In order to speed up the perception of link failures in the IS-IS network, IS-IS can be linked with BFD.
- A . TRUE
- B . FALSE
In OSPF, ABR will convert all Type 7 LSAs in the NSSA area into Type 5 LSAs.
- A . TRUE
- B . FALSE
Regarding the IPSG, which of the following statement is incorrect?
- A . IPSG can prevent IP address spoofing attacks
- B . IPSG is a source IP address filtering technology based on the three-layer interface
- C . IPSG can turn on the IP packet inspection and alarm function, and cooperate with the network management to perform alarms
- D . IPSG can prevent the host from changing the IP address privately
Which of the following are not included in the security protection actions that a secure MAC address can perform?
- A . Protect
- B . Restrict
- C . Shutdown
- D . Remark
An engineer uses two routers to test IPv6 services, and simulates the interconnection between the headquarters and branches by running BGP4+. As shown in the figure, an engineer captures the packet to view the update message sent by R1.
Regarding the description of the message information, which of the following statements is correct?
- A . The next-hop address of the route described in this message is: 2001:db8::2345:1.:1
- B . The message describes the currently revoked IPv6 route
- C . The routing address prefix and its prefix length described in this message are: 2001:db8:2345:1::1/128/
- D . The route described in the message may be imported through import
As shown in the figure, a certain park has deployed IPv6 for service testing, and there are 4 routers in the network. Run OSPFv3 to realize network interconnection.
Regarding the LSA generated by the OSPFv3 network, which of the following statements is wrong?
- A . R1 itself will generate Router-LSA to describe device interface information, and will receive Router-LSA generated by R2 and R3 at the same time
- B . There is a Network LSA generated by R3 in the LSDB of R1, indicating that R3 may be the DR of this link
- C . R1 will receive the two Link-LSAs generated by R2, describing the two links information connected to R2 respectively
- D . As an ABR, R2 will generate Inter-Area-Prefix-LSA describing the IPv6 address prefix of Area 1, and advertise it to R1 and R3
A network engineer outputs the following information when troubleshooting OSPF. Based on this, determine which reason causes the adjacency relationship to fail to be established normally?
- A . Authentication password is not-consistent
- B . Regional type is not-consistent
- C . The interval for sending Hello messages is not-consistent
- D . The IP address mask of the interface is not-consistent
A router is running OSPF, and the output information is as shown in the figure. Which of the following statements is correct?
- A . The type of the LSA is AS-externa1-LSA
- B . The destination network described by this LSA is 10.0.23.0/24
- C . The LSA in the figure is generated by this router
- D . This device is ABR
When there are multiple redundant links in the IS-S network, multiple equal-cost routes may appear.
Regarding equal-cost routes in an IS-IS network, which of the following descriptions is wrong?
- A . When the number of equal-cost routes in the networking is greater than the number configured through commands, and the priorities of these routes are the same, the route with the higher System ID of the next hop device is preferred for load sharing
- B . If negative arbitration sharing is configured, the traffic will be evenly distributed to each link
- C . After the equal-cost routing priority is configured, when the IS-IS device forwards the traffic that reaches the destination network segment, it will not adopt the load sharing method, but will forward the traffic to the next-hop with the highest priority.
- D . For each route in the equal-cost route, the priority can be specified, and the route with the higher priority will be preferred. The rest are used as backup routes
As shown in the figure, all routers run OSPF.
Which of the following statements is correct?
- A . R2 generates Router LSA in both area 1 and area 0
- B . R2 forwards the Router LSA generated by R3 to R1
- C . R2 forwards the Router LSA generated by R1 to R3
- D . R2 only generates Router LSA in area 0
What is the value of OSPF and BFD linkage?
- A . The hello sending interval of OSPF is at the second level, which is faster than BFD inductive link state
- B . The sending interval of BFD packets can reach the millisecond level, which is slower than the OSPF inductive link state
- C . Through the BFD detected at the millisecond level, the OSPF status is associated to achieve the purpose of OSPF quickly inductive link state
- D . Any change in the BFD status will not affect the OSPF neighbor status
According to this figure, which of the following is the correct description of the IPv6 routing information calculated by the R4 router through IS-IS?
- A . R4 has 1 IS-IS default route
- B . R4 has 2 equal-cost IS-IS default routes
- C . R4 has 2 unequal IS-IS default routes
- D . R4 has no IS-IS routing entry
The routing attributes of the three routing entries are shown in the figure. Assuming that the next hop of the three routing entries are all reachable, when the three routing entries arrive at the BP router in sequence, by default, BGP will finally select one route entry?
