SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data
SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer dataA . TRUE B. FALSEView AnswerAnswer: A
Which of the following is not a configurable action?
After configuring the VLAN-based MAC address drift detection function, if the MAC address drifts, you can configure the actions of the interface according to your needs. Which of the following is not a configurable action?A . Send an alert B. The MAC address blocks C. Interface blocking D. Traffic filteringView...
What is the wrong description of the function of OSPFv3 protocol authentication?
What is the wrong description of the function of OSPFv3 protocol authentication?A . OSPFv3 can only establish a security alliance SA using manual mode B. Huawei router OSPFv3 IPSec authentication can not only support transmission mode, but also support tunnel mode C. OSPFv3 authentication relies on IPv6 packet authentication headers...
If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correct
If the Option field value in the 0SPFv3 Hello message issued by the router's GIgabit Ethermet0/0 interface is 0x000013, the following description is correctA . The Gigabit/thernetO/0/0 interface of Router A adds IPv6 routing to compute B. Router A's Gigabit/thernetO/0/0 interface belongs to the NSSA zone C. Router A supports...
In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN network
In a VXLAN network, traffic is connected to the VXLAN network, and it can also be used to communicate with the same subnet within the same XLAN networkA . NVE interface B. VXVAN L2 Gateway C. VXLAN L3 Gateway D. VLANIF interfaceView AnswerAnswer: B
The following description of Filter-Policy is correct?
CORRECT TEXT The following description of Filter-Policy is correct? (Radio). A With Filter-Policy, on ASBR in OSPF, type5LSA and type7LSA can be applied. The build is filtered. B. Prefix lists can be used to filter both routes and packets. C. Filter-policy filters the link state information received or published, and...
MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch. The interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0
MSTP switches treat RSTP switches as MSTP domains, MSTP, which are formed by a single switch. The interchange resolves the RSTBPDU to MSTBPDU, where IRPC is 0A . True B. FalseView AnswerAnswer: A
In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correct
In order to reduce the number of OSPF routes in certain areas, the OSPf protocol has developed special area functions, and the following description of the characteristics of OSPF special areas is correctA . ASBR-Sunmary-LSA is allowed to be published to the NSSA region B. AS-External-LSA is allowed to be...
What state is the port in?
In RSTP, which port provides a backup path to reach the root node of the spanning tree? What state is the port in?A . Root Port and Listening Status B. Alternate Port and Forwarding Status C. Alternate Port and Learning Status D. Designated port and Listening status E. Alternate port...
For Layer 2 VPN technology, the following statement is correct? Multi-select
For Layer 2 VPN technology, the following statement is correct? Multi-selectA . VPLS is a widely used technology in the live network, which can provide transparent transmission of three-layer messages and achieve multi-point access. B. The VPLS configuration is complex and the Layer 2 network transmits BUM packets. C. BGPEVPN...