Which of the following description of OSPF neighbor relationship and adjacency relationship is correct?
Which of the following description of OSPF neighbor relationship and adjacency relationship is correct?A . The adjacency relationship is maintained by OSPF DD packetsB . OSPF routers must establish an adjacency before exchanging Hello packetsC . The neighbor relationship is selected from the adjacency relationship and formed to exchange routing informationD . Not all neighbor relationships can be adjacenciesView...
As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails and the port is in the Down state. At this time, which of the following processes will the network go through to achieve stability?
As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails and the port is in the Down state. At this time, which of the following processes will the network go through to achieve stability? A . The standby port on the SWC becomes the new root port...
The rated voltage of the cell (CELL) in the VRLA battery is ().
The rated voltage of the cell (CELL) in the VRLA battery is ().A . 12VB . 6VC . 2VD . 1VView AnswerAnswer: C
The filter-policy 2000 export is configured in the IS-IS process, which statement about the function of this command is wrong?
The filter-policy 2000 export is configured in the IS-IS process, which statement about the function of this command is wrong?A . It needs to be used in combination with route import, so that only part of the imported external routes can be advertised to neighborsB . This command will filter the link state...
Compared with routers and switching machines, what is the unique forwarding module of the firewall?
Compared with routers and switching machines, what is the unique forwarding module of the firewall?A . Switch fabric boardB . MPUC . LPUD . SPUView AnswerAnswer: D
Which function does the switch control plane not include?
Which function does the switch control plane not include?A . Business processingB . Routing operationC . System loadingD . Traffic StatisticsView AnswerAnswer: C
The RSTP protocol provides a variety of protection functions. For example, when the edge terminal port is configured in the protection state, the processing method of the edge port after receiving the BPDU message is:
The RSTP protocol provides a variety of protection functions. For example, when the edge terminal port is configured in the protection state, the processing method of the edge port after receiving the BPDU message is:A . Forward BPDU messages as requiredB . Obtain relevant information after the BPDU messageC . Close the portD . Directly...
Which of the following description about verifying whether a received Hello message is legal is wrong?
Which of the following description about verifying whether a received Hello message is legal is wrong?A . If the network type of the receiving port is point-to-point or virtual link, the Network Mask field is not checkedB . The RouterDeadIntera1 field in the received Hello message must be consistent with the configuration of the receiving portC . If...
Among the matters needing attention in configuring the Stub area, the correct description is:
Among the matters needing attention in configuring the Stub area, the correct description is:A . The virtual connection can pass through the stub areaB . If an area is configured as a Stub area, all routers in the area must be configured with Stub area attributesC . The backbone area can be configured as a stub areaD . ASBR can exist in...
Which of the following scenarios is the SD-WAN solution suitable for?
Which of the following scenarios is the SD-WAN solution suitable for?A . Enterprise branch interconnectionB . Internal interconnection of enterprise data center networkC . Enterprise campus wireless network deploymentView AnswerAnswer: A