The current network design patterns can generally be summarized into which of the following items? (Multiple choice)

 The current network design patterns can generally be summarized into which of the following items? (Multiple choice)A .  ModularityB .  AutomationC .  HierarchicalD .  ModernizationE .  StandardizationView AnswerAnswer: AC

November 23, 2021 No Comments READ MORE +

Which of the following description is wrong?

About the warning information "OSPF/2/IFAUTFAIL (OID) [1.3.6.1.2.1.14.16.2.6]: A packet is received on a non-virtual interface from a router whose authentication key or authentication type conflicts with the local authenctication key or authenctication type. (IfIpAddress=[ip-address], AddressLessIf=[interface-index], ProcessId= [process -id], RouterId=[router-id], PacketSrc=[source-ip-address], ConfigErrorType=[error-type], PacketType=[packet-type], InstanceName=[instance-name])" Which of the following description is wrong?A...

November 23, 2021 No Comments READ MORE +

 During the inspection of operation equipment, which of the following statements is correct?

 During the inspection of operation equipment, which of the following statements is correct?A . You can check the memory usage of the device by executing the display memory-usage command. If "Memory Using Percentage Is" exceeds 80%, you need to pay special attention currently.B . You can check the running status of the board by executing the display device command, the “Online” of the board should be “Present”C...

November 23, 2021 No Comments READ MORE +

Determining the project team members is the work content of the implementation phase.

Determining the project team members is the work content of the implementation phase.A . TrueB . FalseView AnswerAnswer: B

November 23, 2021 No Comments READ MORE +

 As an effective security mechanism, DHCP SNOOPING can prevent which of the following attacks? (Multiple Choice)

 As an effective security mechanism, DHCP SNOOPING can prevent which of the following attacks? (Multiple Choice)A .  Prevent DHCP spoofing attacksB .  Prevent DOS attacks on the DHCP serverC .  Prevent MAC address flooding attacksD .  Combine the DAI function to check the source MAC address of the data packetE .  Combine the IPSG function to check the source IP address of the data packet View AnswerAnswer: ABE

November 23, 2021 No Comments READ MORE +

By default in VRP, when the route-policy of a BGP neighbor is changed, manual operations are required to re-send the UPDATE information to the neighbor.

By default in VRP, when the route-policy of a BGP neighbor is changed, manual operations are required to re-send the UPDATE information to the neighbor.A . TrueB . FalseView AnswerAnswer: B

November 23, 2021 No Comments READ MORE +

On the broadcast or nbma network, not all neighbors will establish adjacency.

On the broadcast or nbma network, not all neighbors will establish adjacency.A . TrueB . FalseView AnswerAnswer: A

November 22, 2021 No Comments READ MORE +

MUX VLAN provides a mechanism for network resource control through VLAN. Which of the following concepts do not belong to MUX VLAN?

MUX VLAN provides a mechanism for network resource control through VLAN. Which of the following concepts do not belong to MUX VLAN?A . Primary VLANB . Slave VLANC . Guest VLAND . Interworking VLANView AnswerAnswer: C

November 22, 2021 No Comments READ MORE +

IGMPv1 only contains two message types: membership query and membership report.

IGMPv1 only contains two message types: membership query and membership report.A . TrueB . FalseView AnswerAnswer: A

November 22, 2021 No Comments READ MORE +

Since the attribute AS-PATH cannot work well in the AS, it is stipulated that BGP routers will not announce any update information from IBGP peers to its IBGP peers.

Since the attribute AS-PATH cannot work well in the AS, it is stipulated that BGP routers will not announce any update information from IBGP peers to its IBGP peers.A . TrueB . FalseView AnswerAnswer: A

November 22, 2021 No Comments READ MORE +