The Agile Controller is an automated control system for network resources. It provides a unified policy engine to realize unified access control policies within the entire organization, and implements 5W1H-based (user identity, access time, access location, device type, device source, and access mode) authentication and authorization.
The Agile Controller is an automated control system for network resources. It provides a unified policy engine to realize unified access control policies within the entire organization, and implements 5W1H-based (user identity, access time, access location, device type, device source, and access mode) authentication and authorization.A . TRUEB . FALSEView...
Which of the following MPLS statements is false?
MPLS is a label forwarding technology. Which of the following MPLS statements is false?A . MPLS uses the connection-oriented control plane and connectionless data plane.B . The control plane transmits route information and distributes labels. The data plane transmits packets along the created label switched path (ISP).C . Switches in...
The interface IP address and VRRP virtual IP address can be the same.
The interface IP address and VRRP virtual IP address can be the same.A . TRUEB . FALSEView AnswerAnswer: A
Which of the following are highlights of the Service Chain component of the Agile Controller? (Multiple Choice)
Which of the following are highlights of the Service Chain component of the Agile Controller? (Multiple Choice)A . Services are orchestrated based on the Layer 3 GRE tunnels and service devices can be deployed flexibly.B . Service orchestration operations are visualized in the topology, simplifying the configuration and management.C ....
Which are the major limitation that MPLS VPN solves?
MPLS VPN is used to solve some limitations of traditional VPN technology. Which are the major limitation that MPLS VPN solves?A . Private routes cannot communicate with each other.B . Leased lines are expensive.C . Bandwidth resources cannot be fully used.D . The address space is overlapping.View AnswerAnswer: D
SDN technology advocate layered open architecture. Then which organization advocate and defines the centralized architecture and Open Flow?
SDN technology advocate layered open architecture. Then which organization advocate and defines the centralized architecture and Open Flow?A . ONFB . IETFC . ETSID . ITUView AnswerAnswer: A
What about all outgoing labels in the label forwarding table of a MPLS-capable device for the same route with the same next hop?
What about all outgoing labels in the label forwarding table of a MPLS-capable device for the same route with the same next hop?A . They must be different.B . They must be the same.C . They may be the same.View AnswerAnswer: B
What are differences between the DiffServ and IntServ models? (Multiple Choice)
What are differences between the DiffServ and IntServ models? (Multiple Choice)A . The DiffServ model provides different services destined for different destinations.B . The DiffServ model provides different services destined for different sources.C . The DiffServ model does not need to maintain the status of each flow.D . The DiffServ...
Which of the following command is used to configure the listening address of the SDN controller?
Which of the following command is used to configure the listening address of the SDN controller?A . openflow listening-ip 1.1.1.1B . sdn controller souce-address 1.1.1.1C . controller-ip 1.1.1.1D . sdn listening-ip 1.1.1.1View AnswerAnswer: A
Which of the following statements regarding the trusted and untrusted zones are true? (Multiple Choice)
Which of the following statements regarding the trusted and untrusted zones are true? (Multiple Choice)A . The direction for the access from the trusted zone to the untrusted zone is the outbound direction.B . The direction for the access from the trusted zone to the untrusted zone is the inbound...