Enterprise networks often use DHCP to allocate IP addresses to users. Compared with static address allocation, DHCP address allocation greatly reduces the workload of network address management.
- A . True
- B . False
Which of the following troubleshooting methods instead of using the TCP/IP reference model as a theoretical basis?
- A . Comparative configuration method
- B . From top to button method
- C . Bottom-up method
- D . Replacement method
Determining the project team members is the work content of the implementation phase.
- A . True
- B . False
Which of the following reasons may lead to the MSTP protocol in LAN does not work? (Multiple Choice)
- A . MSTP configuration error
- B . The physical link oscillates, triggering the device to send many TC packets
- C . Enable MSTP device to receive the client or pass-through of MSTP TC messages
- D . The priority of the unconfigured port in the specified spanning tree instance
Regarding the gathering information stage in the processing of the troubleshooting in the structured network, which of the following items need to focus on? (Multiple Choice)
- A . What information needs to be collected
- B . How to collect the information
- C . Whether authorization is required
- D . Risk assessment at the information gathering stage
Huawei’s enterprise network management products are the eSight, and is divided into three versions: Starter Edition, Standard Edition, and, Professional Edition. Compared with the Standard Edition, what are the main characteristics of the following are added in the Professional Edition?
- A . Professional Edition provides database backup tools
- B . Support multi-user management
- C . Support WLAN, MPLS VPN management
- D . Support hierarchical management model
Which of the following options is the work that needs to be done at the project planning stage? (Multiple Choice)
- A . Determine the technical plan
- B . Understand the project background
- C . Choose network products
- D . Determine project requirements
- E . Plan IP address
In a complex network environment with financial, OA ( Office Automation System , Office Automation), production, and even more business systems, which of the following should be first concerned during the network troubleshooting?
- A . Assignment of IP address
- B . Model of network equipment
- C . Data flow direction of each business system
- D . The environment of the computer room
In what occasions is the " looping " test generally used?
- A . Test whether the application can connect normally
- B . Test whether the routing protocol can effectively avoid loops
- C . Test whether the switch can effectively carry out loop containment and broadcast containment
- D . Test whether the physical circuit is interrupted
As an effective security mechanism, DHCP SNOOPING can prevent which of the following attacks? (Multiple Choice)
- A . Prevent DHCP spoofing attacks
- B . Prevent DOS attacks on the DHCP server
- C . Prevent MAC address flooding attacks
- D . Combine the DAI function to check the source MAC address of the data packet
- E . Combine the IPSG function to check the source IP address of the data packet
Which of the following is the key to network design?
- A . Innovation of key technologies
- B . Selection of equipment lines and other elements
- C . Improve performance at a reasonable cost
- D . Ensure that the network is stable and reliable
Enterprises in order to improve the reliability of the interconnection of exports, often use the method of a plurality of links connecting different operators. When using this method, you need to focus on the flow path of the outgoing direction and incoming direction, or may affect the quality of the network.
- A . True
- B . False
Project acceptance as long as party A and Party B are present, no third party involved.
- A . True
- B . False
Optical power is generally used DBM represented, which of the following DBM is the current most optical transceiver device to receive and identify data?
- A . -30DBM
- B . -10DBM
- C . 10DBM
- D . 30DBM
When the network administrator tries to access the internal network devices through telnet, found it impossible to access. Which of the following is least likely reason?
- A . The route is unreachable, and the client and server cannot establish a TCP connection
- B . The number of users logging in to the device has reached the upper limit
- C . ACL is bound to the VTY user interface
- D . VTP user interface is configured with protocol inbound all
Ethernet is a network supporting broadcast network, once the network has a loop, this simple broadcast mechanism will lead to disastrous consequences. Which of the following phenomena may be caused by loops? (Multiple Choice)
- A . The device cannot log in remotely
- B . When using the DISPLAY INTERFACE command on the device to view the interface statistics, it is found that the interface has received many broadcast-packets
- C . CPU usage exceeds 70%
- D . Severe packet loss during network testing through the PING command
Which device of the following is forwarding data based on the MAC address of data frames?
- A . HUB
- B . Bridge
- C . Router
- D . Firewall
During the inspection of operation equipment, which of the following statements is correct?
- A . You can check the memory usage of the device by executing the display memory-usage command. If "Memory Using Percentage Is" exceeds 80%, you need to pay special attention currently.
