The current network design patterns can generally be summarized into which of the following items? (Multiple choice)
The current network design patterns can generally be summarized into which of the following items? (Multiple choice)A . ModularityB . AutomationC . HierarchicalD . ModernizationE . StandardizationView AnswerAnswer: AC
Which of the following description is wrong?
About the warning information "OSPF/2/IFAUTFAIL (OID) [1.3.6.1.2.1.14.16.2.6]: A packet is received on a non-virtual interface from a router whose authentication key or authentication type conflicts with the local authenctication key or authenctication type. (IfIpAddress=[ip-address], AddressLessIf=[interface-index], ProcessId= [process -id], RouterId=[router-id], PacketSrc=[source-ip-address], ConfigErrorType=[error-type], PacketType=[packet-type], InstanceName=[instance-name])" Which of the following description is wrong?A...
During the inspection of operation equipment, which of the following statements is correct?
During the inspection of operation equipment, which of the following statements is correct?A . You can check the memory usage of the device by executing the display memory-usage command. If "Memory Using Percentage Is" exceeds 80%, you need to pay special attention currently.B . You can check the running status of the board by executing the display device command, the “Online” of the board should be “Present”C...
Determining the project team members is the work content of the implementation phase.
Determining the project team members is the work content of the implementation phase.A . TrueB . FalseView AnswerAnswer: B
As an effective security mechanism, DHCP SNOOPING can prevent which of the following attacks? (Multiple Choice)
As an effective security mechanism, DHCP SNOOPING can prevent which of the following attacks? (Multiple Choice)A . Prevent DHCP spoofing attacksB . Prevent DOS attacks on the DHCP serverC . Prevent MAC address flooding attacksD . Combine the DAI function to check the source MAC address of the data packetE . Combine the IPSG function to check the source IP address of the data packet View AnswerAnswer: ABE
By default in VRP, when the route-policy of a BGP neighbor is changed, manual operations are required to re-send the UPDATE information to the neighbor.
By default in VRP, when the route-policy of a BGP neighbor is changed, manual operations are required to re-send the UPDATE information to the neighbor.A . TrueB . FalseView AnswerAnswer: B
On the broadcast or nbma network, not all neighbors will establish adjacency.
On the broadcast or nbma network, not all neighbors will establish adjacency.A . TrueB . FalseView AnswerAnswer: A
MUX VLAN provides a mechanism for network resource control through VLAN. Which of the following concepts do not belong to MUX VLAN?
MUX VLAN provides a mechanism for network resource control through VLAN. Which of the following concepts do not belong to MUX VLAN?A . Primary VLANB . Slave VLANC . Guest VLAND . Interworking VLANView AnswerAnswer: C
IGMPv1 only contains two message types: membership query and membership report.
IGMPv1 only contains two message types: membership query and membership report.A . TrueB . FalseView AnswerAnswer: A
Since the attribute AS-PATH cannot work well in the AS, it is stipulated that BGP routers will not announce any update information from IBGP peers to its IBGP peers.
Since the attribute AS-PATH cannot work well in the AS, it is stipulated that BGP routers will not announce any update information from IBGP peers to its IBGP peers.A . TrueB . FalseView AnswerAnswer: A