255 destination any destination-port eq smtp
rule deny udp source any destination any destination-port eq smtp
B.acl number 2001
rule permit tcp source 10.0.0.1 0.0.255.255 destination any destination-port eq smtp
rule deny tcp source any destination any destination-port eq smtp
C.acl number 3001
rule permit udp source 10.0.0.1 0.0.255.255 destination any destination-port eq smtp
rule deny udp source any destination any destination-port eq smtp
D.acl number 3001
rule permit tcp source 10.0.0.1 0.0.255.255 destination any destination-port eq smtp
rule deny tcp source any destination any destination-port eq smtp
Answer: d


269. ACL cannot identify ( ).
A.Username
B.IP address
C.Port number
D.Protocol number
Answer: a


270. The advanced ACL ranges ( ) in number.
A.1000-1999
B.2000-2999
C.3000-3999
D.4000-4999
Answer: c


271. Interface-based ACL numbers range ( ).
TestInside GB0-183
A.1000-1999
B.2000-2999
C.3000-3999
D.4000-4999
Answer: a


272. The basic ACL identifies packets according to the ( ).
A.Source address
B.Destination address
C.Source port number
D.Destination port number
Answer: a


273. In filtering packets with the rules in the basic ACL, the keyword permit means ( )
A.The packet can pass through if it meets the rules.
B.The packet cannot pass through if it meets the rules.
C.The packet can pass through if it does not meet the rules.
D.The packet cannot pass through if it does not meet the rules.
Answer: a


274. To match the network 192.168.0.1/22 in an ACL rule, the wildcard mask should be ( )
A.255.255.252.0
B.0.0.3.255
C.255.255.255.0
D.0.0.0.255
Answer: b


TestInside GB0-183
275. To match a network segment with 20-bit mask in an ACL rule, the correct wildcard mask should be ( ).
A.0.0.0.255
B.0.0.240.255
C.255.255.240.0
D.0.0.15.255
Answer: d


276. To match a network segment with 30-bit mask in an ACL rule, the correct wildcard mask should be ( ).
A.0.0.0.3
B.0.0.0.7
C.255.255.255.252
D.255.255.255.248
Answer: a


277. Which of the following statements is right about the wildcard mask in the ACL? ( )
A.The wildcard mask is also called wildcard.
B.The value zero of a wildcard bit indicates that the exact match for the corresponding bit is necessary.
C.In an ACL, the combination of the wildcard and IP address can identify an address range.
D.In an ACL, wildcard "any" can be used to identify any address (wildcard 255.255.255.255).
Answer: abcd


278. Which of the following is right about the wildcard mask?
A.The value zero of a wildcard bit indicates that the exact match for the corresponding bit is not necessary.
B.The value zero of a wildcard bit indicates that the exact match for the corresponding bit is necessary.
C.The value one of a wildcard bit indicates that the exact match for the corresponding bit is not necessary.
D.The value one of a wildcard bit indicates that the exact match for the corresponding bit is necessary.
Answer: bc

TestInside GB0-183

279. In a basic ACL, the network address consists of ( ).
A.IP address
B.Subnet mask
C.MAC address
D.Wildcard mask
Answer: ad


280. An ACL contains many rules. The matching order of these rules includes ( )
A.auto
B.manual
C.config
D.match
Answer: ac


281. In an advanced ACL, the value of parameter ( ) ranges from 0 to 255.
A.source-addr
B.dest-addr
C.protocol
D.port
Answer: c


282. Which of the following is right about parameter destination-port in an advanced ACL? ( )
A.destination-port is an optional parameter.
B.destination-port is used to define the source port of the UDP or TCP packet.
C.It is valid only when the protocol number in the rules refers to TCP or UDP.
D.If the destination-port is not specified, the ACL matches TCP/UDP packets with any destination port.
Answer: acd
TestInside GB0-183


283. In an advanced ACL, parameter lt means ( ).
A.smaller than
B.greater than
C.equal to
D.not equal to
Answer: a


284. In an advanced ACL, parameter gt means ( ).
A.smaller than
B.greater than
C.equal to
D.not equal to
Answer: b


285. To prohibit the hosts in network 129.9.0.0/16 to access the FTP port of the host in network 202.38.160.0/24,
which of the following ACLs should be defined?
A.acl number 2000
rule deny tcp source 129.9.0.0 0.0.255.255 destination 202.38.160.0 0.0.0.255 source-port eq ftp
B.acl number 3000
rule deny tcp source 129.9.0.0 0.0.255.255 destination 202.38.160.0 0.0.0.255 source-port eq ftp
C.acl number 2000
rule deny tcp source 129.9.0.0 0.0.255.255 destination 202.38.160.0 0.0.0.255 destination-port eq ftp
D.acl number 3000
rule deny tcp source 129.9.0.0 0.0.255.255 destination 202.38.160.0 0.0.0.255 destination-port eq ftp
Answer: d


TestInside GB0-183
286. The Telnet port number is ( ).
A.TCP port 21
B.UDP port 21
C.TCP port 23
D.UDP port 23
Answer: c


287. Which of the following advanced applications of ACL may be used? ( ).
A.Set the default packet-filter mode of the firewall
B.Enable/disable fragment packet detection on the firewall
C.Set the time range
D.Set the maximum/minimum threshold of fragment packet detection
Answer: abcd


288. Which of the following is right about the default packet-filter mode of the firewall? ( )
A.The related command is firewall default {permit | deny}
B.The related command is default firewall {permit | deny}
C.By default, the default packet-filter mode is permit on the H3C router firewall
D.By default, the default packet-filter mode is deny on the H3C router firewall
Answer: ac


289. The syntax of command time-range is time-range time-name [start-time to end-time] [days] [from time1
data1] [to time2 date2]. Which of the following is right about "days"? ( )
A.The value for "days" rangess from 1 to 7.
B.The working-day ranges from Monday to Friday.
C.The off-day means Saturday and Sunday.
D.The daily means every day in a week.
Answer: bcd
TestInside GB0-183


290. Which of the following is right about the ACL match orders? ( )
A.The auto means matching the ACL rules automatically according to the depth-first principle.
B.The auto means matching the ACL rules according to the sequence with which the rules are configured by the
user.
C.The config means matching the ACL rules according to the depth-first principle.
D.The config means matching the ACL rules according to the sequence with which the rules are configured by the
user.
E.The manual means matching the ACL rules automatically according to the depth-first principle.
F.The manual means matching the ACL rules according to the sequence with which the rules are configured by the
user.
Answer: ad


291. For an ACL, the match order in case of rule collision is ( ), in which the rules configured first have the
preference.
A.auto
B.config
C.both
D.manual
Answer: b


292. On a router, if packets from network 202.110.10.0/24 are permitted, and those from network 192.168.10.0/24
are denied, which of the following rules should be defined? ( )
A.rule deny ip source 202.110.10.0 0.0.0.255
rule permit ip source 192.168.10.0 0.0.0.255
B.rule deny ip source 202.110.10.0 255.255.255.0
rule permit ip source 192.168.10.0 255.255.255.0
C.rule permit ip source 202.110.10.0 255.255.255.0
TestInside GB0-183
rule deny ip source 192.168.10.0 255.255.255.0
D.rule permit ip source 202.110.10.0 0.0.0.255
rule deny ip source 192.168.10.0 0.0.0.255
Answer: d


293. To apply ACL 3001 to the inbound direction of Serial 0/0, which of the following is correct? ( )
A.In the system view, use command firewall packet-filter 3001 outbound
B.In the interface view, use command firewall packet-filter 3001 outbound
C.In the system view, use command firewall packet-filter 3001 inbound
D.In the interface view, use command firewall packet-filter 3001 inbound
Answer: d


294. Which of the following is not a private address? ( )
A.10.10.10.1/8
B.172.17.10.1/16
C.192.168.10.1/24
D.172.32.10.1/16
Answer: d


295. Which of the following is right about ACL?
A.ACL can not be used for the firewall function.
B.ACL can be applied for traffic policing in QoS (Quality of Service).
C.ACL can not be used for address translation.
D.ACL can be used to filter routing information in routing policies,.
Answer: bd


