What is the most effective way to view device alarms through CLI?
What is the most effective way to view device alarms through CLI?A . display interface briefB . display c1ockC . display alarmD . display current-configurationView AnswerAnswer: C
The network administrator A wants to use ACL to match only the four routing entries 1, 3.5, and 7 in the figure. How many ACL rules does the network administrator A need to configure at least?
The network administrator A wants to use ACL to match only the four routing entries 1, 3.5, and 7 in the figure. How many ACL rules does the network administrator A need to configure at least? A . 2B . 1C . 4D . 3View AnswerAnswer: B
In OSPF, ABR will convert all Type 7 LSAs in the NSSA area into Type 5 LSAs.
In OSPF, ABR will convert all Type 7 LSAs in the NSSA area into Type 5 LSAs.A . TRUEB . FALSEView AnswerAnswer: B
The routing attributes of the three routing entries are shown in the figure. Assuming that the next hop of the three routing entries are all reachable, when the three routing entries arrive at the BP router in sequence, by default, BGP will finally select one route entry?
The routing attributes of the three routing entries are shown in the figure. Assuming that the next hop of the three routing entries are all reachable, when the three routing entries arrive at the BP router in sequence, by default, BGP will finally select one route entry? A . Route...
As shown in the figure, all routers run OSPF, because R3 is in the backbone area, so there is no type 3 LSA in the LSDB of R3.
As shown in the figure, all routers run OSPF, because R3 is in the backbone area, so there is no type 3 LSA in the LSDB of R3. A . TRUEB . FALSEView AnswerAnswer: B
What is the value of OSPF and BFD linkage?
What is the value of OSPF and BFD linkage?A . The hello sending interval of OSPF is at the second level, which is faster than BFD inductive link stateB . The sending interval of BFD packets can reach the millisecond level, which is slower than the OSPF inductive link stateC...
As shown in the figure, network administrator A on the R1 router, after modifying the MED value of the routing entry sent to R2 through the routing policy, can control the path of traffic entering AS100.
As shown in the figure, network administrator A on the R1 router, after modifying the MED value of the routing entry sent to R2 through the routing policy, can control the path of traffic entering AS100. A . TRUEB . FALSEView AnswerAnswer: A
Which of the following is not a hardware preparation item for cutover?
Which of the following is not a hardware preparation item for cutover?A . Test the operation of the boardB . Power-on testC . Device version checkD . Cable connectivity testView AnswerAnswer: C
Therefore, the company intends to use routing strategies to prevent the traffic between different operators from passing each other. Is the configuration in the figure correct?
An enterprise purchased the leased lines of two operators. In order to optimize the route, the enterprise used the 6GP protocol to learn routing entries of the two operators. However, the company found that after such a configuration, the traffic of the export routing increased greatly. After the network engineering...
Compared with the OSPFv2 message header, what fields are added in the OSPFv3 message header?
Compared with the OSPFv2 message header, what fields are added in the OSPFv3 message header?A . IPV6 Auth TypeB . Link IDC . Instance IDD . IPV6 Router IDView AnswerAnswer: C