In Huawei's SD-WAN solution, the topology orchestration results are delivered to the RR through which of the following methods?

In Huawei's SD-WAN solution, the topology orchestration results are delivered to the RR through which of the following methods?A . BGP configurationB . Flow tableC . OSPF configurationD . SNMP configurationView AnswerAnswer: A

September 23, 2024No CommentsREAD MORE +

Regarding the description of configuring the security level of the firewall security zone, which of the following statements is correct?

Regarding the description of configuring the security level of the firewall security zone, which of the following statements is correct?A . For the newly created security zone, the system default security level is 1.B . The security level can only be set for customized security zones.C . In the same...

September 22, 2024No CommentsREAD MORE +

To solve this problem, which header field extension can be used to maintain the HTTP session without immediately disconnecting?

During the HTTP communication process, the client only sends a request for each HTTP connection. Once the server response data is sent, the connection will be released. To solve this problem, which header field extension can be used to maintain the HTTP session without immediately disconnecting?A . CookiesB . SessionC...

September 22, 2024No CommentsREAD MORE +

In scenarios with dense rooms such as dormitories, hotels, and wards, deploying an AP in each room will cause a large number of packets to be sent to the AC, which can easily cause performance bottlenecks on the AC. In order to cope with this challenge, which networking architecture can be adopted?

In scenarios with dense rooms such as dormitories, hotels, and wards, deploying an AP in each room will cause a large number of packets to be sent to the AC, which can easily cause performance bottlenecks on the AC. In order to cope with this challenge, which networking architecture can...

September 19, 2024No CommentsREAD MORE +

Which of the following descriptions of BGP/MPLSIPVPN routing interactions is wrong?

Which of the following descriptions of BGP/MPLSIPVPN routing interactions is wrong?A . PE and CE exchange IPv4 routing information.B . The egress PE can send IPv4 routes to the remote CE through BGP, IGP or static routing.C . The ingress PE changes the IPv4 routes received from the CE into...

September 19, 2024No CommentsREAD MORE +

In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, when EVPN Type2 is used to advertise host ARP and host IP routes respectively, which option is wrong in the following description?

In the scenario of dynamically establishing a VXLAN tunnel through BGP EVPN, when EVPN Type2 is used to advertise host ARP and host IP routes respectively, which option is wrong in the following description?A . Both carry L2 VNIB . Both carry host IP informationC . Both carry L3 VNID...

September 18, 2024No CommentsREAD MORE +

When the client calls iMaster NCE Campus RESTful When using the API, if the server returns status code 401, which of the following descriptions is correct?

When the client calls iMaster NCE Campus RESTful When using the API, if the server returns status code 401, which of the following descriptions is correct?A . The requested resource does not existB . UnauthorizedC . No access allowedD . Service is unavailableView AnswerAnswer: B

September 17, 2024No CommentsREAD MORE +

After the interface Sticky MAC function is enabled on the device, what is the number of MAC addresses learned by the interface by default?

After the interface Sticky MAC function is enabled on the device, what is the number of MAC addresses learned by the interface by default?A . 10B . 15C . 5D . 1View AnswerAnswer: D

September 16, 2024No CommentsREAD MORE +

In a virtualized campus network scenario deployed through iMaster NCE-Campus, some key parameters need to be configured when configuring the authorization results for access authentication. Which of the following does not include?

In a virtualized campus network scenario deployed through iMaster NCE-Campus, some key parameters need to be configured when configuring the authorization results for access authentication. Which of the following does not include?A . Authorized security groupsB . Authorization result nameC . Binding siteD . Bind authentication rulesView AnswerAnswer: D

September 16, 2024No CommentsREAD MORE +