296. Which of the following is right about the advanced ACL?
TestInside GB0-183
A.The advanced ACL ranges from 2000 to 2999.
B.The protocol can be set to any protocol number between 0 and 255.
C.The source-addr is the source address and the source-wildcard is the wildcard of the source address.
D.The dest-addr is the destination address, and the dest-wildcard is the wildcard of the destination address.
Answer: bcd


297. Which of the following is right about the operator of the advanced ACL? ( )
A.The eq portnumber means equal to the specified port number.
B.The gt portnumber means smaller than the specified port number.
C.The lt portnumber means greater than the specified port number.
D.The neq portnumber means unequal to the specified port number.
Answer: ad


298. Which of the following is right about address translation? ( )
A.NAT is put forward because of IP address shortage.
B.Not all hosts in a LAN can get legal public network IP addresses. To provide Internet access for all intranet
hosts, address translation should be adopted.
C.NAT can hide the intranet hosts effectively. Therefore, it is also an efficient network security technology.
D.NAT server enables the Internet users to access the services such as FTP, WWW and Telnet provided by the
internal servers.
Answer: abcd


299. Which of the following is included in address translation configuration? ( )
A.Define which host can access Internet by using ACL.
B.Provide the public addresses through the EASY IP method or the address pool.
C.Enable address translation on the interface connected to the Internet.
D.Define the internal servers as needed.
Answer: abcd
TestInside GB0-183


300. Which of the following is right about EASY IP? ( )
A.EASY IP means the IP address of the interface is used directly as the source address after the translation.
B.The command to enable EASY IP is nat outbound acl-number, which shall be configured in the interface view.
C.EASY IP can be used on dial-up interfaces or interfaces with a fixed IP address.
D.In the interface view, the ACL is by default associated with the interface.
Answer: abc


301. Which of the following is right about NAT monitoring and maintenance?( )
A.display nat can be used to display the configuration for NAT.
B.nat aging-time can be used to set the aging time of NAT.
C.reset nat can be used to reset the NAT connection.
D.debugging nat can be used to enable NAT debugging.
Answer: abcd


302. The shortcomings of NAT include ( ).
A.It is difficult for NAT to handle the circumstances when there is useful address information in the payload of
packets.
B.NAT cannot handle the packets with encrypted IP header.
C.NAT can solve the address shortage problem.
D.NAT can hide intranet host addresses. Therefore, the troubleshooting becomes more complicated sometimes.
Answer: abd


303. In DCC, the dialing connection is enabled only when packet transmission is necessary and is disabled
automatically when the link is idle. Therefore, the cost of dialing connection can be reduced greatly. ( )
T.True
F.False
TestInside GB0-183
Answer: t


304. For a DCC link, we can set the maximum time for the link to keep active in the idle status. What is the
parameter? ( )
A.keep alive time
B.dead time
C.idle-timeout
D.hello time
Answer: c


305. Which of the following is right about command dialer enable-circular of DCC? ( )
A.To dial through an asynchronous serial port, use the command dialer enable-circular.
B.For the ISDN interface, the system enables this command automatically.
C.The command dialer enable-circular is to enable circular DCC.
D.It is applicable to point-to-multipoint dial-up.
Answer: bc


306. Which of the following is not supported by the DCC?
A.Callback
B.Auto-dialing
C.Triggering the dialer through the interesting traffic setting
D.MD5 authentication for incoming calls
Answer: d


307. In shared DCC, what shall be configured? ( )
A.Customize the DCC features of the dialer interface
B.Set the physical interface to be a member in the dialer bundle
TestInside GB0-183
C.Create a dialer interface, and set parameters such as IP address, dial-up string, and dialer bundle
D.Set the dial-up trigger rule of the DCC interface.
Answer: abcd


308. To view the information of a DCC dialer interface, what command can be used? ( )
A.display port dialer
B.display dialer interface
C.display dcc interface
D.display dialer-group
Answer: b


309. In the circular DCC mode, two methods can be used to complete the configuration of DCC interface. One is
to enable DCC directly on the physical interface. The other is to set the logical DCC dialer interface, and then
bind the physical interface to the dialer interface. ( )
T.True
F.False
Answer: t


310. Which of the following is a ISDN interface? ( )
A.Basic Rate Interface (BRI)
B.PVC interface
C.Primary Rate Interface (PRI)
D.Frame-relay interface
Answer: ac


311. If the user requires ISDN access, but his access terminal is not a standard ISDN terminal. What other device
is needed? ( )
TestInside GB0-183
A.Network terminal 1 (NT1)
B.Network terminal 2 (NT2)
C.Terminal adaptor (TA)
D.Class 1 terminal equipment (TE1)
Answer: c


312. Which one is the signal channel for ISDN? ( )
A.B channel
B.D channel
C.A channel
D.C channel
Answer: b


313. ISDN can be only set to the shared DCC mode, instead of the circular DCC mode. ( )
T.True
F.False
Answer: f


314. 192.168.1.0/24 uses mask 255.255.255.240 for subnet segmentation. It can be divided into ( ) subnets, and ( )
host addresses are available in each subnet.
A.14 14
B.16 14
C.254 6
D.14 62
Answer: a


315. Which of the following is a correct description of Classless Inter-Domain Route (CIDR)?
TestInside GB0-183
A.CIDR is an expansion to the IP address structure. It came into being with the fast development of Internet at the
beginning of 1990s.
B.It eliminates address classification.
C.It greatly reduces the size of routing tables in any interconnecting networks, and provides better scalability.
D.It enhances route aggregation.
Answer: abcd


316. Some IP addresses are reserved for intranets. They are ( ).
A.10.0.0.0-10.255.255.255
B.127.0.0.0-127.255.255.255
C.172.16.0.0-172.31.255.255
D.192.168.0.0-192.168.255.255
Answer: acd


317. Which of the following is correct? ( )
A.IP is a network layer protocol
B.TCP is a reliable host-to-host protocol
C.UDP is a best-effort forwarding host-to-host protocol
D.ICMP is designed for control, test, and management of IP network
Answer: abcd


318. Which of the following is a multicast address? ( )
A.192.168.10.1
B.224.0.0.10
C.232.10.0.20
D.10.0.0.10
Answer: bc

TestInside GB0-183

319. If the subnet mask of Class B address is 255.255.255.248, then there are ( ) host addresses available in each
subnet.
A.10
B.8
C.6
D.4
Answer: c


320. Which of the following set the subnet mask correctly? ( )
A.Set the bits corresponding to the network address to zeros
B.Set the bits corresponding to the host address to ones.
C.Set the bits corresponding to the network address to ones.
D.None of the above is right.
Answer: c


321. With the subnet mask 255.255.0.0, which one of the following is not in the same network segment with the
others? ( )
A.172.25.15.201
B.172.25.16.15
C.172.16.25.16
D.172.25.201.15
Answer: c


322. Which of the following is an available host address? ( )
A.131.255.255.18/16
B.220.103.256.56/24
C.192.5.91.255/24
TestInside GB0-183
D.192.5.255.255/24
Answer: a


323. Which of the following is the correct binary value for IP address 202.112.108.158? ( )
A.11001010 01110000 01101100 10011110
B.11001010 01101100 01101100 10011001
C.10110011 11001110 10010001 00110110
D.01110111 01111100 01110111 01110110
Answer: a


324. Which of the following data transmission types are supported by TCP/IP? ( )
A.Multicast, broadcast, and unicast
B.Multicast, unicast and IP data
C.Anycast, multicast and unicast
D.IP data, multicast, and broadcast
Answer: a


325. What protocol is adopted by the File Transfer Protocol (FTP)? ( )
A.ICMP
B.UDP
C.TCP
D.IGMP
Answer: c


326. The Simple Network Management Protocol (SNMP) works at the ( ).
A.Transport layer
B.Application layer
TestInside GB0-183
C.Physical layer
D.Data link layer
Answer: b


327. The TCP Port number of HTTP is ( ).
A.68
B.67
C.80
D.23
Answer: c


328. What is used by the transport layer to identify and distinguish the upper-layer application programs? ( )
A.MAC address
B.Source IP address
C.Destination IP address
D.Port number
Answer: d


329. Transport layer protocol includes ( ).
A.TCP
B.ICMP
C.IP
D.UDP
Answer: ad


330. The FTP port number is ( ).
A.53
TestInside GB0-183
B.6/17
C.20/21
D.161
Answer: c


331. Which of the following is a correct description of Time To Live (TTL)? ( )
A.When the TTL is 0, the packet will be dropped.
B.When the TTL is 2, the packet will be dropped.
C.The TTL is deducted by 1 after passing through a router.
D.The TTL is deducted by 2 after passing through a router.
Answer: ac


