Which one is wrong in the description of calico, the networking solution for Kubernetes?
Which one is wrong in the description of calico, the networking solution for Kubernetes?A . Felix is primarily used to store the metadata of the calico and to serve as a communication hub for the various components of the calicoB . Think of the server running the container as a...
Which of the following is wrong in the description of communication between VMs in a DVS distributed virtual switch environment in server virtualization?
Which of the following is wrong in the description of communication between VMs in a DVS distributed virtual switch environment in server virtualization?A . VMs in the same port group, if they are on different hosts, can reach DVS on the destination host through the uplink of DVS and finally...
Which of the following descriptions of the business chain is wrong?
Which of the following descriptions of the business chain is wrong?A . In the NSH implementation, the service chain function is implemented by inserting the NSH header into VXLAN packetsB . In the PBR implementation, the controller delivers PBR diversion policy routes to SFF and SC nodes hop-by-hop through NETCONFC...
Which of the following types of virtual NICs can be created by the Linux server?
Which of the following types of virtual NICs can be created by the Linux server?A . TunB . TapC . Linux BridgeD . OVSView AnswerAnswer: A B
What are the correct terms of the following descriptions of underlays and overlay networks?
What are the correct terms of the following descriptions of underlays and overlay networks?A . Underlay is logically isolated from overlay, and as long as the routes between tunnel endpoints are reachable, the failure of the underlay network will not directly affect the overlay networkB . Overlay Routes for the...
In the container network scenario of the CloudFabric solution, when the container accesses the network through the L3 route mode, which of the following components establishes a BGP neighbor relationship with the ToR?
In the container network scenario of the CloudFabric solution, when the container accesses the network through the L3 route mode, which of the following components establishes a BGP neighbor relationship with the ToR?A . CNI PluginB . vRouterC . birdD . etcdView AnswerAnswer: C
Which of the following protocol standards is led by Huawei to solve the PFC head-resistance problem?
Which of the following protocol standards is led by Huawei to solve the PFC head-resistance problem?A . IEEE 802.1ABB . IEEE P802.1CQC . IEEE 802.1QcpD . IEEE P802.1QczView AnswerAnswer: D Explanation: Resolution: • ECN was originally defined in RFC3168 and is used to define network congestion identity. PFC is defined...
Which of the following is a closed-loop approach to business failures?
iMaster NCE-Fabric provides an intelligent event function based on user intent, which can close the loop on fault events. Which of the following is a closed-loop approach to business failures?A . This section displays the details of the abnormal re-insurance flow monitoringB . Notify the user of a failureC ....
Which of the following descriptions of container technology and virtual machine technology is wrong?
Which of the following descriptions of container technology and virtual machine technology is wrong?A . Container images are smaller than virtual machinesB . Containers start up faster than virtual machinesC . Containers don't need separate kernelsD . Containers are more isolated than virtual machinesView AnswerAnswer: D
Which of the following descriptions of the RTT requirements between different PoDs is correct in the Multi-PoD scenario of the CloudFabric solution?
Which of the following descriptions of the RTT requirements between different PoDs is correct in the Multi-PoD scenario of the CloudFabric solution?A . No more than 50msB . No more than 100msC . No more than 10msD . No more than 1sView AnswerAnswer: A Explanation: Analysis: When using the Multi-PoD...