Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Note! Following H31-161 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

H31-161 HCIE-Carrier IP (Written) Questions and Answers

Questions 4

Refer to the exhibit

.

As shown in the figure, basic BGP/MPLS IP VPN configuration has been completed on routers. Which of the following configurations is incorrect for advertising default

routes in VPN instances on the SPE?

Note: All configurations are performed on the SPE.

Options:

A.

Run the peer 2.2.2.2 enable command in the BGP-VPNv4 subsequent address family view to enable the peer to exchange BGP-VPNv4 routing information.

B.

Run the peer 2.2.2.2 upe command in the BGP-VPNv4 subsequent address family view to

designate the peer as a UPE of the SPE.

C.

Run the peer default-originate vpn-instance command in the BGP-VPNv4 subsequent address family view.

D.

Configure the default-route imported command in the BGP-VPN instance view without importing default IGP routes, and then configure the peer default-originate vpn-instance command in the BGP-VPNv4 address family view.

E.

Configure the peer default-originate vpn-instance command in the BGP-VPNv4 address family view, and then configure the default-route imported command in the BGP-VPN instance view.

Buy Now
Questions 5

Which statement about the tunnel policy configuration is false?(A)

Options:

A.

The tunnel policy is configured in the system view. You can run the tunnel-policy policy-name command to create tunnel policies and enter the tunnel policy view. One VPN instance supports multiple tunnel policies, and multiple VPN instances can share a tunnel policy.

B.

You can run tunnel select-seq { gre | lsp | cr-lsp } * load-balance-number load-balance-number in the tunnel policy view to configure the priorities of tunnels and the number of tunnels among which load is balanced.

C.

You can run the tnl-policy policy-name command in the VPN instance view to apply tunnel

policies to VPN instances. If the required tunnel policy does not exist, the configuration is saved but does not take effect. If you create this tunnel policy in the system view later, the saved configuration will take effect.

D.

If a VPN instance does not have a tunnel policy, an LSP is used and the number of tunnels

configured for load balancing is set to 1

Buy Now
Questions 6

Which of the following statements about the L2VPN are true?

Options:

A.

If the length of a L2VPN packet that arrives at a P node exceeds the maximum transmission unit (MTU) of relevant interfaces of the P node, the packet will be fragmented and then forwarded.

B.

When a traditional L2VPN (ATM and FR) is upgraded to an MPLS L2VPN, the network topology does not need to be adjusted.

C.

When providing the MPLS L2VPN service for enterprise users, the carrier must filter user route advertisements. Otherwise, flapping of user routes may lead to flapping of network routes.

D.

On a L2VPN, routing information of users does not need to be maintained or managed.

Buy Now
Questions 7

According to the inter-AS VPN Option A, which protocol is used to forward traffic between ASBRs?

Options:

A.

MPLS

B.

IP

C.

A or B

D.

None of the above

Buy Now
Questions 8

On the IP bearer network, different VPN users (VPN A and VPN B) must access the internet through the same egress. Which of the following schemes can achieve security isolation VPNs and have the best scalability?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 9

Configure VRFs and relevant policies on a PE as follows:

If a route is imported to the routing table of VRF 1, which VRF can the route match?

Options:

A.

vrf4

B.

vrf3

C.

vrf2

Buy Now
Questions 10

display current-configuration

multicast routing-enable

#

acl number 2000

rule 5 permit source 225.0.0.0 0.0.0.255

#

interface Ethernet6/1/0

ip address 10.1.1.1 255.255.255.0

igmp enable

pim sm

#

igmp

#

pim

ssm-policy 2000

#

return

The preceding are partial multicast router configurations. Which of the following configurations

are required to configure the SSM Mapping on Ethernet 6/1/0 and map IGMPv2 Report messages for multicast group 225.0.0.1 to multicast source 2.2.2.2?

Options:

A.

ssm-mapping 225.0.0.0 255.255.255.0 2.2.2.2

B.

igmp on-demand

C.

igmp prompt-leave

D.

igmp ssm-mapping enable

Buy Now
Questions 11

The VRRP is enabled on the firewall dual-system Intranet users use NAT to access extranet FTP services Which of the following statements are true?

Options:

A.

The NAT cannot be used in easy IP mode.

B.

VRIDs of the VRRP must be bound with the NAT during NAT configuration in the outbound direction between domain.

C.

VRIDs of the VRRP do not need to be bound with the NAI during NAI configuration in the outbound direction between domains.

D.

The FTP Nat Alg function must be enabled on the firewall

Buy Now
Questions 12

In PIM-DM, which of the following scenarios about sending Join messages is true?

Options:

A.

The leaf router in the idle state receives host Join messages.

B.

The router receives prune messages of the RPF neighbor from other routers when it is receiving data from the upstream.

C.

The intermediate router receives graft messages from the downstream router when all

downstream interfaces of the intermediate router are in the prune state.

D.

The router receives state-refresh messages.

Buy Now
Questions 13

Which statement about the edge access layer is true?