332. Which of the following is contained in the IP packet header? ( )
A.ToS
B.TTL
C.Total length
D.Version number
Answer: abcd


333. Which of the following is a correct description of ICMP? ( )
A.It is generally used by IP or the upper layer protocols.
B.ICMP Echo Reply message means the node is reachable.
C.ICMP defines the source quench packet.
D.It is a network layer protocol.
Answer: acd


334. Binary IP address 00001010 01101110 10000000 01101111 can be converted to ( ).
TestInside GB0-183
A.10.151.192.101
B.10.110.192.111
C.10.110.191.111
D.101.110.191.111
Answer: b


335. To combine Class C IP networks 192.168.168.0, 192.168.169.0, 192.168.170.0, and 192.168.171.0 into a
supernet, the most reasonable subnet mask is ( ).
A.255.255.248.0
B.255.255.255.0
C.255.255.252.0
D.255.255.224.0
Answer: c


336. Which of the following is a correct description of TFTP? ( )
A.It uses the services provided by TCP.
B.It is applicable to links of far distance and less reliability.
C.It uses UDP to provide services.
D.It is generally applicable to LANs for reliable file transfer.
Answer: cd


337. Which of the following is a correct description of IPv4 addresses? ( )
A.IPv4 addresses are also called logical addresses.
B.The IPv4 public network address is globally unique.
C.IPv4 addresses consist of 32 binary digits.
D.None of the above is right.
Answer: abc

TestInside GB0-183

338. Which of the following is a correct description of service port number in TCP/IP implementation? ( )
A.Allocated and managed by the IANA.
B.Port numbers those are smaller than 255 are reserved for public applications.
C.Port numbers ranging 255-1023 are allocated to companies.
D.Port numbers those are higher than 1023 are temporary port numbers.
Answer: abcd


339. Which of the following describes the Socket correctly? ( )
A.It falls into source and destination Sockets.
B.It is used to identify a TCP connection.
C.Source Socket is a combination of the source port number and the source IP address.
D.Destination Socket is a combination of the destination port number and the destination IP address.
Answer: abcd


340. Which of the following describes the reserved TCP/UDP port numbers correctly? ( )
A.HTTP 80
B.SNMP 160
C.DNS 53
D.SMTP 25
Answer: acd


341. Which of the following is a private IP address? ( )
A.10.0.0.1/8
B.100.0.0.1/16
C.192.168.0.1/24
D.255.0.0.1/24
Answer: ac
TestInside GB0-183


342. For a Class C IP address, if the subnet mask is 255.255.255.248, then ( ) subnets are available.
A.16
B.32
C.30
D.128
Answer: c


343. Network segments 192.168.1.0/24, 192.168.2.0/24 and 192.168.3.0/24 can be aggregated into ( ).
A.192.168.1.0/22
B.192.168.2.0/22
C.192.168.3.0/22
D.192.168.0.0/22
Answer: d


344. The default mask for Class B addresses is ( ).
A.255.255.255.0
B.255.255.0.0
C.255.255.255.240
D.255.0.0.0
Answer: b


345. The data unit at the network layer is called ( ).
A.Fragment
B.Frame
C.Bit
D.Packet
TestInside GB0-183
Answer: d


346. Data fragmentation in TCP/IP is implemented at the ( ).
A.Physical layer
B.Network layer
C.Transport layer
D.Application layer
E.Data link layer
Answer: c


347. The transport layer uses ( ) to identify application programs at the application layer.
A.Protocol number
B.IP address
C.Serial number
D.Port number
Answer: d


348. Which of the following application uses TCP as the transport layer protocol? ( )
A.FTP
B.TFTP
C.Telnet
D.DNS
E.BootP
Answer: ac


349. Address Resolution Protocol (ARP) is used to get the ( ) address of a host according to its ( ) address.
A.MAC,MAC
TestInside GB0-183
B.IP,MAC
C.IP,IP
D.MAC,IP
Answer: d


350. Which of the following applications use UDP as the transport layer protocol? ( )
A.FTP
B.TFTP
C.Telnet
D.DNS
E.BootP
Answer: bde


351. The IP layer is responsible for the reliability of data exchange. ( )
T.True
F.False
Answer: f


352. DHCP data unit is encapsulated in TCP segment. ( )
T.True
F.False
Answer: f


353. Telnet establishes a/an ( ) connection between the client and the remote server through the TCP/IP module.
A.TCP
B.ARP
C.UDP
TestInside GB0-183
D.RARP
Answer: a


354. IP provides connectionless and unreliable services. But it can re-order the data, and then deliver it to the
application layer. ( )
T.True
F.False
Answer: f


355. The network layer protocol uses specific protocol numbers to distinguish transport layer protocols. For
example, it uses ( ) to identify TCP, and uses ( ) to identify UDP.
A.17 and 6
B.6 and 17
C.18 and 7
D.7 and 18
Answer: b


356. Which of the following describes the TTL field in the IP packet header correctly?( )
A.The maximum value of TTL is 65535.
B.Normally, routers do not receive IP packets whose TTL is 0.
C.TTL is mainly to prevent cycling forwarding of IP packets, thus preventing bandwidth waste.
D.Whenever the IP packet passes through a device, such as hub, switch or router, a certain value will be deducted
from TTL.
Answer: bc


357. A field in the IP packet is used to describe the life period of the packet, that is, the TTL. Its value can be up to
( ).
TestInside GB0-183
A.255
B.254
C.64
D.63
Answer: a


358. ( ) is a network layer protocol. It provides the error reports and the information about IP packet processing
that shall be returned to the source.
A.TCP
B.UDP
C.ICMP
D.IGMP
Answer: c


359. The length of the fixed fields in the IP packet header is ( ) bytes.
A.10
B.20
C.30
D.60
Answer: b


360. Which of the following is wrong about ARP? ( )
A.All packets of ARP are sent in the form of broadcast.
B.The ARP Request will be sent only when the sender thinks that the destination host is not within the same
logical network (the same IP network segment).
C.ARP is an application layer protocol.
D.The MAC address can be obtained through the IP address.
Answer: abc
TestInside GB0-183


361. Which of the following is right about the transport layer? ( )
A.The transport layer is responsible for routing and packet forwarding.
B.It splits application data into segments that are more suitable to transmit.
C.It is used for the software flow control to reduce congestion possibilities.
D.It consists of receiving buffer and sending buffer.
Answer: bcd


362. The transport layer protocol uses port number to identify and distinguish upper layer application programs.
Which of the following are the ports allocated by the IANA? ( )
A.0-1023
B.0-1024
C.1-1023
D.1-1024
E.None of the above
Answer: c


363. Which of the following parameters can uniquely identify a TCP connection? ( )
A.Source port number, and source IP address
B.Destination port number, and destination IP address
C.Source port number, and destination port number
D.Source MAC address, and destination MAC address
E.None of the above
Answer: e


364. TCP identify different connections through ( ).
A.Port number
TestInside GB0-183
B.Port number and IP address
C.Port number and MAC
D.IP address and MAC address
Answer: b


365. Which kind of ICMP message is used by PING application? ( )
A.Redirect
B.Source quench
C.Echo Request and Echo Reply
D.Destination unreachable
Answer: c


366. To establish a TCP connection, two hosts need three-way handshakes before data transmission. To terminate
the connection, they need two-way handshakes. ( )
T.True
F.False
Answer: f


367. The common field in the UDP header and the TCP header is ( ).
A.Source IP address
B.Flow control
C.Checksum
D.Sequence number
E.Destination port
F.Source port
Answer: cef


TestInside GB0-183
368. When the sliding window is in size 0, the receiving party has received all data, and the sending party will
stop the transmission. ( )
T.True
F.False
Answer: f


369. The bandwidth of a ISDN B channel is ( ).
A.8 kbps
B.9.6 kbps
C.64 kbps
D.128 kbps
Answer: c


370. ISDN BRI is a ( ) channel.
A.2B+D
B.30B+D
C.Coaxial cable
D.Common telephone line
Answer: a


371. The physical medium of ISDN BRI is ( ).
A.2B+D
B.30B+D
C.Coaxial cable
D.Copper twisted-pair cable
Answer: d


TestInside GB0-183
372. The D channel in ISDN PRI functions ( ).
A.To transmit voices
B.To transmit user data.
C.To transmit synchronous signals
D.To transmit signaling
Answer: d


