When the administrator deploys the traffic suppression function on the switch, in the VLAN view of the device, which of the following types of messages can be suppressed based on the bit rate?

When the administrator deploys the traffic suppression function on the switch, in the VLAN view of the device, which of the following types of messages can be suppressed based on the bit rate?A . Unknown multicast messageB . Broadcast messageC . Known unicast messageD . Unknown unicast messageView AnswerAnswer: B

September 14, 2024No CommentsREAD MORE +

A network engineer enters "dir" on the device and obtains the following file names. Which of the following is most likely to be the version file of the device?

A network engineer enters "dir" on the device and obtains the following file names. Which of the following is most likely to be the version file of the device?A . V300R022000SPC100.cfgB . startup yl.rdbC . Ca.cerD . V300R022C00SPC100.ccView AnswerAnswer: D

September 13, 2024No CommentsREAD MORE +

Which of the following commands can be configured on an IS-IS Level-1-2 device to prevent the Level-1 device from generating a default route?

Which of the following commands can be configured on an IS-IS Level-1-2 device to prevent the Level-1 device from generating a default route?A . attached-bit advertise neverB . attached-bit advertise alwaysC . import-route isis level-2 into level-1D . attached-bit avoid-learningView AnswerAnswer: A

September 13, 2024No CommentsREAD MORE +

In a BGP/MPLS IP VPN network, VPNv4 routing transfers carry RD values. Which of the following path attributes does MP-BGP use to carry the RD value?

In a BGP/MPLS IP VPN network, VPNv4 routing transfers carry RD values. Which of the following path attributes does MP-BGP use to carry the RD value?A . Extended_CommunityB . AS_PathC . MP_REACH_NLRD . Local_PreferenceView AnswerAnswer: C

September 13, 2024No CommentsREAD MORE +

In order to support multi-topology functions, which of the following TLVs has been newly added by IS-IS?

In order to support multi-topology functions, which of the following TLVs has been newly added by IS-IS?A . TLV No. 229B . TLV No. 236C . TLV No. 129D . TLV No. 232View AnswerAnswer: A

September 12, 2024No CommentsREAD MORE +

A network engineer accidentally deleted the IP address of an interface through the command line. If he wants to view the deleted IP address, which of the following information should he query?

A network engineer accidentally deleted the IP address of an interface through the command line. If he wants to view the deleted IP address, which of the following information should he query?A . Debug informationB . Log informationC . Trap informationD . SNMP agent informationView AnswerAnswer: B

September 12, 2024No CommentsREAD MORE +

The MPLS architecture is divided into a control plane and a forwarding plane, which contains multiple protocols and tables. Which of the following tables is responsible for forwarding packets with MPLS labels?

The MPLS architecture is divided into a control plane and a forwarding plane, which contains multiple protocols and tables. Which of the following tables is responsible for forwarding packets with MPLS labels?A . Label Information Table LIBB . Label Forwarding Information Table LFIBC . Forwarding Information Table FIBD . Routing...

September 11, 2024No CommentsREAD MORE +

The "set-overload" command is configured in the process of an IS-IS router. By default, how long does it take for the router to exit the overload state after restarting?

The "set-overload" command is configured in the process of an IS-IS router. By default, how long does it take for the router to exit the overload state after restarting?A . 900sB . 600sC . 500sD . 1200sView AnswerAnswer: B

September 10, 2024No CommentsREAD MORE +

In the BGP/MPLS IP VPN network shown in the figure, the administrator uses Hub-spoke networking to implement centralized control of VPN traffic at the Hub site. Which of the following RT value plans for each device is correct?

In the BGP/MPLS IP VPN network shown in the figure, the administrator uses Hub-spoke networking to implement centralized control of VPN traffic at the Hub site. Which of the following RT value plans for each device is correct? A . PE1 VPN1: IRT=100:1; ERT=100:1 PE2 VPN1: IRT=100:1; ERT=100:1 PE3 VPN1:...

September 9, 2024No CommentsREAD MORE +