Options:

A.

It connects users to the network by providing various access means, and converts the format of

information so that the information can be transmitted on the network.

B.

Using the packet technology, it provides a comprehensive transport platform that boasts high

reliability, quality of service (QoS) assurance, and large capacity.

C.

It implements call control. With the softswitch technology as the core, it completes basic realtime call control and connection control.

D.

It provides additional value-added services and operation support for established calls

Buy Now
Questions 14

Which statement about the MPLS LSP Ping is true?

Options:

A.

The LSP Ping Echo request must contain the downstream mapping TLV

B.

A unique Sender's Handle is generated during each LSP Ping operation

C.

A unique sequence number is generated during each LSP Ping operation

D.

The LSP Ping Echo request may contain the FEC stack TLV

Buy Now
Questions 15

On the IP bearer network, which of the following methods can be used to manage devices on the backbone network and switches on the signaling VPN?

Options:

A.

Construct an outband NM network to manage all devices.

B.

Leak public and private network routes to manage devices on the public and private networks.

C.

Establish two physical or logical links with the PE to manage devices on the public and private networks. One link belongs to the public network and the other belongs to the private network.

D.

Establish a physical or logical link with the PE and mount MCEs to the PE to manage devices on the public and private networks.

Buy Now
Questions 16

As shown in the figure, RTA, RTB, RTC are interconnected over IS-IS, RTA,

RTD, RTE, and RTC are interconnected over OSPF. Both IS-IS and OSPF use the default costs. RSVPTE is enabled on all routers and the interfaces between these routers. The Loopback0 interface of RTC is 192.168.0.3/32 and is advertised in both OSPF and ISIS areas. 192.168.0.3/32 is also the LSR ID of MPLS. Configurations of the MPLS and tunnel on RTA:

#

mpls lsr-id 192.168.0.1

mpls

mpls te

mpls rsvp-te

mpls te cspf

interface Tunnel1/0/0

tunnel-protocol mpls te

destination 192.168.0.3

mpls te tunnel-id 1

mpls te path metric-type igp

mpls te igp metric absolute 1

mpls te commit

#

Which path will be selected when the tunnel becomes Up? What is the metric of this tunnel?

Options:

A.

RTA—RTB—RTC; 1

B.

RTA—RTD—RTE—RTC; 1

C.

RTA—RTB—RTC; 20

D.

RTA—RTD—RTE—RTC; 3

Buy Now
Questions 17

In the access architecture of an IP bearer network, the OSPF protocol is enabled between two access routers, two firewalls (in transparent mode), and two Layer 3 switches. Softswitches work in active/standby mode. VRRP is enabled between the softswitches to provide a gateway. In normalcases, SW1 is the master router and SW2 is the backup router. Considering the reliability of the access network, how would you plan the cost value of each link in the OSPF area?

Options:

A.

a=b=c=d

B.

c>a+b+d

C.

d>a+b+c

D.

a=b>c=d

Buy Now
Questions 18

The inner VLAN tag in layer 2 user packets is used to differentiated key services from other services. If packets are not processed after being encapsulated by QinQ, the 802. 1p information of the inner VLAN tag becomes invalid. After the QinQ is employed, three methods can be used to configure conditions for sensing 8021p configuration of the inner VLAN tag:

1. Reset the 802.1p of the outer VLAN tag regardless of the existing 02 1p configurations of the inner VLAN tag.

2. Automatically swap the 802. 1p configurations of the inner VLAN tag to that of the outer VLAN tag.

3. Reset the 802.1p configurations of the outer VLAN tag based on the existing 802.1p configurations of the different VLAN tags

Options:

A.

True

B.

False

Buy Now
Questions 19

Which of the following statements about TE FRR in forwarding adjacency (FA) mode and TE FRR in IGP Shortcut mode are true?

Options:

A.

When TE FRR in FA mode is enabled, nodes except the node on which FA is configured can sense the TE tunnel interface. When the primary tunnel link becomes faulty, the PLR switches traffic to the bypass tunnel through protection switching. The upstream node assumes the TE tunnel link is normal and therefore it continues traffic forwarding. In this case, the route does not change and an FRR is not triggered.

B.

When TE FRR in FA mode is enabled, nodes except the node on which FA is configured can sense the TE tunnel interface. When the primary tunnel link becomes faulty, the PLR switches traffic to the bypass tunnel through protection switching. The upstream node assumes the TE tunnel link changes and therefore it triggers an FRR.

C.

When TE FRR in IGP Shortcut mode is enabled, nodes except the node on which FA is configured cannot sense the TE tunnel interface. When the primary tunnel link becomes faulty, the PLR switches traffic to the bypass tunnel through protection switching. On the PLR, traffic is still forwarded through the bypass tunnel. The upstream node of the PLR cannot sense the TE tunnel interface and does not trigger an FRR.

D.