373. The bandwidth of ISDN BRI is ( ).
A.16 kbps
B.64 kbps
C.144 kbps
D.2048 kbps
Answer: c


374. How many B channels can the ISDN PRI provide? ( )
A.2
B.23
C.30
D.32
Answer: c


375. ISDN terminal equipments include ( ).
A.E1
B.TE1
C.E2
D.TE2
Answer: bd

TestInside GB0-183

376. ITU-T specially designs a solid model on the basis of the ISO for the ISDN protocol. The model consists of ( )
planes.
A.2
B.3
C.6
D.7
Answer: b


377. An ordinary PC is a specialized ISDN terminal equipment, which can be connected to the ISDN directly. ( )
T.True
F.False
Answer: f


378. The control plane C of ISDN is a protocol of control signaling. It consists of 7 layers, and controls all the
calls and the network performance. ( )
T.True
F.False
Answer: t


379. The user plane U of ISDN is a user information protocol. It consists of 3 layers, and defines all rules to
exchange data on the user information transmission channel. ( )
T.True
F.False
Answer: f


380. The management plane M of ISDN are internal operation rules for terminals or ISDN nodes. It consists of 7
TestInside GB0-183
layers.
T.True
F.False
Answer: f


381. The control plane C and user plane U of ISDN can communicate with management plane M through
primitives. ( )
T.True
F.False
Answer: t


382. The management entity of management plane M coordinates the control plane C with the user plane U. The
two planes do not communicate directly. ( )
T.True
F.False
Answer: t


383. NT1 in the ISDN mainly realizes the function of the second layer of OSI. ( )
T.True
F.False
Answer: f


384. NT1 of the ISDN functions for user line transmission, loop test and D channel competition. ( )
T.True
F.False
Answer: t

TestInside GB0-183

385. An ISDN digital phone set is an user equipment complying with the ISDN interface standard, that is the TE1.
T.True
F.False
Answer: t


386. TE2, also known as ISDN standard terminal equipment, is an user equipment complying with the ISDN
interface standard.
T.True
F.False
Answer: f


387. To access the Internet and make phone calls at the same time, you can use NT1+and ISDN adaptor. The
telephone should be connected to the NT1+analog interface. The Internet access is provided through the ISDN
adaptor.
T.True
F.False
Answer: t


388. An ISDN connection is activated through dialing. It can transmit voice, data and video on the existing copper
twisted-pair cables. ( )
T.True
F.False
Answer: t


389. The backup center is to ( ).
A.Improve network reliability
TestInside GB0-183
B.Enhance network availability
C.Improve data transmission speed
D.Reduce transmission delay
Answer: ab


390. Which of the following is right about the active interface of the backup center? ( )
A.It is backed up by other interface
B.Any physical interface can act as an active interface.
C.It can be a logical interface
D.Any sub-interface can act as an active interface
Answer: abcd


391. Which of the following is right about the standby interface of the backup center? ( )
A.It is used to back up other interfaces.
B.It can be a physical interface
C.It can be a logical interface
D.It can be a logical channel
Answer: abcd


392. The interface with multiple physical channels (such as ISDN BRI and ISDN PRI) can backup multiple
interfaces through the ( ).
A.Dialer Route
B.OSPF
C.RIP
D.IS-IS
Answer: a


TestInside GB0-183
393. An active interface can have multiple standby interfaces. In case of failures, the replacing interface can be
decided according to ( ).
A.The configuration sequence
B.Logical interfaces have the preference
C.Physical interfaces have the preference
D.The priorities
Answer: d


394. Which of the following is right about backup center configuration? ( )
A.If static routing is adopted, there is no need to consider whether there is a route to the destination network for
the static routes exist all the time.
B.If the dynamic routing protocol is adopted, there is no need to consider whether there is a route to the
destination network for dynamic routing protocol can discover routes automatically.
C.Whether dynamic routing or static routing is adopted, the active/standby interface shall provide a route to the
destination network.
D.The configurations of active/standby interface have nothing to do with routing, there is no need to consider it.
Answer: c


395. To specify a physical interface as the standby interface in the active interface view, the command shall be ( ).
A.standby interface [priority]
B.standby interface interface-type [priority]
C.standby interface interface-type interface-num[priority].
D.standby interface interface-type interface-num priority [priority]
Answer: c


396. If the standby interface is a logical channel, which of the following is true? ( )
A.There is no difference between using a logical channel and using a physical interface as a standby interface.
B.You shall associate the logical channel with the virtual circuit or the dialer route.
TestInside GB0-183
C.You shall configure the standby interface in the logical channel.
D.You shall associate the logical channel with the active interface through dialer route.
Answer: b


397. In command standby timer delay second1 second2, the parameter second1 refers to ( ).
A.The delay to switch from using the active interface to using the standby interface
B.The delay to switch from using the standby interface to using the active interface
C.The delay to switch between standby interfaces with same priorities.
D.The interval of routing update.
Answer: a


398. In command standby timer delay second1 second2, parameter second2 refers to ( ).
A.The delay to switch from using the active interface to using the standby interface
B.The delay to switch from using the standby interface to using the active interface
C.The delay to switch between standby interfaces with same priorities.
D.The interval of routing update.
Answer: b


399. By default, the delay to switch from using the standby interface to using the active interface is ( ) seconds.
A.0
B.10
C.30
D.A polling period
Answer: a


400. The delay to switch from using the standby interface to using the active interface ranges ( ) seconds.
A.0-65534
TestInside GB0-183
B.0-65535
C.10-65534
D.10-65535
Answer: b


401. The delay to switch from using the active interface to using the standby interface ranges ( ) seconds.
A.0-65534
B.0-65535
C.5-65534
D.5-65535
Answer: b


402. Command standby threshold should be configured on the ( ) of the backup center.
A.active interface
B.standby interface
C.active interface and the standby interface
D.active interface or the standby interface
Answer: a


403. In command standby threshold Threshold1 Threshold2, parameter Threshold1 refers to ( ).
A.the percentage of low threshold
B.the percentage of high threshold
C.high threshold of switch interval
D.low threshold of switch interval

Answer: b


TestInside GB0-183
404. In command standby threshold Threshold1 Threshold2, parameter Threshold2 refers to ( ).
A.the percentage of low threshold
B.the percentage of high threshold
C.high threshold of switch interval
D.low threshold of switch interval
Answer: a


405. Command standby threshold Threshold1 Threshold2 is to ( ).
A.Set the traffic percentage
B.Set the switch delay
C.Set the backup polling
D.Set load sharing
Answer: d


406. Command standby timer delay second1 second2 is to ( ).
A.Set the traffic percentage
B.Set the switch delay
C.Set the backup polling
D.Set load sharing
Answer: b


407. Which of the following can act as an active interface of the backup center? ( )
A.Virtual-template interface
B.Dialer interface
C.MFR interface
D.Logical channel
Answer: ab

TestInside GB0-183

408. Which of the following provides multiple physical channels? ( )
A.POS interface
B.Asynchronous/Synchronous serial interface
C.ISDN BRI
D.ISDN PRI
Answer: cd


409. Which of the following is right about backup? ( )
A.Backup interfaces can be provided for any interface on the router.
B.Backup interfaces can be provided only for physical interfaces on the router.
C.Logical interfaces are not physically existing interface; therefore, the backup interfaces for them are necessary.
D.Physical interfaces may be affected by many factors; therefore, the backup interfaces for them are necessary.
E.None of the above
Answer: e


410. Using the following commands on the router:
[H3C] ip route 129.102.0.0 16 serial 0/0
[H3C] ip route 129.102.0.0 16 serial 0/1
[H3C] ip route 129.102.0.0 16 serial 0/2
[H3C] interface serial 0/0
[H3C-Serial0/0] standby interface serial 0/1 30
[H3C-Serial0/0] standby interface serial 0/2 10
if the interface serial0/0 is shut down, the ( ) will replace it as the active interface.
A.first sub-interface under serial0/0
B.interface serial0/1
C.interface serial0/2
D.last sub-interface under serial0/0
Answer: b
TestInside GB0-183


