GB0-392-MOCK

    23-05-2024

1.Which of the following functions are provided on the access layer?

A. A large amount of interfaces are provided for interconnection among computers of end users.

B. Access security control

C. High-speed packet switching

D. Complex routing policy

2.When the link type of the ONU port is Trunk, the downlink packet processing mode is ______.

A. Only packets without tags can pass through the port, and default VLAN tags are added to the packets.

B. Only packets with default VLAN tags can pass through the port and the tags will be removed.

C. For packets without tags, the port adds default VLAN tags to the packets. For packets with tags, the port directly forwards the packets.

D. Only packets with tags can pass through the port.

3.The VPN can be classified into ______ types according to the operation mode.

A. Intranet VPN

B. Internet VPN

C. CPE-Based VPN

D. Network-Based VPN

4.When an L2TP header is encapsulated to a PPP frame, correct Tunnel ID and Session ID are marked to identify the tunnel and session attributes.
The Tunnel ID in the L2TP header is allocated by ______, and Session ID is allocated by ______.

A. Local LAC, local LAC

B. Peer LNS, peer LNS

C. Local LAC, peer LAC

D. Peer LAC, local LAC

5.For L2TP networking, user authentication methods of LNS include ______.

A. Proxy authentication

B. Forced CHAP authentication

C. IPCP renegotiation

D. LCP renegotiation

6.Which of the following commands is used to clear an established IKE security tunnel?

A. reset ike

B. reset ike tunnel

C. reset ipsec sa

D. reset ike sa

7.A packet captured between two remote routers consists of an IP header, an ESP header, and encrypted data. The packet may experience ______.

A. GRE over IPSec, IPSec adopts the transmission mode.

B. GRE over IPSec, IPSec adopts the tunnel mode.

C. IPSec over GRE, IPSec adopts the transmission mode.

D. IPSec over GRE, IPSec adopts the tunnel mode.

8.Which of the following statements is/are TRUE about PKI workflow?

A. An entity applies for the certificate.

B. RA completes the entity auditing.

C. CA issues the certificate.

D. An entity applies to RA for certificate revocation.

9.Which of the following statements is/are TRUE about AH (Authentication Header) and ESP (Encapsulating Security Payload?

A. Both can provide integrity protection for data.

B. Both can provide data source authentication and optional anti-reply protection.

C. Both can provide confidentiality protection.

D. Both can be used at the same time.

10.Which of the following statements about the MP-BGP neighbor relationship between PEs are correct?

A. An OSPF neighbor relationship must be established between PEs.

B. You must enter the BGP VPNv4 address suite view to enable the MP-BGP neighbor relationship.

C. PEs must use the loopback interface address to establish the BGP neighbor relationship.

11.Which of the following statements about the LR are correct?

A. It is an active traffic adjustment measure and limits the total rate of packets sent from an interface to the downstream interface.

B. The token bucket is used to measure the traffic. When the packets exceeding the committed rate enter the queue again, the general packet loss rate is decreased, the traffic is smoothened, but an extra delay is introduced.

C. It is on the link layer and is valid to all outgoing packets through this port (except for the emergency packets).

D. It does not take effect to non-IP packets.

12.The basic component of MPLS network is called ______.

A. LSR

B. LER

C. LSP

D. LRR

13.On a public network P device of BGP MPLS VPN, the message is forwarded based on _____.

A. Outer MPLS label

B. Inner MPLS label

C. Outer destination IP address

D. Inner destination IP address

14.The following commands are configured on the switch:
qos map-table dot1p-lp
import 1 export 4
import 2 export 5
interface GigabitEthernet1/0/8
port link-mode bridge
port link-type trunk
port trunk permit vlan 1 4
qos trust dot1p
interface GigabitEthernet1/0/9
port link-mode bridge
port link-type trunk
port trunk permit vlan 1 4
qos wrr 5 group 2 weight 50
qos wrr 4 group 1 weight 40
qos gts any cir 65000 cbs 2000000
When packets with traffic being 40 Mbit/s, VLAN ID being 4, and 802.1p priority being 1 and packets with traffic being 40 Mbit/s, VLAN ID being 4, and 802.1p priority being 2 are forwarded by port GE1/0/9, which of the following statements is(are) correct?

A. 80 Mbit/s packets are forwarded normally.

B. Traffic of packets is shaped as 65 Mbit/s for forwarding.

C. Packets with 802.1p priority being 1 are forwarded through egress port GE1/0/9.

D. Packets with 802.1p priority being 2 are forwarded through egress port GE1/0/9.

15.Which of the following statements is/are FALSE about RED (Radom Early Detection)?

A. Messages are discarded after port congestion.

B. Messages are not discarded when the average length of the queue is less than Low-Limit Discard.

C. Messages received are discarded randomly when the average length of the queue is greater than Low-Limit Discard and less than High-Limit Discard.

D. Messages received are discarded randomly when the average length of the queue is greater than High-Limit Discard.

E. The higher the message priority, the lower the message discarding probability, i.e. fewer messages discarded.

GB0-392-MOCK Reference Answer

新华三官网