When the client calls iMaster NCE Campus RESTful When using the API, if the server returns status code 401, which of the following descriptions is correct?

When the client calls iMaster NCE Campus RESTful When using the API, if the server returns status code 401, which of the following descriptions is correct?A . The requested resource does not existB . UnauthorizedC . No access allowedD . Service is unavailableView AnswerAnswer: B

September 17, 2024 No Comments READ MORE +

After the interface Sticky MAC function is enabled on the device, what is the number of MAC addresses learned by the interface by default?

After the interface Sticky MAC function is enabled on the device, what is the number of MAC addresses learned by the interface by default?A . 10B . 15C . 5D . 1View AnswerAnswer: D

September 16, 2024 No Comments READ MORE +

In a virtualized campus network scenario deployed through iMaster NCE-Campus, some key parameters need to be configured when configuring the authorization results for access authentication. Which of the following does not include?

In a virtualized campus network scenario deployed through iMaster NCE-Campus, some key parameters need to be configured when configuring the authorization results for access authentication. Which of the following does not include?A . Authorized security groupsB . Authorization result nameC . Binding siteD . Bind authentication rulesView AnswerAnswer: D

September 16, 2024 No Comments READ MORE +

Which of the following options is not the discarding strategy of the cache queue?

Which of the following options is not the discarding strategy of the cache queue?A . Tail discardB . WRRC . REDD . WREDView AnswerAnswer: B

September 15, 2024 No Comments READ MORE +

As shown in the figure, if you want to allow only legal users (users who obtain IP addresses through a legal DHCP server or specific static IP users) to access the network in the network, which of the following solutions can be used?

As shown in the figure, if you want to allow only legal users (users who obtain IP addresses through a legal DHCP server or specific static IP users) to access the network in the network, which of the following solutions can be used? A . DAI+IPSGB . DHCP Snooping+DAIC ....

September 15, 2024 No Comments READ MORE +

The default sending interval of BFD detection packets is?

The default sending interval of BFD detection packets is?A . 1000msB . 10sC . 5sD . 100msView AnswerAnswer: A

September 15, 2024 No Comments READ MORE +

As shown in the figure, the OSPF protocol is enabled on all interfaces of the router. Which of the following descriptions is correct?

As shown in the figure, the OSPF protocol is enabled on all interfaces of the router. Which of the following descriptions is correct? A . The Type5 LSA generated by R2 in area 0 contains the routing information of 10.0.2.2/32B . The Type1 LSA generated by R2 in area 0...

September 14, 2024 No Comments READ MORE +

Which of the following descriptions of BGP/MPLS IP VPN network architecture is wrong?

Which of the following descriptions of BGP/MPLS IP VPN network architecture is wrong?A . The P device only needs to have basic MPLS forwarding capabilities and does not maintain VPN related information.B . Under normal circumstances, CE devices are not aware of the existence of VPN, and CE devices do...

September 14, 2024 No Comments READ MORE +

Which of the following descriptions about traffic policing is correct?

Which of the following descriptions about traffic policing is correct?A . Traffic policing will discard traffic that exceeds the limit.B . Traffic policing will cache traffic that exceeds the limit.C . Traffic policing can only be used in the outbound direction.D . Traffic policing can only be used in the...

September 14, 2024 No Comments READ MORE +

There are three different roles in strategic linkage. Which of the following is not a role defined in strategic linkage?

There are three different roles in strategic linkage. Which of the following is not a role defined in strategic linkage?A . Authentication execution pointB . Authentication Control PointC . Policy execution pointD . TerminalView AnswerAnswer: C

September 12, 2024 No Comments READ MORE +