411. Using the following commands on the router:
[H3C] ip route 129.102.0.0 16 serial 0/0
[H3C] ip route 129.102.0.0 16 serial 0/1
[H3C] ip route 129.102.0.0 16 serial 0/2
[H3C] interface serial 0/0
[H3C-Serial0/0] standby interface serial 0/1 30
[H3C-Serial0/0] standby interface serial 0/2 10
if the interface serial0/0 is in transmission, and we shutdown the interface serial0/2, the transmission interface will
be the ( ).
A.first sub-interface under serial0/0
B.interface serial0/1
C.interface serial0/2
D.interface serial0/0
Answer: d


412. Using the following commands on the router:
[H3C] ip route 129.102.0.0 16 serial 0/0
[H3C] ip route 129.102.0.0 16 serial 0/1
[H3C] ip route 129.102.0.0 16 serial 0/2
[H3C] interface serial 0/0
[H3C-Serial0/0] standby interface serial 0/1 30
[H3C-Serial0/0] standby interface serial 0/2 10
if the interface serial0/0 is in transmission, and we configure [H3C-Serial0/0] standby interface serial 0/2 40, the
transmission interface will be the ( ).
A.first sub-interface under serial0/0
B.interface serial0/1
C.interface serial0/2
D.interface serial0/0
TestInside GB0-183
Answer: d


413. Using the following commands on the router:
[H3C] ip route 129.102.0.0 16 serial 0/0
[H3C] ip route 129.102.0.0 16 serial 0/1
[H3C] ip route 129.102.0.0 16 serial 0/2
[H3C] interface serial 0/0
[H3C-Serial0/0] standby interface serial 0/1 30
[H3C-Serial0/0] standby interface serial 0/2 10
if the interface serial0/0 is in transmission, and we configure [H3C-Serial0/0] standby interface serial 0/2 40, and
then shutdown the interface serial0/0, the transmission interface will be the ( ).
A.first sub-interface under serial0/0
B.interface serial0/1
C.interface serial0/2
D.interface serial0/0
Answer: c


414. If load sharing is adopted in the backup center, and the backup interface is not up, then what problem will
occur? ( )
A.Half of the packets will be lost for they are sent to the backup interface.
B.As the backup interface is not up, all the packets will be lost.
C.If the active interface is not down, no problem will occur.
D.Only uni-direction transmission can be made.
Answer: a


415. Configure on the router with command standby threshold 50 20. If the bandwidth of the link is 100Mbps, and
the traffic on the active interface is 80Mbps and then reduced to 10Mbps, the system will finally ( ).
A.Enable the backup interface
TestInside GB0-183
B.Not enable the backup interface
C.Shutdown the backup interface
D.Shutdown the backup interface permanently
Answer: c


416. When the status of the active interface changes from up to down, the system does not switch to the backup
interface immediately, it will wait for a pre-defined delay. If the active interface recovers within this delay time,
then ( )
A.No active/standby switchover is performed.
B.Active/Standby switchover is performed, and the active interface will be switched back when the backup
interface is down.
C.Active/Standby switchover is performed, and the active interface will be switched back when the active
interface is up.
D.No active/standby switchover is performed for the first time, and it is performed when such problem occurs for
the second time.
Answer: a


417. Which of the following is correct about IP addresses? ( )
A.The IP address can be built in the hardware, and it is unique.
B.The IP address can be classified into A, B, C, D and E classes.
C.The IP address is usually expressed in hex digits that are separated with dots, such as 10.110.192.111.
D.The IP address consists of 32 binary digits.
Answer: bd


418. The network portion of IP address 10.1.0.11 is ( ).
A.10
B.10.1
C.10.1.0
TestInside GB0-183
D.None of the above
Answer: d


419. Which of the following is correct about private IP addresses? ( )
A.Private IP addresses are reserved by the InterNIC.
B.Direct Internet access with private IP addresses is not available.
C.NAT can be adopted for converting private IP address into public IP addresses that can be identified by Internet.
D.Some IP addresses in Classes A, B, C and D addresses are allocated as private addresses, and there is no private
address in Class E.
Answer: bc


420. Which of the following is correct about IP addresses? ( )
A.The IP address consists of network address and host address.
B.The network address of Class A is of 8 bits, and actually only 7 bits are effective.
C.Class D addresses usually act as multicast addresses. And in the network address portion, the first decimal
number ranges from 224 to 239.
D.NAT is usually used for converting Class A addresses to Class C addresses.
Answer: abc


421. Which of the following is right about the IP address? ( )
A.The IP address consists of network address and host address.
B.The network address of Class A address is the first 8 bits. The first decimal number ranges from 0 to 126 (127 is
reserved for other purpose).
C.The IP address adopts dotted-decimal notation, such as 10.110.168.121.
D.A IP address whose host address portion are all ones is called network address, which is used to identify all the
hosts in a network.
Answer: ac

TestInside GB0-183

422. Which of the following is not a private address? ( )
A.10.0.0.0/8
B.172.16.0.0/12
C.192.168.0.0/16
D.224.0.0.0/8
Answer: d


423. 10.0.10.32/255.255.255.224 indicates ( ).
A.A host address
B.A network address
C.A broadcast address
D.None of the above
Answer: b


424. Subnet partition can be used to expand IP address space, thus providing more IP addresses. ( )
T.True
F.False
Answer: f


425. Which of the following can be a legal IP address of a host? ( )
A.221.0.0.1/24
B.224.0.0.5/28
C.30.10.1.15/28
D.12.2.2.2/30
Answer: ad


TestInside GB0-183
426. Subnet mask can be used to identify which part of the IP address is the network address, and which part is the
host address? ( )
T.True
F.False
Answer: t


427. Subnet mask 255.255.255.224 is applied to network 192.168.1.0. Which of the following is right? ( )
A.Four valid subnets are allocated.
B.Six valid subnets are allocated.
C.The valid number of hosts in each subnet is 30.
D.The valid number of hosts in each subnet is 31.
E.The valid number of hosts in each subnet is 32.
Answer: bc


428. Classless Intra-Domain Route (CIDR) breaks through traditional IP address classification. It can aggregate
multiple routes in the routing table into one route, thus, reducing the size of the routing table. ( )
T.True
F.False
Answer: t


429. Subnet mask 255.255.192.0 is adopted for network 172.16.0.0. Which of the following is right? ( )
A.Two valid subnets are allocated.
B.Four valid subnets are allocated.
C.The broadcast address of one subnet is 172.16.191.255
D.The broadcast address of one subnet is 172.16.128.255
Answer: ac


TestInside GB0-183
430. For IP address 192.168.19.125 (with subnet mask 255.255.255.248), which of the following is right? ( )
A.The network address is 192.168.19.120
B.The network address is 192.168.19.121
C.The broadcast address is 192.168.19.127
D.The broadcast address is 192.168.19.128
Answer: ac


431. IPv6 can completely solve the depletion of IP addresses, for IPv6 adopt 256-bit address. ( )
T.True
F.False
Answer: f


432. A Class C network 192.168.5.0 is used for subneting. Ten hosts are required in each subnet. Which subnet
mask is better? ( )
A.Subnet mask 255.255.255.192
B.Subnet mask 255.255.255.224
C.Subnet mask 255.255.255.240
D.Subnet mask 255.255.255.252
Answer: c


433. A Class B IP network is used for subnetting. A maximum of ( ) valid subnets can be provided.
A.2046
B.4096
C.8190
D.16382
Answer: d


TestInside GB0-183
434. A Class B IP network is used for subnetting. A maximum of ( ) valid hosts can be provided in each subnet.
A.16382
B.16384
C.4096
D.4094
Answer: a


435. For Class C network subneting, which of the following is right? ( )
A.Up to 62 hosts can be available in each subnet.
B.IP address 192.168.5.120 (with subnet mask 255.255.255.248) can be allocated to the host.
C.The most subnets are available with subnet mask 255.255.255.252.
D.To limit the hosts of each subnet within 10, subnet mask 255.255.255.248 shall be used.
Answer: ac


436. There are three routes to network 172.168.1.0/24, 172.168.2.0/24 and 172.168.3.0/24 on a router. CIDR can
be used to aggregate them into one route.
T.True
F.False
Answer: t