- B . You can check the running status of the board by executing the display device command, the “Online” of the board should be “Present”
- C . You can view the fan status by executing the display fan command. When the Present item is NO, it means normal
- D . You can view the FTP network service port by executing the display ftp-server command, and the unused FTP network service port needs to be recorded
Which of the following link can run the PPP protocol but cannot run the HDCL protocol? (Multiple Choice)
- A . ATM
- B . ISDN
- C . MSTP
- D . PSTN
- E . E1
The event marking the end of the network planning phase is:
- A . Project establishment
- B . Issuing bids
- C . Contract signing
- D . Project preliminary inspection
Project ranges may be defined in terms of three aspects, which of the following are not included?
- A . Functional boundaries
- B . Coverage area
- C . Investment quota
- D . Engineering boundary
When the DHCP client and DHCP server exists the device, if the IP address of the DHCP server global address pool and the IP address on the VLANIF interface of client connecting on a relay device is not in the same network segment, it will cause DHCP failure.
- A . True
- B . False
In the current Internet access market, the FTTH (Fiber To The Home) is mainly popularize, which of the following technology will be mainly used by FTTH?
- A . GPON/EPON
- B . XDSL
- C . FTTH
- D . HFCs
About description of IP address assignment, which of the following is correct? (Multiple Choice)
- A . Unless AnyCast is used, the IP address of the entire network must remain unique
- B . IPv4 address space is divided into three categories: A, B, and C
- C . When assigning addresses, if the /24 -bit mask length is used uniformly, the network design can be simplified
- D . In order to improve the efficiency of the use of IP addresses, we generally use VLSM and determine the mask length as needed
The high-risk operation plan is generally approved and finalized one day before implementation.
- A . True
- B . False
Layer 2 network architecture compared with the Layer 3 network architecture, with a simple structure, high efficiency advantages of data forwarding, so the future network structure will be fully turned to a Layer 2 network architecture, Layer 3 network architecture will be phased out.
- A . True
- B . False
Which of the following belong to the sub-process or stage of the structured network troubleshooting process? (Multiple Choice)
- A . Comparison configuration
- B . Report failure
- C . Reasons list
- D . Investigate one by one
In the network design, we can provide higher reliability for business customers through a network of redundant topology selection, which of the following topological structure can provide with redundancy? (Multiple Choice)
- A . Star topology
- B . Ring topology
- C . Bus topology
- D . Double star topology
Currently, which of the following architecture is the mainstream use of switches ? A. Bus type
B. Shared memory type
C. Switching matrix
D. Distributed
E. CLOS architecture
Network Optimization major work content does not include:
- A . Hardware optimization
- B . Software optimization
- C . Network expansion
- D . Replace the computer room air conditioner
Which of the following is the source of demand for network optimization? (Multiple Choice)
- A . After long-term network maintenance, some summarized problems and improvement points, put forward relevant suggestions, and carry out centralized rectification
- B . Video conferencing services need to be carried out in the network, and switching equipment supporting Layer 2 multicast functions needs to be added
- C . The environmental problem of a weak current well, the signal line is seriously aging, and needs to be replaced collectively
- D . For corporate information security needs, add new security equipment
The current internal corporate networks often use private IP addresses to communicate, then which of the following addresses belong to private IP addresses?
- A . 0.1.1.1
- B . 127.5.4.3
- C . 128.0.0.5
- D . 172.24.35.36
- E . 231.33.24.35
What are the main difficulties of cutover? (Multiple Choice)
- A . Minimize the scope that affects the business
- B . Do the best in risk avoidance
- C . Develop a complete cutover plan
- D . Smoothly execute cutover
In order to save the cost of equipment, the position of the network monitoring optimization can be a network outlet, server interface, the key link.
- A . True
- B . False
S7700 and S9700 are both Huawei’s modular campus switches. Compared with S7700, S9700 has the characteristics as follows:
- A . S9700 switches provide more slots and more ports
- B . S9700 switches provide non-blocking data exchange capabilities
- C . S9700 provides provide redundant engines, redundant power supplies and redundant fans
- D . S9700 switches provide data center features such as TRILL ratio and FCOE
When troubleshooting the EBGP neighbor relationship faults, you find two directly connected devices use LOOPBACK port to establish a connection, so execut the DISP; AY-CURRENT CONFIGURATION CONFIGURATION BGP to view PEER EBGP-MAX-HOP HOP- COUNT configuration, which of the following statements is correct?
