The following description of the BSR mechanism, which is correct? (Multiple Choice)
The following description of the BSR mechanism, which is correct? (Multiple Choice)A . There can be multiple C-BSR in a PIM-SM domain, but only one BSR can be elected.B . The BSR collects C-RP information through the received C-RP data packets.C . The BSR advertises BSR information and C-RP information...
What protocol does TFTP rely on for transmission?
HW users are transmitting a lot of files through TFTP. What protocol does TFTP rely on for transmission?A . IcmP and UDPB . iP and TCPC . UDPD . NFSE . FTPView AnswerAnswer: C
Then, after the first round of scheduling, what is the bandwidth allocated by the EF queue?
Assume that the port shaping rate is 100Mbps. The input bandwidth and PIR configured by IP of each service on the interface are as follows. Then, after the first round of scheduling, what is the bandwidth allocated by the EF queue?A . 30MB . 15MC . 90MD . 25MView AnswerAnswer:...
RD is used to distinguish the same IP address in different VPNs. How many bits does the RD contain?
RD is used to distinguish the same IP address in different VPNs. How many bits does the RD contain?A . 64B . 32C . 16D . 128View AnswerAnswer: A
Which of the following types of packets is required to implement virtual machine migration in the BGP EVPN distributed gateway scenario?
Which of the following types of packets is required to implement virtual machine migration in the BGP EVPN distributed gateway scenario?A . Type3B . Type5C . Type4D . Type2E . Type1View AnswerAnswer: D
As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same time, an IPSEC tunnel needs to be established between the two IPv6 networks for communication. Which of the following encapsulation modes can meet the requirements above?
As shown in the figure, there are two IPv6 networks that can access the IPv4 network. At the same time, an IPSEC tunnel needs to be established between the two IPv6 networks for communication. Which of the following encapsulation modes can meet the requirements above? A . ESP + tunnel...
Regarding the processing mode of MPLS for TTL, which description is correct?
Regarding the processing mode of MPLS for TTL, which description is correct?A . In Pipe mode, when an IP packet passes through the MPLS network, the IP TTL is decremented by 1 to the MPLS TTL field on the ingress node.B . The TTL of the MPLS label has the...
If running PIM-SM on a multicast network, you need to construct a multicast forwarding tree between the multicast source and the receiver to enable the receiver to receive multicast data. Which of the following description about the constructed multicast forwarding tree is correct? (Multiple Choice)
If running PIM-SM on a multicast network, you need to construct a multicast forwarding tree between the multicast source and the receiver to enable the receiver to receive multicast data. Which of the following description about the constructed multicast forwarding tree is correct? (Multiple Choice)A . The RTP tree is...
The following procedure for NDP to resolve the link layer address is correct or not.
The following procedure for NDP to resolve the link layer address is correct or not. A . TureB . FalseView AnswerAnswer: B
If there are multiple receivers in a multicast group, the administrator enables IGMP-Snooping on the switch connecting the receiver. After the receiver receives the general query message from the querier, the receiver receives multiple receivers. How to respond?
If there are multiple receivers in a multicast group, the administrator enables IGMP-Snooping on the switch connecting the receiver. After the receiver receives the general query message from the querier, the receiver receives multiple receivers. How to respond?A . All recipients will respond to the Report message.B . Only when...