Which of the following descriptions about the purpose of configuring LSP fragmentation on IS-IS equipment is correct?

Which of the following descriptions about the purpose of configuring LSP fragmentation on IS-IS equipment is correct?A . Prevent the device from learning IS-IS routing informationB . Without any practical purposeC . Prevent the device from establishing IS-IS neighborsD . Allow the device to support more IS-IS routing entriesView AnswerAnswer:...

September 28, 2024No CommentsREAD MORE +

Regarding the description of MAC address spoofing attack, which of the following statements is correct?

Regarding the description of MAC address spoofing attack, which of the following statements is correct?A . A MAC address spoofing attack will cause the data that the switch intends to send to the correct destination to be sent to the attacker.B . An attacker can implement a MAC address spoofing...

September 28, 2024No CommentsREAD MORE +

SR-MPLS Policy needs to introduce business traffic into the tunnel for forwarding. If there are different business traffic going to the same destination address, in order to better ensure the quality of different services, which of the following traffic diversion methods is best to use?

SR-MPLS Policy needs to introduce business traffic into the tunnel for forwarding. If there are different business traffic going to the same destination address, in order to better ensure the quality of different services, which of the following traffic diversion methods is best to use?A . Drainage based on quintupleB...

September 27, 2024No CommentsREAD MORE +

Which of the following is the meaning of the ipv6 enable topology ipv6 command in IS-IS protocol view?

Which of the following is the meaning of the ipv6 enable topology ipv6 command in IS-IS protocol view?A . IPv4 and IPv6 use the same topology for SPF calculationB . SPF calculation is performed separately in IPv4 and IPv6 topologies.C . SPF calculation for IPv6 routing is not supportedD ....

September 27, 2024No CommentsREAD MORE +

Which of the following BGP routing attributes cannot control BGP route selection?

Which of the following BGP routing attributes cannot control BGP route selection?A . Originator IDB . MEDC . AS_PathD . CommunityView AnswerAnswer: D

September 25, 2024No CommentsREAD MORE +

When the network administrator tried to access the internal network device through Telnet, he found that he could not access it. Which of the following reasons is impossible?

When the network administrator tried to access the internal network device through Telnet, he found that he could not access it. Which of the following reasons is impossible?A . The route is unreachable and the client and server cannot establish a TCP connection.B . ACL is bound in the VTY...

September 24, 2024No CommentsREAD MORE +

Which of the following descriptions about DHCP Snooping is wrong?

Which of the following descriptions about DHCP Snooping is wrong?A . If the DHCP Snooping function is enabled in the interface view, all DHCP message command functions under the interface will take effect.B . DHCP Snooping can prevent illegal attacks by setting trusted portsC . Enable DHCP Snooping globally. Without...

September 24, 2024No CommentsREAD MORE +

In different scenarios, RSTP provides different protection functions. Which of the following is wrong?

In different scenarios, RSTP provides different protection functions. Which of the following is wrong?A . For a designated port with root protection enabled, its port role can only remain as a designated port.B . After enabling the anti-TC-BPDU packet attack function, the number of times the switching device processes IC...

September 24, 2024No CommentsREAD MORE +

Based on this judgment, which of the following reasons may cause the adjacency relationship to fail to be established normally?

As shown in the figure is the output information of a network engineer when troubleshooting OSPF faults. Based on this judgment, which of the following reasons may cause the adjacency relationship to fail to be established normally?A . Hello message sending intervals are inconsistentB . Authentication passwords are inconsistentC ....

September 23, 2024No CommentsREAD MORE +

Regarding the description of Network Address Port Translation (NAPT) and Network Address Only Translation (No-PAT), which of the following statements is correct?

Regarding the description of Network Address Port Translation (NAPT) and Network Address Only Translation (No-PAT), which of the following statements is correct?A . After NAPT conversion, for external network users, all packets will only come from the same IP address.B . No-PAT supports protocol address translation at the network layerC...

September 23, 2024No CommentsREAD MORE +