When the client calls iMaster NCE Campus RESTful When using the API, if the server returns status code 401, which of the following descriptions is correct?
When the client calls iMaster NCE Campus RESTful When using the API, if the server returns status code 401, which of the following descriptions is correct?A . The requested resource does not existB . UnauthorizedC . No access allowedD . Service is unavailableView AnswerAnswer: B
After the interface Sticky MAC function is enabled on the device, what is the number of MAC addresses learned by the interface by default?
After the interface Sticky MAC function is enabled on the device, what is the number of MAC addresses learned by the interface by default?A . 10B . 15C . 5D . 1View AnswerAnswer: D
In a virtualized campus network scenario deployed through iMaster NCE-Campus, some key parameters need to be configured when configuring the authorization results for access authentication. Which of the following does not include?
In a virtualized campus network scenario deployed through iMaster NCE-Campus, some key parameters need to be configured when configuring the authorization results for access authentication. Which of the following does not include?A . Authorized security groupsB . Authorization result nameC . Binding siteD . Bind authentication rulesView AnswerAnswer: D
Which of the following options is not the discarding strategy of the cache queue?
Which of the following options is not the discarding strategy of the cache queue?A . Tail discardB . WRRC . REDD . WREDView AnswerAnswer: B
As shown in the figure, if you want to allow only legal users (users who obtain IP addresses through a legal DHCP server or specific static IP users) to access the network in the network, which of the following solutions can be used?
As shown in the figure, if you want to allow only legal users (users who obtain IP addresses through a legal DHCP server or specific static IP users) to access the network in the network, which of the following solutions can be used? A . DAI+IPSGB . DHCP Snooping+DAIC ....
The default sending interval of BFD detection packets is?
The default sending interval of BFD detection packets is?A . 1000msB . 10sC . 5sD . 100msView AnswerAnswer: A
As shown in the figure, the OSPF protocol is enabled on all interfaces of the router. Which of the following descriptions is correct?
As shown in the figure, the OSPF protocol is enabled on all interfaces of the router. Which of the following descriptions is correct? A . The Type5 LSA generated by R2 in area 0 contains the routing information of 10.0.2.2/32B . The Type1 LSA generated by R2 in area 0...
Which of the following descriptions of BGP/MPLS IP VPN network architecture is wrong?
Which of the following descriptions of BGP/MPLS IP VPN network architecture is wrong?A . The P device only needs to have basic MPLS forwarding capabilities and does not maintain VPN related information.B . Under normal circumstances, CE devices are not aware of the existence of VPN, and CE devices do...
Which of the following descriptions about traffic policing is correct?
Which of the following descriptions about traffic policing is correct?A . Traffic policing will discard traffic that exceeds the limit.B . Traffic policing will cache traffic that exceeds the limit.C . Traffic policing can only be used in the outbound direction.D . Traffic policing can only be used in the...
There are three different roles in strategic linkage. Which of the following is not a role defined in strategic linkage?
There are three different roles in strategic linkage. Which of the following is not a role defined in strategic linkage?A . Authentication execution pointB . Authentication Control PointC . Policy execution pointD . TerminalView AnswerAnswer: C