In the network shown in the figure, R1 is configured with route penetration, then R1 sends the LSP of Level1-2 to R3, so that R3 can learn the entire network route.
In the network shown in the figure, R1 is configured with route penetration, then R1 sends the LSP of Level1-2 to R3, so that R3 can learn the entire network route. A . True B. FalseView AnswerAnswer: B
The router receives two BGP routes containing the following attributes, please select the optimal route according to the BGP route selection rules.
The router receives two BGP routes containing the following attributes, please select the optimal route according to the BGP route selection rules. A . The optimal route is route M, because its AS_Path is shorter than route N B. The optimal route is route N, because its MED is smaller than route M C. The optimal route is route N, because its AS_Path is longer than route N D. The optimal route...
There is a message in the BGP protocol that is periodically sent between BGP neighbors to maintain the neighbor relationship. This message is:
There is a message in the BGP protocol that is periodically sent between BGP neighbors to maintain the neighbor relationship. This message is:A . Update B. Hello C. open D. KeepaliveView AnswerAnswer: D
As shown in the figure, the stateful inspection firewall will forward the second TCP three-way handshake message in the figure.
As shown in the figure, the stateful inspection firewall will forward the second TCP three-way handshake message in the figure. A . True B. FalseView AnswerAnswer: B
The command to configure the VRRP preemption delay is:
The command to configure the VRRP preemption delay is:A . vrrp vrid 1 preempt-mode timer delay 20 B. vrrp vrid 1 timer delay 20 C. vrrp vrid 1 preempt-timer 20 D. vrrp vrid 1 preempt-delay 20View AnswerAnswer: A
Which of the following statements about the address used by AC to establish a CAPWAP tunnel in VRRP hot backup is correct?
Which of the following statements about the address used by AC to establish a CAPWAP tunnel in VRRP hot backup is correct?A . The physical address of the primary AC B. The physical address of the standby MC C. Any address configured in the AC is fine D. VRRP virtual addresses of the active and standby ACsView AnswerAnswer: D
As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails and the port is in the Down state. At this time, which of the following processes will the network go through to achieve stability?
As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails and the port is in the Down state. At this time, which of the following processes will the network go through to achieve stability? A . The standby port on the SWC becomes the new root port...
As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails and the port is in the Down state. At this time, which of the following processes will the network go through to achieve stability?
As shown in the figure, in the network running the RSTP protocol, the original root port of SWC fails and the port is in the Down state. At this time, which of the following processes will the network go through to achieve stability? A . The standby port on the SWC becomes the new root port...
Which of the following statements about OSPF protocol packets is wrong?
Which of the following statements about OSPF protocol packets is wrong?A . The header format of all OSPF packets is the same B. All OSPF packet headers carry the Router-ID field C. The OSPF protocol uses five types of packets to complete the transfer of routing information D. OSPF packets are encapsulated in UDP packets, and the port number is 89View...
By default, on a router running IS-IS in a broadcast network, how many seconds does DIS send CSNP messages?
By default, on a router running IS-IS in a broadcast network, how many seconds does DIS send CSNP messages?A . 10 B. 3.3 C. 30 D. 40View AnswerAnswer: A