- A . hop-count must be greater than 1
- B . hop-count must be greater than 2
- C . hop-count must be greater than 15
- D . hop-count must be greater than 255
During the software and configuration backup, which of the following statements is correct?
- A . To back up the software version, and the same product, the same version should be backed up multiple times
- B . License does not need to be backed up
- C . After the configuration of the device is changed, there is no need to back up the configuration file
- D . The purpose of backup is to restore network functions in extreme cases
Regarding the description of the OSPF neighbor relationship faults, which of the following statement is incorrect?
- A . Stuck in the ExStart state indicates that the MTU between neighboring routers does not match or the OSPF RID (Router ID) is duplicated
- B . For non-DR/BDR routers on the Ethernet link. It is acceptable to be stuck in a 2-way state
- C . Stuck in the Init state indicates that the router has received the Hello message from the neighbor, but the Hello message does not contain the OSPF RID (Router ID) of the receiving router
- D . Stuck in the Attempt state indicates that the router does not send unicast Hello packets to the configured neighbors
Coaxial cable typically used to carry video signals, data signals cannot be carried
- A . True
- B . False
When checking service running status, which of the following statements is correct?
- A . When checking the multicast forwarding table information, you can execute the display multicast forwarding-table command to view the Layer 2 multicast forwarding table entries
- B . When checking the multicast routing protocol, you can view the multicast routing table by executing the display multicast routing-table command. If the intra-domain multicast routing protocol uses PIM-SM, then the interfaces connected to the multicast do not need to enable IGMP
- C . When checking VRRP state, by performing display vrrp and display vrrp statistics command to view, "State" should be "Initailize" state
- D . When checking the anti-attack detection configuration, you can execute the display current-configuration | include car command, and there should be anti-attack configuration. If it is not configured, use the car command to configure the anti-attack function for the device
The purpose of the organization cutover started coordination is mainly for good customer communication and project information, and communicate with other parties is not very important.
- A . True
- B . False
Which of the following is the event that no need the customer’s signature in the cutover project?
- A . Finalized cutover plan
- B . Change application form
- C . Change reminder
- D . Cutover completion report
What are the reasons below may cause IS-IS fault neighbor relations? (Multiple Choice)
- A . The device at both ends of the link is configured with the same System ID
- B . IS-IS Levels at both ends of the link do not match
- C . When establishing IS-IS Level-1 neighbors, the area addresses of the devices at both ends of the link do not match
- D . The IP addresses of the interfaces on both ends of the link are not in the same network segment
ABCD
44 . Industry background to understand what the project can grasp the following information ?
On Monday morning, you received a phone call at the office seat, an employee said he could not through the PC to access the Internet, you want to get technical support. So you use the ping command on his PC to test, and use the tracert command to see where the packet is lost.
Which of the following methods of network troubleshooting belong to ?
- A . Comparative configuration method
- B . Bottom-up approach
- C . Confirm business traffic path
- D . Self-term down method
In the layer 2 switching network, the device forwards data based on the MAC address, so the data can be filtered according to the MAC address. Therefore, the firewall running in transparent mode cannot filter the layer 3 information of the data packet.
- A . True
- B . False
When unpacking and inspecting the goods, what content needs to be checked on the packing list ? (Multiple Choice)
- A . Part code
- B . Part model
- C . Number of parts
- D . Project name
When configuring the DHCP Relay function on the device, the VLANIF interface connecting the relay to the client must be bound to the DHCP server group, and the binding DHCP server group must be configured with the proxy DHCP server IP address.
- A . True
- B . False
What are the main difficulties in cutover? (Multiple Choice)
- A . Minimize the scope of business impact
- B . Do the best in risk avoidance
- C . Develop a complete cutover plan
- D . Profit execution cutover
When a structured network troubleshooting process is used for troubleshooting, the results are predictable, and the impact of the troubleshooting process is controllable, and no new risks will be introduced.
