In the network shown in the figure, OSPF protocol is running between R1, R2, and R3, and OSPF BFD feature is enabled. IBGP neighbor relationship is established between R1 and R3 using loopback interface. If GE0/0/1 interface of R2 is shut down, and BGP neighbor relationship is checked on R1, by default, which of the following is the longest time for R1 BGP neighbor relationship to change from Up state to Down state?
In the network shown in the figure, OSPF protocol is running between R1, R2, and R3, and OSPF BFD feature is enabled. IBGP neighbor relationship is established between R1 and R3 using loopback interface. If GE0/0/1 interface of R2 is shut down, and BGP neighbor relationship is checked on R1,...
If the "ageregate 192.168.1.0.16 detail-suppresed" command is configured on R1, which of the following is the traffic path from R3 to 192.168.1.0/24?
In the network shown in the figure, adjacent routers use directly connected interfaces to establish EBGP neighbor relationships. The Router ID of each device is 10.0.XX, and the AS number is 6500X, where X is the router number. R1 and R4 both have static routes to 192.168.1.0/24, which are introduced...
When traffic accesses the backbone network, VPN isolation is required. At this time, the interface configuration of a PE router is as follows. If the administrator needs to bind the interface to VPN1 and the interface IP address remains unchanged, which of the following descriptions of the administrator's operation is correct?
When traffic accesses the backbone network, VPN isolation is required. At this time, the interface configuration of a PE router is as follows. If the administrator needs to bind the interface to VPN1 and the interface IP address remains unchanged, which of the following descriptions of the administrator's operation is...
In a certain MPLS network, the LSP information of R1 and R3 is shown in the figure. At this time, the administrator enters the command ping -a 10.1.12.13.3.3.3 on R1. Which of the following descriptions of this scenario is correct?
In a certain MPLS network, the LSP information of R1 and R3 is shown in the figure. At this time, the administrator enters the command ping -a 10.1.12.13.3.3.3 on R1. Which of the following descriptions of this scenario is correct? A . The Echo Request message received by R2 carries...
When the administrator deploys the traffic suppression function on the switch, in the VLAN view of the device, which of the following types of messages can be suppressed based on the bit rate?
When the administrator deploys the traffic suppression function on the switch, in the VLAN view of the device, which of the following types of messages can be suppressed based on the bit rate?A . Unknown multicast messageB . Broadcast messageC . Known unicast messageD . Unknown unicast messageView AnswerAnswer: B
In the network shown in the figure, R1 and R2 establish an EBGP neighbor relationship through a direct interface, and the BFD function is enabled in the BGP process. The BFD parameters are "bfd min-tx-interval 1000 min-rx-interval 1000 detect-multiplier 6". If the IP address of GE0/0/0 on R2 is deleted and the BGP neighbor relationship is checked on R1, which of the following is the longest time for the BGP neighbor relationship on R1 to change from Up to Down?
In the network shown in the figure, R1 and R2 establish an EBGP neighbor relationship through a direct interface, and the BFD function is enabled in the BGP process. The BFD parameters are "bfd min-tx-interval 1000 min-rx-interval 1000 detect-multiplier 6". If the IP address of GE0/0/0 on R2 is deleted...
A network engineer enters "dir" on the device and obtains the following file names. Which of the following is most likely to be the version file of the device?
A network engineer enters "dir" on the device and obtains the following file names. Which of the following is most likely to be the version file of the device?A . V300R022000SPC100.cfgB . startup yl.rdbC . Ca.cerD . V300R022C00SPC100.ccView AnswerAnswer: D
Which of the following commands can be configured on an IS-IS Level-1-2 device to prevent the Level-1 device from generating a default route?
Which of the following commands can be configured on an IS-IS Level-1-2 device to prevent the Level-1 device from generating a default route?A . attached-bit advertise neverB . attached-bit advertise alwaysC . import-route isis level-2 into level-1D . attached-bit avoid-learningView AnswerAnswer: A
In a BGP/MPLS IP VPN network, VPNv4 routing transfers carry RD values. Which of the following path attributes does MP-BGP use to carry the RD value?
In a BGP/MPLS IP VPN network, VPNv4 routing transfers carry RD values. Which of the following path attributes does MP-BGP use to carry the RD value?A . Extended_CommunityB . AS_PathC . MP_REACH_NLRD . Local_PreferenceView AnswerAnswer: C
In order to support multi-topology functions, which of the following TLVs has been newly added by IS-IS?
In order to support multi-topology functions, which of the following TLVs has been newly added by IS-IS?A . TLV No. 229B . TLV No. 236C . TLV No. 129D . TLV No. 232View AnswerAnswer: A