SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data

SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer dataA . TRUE B. FALSEView AnswerAnswer: A

February 19, 2023 No Comments READ MORE +

Which of the following is not a configurable action?

After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?A . Send an alert B. The MAC address blocks C. Interface blocking D. Traffic filteringView...

February 18, 2023 No Comments READ MORE +

What is the wrong description of the function of OSPFv3 protocol authentication?

What is the wrong description of the function of OSPFv3 protocol authentication?A . OSPFv3 can only establish a security alliance SA using manual mode B. Huawei router OSPFv3 IPSec authentication can not only support transmission mode, but also support tunnel mode C. OSPFv3 authentication relies on IPv6 packet authentication headers...

February 18, 2023 No Comments READ MORE +

If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correct

If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correctA . The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute B. Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone C. Router A supports...

February 18, 2023 No Comments READ MORE +

In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN network

In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN networkA . NVE interface B. VXVAN L2 Gateway C. VXLAN L3 Gateway D. VLANIF interfaceView AnswerAnswer: B

February 17, 2023 No Comments READ MORE +

The following description of Filter-Policy is correct?

CORRECT TEXT The following description of Filter-Policy is correct? (Radio). A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied. The build is filtered. B. Prefix lists can be used to filter both routes and packets. C. Filter-policy filters the link state information received or published, and...

February 17, 2023 No Comments READ MORE +

MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch. The interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0

MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch. The interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0A . True B. FalseView AnswerAnswer: A

February 17, 2023 No Comments READ MORE +

In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correct

In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correctA . ASBR-Sunmary-LSA is allowed to be published to the NSSA region B. AS-External-LSA is allowed to be...

February 17, 2023 No Comments READ MORE +

What state is the port in?

In RSTP, which port provides a backup path to reach the root node of the spanning tree? What state is the port in?A . Root Port and Listening Status B. Alternate Port and Forwarding Status C. Alternate Port and Learning Status D. Designated port and Listening status E. Alternate port...

February 16, 2023 No Comments READ MORE +

For Layer 2 VPN technology, the following statement is correct? Multi-select

For Layer 2 VPN technology, the following statement is correct? Multi-selectA . VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access. B. The VPLS configuration is complex and the Layer 2 network transmits BUM packets. C. BGPEVPN...

February 15, 2023 No Comments READ MORE +