Which of the following statements about RSTP root protection is true? (Multiple Choice)
- A . The root protection function on the root port will take effect
- B . The port with root protection enabled will enter the error-down state after receiving the RST BDPU with higher priority
- C . It is recommended to enable it on the switch at the edge of the network
- D . After the port with root protection enabled receives RST BPDUs with higher priority and does not receive RST BPDUs with higher priority for a period of time, it will return to the normal forwarding state
Unlike STP, RSTP has only one BPDU type, the value is 2, and there is no TCN BPDU.
- A . TRUE
- B . FALSE
As shown in the figure, Client1, Client2, and Client3 serve as clients of RR1 at the same time, and R1 introduces 10 routes.
Assuming that the BGP configuration is correct and all neighbor relationships have been established, how many routing entries exist in the BGP routing table of Client3?
- A . 15
- B . 10
- C . 20
- D . 1
OSPFv3 adopts the same route advertisement method as OSPFv2: it is advertised through the network command in the OSPFv3 area view.
- A . TRUE
- B . False
In the topology shown in the figure, what type of LSA will not be generated on R1 when the entire network runs OSPFv3 without importing external routes?
- A . Intra-Area-Prefix-LSA
- B . Inter-Area-Router LSA
- C . Link-LSA
- D . Inter-Area-Prefix-LSA
IS-IS is a link-state routing protocol that uses the SPF algorithm for route calculation. As shown in the figure, a campus deploys both IPv4 and IPv6, also runs IS-IS to achieve network interconnection. R2 only supports IPv4.
Which of the following statements is true about the topology calculation of this network?
- A . By default, since R2 does not support IPv6, so in the shortest path tree formed by IPv6 network calculation, the path for R1 to access R4 is: R1-R3-R4
- B . If you want IPv4 and IPv6 network computation to form the same shortest path tree, you need to run the ipv6 enable topology ipv6 command to enable the IPv6 capability in the IS-IS process
- C . By default, in the shortest path tree formed by IPv6 network calculation, the path for R1 to access R4 is R1-R2-R4. Since R2 does not support IPv6, R2 will directly discard IPv6 packets after receiving them, causing traffic lost
- D . By default, IPv4 and IPv6 networks will be calculated separately to form different shortest path trees
Which of the following parameters are not required when configuring BGP peers? (Multiple Choice)
- A . as-number
- B . password
- C . peer’s IP Address
- D . description
Link state information is isolated by default between different IS-IS processes on the same router.
- A . TRUE
- B . FALSE
Which of the following statements about the multicast address used by 0SPFv3 is correct? (Multiple Choice)
- A . The DR router uses FF02: :6
- B . The DR router uses FF08::6
- C . All OSPF routers use FF08:5
- D . All OSPF routers use FF02::5
As shown in the figure, PE1 and PE2 exchange private network routing information with their CEs through OSPF, and the same Domain ID is configured on PEI and PE2.
When importing routes from BGP to OSPF on PE2, which of the following types of LSAs may be passed to CE2? (Multiple Choice)
- A . Type7 LSA
- B . Type5 LSA
- C . Type3 LSA
- D . Type1 LSA
A medium-sized campus network manages the network through the SNMP protocol. The campus has high network security.
Which SNMP version is recommended for management?
- A . SNMPv1
- B . SNMPv2C
- C . SNMPv3
- D . All versions can be implemented
In a VXLAN network, which can realize traffic access to the VXLAN network, and can also be used for communication with the same subnet in the same XLAN network?
- A . NVE interface
- B . VXVAN L2 Gateway
- C . VXLAN L3 Gateway
- D . VLANIF interface
What are the problems with manually creating static VXLAN tunnels in a campus network? (Multiple Choice)
- A . Although the static VXLAN tunnel mode can support distributed gateway application scenarios, the configuration workload is large and the configuration adjustment is complicated.
- B . When N devices establish static VXLAN tunnels, at most N (N-1)/2 tunnels need to be manually configured, and the amount of configuration is large.
- C . VTEP can only rely on data flooding to learn the remote MAC address
- D . Static VLAN tunnels also use related protocols on the control plane, which will cause device resource consumption
The DHCP protocol can assign some TCP/IP-related parameter information to the client. In this process, DHCP defines a variety of packets. The encapsulation protocol used by these packets at the transport layer is:
- A . PPP encapsulation
- B . IP encapsulation
- C . TCP encapsulation
- D . UDP encapsulation
After a switch is powered on, it joins a running stack system. This behavior is called stack join.
- A . TRUE
- B . FALSE
In the multi-level RR scenario, a large number of secondary RRs will be connected to the primary RR, which may cause the BGP routing table of the primary RR to overflow.
What method can be used to reduce the risk of overflowing the the primary RR BGP routing table?
