The Ethernet switch working in store and forward mode drops the frame with length smaller than 64 bytes.
- A . True
- B . False
VXLAN uses MAC in UDP encapsulation to extend Layer 2 networks and encapsulates Ethernet packets on IP packets. When packets are transmitted on a touted network, the intermediate touting device does not need to learn inner MAC addresses.
- A . True
- B . False
Which of the following statements about LAN switch is correct?
- A . LAN switch is transparent for user, it does not modify the data field of the forwarded frame.
- B . LAN switch can still operate normally even when loop exists.
- C . LAN switch can detect loop according to the contents of the packet.
- D . LAN switch can modify the data field of the forwarded frame when necessary.
Which of the following statements about layer 2 LAN switch are incorrect?
- A . LAN switch will modify the data link layer header of the packet and then forward it.
- B . LAN switch can learn Mac address automatically.
- C . LAN switch operates at data link layer.
- D . LAN switch will modify the network layer header of the packet and then forward it.
Is the following statement correct or incorrect? Because a bypass tunnel Is manually created during TE FRR configuration, the constraint shortest path first (CSPF) does not need to be enabled.
- A . True
- B . False
Which of the following statements is correct regarding virtual router?
- A . If multiple routers are configured with the same virtual router ID.they all associate to the same virtual router.
- B . If multiple routers associate to the same virtual router, they must be configured with the same virtual router ID and at feast one virtual IP address.
- C . If multiple routers associate to the same virtual router, they must be configured with the same virtual router ID and virtual IP address.
- D . If multiple routers are configured with the same virtual IP address, they all associate to the same virtual router.
The VRRP advertfse-lnterval is 2s, preempt mode is enabled, Delay Time is 3s, then which of the following is the Master_Down_Interval time?
- A . 2s
- B . 4s
- C . 9s
- D . 6s
Which of the following statements are correct?
- A . Both TE FRR and VPN FRR are used to protect tunnels, and therefore they can replace each other.
- B . After VPN FRR is deployed, the end-to-end service convergence time is shorter than 1 second.
- C . TE FRR Implements quick traffic switchovers if a PE becomes faulty.
- D . VPN FRR implements quick traffic switchovers if a PE becomes faulty.
Which of the following statement are correct regarding TTL value in VRRP packet?
- A . The VRRP packet is only forwarded in one IP network, so the TTL value is always set to 1.
- B . The TTL value of device from different manufactures is different; on VRP, the TTL value is 1.
- C . By default, the VRRP packet with TTL value not equal to 255 will be dropped; On VRP, we can use some commands to disable the function of delecting TTL value.
- D . The TTL value must be 255 In normal VRRP packet.
Which of the following operations need to be complete before IP FRR configuration?
- A . Configure different costs to generate two routes with different costs.
- B . Configure the same cost to generate two equal-cost routes.
- C . Configure a dynamic routing protocol on the entire network to Implement IP connectivity between nodes.
- D . Configure static routes or an IGP to implement IP connectivity between nodes.
PIM-SM relies on particular unicast routing protocol for RPF check.
- A . True
- B . False
Which of the following statements regarding multicast MAC address is correct?
- A . The first six hexadecimal value of the multicast Mac address is 0x01005e.
- B . Multicast MAC address is composed of 23 bits.
- C . The range of multicast MAC address is assigned by IEEE.
- D . On Ethernet, 28-bits of layer 3 multicast IP address are mapped into the 24-bits of the layer 2 multicast MAC address.
Which of the following multicast IP addresses is administratively scope address?
- A . 224.0.0.0-224.0.0.255
- B . 239.0.0.0- 239.255.255.255
- C . 224.0.1.0-238.255.255.255
- D . 224.0.0.0-239.255.255.255
The IGMP snooping configuration is as follows:
#
vlan batch 3
#
igmp-snooping enable
#
vlan 3
igmp-snooping enable
#
interface GigabitEthernet1/0/1
port hybrid tagged vlan 3
I2-multicast static-group group-address 225.1.1.1 to 225.1.1.3 vlan 3
#
interface GigabitEthernet3/0/1
port hybrid tagged vlan 3
igmp-snooplng static-router-port vlan 3
Which of the following statements are correct?
- A . The device connected to GE 1/0/1 can receive multicast traffic only for the multicast groups 225.1.1.1 to 225.1.1.3. because static multicast groups are configured on GE 1/0/1.
- B . The device connected to GE 1/0/1 can send Report messages to receive multicast data ‘or multicast groups outside the 225.1.1.1 to 225.1-1.3 range.
- C . IGMP snooping has been enabled on the switch.
- D . The device connected to GE 3/0/1 Is a multicast router.
Which of the following statements regarding IP address 224.0.0.1 are correct?
- A . It represents all the hosts and routers.
- B . It represents all the routers.
- C . It is a private IP address.
- D . It is a multicast IP address.
The PPPoE Session Stage is a complete PPP procedure.
- A . True
- B . False
The Session ID of PPPoE could be changed during the whole Session Stage.
- A . True
- B . False
After the server receives the PADR sent by the client, which message will be sent as the response and to identify the connection?
- A . PADS
- B . PADR
- C . PADO
- D . PADT
Which of the following functions could be achieved by the LCP of PPP?
- A . To establish, maintain and terminate the point-to-point connection
- B . IPX address negotiation
- C . IP address negotiation
- D . To maintain multiple physical links
What are the three components of PPP?
- A . NCP (Network Control Protocol)
- B . PPPOE
- C . LCP (Link Control Protocol)
- D . The extension protocol of PPP