- A . True
- B . False
Two hosts are connected to the same switch and belong to the same VLAN and the same network segment. Now the two hosts cannot ping each other. Which of the following is the possible cause ? (Multiple Choice)
- A . The host is configured with incorrect static ARP
- B . Port isolation is configured on the switch
- C . The interface is manually shut down or the physical interface is damaged
- D . Wrong port and MAC address binding is configured on the switch
In the preliminary analysis of the cutover project, which of the following aspects should be considered? (Multiple Choice)
- A . Necessity
- B . Feasibility
- C . Risk
- D . Cost
When troubleshooting the network, you find that there may be a problem with the OSPF configuration on a certain router, but when you log in to the network device to check the OSPF configuration, you find that the OSPF and BFD linkage configuration is also wrong, so you modify the configuration of OSPF and BFD.
The network troubleshooting method belongs to which one of the following?
- A . Block method
- B . Comparative configuration method
- C . Segmentation method
- D . Bottom-up approach
What are the main tasks in the acceptance phase of cutover? (Multiple Choice)
- A . Transfer of data
- B . Transition training
- C . Acceptance meeting
- D . Accounting for business expenses
Which of the following steps or measures belong to the troubleshooting phase of the structured network troubleshooting process? (Multiple Choice)
- A . Emergency plan
- B . Preparation for rollback
- C . Temporary environment construction
- D . Information filtering
Which of the following aspects should be considered in the cutover risk assessment? (Multiple Choice)
- A . Key locations of risk points
- B . Scope of risk impact
- C . Time of risk impact
- D . Loss caused by risk
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
- A . Stable
- B . Bandwidth
- C . Delay
- D . Jitter
- E . Security
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
- A . Stable
- B . Bandwidth
- C . Delay
- D . Jitter
- E . Security
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
- A . Stable
- B . Bandwidth
- C . Delay
- D . Jitter
- E . Security
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
- A . Stable
- B . Bandwidth
- C . Delay
- D . Jitter
- E . Security
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
- A . Stable
- B . Bandwidth
- C . Delay
- D . Jitter
- E . Security
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
- A . Stable
- B . Bandwidth
- C . Delay
- D . Jitter
- E . Security
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
- A . Stable
- B . Bandwidth
- C . Delay
- D . Jitter
- E . Security
Enterprise business often has strict requirements on network service quality. Which of the following aspects are commonly used to describe network service quality? (Multiple Choice)
- A . Stable
- B . Bandwidth
- C . Delay
- D . Jitter
- E . Security
Solve the fault
- A . 1->2->3->6->4->5->7
- B . 1->2->3->6->5->4->7
- C . 2->1->3->5->6->4->7
- D . 2->1->5->3->4->6->7
Cutover rollback refers to roll back the current changes to the state before execution.
- A . True
- B . False
A user reported that he could not receive emails through the email client. What are the possible reasons? (Multiple choice)
- A . The user does not have corresponding permissions
- B . Mail server failure
- C . Link failure
- D . User client setting error
In the judgment and analysis stage of the structured network troubleshooting process, as long as the failure information, maintenance information, and change information are summarized, a list of causes of network failures can be obtained.
- A . True
- B . False
Which of the following WAN links belong to the message switching network? (Multiple choice)
- A . ATM
- B . ISDN
- C . MSTP
- D . PSTN
- E . X.25
Which businesses in the enterprise usually need to optimize the user experience? (Multiple choice)
- A . Video surveillance business
- B . Video conferencing business
- C . Voice phone service
- D . Network management business
The essence of SDN is to build a centralized brain for the network, and achieve the optimal global traffic through a global view and centralized control.
- A . True
- B . False
Which of the following parameters do we generally use to measure the performance of the switch? (Multiple choice)
- A . Port density
- B . CPU frequency
- C . Exchange capacity
- D . Packet forwarding rate
- E . MAC table capacity
- F . Port rate
What are the main contents of the cutover project plan? (Multiple choice)
- A . Cutover preparation
- B . Cutover implementation
- C . Rollback plan
- D . Emergency plan
Regarding the use of the network management system, which of the following options are correct? (Multiple choice)
- A . The network management software has an alarm management function. For example, the UP/DOWN changes of the device port can be immediately fed back to the network management software through TRAP messages, so that the network administrator can discover and deal with network faults in time
- B . The network management software has a performance management function. The network management software can automatically collect and count the points and rates of the device’s CPU and memory, and can assist the network administrator to analyze the network performance bottleneck.
