In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is
In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement isA . The root protection feature is enabled for the specified port, and its port role can only remain as the specified port B. When the anti-TC-BPDU packet attack feature is enabled, the number of...
To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filter
To implement the traffic filtering function, you can use trapp-filter or MQC, which can be called in more views than traffic-filterA . FALSE B. TRUEView AnswerAnswer: B
Is the following description of ospf virtual links correct?
Is the following description of ospf virtual links correct?A . A virtual connection can be established in any area, after which it itself belongs to the region B. The virtual connection ip is used as the link address C. Virtual links can be used to solve the problem of zone...
Which of the following IEEE standards is specific to Gigabit Ethernet?
Which of the following IEEE standards is specific to Gigabit Ethernet?A . 8023z B. 8023ab C. 8023ad D. 8023afView AnswerAnswer: A,B
How do 8021w and 8021D handle BPDUs? (Confirmed). The
How do 8021w and 8021D handle BPDUs? (Confirmed). TheA . 8021D bridge only forwards BPDU packets received from the root bridge B. The 8021D bridge does not forward BPDU messages C. The 8021w bridge forwards only BPDU packets received from the root bridge D. 8021w Bridge does not forward BPDU...
The following description of the link state protocol is plausible?
The following description of the link state protocol is plausible?A . CPU utilization is high and loops are easy to generate B. Slow convergence and low CPU utilization C. Fast convergence and low CPU utilization D. Fast convergence and high CPU utilizationView AnswerAnswer: D
The following description of the characteristics of multi-instance CE is?
The following description of the characteristics of multi-instance CE is?A . Since the MCE device is already bound to the VPN, there is no need to bind the VPN on the PE connected to the MCE device B. The MCE device can determine the source of the routing information according...
As a network administrator, which of the following protocols can I use for network device configuration?
As a network administrator, which of the following protocols can I use for network device configuration?A . SSH B. NETCONF C. LLDP D. SNMPView AnswerAnswer: B,D
ISIS elects DIS in broadcast multiplexed access networks, and the following statement about DIS is correct? (Multiple choice)
ISIS elects DIS in broadcast multiplexed access networks, and the following statement about DIS is correct? (Multiple choice)A . ISIS elects dis by comparing priorities, and mac addresses if the priorities are consistent B. In a broadcast multiple access network, DIS sends Hello PDUs at three times the frequency C....
If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?
If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?A . PIM routers with long interface masks are elected dr. B. Compare the...