- All Exams Instant Download
When the administrator deploys the traffic suppression function on the switch, in the VLAN view of the device, which of the following types of messages can be suppressed based on the bit rate?
When the administrator deploys the traffic suppression function on the switch, in the VLAN view of the device, which of the following types of messages can be suppressed based on the bit rate?A . Unknown multicast messageB . Broadcast messageC . Known unicast messageD . Unknown unicast messageView AnswerAnswer: B
In the network shown in the figure, R1 and R2 establish an EBGP neighbor relationship through a direct interface, and the BFD function is enabled in the BGP process. The BFD parameters are "bfd min-tx-interval 1000 min-rx-interval 1000 detect-multiplier 6". If the IP address of GE0/0/0 on R2 is deleted and the BGP neighbor relationship is checked on R1, which of the following is the longest time for the BGP neighbor relationship on R1 to change from Up to Down?
In the network shown in the figure, R1 and R2 establish an EBGP neighbor relationship through a direct interface, and the BFD function is enabled in the BGP process. The BFD parameters are "bfd min-tx-interval 1000 min-rx-interval 1000 detect-multiplier 6". If the IP address of GE0/0/0 on R2 is deleted...
A network engineer enters "dir" on the device and obtains the following file names. Which of the following is most likely to be the version file of the device?
A network engineer enters "dir" on the device and obtains the following file names. Which of the following is most likely to be the version file of the device?A . V300R022000SPC100.cfgB . startup yl.rdbC . Ca.cerD . V300R022C00SPC100.ccView AnswerAnswer: D
Which of the following commands can be configured on an IS-IS Level-1-2 device to prevent the Level-1 device from generating a default route?
Which of the following commands can be configured on an IS-IS Level-1-2 device to prevent the Level-1 device from generating a default route?A . attached-bit advertise neverB . attached-bit advertise alwaysC . import-route isis level-2 into level-1D . attached-bit avoid-learningView AnswerAnswer: A
In a BGP/MPLS IP VPN network, VPNv4 routing transfers carry RD values. Which of the following path attributes does MP-BGP use to carry the RD value?
In a BGP/MPLS IP VPN network, VPNv4 routing transfers carry RD values. Which of the following path attributes does MP-BGP use to carry the RD value?A . Extended_CommunityB . AS_PathC . MP_REACH_NLRD . Local_PreferenceView AnswerAnswer: C
In order to support multi-topology functions, which of the following TLVs has been newly added by IS-IS?
In order to support multi-topology functions, which of the following TLVs has been newly added by IS-IS?A . TLV No. 229B . TLV No. 236C . TLV No. 129D . TLV No. 232View AnswerAnswer: A
A network engineer accidentally deleted the IP address of an interface through the command line. If he wants to view the deleted IP address, which of the following information should he query?
A network engineer accidentally deleted the IP address of an interface through the command line. If he wants to view the deleted IP address, which of the following information should he query?A . Debug informationB . Log informationC . Trap informationD . SNMP agent informationView AnswerAnswer: B
The MPLS architecture is divided into a control plane and a forwarding plane, which contains multiple protocols and tables. Which of the following tables is responsible for forwarding packets with MPLS labels?
The MPLS architecture is divided into a control plane and a forwarding plane, which contains multiple protocols and tables. Which of the following tables is responsible for forwarding packets with MPLS labels?A . Label Information Table LIBB . Label Forwarding Information Table LFIBC . Forwarding Information Table FIBD . Routing...
The "set-overload" command is configured in the process of an IS-IS router. By default, how long does it take for the router to exit the overload state after restarting?
The "set-overload" command is configured in the process of an IS-IS router. By default, how long does it take for the router to exit the overload state after restarting?A . 900sB . 600sC . 500sD . 1200sView AnswerAnswer: B
In the BGP/MPLS IP VPN network shown in the figure, the administrator uses Hub-spoke networking to implement centralized control of VPN traffic at the Hub site. Which of the following RT value plans for each device is correct?
In the BGP/MPLS IP VPN network shown in the figure, the administrator uses Hub-spoke networking to implement centralized control of VPN traffic at the Hub site. Which of the following RT value plans for each device is correct? A . PE1 VPN1: IRT=100:1; ERT=100:1 PE2 VPN1: IRT=100:1; ERT=100:1 PE3 VPN1:...