- C . The network management software has a configuration file management function, which can perform automatic backup, comparison, and restoration of configuration files, so that network administrators can automatically back up configuration files in batches
- D . The network manager can regularly output reports according to user needs to provide reference for later network optimization
When troubleshooting a network, if you need to confirm the business traffic path, which of the following tasks may be required? (Multiple choice)
- A . Confirm the data link layer service traffic path
- B . Confirm the network layer business traffic path
- C . Investigate business traffic path planning in the network design stage
- D . Confirm the frequency of failure
When upgrading the equipment software, which statement about the operating window time is wrong?
- A . Determined by the user’s service interruption time
- B . The time must be greater than the execution time of the upgrade operation
- C . Allow a certain amount of time for troubleshooting
- D . The operating window time only needs to be notified to the network maintenance personnel, not to the user.
When troubleshooting a network fault, you locate the fault location on a router. This router and another router in the network are mutually redundant. Then which of the following troubleshooting methods is most suitable?
- A . Comparative configuration method
- B . Bottom-up approach
- C . Confirm business traffic path
- D . Top-down method
Which of the following is not an external risk of the project ?
- A . Exchange rate changes
- B . Heavy rain
- C . Social unrest
- D . Differences in industry standards
For the purpose of optimizing access security, which of the following is the most appropriate ?
- A . Ensure that sensitive management information is not stolen illegally
- B . Prevent and reduce external network attacks and harm
- C . Ensure the access security of key business
- D . Realize user’s secure access control
After replacing the twisted pair, the user finds that he cannot access the network. In this case, which troubleshooting method is most appropriate?
- A . Comparative configuration method
- B . Top-down method
- C . Bottom-up approach
- D . Replacement method
The biggest difference between fat AP and thin AP is that fat AP can access more users, provide higher performance, and is more suitable for large-scale company networking.
- A . True
- B . False
Which of the following is not an operation to verify the cutover plan?
- A . Set up an experimental bureau for testing
- B . Technical review by all parties
- C . Original factory expert review
- D . Risk prediction
Which of the following different types of line interfaces is not in the same category as the others?
- A . BNC interface
- B . FC interface
- C . LC interface
- D . SC interface
The current switches all run the MSTP protocol by default, so in the description of the default state, which of the following options is correct?
- A . All switches run in the same region by default
- B . The calculation speed of STP is faster than when multiple instances are configured
- C . Because of lack of configuration, all switches will switch the operating mode to RSTP
- D . Each switch runs in an independent region
Regarding the cause of the dual-master failure of the VRRP backup group, which of the following is the most unlikely
- A . The VRRP backup group configurations on both ends are inconsistent
- B . The link that transmits the VRRP notification message is faulty
- C . The low-priority VRRP backup group discards the received VRRP notification packets as illegal packets
- D . Master device sends 1 notification message per second
In the finishing work of the structured network troubleshooting process, which of the following are the documents that need to be handed over ? (Multiple choice)
- A . Troubleshooting process documentation
- B . Troubleshooting summary report
- C . Change backup and maintenance recommendations
- D . User communication plan
The current Huawei firewall product USG6X00 series is a UTM firewall product. While supporting stateful inspection packet filtering, it also supports functions such as intrusion detection, anti-virus and URL filtering.
- A . True
- B . False
If the network transformation in the project will affect the business running on the existing network, then the implementer needs to formulate strict implementation process specifications and risk avoidance measures. We generally define this type of project as a cutover project.
- A . True
- B . False
You use a Huawei router as an SSH client to log in to another Huawei router, but the login fails.
You suspect that it may be a configuration error on the SSH server. When checking the cause of the server configuration failure, which of the following is the most unlikely?
- A . The SSH protocol is not bound to the VTY interface of the user interface
- B . User service type, authentication type, user authentication service type are not configured
- C . The server and client SSH versions are inconsistent
- D . SSH first authentication function is not enabled
Regarding the purpose of managing security optimization, which of the following is the most appropriate?
- A . Ensure that sensitive management information is not stolen illegally
- B . Prevent/reduce external network attacks and harm
- C . Ensure the access security of key business
- D . Realize user’s secure access control
During the unpacking inspection, Xiao Wang found that the appearance of the device was not damaged, and all the modules of the device were operating normally when the device was powered on for the first time, but after 24 hours of continuous operation, the board failed, then This situation is not eligible for the DOA process.
