The access control list (acl) is the order of matching rules, which can be matched regardless of the order in which the user configures the ACL rules.
The access control list (acl) is the order of matching rules, which can be matched regardless of the order in which the user configures the ACL rules.A . TrueB . FalseView AnswerAnswer: A
Different network types of the OSPF protocol can form an adjacency in the FULL state.
Different network types of the OSPF protocol can form an adjacency in the FULL state.A . TrueB . FalseView AnswerAnswer: A
IGMP Snooping runs at the data link layer, used to manage, and control multicast groups, and solve the problem of multicast packets broadcast at the third layer.
IGMP Snooping runs at the data link layer, used to manage, and control multicast groups, and solve the problem of multicast packets broadcast at the third layer.A . TrueB . FalseView AnswerAnswer: B
Huawei's enterprise network management products are the eSight, and is divided into three versions: Starter Edition, Standard Edition, and, Professional Edition. Compared with the Standard Edition, what are the main characteristics of the following are added in the Professional Edition?
Huawei's enterprise network management products are the eSight, and is divided into three versions: Starter Edition, Standard Edition, and, Professional Edition. Compared with the Standard Edition, what are the main characteristics of the following are added in the Professional Edition?A . Professional Edition provides database backup toolsB . Support multi-user managementC...
Which of the following is not an external risk of the project ?
Which of the following is not an external risk of the project ?A . Exchange rate changesB . Heavy rainC . Social unrestD . Differences in industry standardsView AnswerAnswer: D
Which of the following reasons may lead to the MSTP protocol in LAN does not work? (Multiple Choice)
Which of the following reasons may lead to the MSTP protocol in LAN does not work? (Multiple Choice)A . MSTP configuration errorB . The physical link oscillates, triggering the device to send many TC packetsC . Enable MSTP device to receive the client or pass-through of MSTP TC messagesD . The priority of the unconfigured port in the specified...
Optical power is generally used DBM represented, which of the following DBM is the current most optical transceiver device to receive and identify data?
Optical power is generally used DBM represented, which of the following DBM is the current most optical transceiver device to receive and identify data?A . -30DBMB . -10DBMC . 10DBMD . 30DBMView AnswerAnswer: B
Which of the following description of Local-Preference is correct?
Which of the following description of Local-Preference is correct?A . Local-Preference is recognized as a mandatory attribute.B . Local-Preference affects the traffic entering the ASC . Local-Preference can be spread across ASD . The default value of Local-Preference is 100View AnswerAnswer: D
Enterprise networks often use DHCP to allocate IP addresses to users. Compared with static address allocation, DHCP address allocation greatly reduces the workload of network address management.
Enterprise networks often use DHCP to allocate IP addresses to users. Compared with static address allocation, DHCP address allocation greatly reduces the workload of network address management.A . TrueB . FalseView AnswerAnswer: A
Which of the following steps or measures belong to the troubleshooting phase of the structured network troubleshooting process? (Multiple Choice)
Which of the following steps or measures belong to the troubleshooting phase of the structured network troubleshooting process? (Multiple Choice)A . Emergency planB . Preparation for rollbackC . Temporary environment constructionD . Information filteringView AnswerAnswer: AB