When TE FRR in IGP Shortcut mode is enabled, nodes except the node on which FA is configured cannot sense the TE tunnel interface. When the primary tunnel link becomes faulty, the PLR switches traffic to the bypass tunnel through protection switching. Though the upstream node of the PLR cannot sense the TE tunnel interface, IGP can sense the faulty link. Therefore, the upstream node triggers an FRR.

Buy Now
Questions 20

#

interface Ethernet6/1/1

ip address 40.1.1.4 255.255.255.0

igmp prompt-leaveigmp enable

pim sm

#

IGMP interface group report information of VPN-Instance: public net

Ethernet6/1/1(40.1.1.4):

Total 1 IGMP Group reported

Group: 224.1.2.3

Uptime: 00:00:32

Expires: 00:04:38

Last reporter: 30.1.1.30

Last-member-query-counter: 0

Last-member-query-timer-expiry: off

Version1-host-present-timer-expiry: off

The preceding information shows the configurations of Ethernet 6/1/1 and entries created based on received IGMPv2 Report messages. Which action does Ethernet 6/1/1 perform after receiving Leave messages for group 224.1.2.3?

Options:

A.

Sends group-specified query messages for group 224.1.2.3.

B.

Deletes the record of group 224.1.2.3.

C.

Both A and B are correct.

D.

Neither A nor B is correct.

Buy Now
Questions 21

Which statement describes the delay requirement of the voice service for the IP bearer network?

Options:

A.

Bearer network delay=50 ms, allowed maximum delay = 100 ms

B.

Bearer network delay=150 ms, allowed maximum delay = 200 ms

C.

Bearer network delay=10s, allowed maximum delay = 20s

D.

No strict requirement.

Buy Now
Questions 22

As shown in the figure, the bearer network is deployed in full mesh mode. For example, RTA uses the physical interface ATM 1/0/0. The interface is devised into ATM 10/0.2 connect to RTC and RTD, respectively . The GigabiteEthernet 2/0/0 and GigabitEthernet 3/0/0 interface are used to set up a trunk as the VRRP heartbeat cable. The UMG work in active/standby mode. Media interface connected to RTA and RTB belong to VLAN 10. VRRP is enable at the VLAN interface RTA is the master router. The interface is configured as follows:

Which of the following RTA configurations are correct in VLAN 10?

A)

B)

C)

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 23

Which of the following are conditions for bringing the remote CCC connection Up? (ABE)

Options:

A.

The interface that is bound to a CCC connection is physically Up.

B.

MPLS is enabled on the outbound interface of the public network.

C.

MPLS LDP is enabled on the outbound interface of the public network.

D.

If a next hop is specified in CCC configuration, a route to the next hop is available.

E.

If an outbound interface is specified in CCC configuration, the outbound interface is Up.

Buy Now
Questions 24

As shown in the figure, the AS number of operator 1 is 100 and that of

operator 2 is 200. Option C is used for exchanging VPN routes between AS 100 and AS 200. Which of the following statements about Option C are true?

Options:

A.

ASBRs are required to exchange VPN-IPv4 routes.

B.

ASBRs do not exchange VPN-IPv4 route.

C.

PEs in different ASs are connected using multi-hop EBGP for direct exchange of VPN-IPv4 routes.

D.

Compared with Option B, Option C greatly reduces the load of the ASBR; therefore, the ASBR will no longer be a bottleneck that hinders network development.

Buy Now
Questions 25

Refer to the exhibit.

As shown in the figure, RT 5 is a stub area router, an external Internet route is imported by RT 1, and a virtual connection is established between RT 1 and RT 3.At present, the Internet is accessible to routers except RT 5. Why can the Internet not be accessed from RT 5?(Select two answers)

Options:

A.

Category 5 LSAs cannot be sent in a stub area.

B.

A stub area cannot be connected using a virtual link.

C.

The cost of the link between RT 1 and RT 3 is excessively large.

D.

RT1 does not inform RT 5 that category 3 LSAs are configured by default.

Buy Now
Questions 26

What is the SSM group address range the IANA allocates for IPv4?

Options:

A.

232.0.0.0/24

B.

225.0.0.0/8

C.

232.0.0.0/8

D.

225.0.0.0/24

Buy Now
Questions 27

Which of the following statements about the working principle f LDAP FRR are true?

Options:

A.

After LDP FRR is enabled, a backup LSP is generated both the primary and backup LSPs are stored in the forwarding table.

B.

LDP TFRR can be deployed on the ingress node and the intermediate node. The primary and backup LSPas are recorded in the ILM table on the intermediate node and on the FIB table on the ingress node.

C.

After LDP FRR enable, a backup can degenerated for a primary LSP to prevent serious packet loss during fats flapping of the primary LSP.

D.

Multiple LSPs can be up on the ingress node, that is entries about multiple backup LSPs are generated in the forwarding table according to the priority of the FRR, implementing multi-layer protection.

Buy Now
Exam Code: H31-161
Exam Name: HCIE-Carrier IP (Written)
Last Update: May 12, 2025
Questions: 180