- A . True
- B . False
When troubleshooting VRRP backup group flapping, you execute the vrrp vrid timer advertise command on the router to increase the interval between VRRP packets, and then repeatedly execute the display vrrp command on the Backup device to view the State field, and you find that the displayed information is always Keep it unchanged, which of the following descriptions is correct regarding the above operations?
- A . The state of the Backup device may fluctuate because the interval between sending VRRP packets is too small.
- B . The state of the Backup device may fluctuate because the interval between sending VRRP packets is too long.
- C . The oscillation of the backup device status has nothing to do with the interval between VRRP packets.
- D . The cause of the failure is not found, and the time interval needs to be restored.
When troubleshooting MSTP, you executed the DISPLAY CURRENT-CONFIGURATION command to obtain the configuration file of the device. Which of the following statements is wrong?
- A . Check the port configuration and confirm whether the MSTP-enabled port is enabled with the protocol message sending command, such as: BPDU ENABLE
- B . Whether the MSTP port connected to the user terminal device is disabled or configured as an edge port
- C . No matter whether the BPDU TUNNL is configured on the device, it will not affect MSTP
- D . Check whether the device port is added to the correct VLAN
After the project is delivered, operation and maintenance costs will continue to be incurred. Which of the following items are costs incurred during operation and maintenance? (Multiple choice)
- A . Energy costs
- B . Route suggestion fee
- C . Line rental fee
- D . Equipment depreciation expenses
- E . Staff costs
When selecting equipment, Xiao Wang needs to choose a Layer 3 switch with 100M interface from a series of campus switches provided by Huawei. Then which series of switches should he choose?
- A . S2700
- B . S3700
- C . S5700
- D . S6700
Ethernet is currently the most mainstream local area network. What factors usually need to be considered when selecting an Ethernet network? (Multiple choice)
- A . Network speed
- B . Network media
- C . Network size
- D . Network hierarchy
- E . Packaging standards
In a complex network environment, the use of non-institutionalized network troubleshooting procedures may lead to new failures, which will make the troubleshooting of network failures more difficult.
- A . True
- B . False
When there are a large number of IP telephones and WLAN APs in the network, which function switch will we generally consider?
- A . Switches with STP edge port function
- B . Switch with POE function
- C . Switches with SACG function
- D . Switch with QOS function
What is the core idea of network troubleshooting?
- A . Confirm business traffic path
- B . Judgment analysis
- C . Collect information
- D . Top-Down approach
The exclusion TELNET logon failure, which is a priority step to do?
- A . Check whether the client can ping the server
- B . Check whether the number of users logging in to the device has reached the upper limit
- C . Check whether ACL is configured in the VTY user interface view on the device
- D . Check whether the protocol configuration allowed for access in the VTY type user interface view is correct
Device as SSH server, you must configure the local key pair
- A . True
- B . False
The current corporate networks often use OSPF as the routing protocol, then use OSPF doing routing protocol, which of the following issues should be paid attention to? (Multiple choice)
- A . Confirm that the backbone area will not split
- B . Confirm whether there will be sub-optimal routes in the network under the OSPF routing rules
- C . Confirm that all non-backbone areas and backbone areas have correct and reliable links
- D . Confirm the topology of the OSPF network to ensure that OSPF does not have loops during route calculation
- E . Confirm that OSPF ‘s COST can correctly reflect the real bandwidth of links above 100M
Which of the following is not a major role in the development of the project delivery process?
- A . Increase customer satisfaction
- B . Clear division of responsibilities
- C . Improve work efficiency
- D . Reduce project risks
The formula is the availability of
- A . MTBF/MTTR/100%
- B . MTTR/RTBF*100%
- C . (MTBF+MTTR)/MTBF*100%
- D . MTBF/(MTBF+MTTR)*100%
The current network design patterns can generally be summarized into which of the following items? (Multiple choice)
- A . Modularity
- B . Automation
- C . Hierarchical
- D . Modernization
- E . Standardization
When troubleshooting a network failure is performed, you try to ping the remote destination host, discovery packets are lost, so which troubleshooting method is best to take next?
- A . Comparative configuration method
- B . Bottom-up approach
- C . Confirm business flow method
- D . Self-term down method