Regarding the cost value (Cost) of the routing protocol, which of the following description is incorrect?

Regarding the cost value (Cost) of the routing protocol, which of the following description is incorrect?A . Because different routing protocols use different basis for calculating routing costs, it is generally recommended to automatically switch when importing routes.B . Because different routing protocols have different basis for calculating routing costs,...

November 21, 2021 No Comments READ MORE +

A user reported that he could not receive emails through the email client. What are the possible reasons? (Multiple choice)

A user reported that he could not receive emails through the email client. What are the possible reasons? (Multiple choice)A . The user does not have corresponding permissionsB . Mail server failureC . Link failureD . User client setting errorView AnswerAnswer: ABCD

November 21, 2021 No Comments READ MORE +

 Layer 2 network architecture compared with the Layer 3 network architecture, with a simple structure, high efficiency advantages of data forwarding, so the future network structure will be fully turned to a Layer 2 network architecture, Layer 3 network architecture will be phased out.

 Layer 2 network architecture compared with the Layer 3 network architecture, with a simple structure, high efficiency advantages of data forwarding, so the future network structure will be fully turned to a Layer 2 network architecture, Layer 3 network architecture will be phased out.A . TrueB . FalseView AnswerAnswer: B

November 21, 2021 No Comments READ MORE +

The access control list (acl) is the order of matching rules, which can be matched regardless of the order in which the user configures the ACL rules.

The access control list (acl) is the order of matching rules, which can be matched regardless of the order in which the user configures the ACL rules.A . TrueB . FalseView AnswerAnswer: A

November 20, 2021 No Comments READ MORE +

Different network types of the OSPF protocol can form an adjacency in the FULL state.

Different network types of the OSPF protocol can form an adjacency in the FULL state.A . TrueB . FalseView AnswerAnswer: A

November 20, 2021 No Comments READ MORE +

IGMP Snooping runs at the data link layer, used to manage, and control multicast groups, and solve the problem of multicast packets broadcast at the third layer.

IGMP Snooping runs at the data link layer, used to manage, and control multicast groups, and solve the problem of multicast packets broadcast at the third layer.A . TrueB . FalseView AnswerAnswer: B

November 20, 2021 No Comments READ MORE +

 Huawei's enterprise network management products are the eSight, and is divided into three versions: Starter Edition, Standard Edition, and, Professional Edition. Compared with the Standard Edition, what are the main characteristics of the following are added in the Professional Edition?

 Huawei's enterprise network management products are the eSight, and is divided into three versions: Starter Edition, Standard Edition, and, Professional Edition. Compared with the Standard Edition, what are the main characteristics of the following are added in the Professional Edition?A .  Professional Edition provides database backup toolsB .  Support multi-user managementC...

November 20, 2021 No Comments READ MORE +

Which of the following is not an external risk of the project ?

Which of the following is not an external risk of the project ?A . Exchange rate changesB . Heavy rainC . Social unrestD . Differences in industry standardsView AnswerAnswer: D

November 20, 2021 No Comments READ MORE +

Which of the following reasons may lead to the MSTP protocol in LAN does not work? (Multiple Choice)

Which of the following reasons may lead to the MSTP protocol in LAN does not work? (Multiple Choice)A . MSTP configuration errorB . The physical link oscillates, triggering the device to send many TC packetsC .  Enable MSTP device to receive the client or pass-through of MSTP TC messagesD .  The priority of the unconfigured port in the specified...

November 20, 2021 No Comments READ MORE +

 Optical power is generally used DBM represented, which of the following DBM is the current most optical transceiver device to receive and identify data?

 Optical power is generally used DBM represented, which of the following DBM is the current most optical transceiver device to receive and identify data?A . -30DBMB . -10DBMC . 10DBMD . 30DBMView AnswerAnswer: B

November 20, 2021 No Comments READ MORE +