When you configure a virtualized campus network on iMaster NCE-Campus, creating a virtual network is equivalent to creating a VPN instance to isolate different services.

When you configure a virtualized campus network on iMaster NCE-Campus, creating a virtual network is equivalent to creating a VPN instance to isolate different services.A . True B. FalseView AnswerAnswer: A

July 3, 2023 No Comments READ MORE +

Segment Routing (SR) is a technical architecture designed to forward data packets on a network based on the source routing paradigm. SR-MPLS, as its name suggests, is SR based on MPLS label forwarding.

Segment Routing (SR) is a technical architecture designed to forward data packets on a network based on the source routing paradigm. SR-MPLS, as its name suggests, is SR based on MPLS label forwarding.A . True B. FalseView AnswerAnswer: A

July 2, 2023 No Comments READ MORE +

IPv6 is deployed on a campus network for service tests. In the initial phase of deployment, engineers want to use IPv6 static routes to implement network interconnection. When creating an IPv6 static route, you can specify either or both the outbound interface and next hop.

IPv6 is deployed on a campus network for service tests. In the initial phase of deployment, engineers want to use IPv6 static routes to implement network interconnection. When creating an IPv6 static route, you can specify either or both the outbound interface and next hop.A . True B. FalseView AnswerAnswer:...

July 2, 2023 No Comments READ MORE +

The major routing policy tools available to BGP include the filter-policy and route-policy. The filter-policy can only be used to filter routes, and the route-policy can only be used to modify routes.

The major routing policy tools available to BGP include the filter-policy and route-policy. The filter-policy can only be used to filter routes, and the route-policy can only be used to modify routes.A . True B. FalseView AnswerAnswer: B

July 2, 2023 No Comments READ MORE +

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, BGP EVPN advertises the MAC address of a host to the remote VTEP through a Type 5 route.

In a scenario where a VXLAN tunnel is dynamically established through BGP EVPN, BGP EVPN advertises the MAC address of a host to the remote VTEP through a Type 5 route.A . True B. FalseView AnswerAnswer: B

July 1, 2023 No Comments READ MORE +

In the firewall hot standby scenario, heartbeat interfaces can be connected directly or through an intermediate device such as a switch or router.

In the firewall hot standby scenario, heartbeat interfaces can be connected directly or through an intermediate device such as a switch or router.A . True B. FalseView AnswerAnswer: A

July 1, 2023 No Comments READ MORE +

Which of the following statements is incorrect?

Assume that free mobility is deployed on the virtualized campus network shown in the figure and PC1, PC2 and PC3 belong to the Sales, R&D and Market security groups, respectively. Which of the following statements is incorrect?A . Both AGG1 and AGG2 have the inter-group policy delivered by iMaster NCE-...

July 1, 2023 No Comments READ MORE +

Which of the following statements about node planning on a fabric is incorrect?

Fabric nodes need to be planned during fabric design on a CloudCampus virtualized campus network. Which of the following statements about node planning on a fabric is incorrect?A . It is recommended that core devices be deployed as border nodes, and access or aggregation devices be deployed as edge nodes....

July 1, 2023 No Comments READ MORE +

For telemetry data push, data can be transferred between devices and collectors using the TLS protocol. TLS must be configured for data encryption if data is pushed based on gRPC.

For telemetry data push, data can be transferred between devices and collectors using the TLS protocol. TLS must be configured for data encryption if data is pushed based on gRPC.A . True B. FalseView AnswerAnswer: A

July 1, 2023 No Comments READ MORE +

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.

In 6PE and 6VPE networking, no VPN instance needs to be created on PEs.A . True B. FalseView AnswerAnswer: B

June 30, 2023 No Comments READ MORE +