- A . Route B
- B . Route C
- C . Route A
As shown in the figure, Client1 and Client2 act as clients of RR1 and RR2 at the same time, RR1 and RR2 are in the same Cluster, and R has introduced 10 routes. Assume that the BCP configuration is correct.
The neighbor relationship has been established. How many routing entries are there in the BGP routing table of Client2 ultimately?
- A . 10
- B . 20
- C . 0
- D . 15
Which of the following is not a hardware preparation item for cutover?
- A . Test the operation of the board
- B . Power-on test
- C . Device version check
- D . Cable connectivity test
When troubleshooting dual-master faults in a VRRP backup group, which of the following statements is wrong?
- A . There is no need to check whether the switch port that transmits the VRRP advertisement message is in the same VLAN
- B . Need to check whether the VRRP group ID on the interface is the same
- C . Need to check whether the interface IP address is in the same network segment
- D . Need to check whether the virtual IP addresses of the VRRP group are the same
When troubleshooting the EBGP neighbor relationship, you found that two directly connected devices use Loopback ports to establish a connection, so execute display current-configuration configuration bgp to view the configuration of peer ebgp-max-hop hop-count. Which of the following statements is correct?
- A . hop-count must be greater than 2
- B . hop-count must be greater than 15
- C . hop-count must be greater than 1
- D . hop-count must be greater than 255
When a fault occurs, the fault can be classified to reduce the scope of fault location. Which of the following is not an interface configuration fault?
- A . The duplex modes of the interfaces on both ends are inconsistent
- B . IP address conflict
- C . Inconsistent interface authentication
- D . The receiving and emitting power of both ends is inconsistent
If you want to check files under Flash, which command should use?
- A . dir sdl:
- B . dir sd0:
- C . display patch-information
- D . dir flash:
As shown in the figure, MPLS LSP is configured in the network, and the goal is to establish an LDP session between SWA and SWB, then which of the following statement is correct?
- A . The configuration is correct
- B . No need to enable MPLS globally
- C . No need to enable MPLS on the port
- D . Two devices mpls lsr-id cannot be configured as the same
As shown in the figure, the cost value of the link that all interfaces of the router enable DSPF is identified in the figure.
The Loopback D interface of R2 is advertised in area 1. Then the cost value of R1 to 10.2/32 is:
- A . 200
- B . 150
- C . 50
- D . 100
As shown in the figure, all interfaces of the router enable OSPF. The ip address identified in the figure is the IP address of the device’s Loopback 0 port. R1, R2, R3EJLoopbacD are advertised in area 1, and Loopbacfk D of R4 is advertised in area D, the Loopback D of R5 is advertised in area 2. Which of the following addresses can ping each other?
- A . 10.0.3.3 and 10.0.5.5
- B . 10.0.4.4 and 10.0.2.2
- C . 10.0.2.2 and 10.0.3.3
- D . 10.0.2.2 and 10.0.5.5
According to this picture, we can judge:
- A . The system ID of R1 is ee8c.a0c2.bafl
- B . R1 has both leve1-1 and level-1-2 link state information
- C . R1 only has link state information for leve1-2
- D . In the leve1-2 network, there are a total of 8 routers
In the network shown in the figure below, if you want to implement a remote LDP session between SWA and SWC, which statement is correct?
- A . No need to specify the lsr-id of the correct equivalent
- B . The configuration in the figure can be achieved
- C . Need to create a remote peer, and then specify the lsr-id of the peer
- D . Need to be equipped with a straight connection port to establish a TCP connection
As shown in the figure, MPLS/BGP IPVPN is deployed in the network. The MP-BGP neighbor relationship is established between PE1 and PE2 through the LoopbackD interface. After the configuration is completed, it is found that CE1 and CE2 cannot learn routes from each other. Use the command on PE2 to query neighbor information as shown in the figure. What is the most likely cause of the problem?
- A . The VPN instance parameters on PE1 or PE2 are incorrectly configured
- B . PE1 and PE2 are not enabled with neighbors in the BGP-VPN4 unicast address family view
- C . The LSP tunnel between PE1 and PE2 is not established
- D . The routing protocol configuration between PE1 or PE2 and the respective CE is incorrect
According to this picture, we can judge:
- A . R1 is configured with regional authentication
- B . The device type of R1 is Level-1
- C . The device type of R1 is Level-2
- D . R1 has configured the routing domain authentication
According to this picture, we can judge:
- A . The device type of R3 must be Level-1-2
- B . Unable to determine the device type of R3
- C . The device type of R3 must be Level-1
- D . The device type of R3 must be Level-2
The IS-IS neighbor between R3 and R1 is not established. According to the information in this figure, what is the possible cause?