437. A company has a Class C IP network of addresses, and it needs to be connected with six branch offices.
There are a maximum of 26 hosts in one branch network. If each branch office needs one network segment, you
shall set the subnet mask to ( ).
A.255.255.255.0
B.255.255.255.128
C.255.255.255.192
D.255.255.255.224
Answer: d
TestInside GB0-183


438. In the network 10.32.0.0 with mask 255.224.0.0, the largest host address is ( ).
A.10.32.254.254
B.10.32.255.254
C.10.63.255.254
D.10.63.255.255
Answer: c


439. Which of the following is a legal IP host address? ( )
A.127.8.5.7
B.2.255.255.2/24
C.225.225.200.9
D.192.168.150.255/24
Answer: b


440. If the first octet of a IP address in binary format begins with 1110, this IP address is a ( ).
A.Class D address
B.Class C address
C.Class B address
D.Class A address
Answer: a


441. Which of the following indicates all multicast routers and multicast hosts in a subnet? ( )
A.224.0.0.1
B.224.0.0.2
C.224.0.0.3
D.224.0.0.9
TestInside GB0-183
Answer: a


442. Route entry 10.0.24.0/21 may be aggregated from subnet routes ( ).
A.10.0.22.0/24
B.10.0.23.0/24
C.10.0.25.0/24
D.10.0.26.0/24
Answer: cd


443. if an IP address is 192.168.12.72 with mask 255.255.255.192, the network address and broadcast address of
the segment within which the address is shall be ( ).
A.192.168.12.32 and 192.168.12.127
B.192.168.0.0 and 1255.255.255.255
C.192.168.12.43 and 1255.255.255.128
D.192.168.12.64 and 1192.168.12.127
Answer: d


444. 172.16.10.32/24 indicates the ( ).
A.Network address
B.Host address
C.Multicast address
D.Broadcast address
Answer: b


445. Which of the following is right about interfaces? ( )
A.Physical interfaces fall into LAN interfaces and WAN interfaces.
B.LAN interfaces means mainly the Ethernet interfaces.
TestInside GB0-183
C.WAN interfaces include synchronous/asynchronous serial ports, CE1/PRI interfaces, and ISDN BRI interfaces.
D.Logical interfaces do not exist physically.
Answer: abcd


446. Which of the following is right about Ethernet? ( )
A.Ethernet is electrical bus based network.
B.Ethernet adopts the CSMA/CD mechanism.
C.Ethernet provides short transmission distance (500 meters in maximum).
D.None of the above
Answer: ab


447. Which of the following is a right description on Ethernet protocol standards? ( )
A.IEEE 802.3 defines 10M Ethernet standards and specifications.
B.IEEE802.3z and 802.3ab define 100M Ethernet standards and specifications.
C.IEEE 802.3u defines 1000M Ethernet standards and specifications.
D.IEEE802.3 series protocols define that only twisted-pair can be used for data transmission.
Answer: a


448. 1000Base-T adopts category 5 and category 6 twisted-pair cable with the maximum transmission distance
500m. ( )
T.True
F.False
Answer: f


449. IEEE 802.3ab defines 1000M Ethernet specifications of optical fiber transmission.
T.True
F.False
TestInside GB0-183
Answer: f


450. The physical medium of 10BASE-T is ( ).
A.Thick coaxial cable
B.Thin coaxial cable
C.Twisted pair cable
D.Optical fiber
Answer: c


451. IEEE802.5 refers to the ( ).
A.Ethernet
B.Token bus network
C.Token ring network
D.FDDI network
Answer: c


452. The resistance of thin coaxial cable is ( ).
A.25 ohms
B.50 ohms
C.75 ohms
D.120 ohms
Answer: c


453. Which of the following is wrong on Ethernet? ( )
A.IEEE802.3ab defines fast Ethernet, which is 10 times faster than standard Ethernet.
B.100BASE-TX consists of 100BASE-T and 100BASE-T4
C.100BASE-T4 adopt category 3 twisted pair, and does not support full duplex.
TestInside GB0-183
D.100BASE-FX can use multi-mode and single-mode optical fibers.
Answer: ab


454. Generally, the synchronous serial port of routers works in the DCE mode, and receives the clock signal
provided by the DTE.
T.True
F.False
Answer: f


455. Which of the following is a narrowband WAN? ( )
A.PSTN
B.Frame Relay
C.ATM
D.ISDN
Answer: abd


456. Which of the following is a right description of X.25? ( )
A.X.25 is a timeslot-based exchange technology.
B.X.25 provides flow control and retransmission mechanism.
C.The maximum transmission rate of X.25 is up to10 Mbps.
D.X.25 is high in transmission delay, and low in throughput.
Answer: bd


457. ATM is a connection-orientated technology. ( )
T.True
F.False
Answer: t
TestInside GB0-183


458. Which of the following is a wrong description on synchronous serial interfaces? ( )
A.Synchronous serial interfaces work only in the DCE mode.
B.They support such data link layer protocols as PPP, Frame Relay and LAPB.
C.They support only IP.
D.Various kinds of cables such as V.24 and V.35 can be used.
Answer: ac


459. Which of the following complies with the EIA-RS_232 interface standard? ( )
A.V.24
B.V.35
C.V.28
D.V.30
Answer: a


460. The maximum transmission rate of V.24 is ( ).
A.19200 bps
B.38400 bps
C.64000 bps
D.115200 bps
Answer: d


461. Which of the following is a WAN data link layer protocol? ( )
A.PPP
B.Ethernet II
C.Frame Relay
D.HDLC
TestInside GB0-183
E.Ethernet SNAP
Answer: acd


462. The default data link layer protocol on the ISDN BRI interface of H3C routers is ( ), which supports such
network layer protocols as ( ).
A.HDLC; IP and IPX
B.Frame Relay; IP
C.PPP; IP
D.Frame Relay; IP and IPX
E.PPP; IP and IPX
Answer: e


463. Which of the following is right about optical fibers? ( )
A.According to the transmission mode, optical fibers fall into single-mode and multi-mode optical fibers.
B.The core of optical fibers is the glass for light transmission.
C.Single-mode optical fibers are small in core diameter. For a given wavelength, only single-mode transmission
can be used.
D.Compared with single-mode fibers, multi-mode fibers are broader in bandwidth, greater in capacity, and longer
in transmission distance.
Answer: abc


464. Which of the following is right about optical connectors? ( )
A.FC: common round optical connector with screw threads
B.ST: square optical connector
C.SC: plug-pull round optical connector
D.PC: protruding polished connector
E.APC: 8 degrees angle protruding polished connector
Answer: ade
TestInside GB0-183


465. The physical medium for Ethernet includes ( ).
A.Thick coaxial cable
B.Thin coaxial cable
C.Category 3 twisted pair cable
D.Category 5 twisted pair cable
E.Optical fiber
Answer: abcde


466. Which of the following is right about Ethernet switches? ( )
A.Upon initialization, the MAC address table of the switch is empty. When the switch receives a frame on a port,
it will check the source MAC address of the frame. If the address is not in the MAC address table, the source
MAC address and the port number will be added to the MAC address table as an entry.
B.When the switch receives a unicast frame, it will check whether the destination MAC address of the frame is in
the MAC address table. When the destination MAC address has a match in the MAC address table and the
corresponding port is same as the receiving port, the frame will be dropped.
C.When the switch receives a broadcast frame, it will send the frame from all ports except the one that receives
the frame.
D.When the switch receives a unicast frame, the destination of the frame is in the MAC address table, and the port
for the destination address is different from the port that receives the frame, the frame will be sent from the port of
the destination address.
E.When the switch receives a unicast frame, and the destination address of the frame is not in the MAC address
table, the frame will be sent from all ports except the one that receives the frame.
Answer: abcde


467. A MAC address table entry of H3C switches includes ( ).
A.VLAN ID
B.MAC address
TestInside GB0-183
C.Port number
D.Aging time
E.State
F.Update time
Answer: abcde


468. 802.2 of IEEE (Logic Link Control, LLC) conceals differences between 802 networks, which provides a
unified format and interface for the network layer. These format, interface and protocol base on the OSI.
T.True
F.False
Answer: t


469. All physical ports of a hub are within the same collision domain, and each physical port of an Ethernet switch
is in a separate collision domain. ( )
T.True
F.False
Answer: t