- A . ORF
- B . Routing Control
- C . Route Aggregation
- D . Set the same Cluster-ID
In BGP4+, what is the content of the next hop network address field carried by the MIP_REACH_NLRI attribute in the Update packet?
- A . Can be just a link-local address
- B . Only link-local addresses
- C . Can carry link-local addresses and global unicast addresses at the same time
- D . Can only be a global unicast address
The following descriptions about Link ID, Data, Type and Metirc in Router-LSA, which are correct? (Multiple Choice)
- A . Metric describes the cost of this connection
- B . Link ID indicates the local identification of this connection, and different connection types indicate different meanings of Link ID
- C . Data is used to describe the additional information of this connection, and the information described by different connection types is also different
- D . Type indicates the type of connection
Which of the following statements about the IS-IS protocol is false?
- A . IS-IS protocol is a link state protocol that runs between ASs
- B . IS-IS protocol supports CLNP network
- C . IS-IS protocol packets are directly encapsulated by the data link layer
- D . IS-IS protocol supports IP network
BGP authentication can prevent illegal routers from establishing neighbors with BGP routers. BGP authentication can be divided into MD5 authentication and Keychain authentication.
Which of the following BGP packets will carry BGP Keychain authentication information? (Multiple Choice)
- A . Update
- B . Notification
- C . Keeplive
- D . Open
MPLS is called Multi-Protocol Label Switching, which is correct about the label description in MPLS? (Multiple Choice)
- A . MPLS system has a variety of label distribution protocols, such as LDP is a label distribution protocol
- B . The label is carried by the header of the MPLS packet and has global significance, that is, the label value of all routers cannot be repeated
- C . The label is a fixed-length identifier with only local significance, which is used to uniquely identify the FEC to which a packet belongs
- D . MPLS supports single-layer labels as well as multi-layer labels
In the process of establishing an LDP session, the active party will first send Initialization information to negotiate parameters. If the passive party does not accept the negotiated parameters, which of the following packets will be sent?
- A . Hello Message
- B . Error Notification Message
- C . Keepalive Message
- D . Initialization Message
Which of the following statements is correct when configuring source NAT with no-pat configuration parameters?
- A . Perform destination IP address and destination port translation
- B . Only perform source IP address translation
- C . Only perform destination IP address translation
- D . Simultaneous source IP address and source port translation
After an interface of the firewall is assigned to the Untrust security zone, the interface belongs to the Untrust zone and no longer belongs to the Local zone.
- A . TRUE
- B . FALSE
Which of the following options is correct about the optimal route election for various protocols?
- A . Route entries with unreachable next hops in BGP are also put into the IP routing table.
- B . In the BGP protocol, the optimal route to the same destination network segment is selected by comparing the cost value of the route entry.
- C . The OSPF protocol will put all the routing information in the LSDB into the IP routing table.
- D . Learn different route entries to the same destination network segment from BGP and OSPF, and select the optimal route to add to the IP routing table by comparing the preference value of the protocol.
In a VXLAN scenario, which features can be enabled to reduce the flooding of ARP packets between VTEPs? (Multiple Choice)
- A . Host Information Collection
- B . Local ARP proxy
- C . Port isolation
- D . ARP broadcast suppression
Which of the following statements about ISIS’ route penetration is correct? (Multiple Choice)
- A . ISIS routing penetration can be used in |Pv6 environment.
- B . ISIS routing penetration can be deployed on Level-1 routers.
- C . ISIS’ route penetration does not include aggregated routes.
- D . ISIS route penetration does not cause neighbor flapping.
- E . ISIS route penetration is used to prevent routing loops.
Which of the following statements about the VRRP protocol is correct?
- A . Both VRRPv2 and VRRPv3 support authentication
- B . VRRPv3 does not support the authentication function, while VRRPv2 supports the authentication function
- C . VRRPv2 is only applicable to IPv4 networks, VRRPv3 is only applicable to IPv6 networks
- D . The owner’s VRP priority of the Master IP address is 255, and all configurable priorities range from 0 to 254.
Regarding the MPLS processing mode for TTL, which of the following descriptions is correct?
- A . In Pipe mode, when an IP packet passes through an MPLS network, at the ingress point, the IP TTL minus 1 is mapped to the MPLS TTL field
- B . The TTL in the MPLS label has the same meaning as the TTL field in the IP header. TTL prevents routing loops in MPLS networks
- C . In Unifor mode, when IP packets pass through the MPLS network, the IP TTL of the ingress point is decremented by 1. MPLS TTL field is a fixed value
- D . In MPLS VPI, if you need to hide the structure of the MPLS backbone network, you can use the Uniform mode on the Ingress for private network packets.
In OSPFv3, a Router-LSA is generated for each router, which describes the interface address and cost of each router link, and includes the Router ID of the neighboring router.
- A . True
- B . False