- A . The IIH certification of R3 and R1 failed
- B . The System ID of R3 and R1 are duplicated
- C . The lS-Level of R3 and R1 do not match
- D . The circuit-type of the interconnection interface between R3 and R1 does not match
The network administrator A wants to use ACL to match only the four routing entries 1, 3.5, and 7 in the figure. How many ACL rules does the network administrator A need to configure at least?
- A . 2
- B . 1
- C . 4
- D . 3
As shown in the figure, an engineer uses 4 routers to test branch network interoperability. Among them, R1, R2, and R3 in branch 1 deploy OSPF to achieve network interoperability. R2, R3, and R4 in branch 2 deploy IS-S to achieve network interoperability.
Now the engineer wants to realize the loopback address of R1 to R4. Which of the following operations can meet this requirement?
- A . In the OSFF process and the IS-IS process of R2, respectively advertise the default route
- B . No configuration is required
- C . Advertise the default route only in the IS-IS process of R2
- D . Advertise the default route only in the OSPF process of R2
According to this figure, it can be known that in VLAN300, 0 MAC drift occurred by 00e0-fc3d-3bdb from 17:22:38 to 17:22.44 on 2020-06-04.
- A . 5
- B . 65535
- C . 300
- D . 1
According to this picture, we can judge:
- A . R4 does not have any IS-IS neighbors
- B . R4 and ee8c.aOc2.baf3 have established IPv4 and IPv6 IS-IS neighbors
- C . R4 and ee8c.aOe2.baf3 only established IPv6 IS-IS neighbors
- D . R4 and ee8c.aOc2.bat3 only established IPv4 IS-IS neighbors
As shown in the figure, all interfaces of the router enable OSPF. Which of the following statements is correct?
- A . The Type1 LSA generated by R2 in area 0 contains 10.0.2.2/32 routing information
- B . The Type5 LSA generated by R2 in area 0 contains 10.0.2.2/32 routing information
- C . The Type2 LSA generated by R2 in area 0 contains 10.0.2.2/24 routing information
- D . The Type3 LSA generated by R2 in area 0 contains 10.0.2.2/32 routing information
An engineer used two routers to test IPv6 services, and simulated the interconnection between headquarters and branches by running BGP4+.
The logical topology of the network is shown in the figure. Regarding the transmission of IPv6 routes between two devices, which of the following statements is wrong?
- A . When routing, the Next_Hop attribute must be an IPv6 global unicast address
- B . BGP4+ transmits routing information between peers through Update messages
- C . If the Update message carries the MP_REACH_NLRI attribute, it means that the advertised route is reachable
- D . When routing, it will carry AS_Path and other recognized mandatory attributes
As shown in the figure, Site1 and Site2 need to achieve mutual access through the operator’s BGP/MPLS IPVPN. It is known that the public network tunnel between PE1 and PE2 has been established (the label information is shown in the figure), and PF1 has advertised the 192.168.1.0/24 network segment route in Site1 to PE2 through the MP.JIBGP neighbor relationship, and the route learning is normal.
When capturing the data that Site2 visits the 192.168.1.0/24 of Site1 between P and PE1, what should be the outermost label?
- A . 6661
- B . 3
- C . 6662
- D . 8888
Part of the configuration of R1 is as follows. Which statement about OSPF on R1 is correct?
- A . The device type of R1 is Level-2
- B . The device type of R1 cannot be determined
- C . The device type of R1 is Leve1-1
- D . The device type of R1 is Level-1-2
Which of the following regarding the configuration description is wrong?
- A . If the DHCP request message received by the GigabitEthemnet0/0/1 interface does not contain the SutOption information of Option82, the device will generate Option82 and insert it into the message
- B . Enabling the DHCP Snooping configuration can be used to prevent DHCP Server counterfeiters from attacking
- C . Configure GigabitEthernet0/0/1 as a trusted interface
- D . Enabling the DHCP Snooping configuration can be used to prevent ARP spoofing attacks
Assuming that the neighbor relationship between BGP routers has been established successfully, the configuration on R1 is as shown in the figure.
Which router can the route entry 10.10.10.0/24 advertised by R1 be delivered to?
- A . R1
- B . R2
- C . R3
- D . R4
According to the configuration shown in the figure below, you can know that how many interfaces of R4 are advertised into IS-IS?
- A . 1
- B . 3
- C . 2
- D . 0
As shown in the figure:
- A . The LSA in the figure is generated by this router
- B . The destination network described by this LSA is 10.0.23.0/24
- C . The type of the LSA is AS-exterma1-LSA
- D . This device is ABR