470. Broadcast domain refers to the network scope that local broadcast packets can reach. Not all the physical
ports of a switch are in the same collision domain, and not all the physical ports in a VLAN are in the same
broadcast domain. ( )
T.True
F.False
Answer: f


471. Which of the following is right? ( )
A.IEEE divides the data link layer of the LAN into two sub-layers which are LLC sub-layer and MAC sub-layer.
TestInside GB0-183
B.The MAC sub-layer implements the functions of the data link layer that have nothing with the hardware, such
as flow control and error recovery.
C.The LLC sub-layer provides the interface between the MAC sub-layer and the physical layer.
D.The MAC sub-layers of different LANs are the same, and the LLC sub-layers are different.
E.The introduction of MAC and LLC sub-layers separates hardware implementation from the software
implementation. Hardware producers can provide different functions and drivers for the network cards, to support
different LANs (such as Ethernet, and token ring), while the software suppliers do not need to consider specific
LAN technologies.
Answer: ae


472. In an Ethernet, each device has a built-in Ethernet physical address. The address is a binary string of ( ) bytes.
A.5
B.8
C.10
D.6
Answer: d


473. The length of 802.3 frame varies from 64 bytes to 1518 bytes. In case of 1518 bytes, the length of user data is
( ).
A.500 bytes
B.204800 bits
C.12000 bits
D.46 bytes
Answer: c


474. Which of the following is a data link layer device? ( )
A.Hub
B.Repeater
TestInside GB0-183
C.Ethernet switch
D.Router
Answer: c


475. The MAC address is a binary string of ( ) bytes. Allocated by the IEEE, the Ethernet MAC address falls into
two parts, the previous ( ) bytes indicate the producer code, and the subsequent ( ) bytes are allocated by the
producer.
A.6 3 3
B.6 4 2
C.6 2 4
D.5 3 2
Answer: a


476. Which of the following is correct about MAC addresses? ( )
A.If the most significant bit is one, the address is a unique address or unicast address.
B.If the most significant bit is zero, the address is a group address or multicast address.
C.If the address is all ones, it is a broadcast address.
D.The source MAC address and the destination MAC address are the same in format.
Answer: cd


477. Which of the following is right about CSMA/CD? ( )
A.Carrier means signals are in transmission in channels.
B.When a site in the Ethernet is to send a frame, it has to wait until the channel is idle, that is, when carrier
disappears.
C.When the channel is idle, the site begins to send the frame after waiting for an interval period.
D.If two sites transmit at the same time, they will detect the signal collision, and adjust the transmission.
Answer: abcd

TestInside GB0-183

478. The Len field in the 802.3 frame indicates the length of LLC frame, which lead to the difference between the
frame structure adopting the DIX standard and the frame structure adopting 802.3. Which of the following
statements is right about this field?
A.In the DIX standard, this field is called Type with 4 bytes in length.
B.The Type field in the DIX standard is used to indicate the upper layer protocol of the data link layer.
C.If the Type field in the DIX standard is x0800, the payload protocol is IP.
D.If the Type field in the DIX standard is x0806, the payload protocol is ARP.
Answer: bcd


479. The transmission distances of 10BASE-5, 10BASE-2 and 10BASE-T are ( ) respectively.
A.300m, 200m, and 100m
B.500m, 200m, and 100m
C.500m, 400m, and 200m
D.300m, 100m, and 200m
Answer: b


480. Cables for the 100BASE-T4 and 100BASE-TX are ( ) respectively.
A.2-pair category 3 twisted-pair and 4-pair category 3 twisted-pair
B.4-pair category 5 twisted-pair and 4-pair category 5 twisted-pair
C.4-pair category 3 twisted-pair and 2-pair category 5 twisted-pair
D.2-pair category 5 twisted-pair and 2-pair category 5 twisted-pair
Answer: c


481. The clock frequency of 100BASE-T4 and 100BASE-TX are ( ) respectively.
A.25 MHz and 125 MHz
B.50 MHz and 100 MHz
C.125 MHz and 25 MHz
TestInside GB0-183
D.75 MHz and 125 MHz
Answer: a


482. The signal over 10M Ethernet medium is the ( ) code signal.
A.Manchester
B.Ternaryl
C.CMI
D.5B6B
Answer: a


483. The signal over 100M Fast Ethernet medium is the ( ) code signal.
A.Manchester
B.Ternary
C.CMI
D.5B6B
Answer: b


484. For the category 5 twisted-pair cable, wires 1 and 2 are used to send signals, and wires 3 and 6 are used to
receive signals and to detect collisions.
T.True
F.False
Answer: t


485. 1000M Ethernet standard is defined in ( ).
A.IEEE 802.3z
B.IEEE 802.3u
C.IEEE 802.3ab
TestInside GB0-183
D.IEEE 802.1Q
Answer: ac


486. Which of the following is right about the 802.X standard? ( )
A.802.2 defines the functions of the LLC sub-layer, one sub-layer of the data link layer.
B.802.3 defines the CSMA/CD media access control modes and related physical layer specifications.
C.802.5 defines the media access control modes of token ring networks, and related physical layer specifications.
D.802.4 defines the media access control modes of token ring networks, and related physical layer specifications.
E.802.6 defines the media access control modes of MAN and related physical layer specifications.
Answer: abe


487. Which of the following is right about collision domain and broadcast domain? ( )
A.All the segments connected by a repeater are in one collision domain.
B.The segments connected by a bridge are in separate collision domains.
C.All the segments connected by a repeater are in one broadcast domain.
D.The segments connected by a bridge are in separate broadcast domains.
Answer: abc


488. Generally, the data forwarding logic of Ethernet switch consists of ( ).
A.MAC address table
B.Learning logic
C.Protocol module
D.Filter forwarding logic
E.Route entries
F.Interfaces
Answer: abdf


TestInside GB0-183
489. Multiple repeaters and cable segments can be used in Ethernet. If the delay is high, collision will not be
detected. To prevent such situation, 802.3 specifies that there shall be no more than 2.5 km between two
neighbouring repeaters, and there shall not be more than four repeaters between two transceivers. ( )
T.True
F.False
Answer: t


490. In the DIX standard, there is a Type filed in the Ethernet frame, which is used to indicates the upper layer
protocol of the MAC sub-layer. That means the MAC frame in the DIX standard can carry LLC frames not
specified in IEEE802.2. ( )
T.True
F.False
Answer: t


491. The last field (CRC) of IEEE 802.3 MAC frame is a checksum field, which is used to detect errors during
transmission. ( )
T.True
F.False
Answer: t


492. The PAD field of IEEE 802.3 Ethernet frame is used for filling up to ensure the frame is at least 68 bytes.
The purpose to define the shortest frame is to prevent such possibility as the sending is over before any detection
of collisions. ( )
T.True
F.False
Answer: f


TestInside GB0-183
493. With the traditional Ethernet connection method, a host can be connect to a 10BASE-2 cable with a passive
BNC T-shape connector. ( )
T.True
F.False
Answer: t


494. According to the CSMA/CD specifications, the transmission should be stopped upon collision detection. In
addition, a collision-occurred signal should be sent. After a random time, the channel should be re-monitored until
it is idle. The rules for the random time shall be as follows: If the packet incurs n (n>16) times of collisions, then
the node selects number K randomly among 0, 1, ., 2n-1 with the same possibility, and then it waits K*512 bits of
time. If n<15, the sending will be cancelled. ( )
T.True
F.False
Answer: f


495. Which of the following statements is right? ( )
A.The receiving party of a unicast packet is unique, while the receiving parties of a broadcast packet are all hosts
within the broadcast domain. Therefore, unicast packets occupy lower bandwidth, while broadcast packets waste
lots of bandwidth resource.
B.Either the source or the destination of a unicast packet is a single host, therefore, unicast is mainly applicable to
point-to-point communications.
C.The source of broadcast packets is a single host, while the destination can be all hosts in the LAN.
D.The source of a multicast packet is a single host, and the destination can be all hosts in the group.
Answer: abcd


496. Which of the following is right about VLAN? ( )
A.IEEE802.1q defines VLANs.
B.VLANs utilize the software to realize the partition of Layer-2 broadcast domain through software, which solves
TestInside GB0-183
the insufficiency in broadcast domain partition of routers.
C.VLANs put users at different physical network segments into one LAN logically, which functions and is
operated as the traditional LAN. Interconnection of terminal systems within a certain scope can be provided.
D.A VLAN is a broadcast domain. Ethernet reduces the scope of broadcast domain through using VLANs.
Answer: abcd


