In the firewall dual-machine hot standby scenario, when VGMP is working in load sharing mode, in order to avoid the return traffic being discarded because it does not match the session table entry in the scenario where the round-trip paths are inconsistent, what functions do the firewall need to enable?

In the firewall dual-machine hot standby scenario, when VGMP is working in load sharing mode, in order to avoid the return traffic being discarded because it does not match the session table entry in the scenario where the round-trip paths are inconsistent, what functions do the firewall need to enable?A...

September 4, 2024 No Comments READ MORE +

Which of the following descriptions of MPLS label space is wrong?

Which of the following descriptions of MPLS label space is wrong?A . When the penultimate hop LSR performs label exchange, if it is found that the exchanged label value is 3, the label will be popped up by default and the packet will be sent to the last hop.B ....

September 3, 2024 No Comments READ MORE +

An interface has the following configuration: isitimerhello5level-2. Which of the following descriptions is correct?

An interface has the following configuration: isitimerhello5level-2. Which of the following descriptions is correct?A . The CSNP packet sending interval for Level-2 on this interface is 5s.B . The hello packet sending interval for Level- on this interface is 5s.C . The hello packet sending interval for Level -2 of...

September 2, 2024 No Comments READ MORE +

There are many types of token buckets. Which type of token bucket should be used for long-term burst traffic?

There are many types of token buckets. Which type of token bucket should be used for long-term burst traffic?A . Double bucket double speed token bucketB . Single bucket double speed token bucketC . Single bucket single speed token bucketD . Single bucket double speed token bucketView AnswerAnswer: A

September 2, 2024 No Comments READ MORE +

In the following MPLSL3VPN cross-domain solution, which one of the VPNv4 routes needs to be transmitted between ASBRs?

In the following MPLSL3VPN cross-domain solution, which one of the VPNv4 routes needs to be transmitted between ASBRs?A . Option BB . Option DC . Option AD . Option CView AnswerAnswer: A

September 1, 2024 No Comments READ MORE +

For scenarios where advanced security functions such as UR filtering, IPS, security defense, and AV anti-virus need to be supported, and multi-link uplink needs to be supported, which of the following can be selected for the egress device?

For scenarios where advanced security functions such as UR filtering, IPS, security defense, and AV anti-virus need to be supported, and multi-link uplink needs to be supported, which of the following can be selected for the egress device?A . FWB . ACC . APD . ARView AnswerAnswer: A

August 31, 2024 No Comments READ MORE +

Which of the following descriptions of data encryption methods is wrong?

Which of the following descriptions of data encryption methods is wrong?A . Data encryption methods are divided into symmetric encryption and asymmetric encryptionB . Asymmetric encryption uses public key encryption and private key decryptionC . The keys used in the symmetric encryption algorithm must be exchanged via email, otherwise there...

August 30, 2024 No Comments READ MORE +

Part of the configuration of device H is as shown in the figure. Which item is wrong in the following description of this configuration?

Part of the configuration of device H is as shown in the figure. Which item is wrong in the following description of this configuration? A . Configure GigabitEthernet0/0/1 interface as a trusted interfaceB . Enable DHCP Snooping configuration to prevent ARP spoofing attacksC . If the DHCP request message received...

August 30, 2024 No Comments READ MORE +

Which of the following descriptions of Underlay in VXLAN virtualized campus applications is wrong?

Which of the following descriptions of Underlay in VXLAN virtualized campus applications is wrong?A . When using IMaster NCE-Camspus to implement automatic orchestration of Underlay network routing domains, only OSPF routing protocol is supported.B . The virtualized campus solution uses VXLAN technology and adopts MAC IN UDP encapsulation method to...

August 30, 2024 No Comments READ MORE +

In the scenario of dynamically establishing a VXLAN tunnel through BCP EVPN, when using BGP EVPN Type2 routing for host MAC address advertisement, which of the following descriptions is correct?

In the scenario of dynamically establishing a VXLAN tunnel through BCP EVPN, when using BGP EVPN Type2 routing for host MAC address advertisement, which of the following descriptions is correct?A . It will carry specific L2 VNI and L3 VNI values at the same time.B . Will carry specific L3...

August 30, 2024 No Comments READ MORE +