A company's headquarters network and branch network are interconnected through the Internet. If you want to use VPN technology to ensure safe and reliable data transmission between headquarters users and branch users, which of the following VPN technologies is the most suitable?
A company's headquarters network and branch network are interconnected through the Internet. If you want to use VPN technology to ensure safe and reliable data transmission between headquarters users and branch users, which of the following VPN technologies is the most suitable?A . IPsec VPNB . SSL VPNC . L2TP...
In the campus network, in order to facilitate the management of servers, printers, video surveillance and other equipment, which of the following methods is recommended for address allocation?
In the campus network, in order to facilitate the management of servers, printers, video surveillance and other equipment, which of the following methods is recommended for address allocation?A . DHCP dynamically obtains a non-fixed IP addressB . Use BOOT protocol to dynamically obtain an IP addressC . Use PPPoE authentication...
Portal authentication is also called Web authentication. Users can authenticate user identities through the Web authentication page. Which of the following descriptions of Porta1 authentication is wrong?
Portal authentication is also called Web authentication. Users can authenticate user identities through the Web authentication page. Which of the following descriptions of Porta1 authentication is wrong?A . Generally, Portal authentication does not require the installation of specialized client software, so it is mainly used in terminal access scenarios that...
Which of the following descriptions about the purpose of configuring LSP fragmentation on IS-IS equipment is correct?
Which of the following descriptions about the purpose of configuring LSP fragmentation on IS-IS equipment is correct?A . Prevent the device from learning IS-IS routing informationB . Without any practical purposeC . Prevent the device from establishing IS-IS neighborsD . Allow the device to support more IS-IS routing entriesView AnswerAnswer:...
Regarding the description of MAC address spoofing attack, which of the following statements is correct?
Regarding the description of MAC address spoofing attack, which of the following statements is correct?A . A MAC address spoofing attack will cause the data that the switch intends to send to the correct destination to be sent to the attacker.B . An attacker can implement a MAC address spoofing...
SR-MPLS Policy needs to introduce business traffic into the tunnel for forwarding. If there are different business traffic going to the same destination address, in order to better ensure the quality of different services, which of the following traffic diversion methods is best to use?
SR-MPLS Policy needs to introduce business traffic into the tunnel for forwarding. If there are different business traffic going to the same destination address, in order to better ensure the quality of different services, which of the following traffic diversion methods is best to use?A . Drainage based on quintupleB...
Which of the following is the meaning of the ipv6 enable topology ipv6 command in IS-IS protocol view?
Which of the following is the meaning of the ipv6 enable topology ipv6 command in IS-IS protocol view?A . IPv4 and IPv6 use the same topology for SPF calculationB . SPF calculation is performed separately in IPv4 and IPv6 topologies.C . SPF calculation for IPv6 routing is not supportedD ....
Which of the following BGP routing attributes cannot control BGP route selection?
Which of the following BGP routing attributes cannot control BGP route selection?A . Originator IDB . MEDC . AS_PathD . CommunityView AnswerAnswer: D
When the network administrator tried to access the internal network device through Telnet, he found that he could not access it. Which of the following reasons is impossible?
When the network administrator tried to access the internal network device through Telnet, he found that he could not access it. Which of the following reasons is impossible?A . The route is unreachable and the client and server cannot establish a TCP connection.B . ACL is bound in the VTY...
Which of the following descriptions about DHCP Snooping is wrong?
Which of the following descriptions about DHCP Snooping is wrong?A . If the DHCP Snooping function is enabled in the interface view, all DHCP message command functions under the interface will take effect.B . DHCP Snooping can prevent illegal attacks by setting trusted portsC . Enable DHCP Snooping globally. Without...