497. Compared with the traditional LAN, what advantages does VLAN have? ( )
A.Reduce the moving and changing cost
B.Establish virtual work groups
C.Users are not restricted by physical equipment, and they can be located anywhere of the network.
D.Restrict broadcast packets, and improve bandwidth utilization.
E.Enhance transmission security
F.Enhance network robustness
Answer: abcdef


498. LAN can be partitioned into VLANs with the following methods: ( )
A.Port based
B.MAC address based
C.Port property based
D.Protocol based
E.Subnet based
Answer: abde


499. According to 802.1q, a special tag is added to the original standard Ethernet frame. Which of the following
statements is right about the tag? ( )
A.The tag field consists of TPID, Priority, CFI and VLAN ID.
B.The VLAN ID takes up 14 bits.
C.The Priority takes up 3 bits, which is used to identify the priority of the frame.
TestInside GB0-183
D.The TPID contains a fixed hex value 0x8100.
E.The 802.1q adds a 4 bytes tag field to the end of the destination MAC address of the Ethernet frame.
Answer: acd


500. According to the process of VLAN frames, the port type of H3C Ethernet switch fall into ( ).
A.Access port
B.Trunk port
C.Mirror port
D.Hybrid port
E.Monitor port
Answer: abd


501. Which of the following is right about trunk port and trunk link? ( )
A.The PVID of the trunk port can be modified. If the VLAN ID of the frame and the PVID of the trunk port are
the same, the VLAN ID of the frame will be removed before transmission.
B.If the Trunk port receives an untagged frame, the port PVID will be added to the frame as the VLAN ID for
processing inside the switch.
C.A trunk link can pass multiple frames with different VLAN IDs.
D.Except the frames whose VLAN ID is the same as the PVID of the trunk port, all frames transmitted on a trunk
link must carry a VLAN ID.
Answer: abcd


502. The command to set trunk port on the H3C switch is ( ).
A.[H3C-Ethernet0/1] port link-type trunk
B.[H3C] port link-type trunk
C.[H3C-Ethernet0/1] port trunk permit vlan all
D.[H3C-Ethernet0/1] port trunk pvid vlan_id
Answer: a
TestInside GB0-183


503. Which of the following describes the access port and link of H3C switch correctly? ( )
A.An access port can only belong to one VLAN.
B.An access link can only carry frames without the VLAN ID.
C.An access link can only carry frames with the VLAN ID.
D.When an access port receives a frame without any VLAN ID, the frame will be tagged with the port PVID as
the VLAN ID before forwarded inside the switch.
Answer: abd


504. On a H3C Ethernet switch, which of the following commands will add the access port to a specific VLAN? ( )
A.[H3C] port access vlan_id
B.[H3C-Ethernet0/1] port access vlan_id
C.[H3C-Ethernet0/1] port trunk pvid vlan_id
D.[H3C-Ethernet0/1] port trunk permit vlan all
Answer: b


505. Which of the following commands will perform port aggregation on a H3C Ethernet switch? ( )
A.[H3C] link-aggregation both interface_name1 to interface_name2
B.[H3C] link-aggregation interface_name1 to interface_name2 both
C. link-aggregation interface_name1 to interface_name2 both
D.[H3C] trunk interface_name1 to interface_name2 both
Answer: b


506. Which of the following commands will set the PVID of the trunk port? ( )
A.[H3C] port access vlan_id
B.[H3C-Ethernet0/1] port access vlan_id
C.[H3C-Ethernet0/1] port trunk pvid vlan_id
TestInside GB0-183
D.[H3C-Ethernet0/1] port trunk permit vlan all
Answer: c


507. Which of the following statements describes the mdi { across | auto | normal } command correctly? ( )
A.Parameter across indicates the cable is a straight-through cable.
B.Command mdi is used to set the cable type of the Ethernet port; while undo mdi is to restore the default cable
type of the Ethernet port.
C.Parameter auto indicates that straight-through cable or cross-over cable shall be identified automatically.
D.Parameter normal indicates the cable is a cross-over cable.
Answer: bc


508. With command display interface on H3C switch, what information can you get? ( )
A.Whether the state of the interface is up?
B.Working speed and duplex state of the interface
C.PVID
D.MDI type
E.Flow control status of the port
F.link type of the port
G.Import and export rates and packets statistics in the last five minutes
Answer: abcdefg


509. Which of the following is right about STP? ( )
A.BridgeID consists of the bridge priority and 48-bit bridge MAC address. The previous part is the priority, and
the latter part is the MAC address.
B.The default bridge priority of H3C switch is 32768.
C.The smaller the bridge priority value, the lower the priority.
D.With the same bridge priority value, the smaller the bridge MAC address, the higher the priority.
E.The bridge with the smallest BridgeID will be selected as the root bridge.
TestInside GB0-183
Answer: abde


510. Which of the following is right about mirroring? ( )
A.Mirroring falls into port mirroring and flow mirroring.
B.Port mirroring can not differentiate flows. It would monitor all flows on a specific port.
C.Traffic mirroring can identify and monitor special flows.
D.Port mirroring and traffic mirroring must specify monitor port and mirroring port.
Answer: abc


511. The contents of STP BPDU mainly consist of ( ).
A.BridgeID
B.RootID
C.RootPathCost
D.TransmittingBridgeID
E.TransmittingPortID
Answer: abcde


512. Which of the following commands is to set the priority of the bridge on a H3C switch? ( )
A.[H3C] stp port priority port-priority
B.[H3C] stp priority bridge-priority
C.[H3C] stp bridge-priority priority
D.[H3C] stp cost cost
Answer: b


513. If the MDI type of two switch ports that are connected via Ethernet cable is set to across, then the cable shall
use ( ).
A.Straight-through cable only
TestInside GB0-183
B.Cross-over cable only
C.Straight-through cable or cross-over cable
D.Neither straight-through cable nor cross-over cable
Answer: b


514. Routers work at the ( ) layer of the OSI reference model.
A.1st
B.2nd
C.3rd
D.4th
Answer: c


515. Routers function to ( ).
A.Store
B.Route
C.Forward
D.Broadcast
Answer: abc


516. Routers are composed of ( ) logically.
A.Inbound and outbound interfaces
B.Physical cables
C.The component for data forwarding
D.Power supply
E.The component for routing management
F.User configuration interface
Answer: acef

TestInside GB0-183

517. What functions do routers have? ( )
A.Generating routes and updating the routing table
B.Backing up and monitoring traffic
C.Interconnecting heterogeneous networks
D.Broadcasting
E.Allocating VLANs
Answer: abc


518. Which of the following can be a next hop in a routing table? ( )
A.10.1.1.2
B.21.255.255.0
C.1.1.1.255
D.3.3.3.3
Answer: ad


519. Which of the following can be a mask in a routing table? ( ).
A.1.1.1.2
B.100.255.1.255
C.255.128.0.255
D.255.255.0.0
Answer: d


520. When a H3C middle-end or a low-end router initializes, which keys shall you press to enter the Bootrom
menu? ( )
A.Ctrl+A
B.Ctrl+B
C.Ctrl+C
TestInside GB0-183
D.Ctrl+D
Answer: b


521. The default baudrate of the console interface of the H3C router is ( ).
A.2400bps
B.4800bps
C.9600bps
D.115200bps
Answer: c


522. To upgrade routers with Xmodem, the maximum baudrate shall be set to( ).
A.2400bps
B.4800bps
C.9600bps
D.115200bps
Answer: d


523. What items are included in the routing table? ( )
A.MAC address
B.Subnet mask
C.Destination network address
D.Next hop
Answer: bcd


524. The console interface of the H3C router is a ( ) interface.
A.RJ 45
B.DB25
TestInside GB0-183
C.DB9
D.DB34
Answer: a


525. The COMWARE software of the H3C router can be upgraded through ( ).
A.Xmodem
B.FTP
C.Memory replacement
D.TFTP
Answer: abd


526. Which of the following is a WAN protocol? ( )
A.HDLC
B.SDLC
C.PPP
D.Ethernet II
E.802.1x
Answer: abc

You might also like